The Secrets and Aliases of Obama Admin

Thank you Kimberley but it appears to the rest of the country, the secreted Obama administration goes way beyond emails and aliases. We can start with Fast and Furious and the IRS scandal is by no means the end.

The Obama Secrets Regime

Republicans ban the IRS from private email. But why not all federal employees?

By KIMBERLEY A. STRASSEL

WSJ: Some scandals come on fast, and some creep up on Washington. The slow-rolling outrage of 2015—Obama administration secrecy—received a small correction in this week’s omnibus budget bill, but it deserves far more attention. It’s time for the federal government to come back on the grid.

A steady drip of news has shown that for seven years now, the highest (and lowest) echelons of the Obama administration have conducted the people’s business in secret, via private email addresses and other hidden electronic means. They’ve been doing so in contravention of department guidelines, executive orders and statutes that require record-keeping and public accountability. Since those rules are well known and understood, it has to be assumed that they’ve been doing it purposely, to hide their actions.

The New York Times on Thursday revealed the latest email-hider: Defense Secretary Ash Carter. Mr. Carter was confirmed in February, and from the start used a private account to correspond with aides about everything from legislation to media appearances. He may well have discussed far more serious, classified matters, but we don’t know. That’s because we must rely on Mr. Carter’s word that he turned all his work correspondence over to the Defense Department. Just as we must trust that Hillary Clinton didn’t delete anything official from the private server she used as secretary of state.

Speaking of the Democratic front-runner, it seems that Mr. Carter continued to use his private email account for two full months after the news broke about Mrs. Clinton’s ether escapades. So the defense secretary either a) doesn’t read the news; b) thinks rules apply to him even less than they do Mrs. Clinton; or c) felt the secrecy afforded was worth the risk of getting caught. It seems Mr. Carter didn’t stop until White House Chief of Staff Denis McDonough—who was watching the Hillary explosion—told him in May to cut it out.

Secrecy aside, this marks the second top Obama national-security official to be caught winging around potentially sensitive information on unsecured email. Mr. Carter has presumably sat in on a few briefings about the growing threat from hackers and the urgent need for better cybersecurity.

One irony of these scandals is that, in seeking to keep government business secret from Americans, officials make it more available to foreign enemies.

Former EPA Administrator Lisa Jackson used private email accounts. She and Agriculture Secretary Tom Vilsack also used email aliases, making it harder for Freedom of Information Act filers to track down correspondence. Former Health and Human Services Secretary Kathleen Sebelius used private email. As did former Acting Labor Secretary Seth Harris, who had three private accounts.

The head of the Chemical Safety Board used a private account and didn’t preserve the correspondence. High-ranking Justice Department officials—including the former head of the criminal division—were off the government grid. Disgraced former IRS official Lois Lerner used two off-reservation email addresses, as well as an internal instant-messaging service that didn’t archive conversations.

When the folks at the top routinely break the rules, the folks lower down figure they get to as well. Mrs. Clinton’s aides conducted business off government servers. A former EPA official strategized over private email with environmental groups about how to shut down the proposed Pebble Mine in Alaska. Attorney Chris Horner, of the Energy and Environment Legal Institute, recently unearthed emails showing an EPA official working with outside groups over private email to draft Mr. Obama’s climate regulations.

The Government Business Council this year interviewed 412 “high-level” federal executives about private email. A full one-third admitted it is used at least “sometimes” for government work. (The number was 41% at the Defense Department.) Only 18% said private email is “never” used. And 31% admitted these emails aren’t archived—meaning a big chunk of government business has been deleted from the public record.

Republicans this week included in the omnibus bill a rider that bars IRS employees from using private email for work. The question is why they stopped there. Conservatives complain ceaselessly about the Obama administration’s extralegal or abusive practices, and the record shows a main conduit for these shenanigans is private email. Since we can have no confidence they will provide a full record of their private correspondence, the wiser course is to bar it entirely. For every federal employee.

The best excuse any Obama official has been able to come up with for these accounts is “convenience”—and that’s a hoot in today’s world of easy-to-use technology. More to the point, who ever said federal employees are due “convenience”? They aren’t the average American. Quite the opposite. They serve the average American, and a core duty is to create a public record of their work. If Republicans want a 2016 issue that will resonate with the public, here’s one: End the Obama Secrets Regime.

One last thing….a new release of some Hillary emails and she was told her Blackberry was not an acceptable means of communication by officials at her State Department. She ignored it all.

foia black

Juniper Hacked, Several Govt Agencies at Risk

Backdoor Code Found in Firewall

Engadget: One of the reasons corporate users and the privacy-minded rely on VPNs is to control access to their networks and (hopefully) not expose secrets over insecure connections. Today Juniper Networks revealed that some of its products may not have been living up to that standard, after discovering “unauthorized code” in the software that runs on its NetScreen firewalls during a code review. Pointed out by security researcher “The Grugq,” the backdoor has been present since late 2012 and can only be fixed by upgrading to a new version of software just released today.

Telnet / ssh exposes a backdoor added by attackers to ScreenOS source code. This has been there since August 2012. Noted code here.

The pair of issues that created the backdoor would allow anyone who knows about it to remotely log in to the firewall as an administrator, decrypt and spy on supposedly secure traffic, and then remove any trace of their activity. Obviously this is a Very Bad Thing, although Juniper claims it has not heard of any exploitation in the wild (which would be difficult, since no one knew it existed and attackers could hide their traces) so far.

Beyond sending IT people sprinting to patch and test their setups, now we can all speculate about which friendly group of state-sponsored attackers is responsible. US government officials have recently been pushing for mandated backdoor access to secure networks and services, but the Edward Snowden saga made clear that even our own country’s personnel aren’t always going to ask permission before snooping on any information they want to check out. I contacted Juniper Networks regarding the issue, but have not received a response at this time.

Update: A Juniper Networks spokesperson told us:

During a recent internal code review, Juniper discovered unauthorized code in ScreenOS® that could allow a knowledgeable attacker to gain administrative access and if they could monitor VPN traffic to decrypt that traffic. Once we identified these vulnerabilities, we launched an investigation and worked to develop and issue patched releases for the impacted devices. We also reached out to affected customers, strongly recommending that they update their systems and apply the patched releases with the highest priority.

The patched releases also address an SSH bug in ScreenOS that could allow an attacker to conduct DoS attacks against ScreenOS devices. These two issues are independent of each other.

Newly discovered hack has U.S. fearing foreign infiltration

Washington (CNN) A major breach at computer network company Juniper Networks has U.S. officials worried that hackers working for a foreign government were able to spy on the encrypted communications of the U.S. government and private companies for the past three years.

The FBI is investigating the breach, which involved hackers installing a back door on computer equipment, U.S. officials told CNN. Juniper disclosed the issue Thursday along with an emergency security patch that it urged customers to use to update their systems “with the highest priority.”

The concern, U.S. officials said, is that sophisticated hackers who compromised the equipment could use their access to get into any company or government agency that used it.

One U.S. official described it as akin to “stealing a master key to get into any government building.”

The breach is believed to be the work of a foreign government, U.S. officials said, because of the sophistication involved. The U.S. officials said they are certain U.S. spy agencies themselves aren’t behind the back door. China and Russia are among the top suspected governments, though officials cautioned the investigation hasn’t reached conclusions.

It’s not yet clear what if any classified information could be affected, but U.S. officials said the Juniper Networks equipment is so widely used that it may take some time to determine what damage was done.

A senior administration official told CNN, “We are aware of the vulnerabilities recently announced by Juniper. The Department of Homeland Security has been and remains in close touch with the company. The administration remains committed to enhancing our national cybersecurity by raising our cyber defenses, disrupting adversary activity, and effectively responding to incidents when they occur.”

Juniper Networks’ security fix is intended to seal a back door that hackers created in order to remotely log into commonly used VPN networks to spy on communications that were supposed to be among the most secure. A free trial vpn has been helpful for those new to the VPN world to decide if it is right for them.

Juniper said that someone managed to get into its systems and write “unauthorized code” that “could allow a knowledgeable attacker to gain administrative access.”

Such access would allow the hacker to monitor encrypted traffic on the computer network and decrypt communications.

Juniper sells computer network equipment and routers to big companies and to U.S. government clients such as the Defense Department, Justice Department, FBI and Treasury Department. On its website, the company boasts of providing networks that “US intelligence agencies require.”

Its routers and network equipment are widely used by corporations, including for secure communications. Homeland Security officials are now trying to determine how many such systems are in use for U.S. government networks.

Juniper said in its security alert that it wasn’t aware of any “malicious exploitation of these vulnerabilities.” However, the alert also said that attackers would leave behind no trace of their activity by removing security logs that would show a breach.

“Note that a skilled attacker would likely remove these entries from the log file, thus effectively eliminating any reliable signature that the device had been compromised,” the Juniper security alert said. If encrypted communications were being monitored, “There is no way to detect that this vulnerability was exploited,” according to the Juniper security alert.

According to a Juniper Networks spokeswoman’s statement, “Once we identified these vulnerabilities, we launched an investigation and worked to develop and issue patched releases for the impacted devices. We also reached out to affected customers, strongly recommending that they update their systems.”

U.S. officials said it’s not clear how the Juniper source code was altered, whether from an outside attack or someone inside.

The work to alter millions of lines of source code is sophisticated. The system was compromised for three years before Juniper uncovered it in a routine review in recent weeks.

Juniper said it was also issuing a security fix for a separate bug that could allow a hacker to launch denial-of-service attacks on networks.

Hagel: WH Worked to Destroy Me

Hagel: The White House Tried to ‘Destroy’ Me

21st Century Genocide, Syria

On regime change in Syria, the White House capitulates to Russia

WashingtonPost Editorial Board: RUSSIAN PLANES are still bombing Western-backed forces in Syria every day and targeting hospitals, bakeries and humanitarian corridors. Moscow is still insisting that blood-drenched dictator Bashar al-Assad remain in power indefinitely while trying to exclude opposition groups from proposed peace negotiations by claiming they are terrorists.

Nevertheless, Secretary of State John F. Kerry insisted Tuesday after meeting with Vladi­mir Putin that the Russian ruler and the Obama administration see Syria “in fundamentally the same way.” Unfortunately, that increasingly appears to be the case — and not because Mr. Putin has altered his position.

For four years, President Obama demanded the departure of Mr. Assad, who has killed hundreds of thousands of his own people with chemical weapons, “barrel bombs,” torture and other hideous acts. Yet in its zeal to come to terms with Mr. Putin, the Obama administration has been slowly retreating from that position. On Tuesday in Moscow, Mr. Kerry took another big step backward: “The United States and our partners are not seeking so-called regime change,” he said. He added that a demand by a broad opposition front that Mr. Assad step down immediately was a “non-starting position” — because the United States already agreed that Mr. Assad could stay at least for the first few months of a “transition process.”

Mr. Kerry’s rhetorical capitulation was coupled with the observation that the administration doesn’t “believe that Assad himself has the ability to be able to lead the future Syria.” But he now agrees with Mr. Putin that the country’s future leadership must be left to Syrians to work out. That’s a likely recipe for an impasse — especially as Mr. Assad is still saying he won’t even negotiate with any opponents who are armed or backed by foreign governments. At the same time, the administration’s forswearing of “regime change” sends a message to Mr. Putin and his Iranian allies: The power structure in Damascus that has granted Russia a naval base and served as a conduit for Iranian weapons to the Hezbollah militia in Lebanon can remain. (complete editorial here)

“If the Dead Could Speak” reveals some of the human stories behind the more than 28,000 photos of deaths in government custody that were smuggled out of Syria and first came to public attention in January 2014.

The report lays out new evidence regarding the authenticity of what are known as the Caesar photographs, identifies a number of the victims, and highlights some of the key causes of death. Human Rights Watch located and interviewed 33 relatives and friends of 27 victims whose cases researchers verified; 37 former detainees who saw people die in detention; and four defectors who worked in Syrian government detention centers or the military hospitals where most of the photographs were taken. Using satellite imagery and geolocation techniques, Human Rights Watch confirmed that some of the photographs of the dead were taken in the courtyard of the 601 Military Hospital in Mezze.

If you can stomach more truth, torture and genocide click here.

Why is this an important story? It is a holocaust at the hands of the Syrian leader, Bashir al Assad, a deadly tyrannical leader who is fully supported by Vladimir Putin of Russia and the rogue regime of Iran. Further questions are required, where is the United Nations? Where is the International Criminal Court, why no modern day Nuremberg trial? Why have Western leaders including John Kerry, Barack Obama, David Cameron even the Middle East Gulf States come to accept this?

Many across America say that Syria is not our problem. While there is some truth to that, when the United States is taking in hundreds of thousands refugees without vetting and Europe is being crushed by migrants, it does become a problem for at least America.

The full Human Rights Watch report is here. In full disclosure, multi-billionaire George Soros gave $100 million to HRW in 2010, but it seems there is selective attention, attitudes and investigations by Human Rights Watch as noted with regard to Iran.

Full Story on San Bernardino Accomplice, Marquez

Marquez-Complaint-Charging-Document-12-17En­rique Mar­quez, the friend of ter­ror­ist Syed Rizwan Farook, was ar­res­ted Dec. 17 and charged with con­spir­ing to give ma­ter­i­al sup­port to a ter­ror­ist plot, ac­cord­ing to a char­ging state­ment re­leased by fed­er­al of­fi­cials.

Marquez-Complaint-Charging-Document-12-17 https://assets.documentcloud.org/documents/2648603/Marquez-Complaint-Charging-Document-12-17.pdf

SAN BERNARDINO, Calif. — Enrique Marquez, who bought the assault rifles used in a deadly attack here, was charged Thursday with conspiring to provide material support to terrorists, federal officials said.

Marquez, 24, was also charged in federal court with making a false statement in connection with the acquisition of firearms used in the attack, the Justice Department announced.

These charges are the first to stem from what became a sprawling global investigation into the Dec. 2 massacre at an office holiday gathering, a probe that has remained focused on the man who once lived next door to one of the attackers.

Syed Rizwan Farook and Tashfeen Malik, a married couple with a young baby, killed 14 people and wounded 21 others in what authorities said was a terrorist attack. The couple died in a shootout with police hours later.

Officials say that Marquez and Farook, former neighbors, had discussed mounting a attack in 2012, a year before the FBI says Farook and his future wife began corresponding online about waging violent jihad.

The FBI arrested Marquez on Thursday and he is expected to make his first court appearance in Riverside, Calif., later in the day.

“While there currently is no evidence that Mr. Marquez participated in the Dec. 2, 2015 attack or had advance knowledge of it, his prior purchase of the firearms and ongoing failure to warn authorities about Farook’s intent to commit mass murder had fatal consequences,” U.S. Attorney Eileen M. Decker of the Central District of California said in a statement.

Authorities also said Thursday that in addition to buying the guns used by the husband-and-wife attackers, Marquez had bought explosive material used to construct the pipe bomb authorities found at the Inland Regional Center after the shooting attack.

Marquez and Farook were friends who fixed up cars together and were also connected through marriage. Last year, Marquez married Mariya Chernykh, and her sister Tatiana is married to Farook’s brother, a Navy veteran named Syed Raheel Farook. A co-worker of Marquez said the marriage to Chernykh was arranged and described it as strained.

Marquez has also told the FBI that he and Farook talked about mounting some kind of attack in 2012, according to senior U.S. law enforcement officials. But he said said they were scared off after a terrorism investigation in Riverside, Calif., that year ended with four local men arrested for plotting to kill Americans in Afghanistan. The men were convicted and sentenced to prison.

Authorities say Marquez legally purchased two assault rifles in 2011 and 2012 that were eventually used in the massacre this month at the Inland Regional Center. California law states that transferring gun ownership from one person to another must be done by a registered dealer. Exemptions include transfers from a parent to an adult child or transfers between spouses.

Some Democratic lawmakers responded immediately with vows to push legislation to tighten gun trafficking laws.

“We must do everything we can to ensure that deadly weapons – like the rifles used in the San Bernardino shootings – do not fall into the hands of terrorists, violent criminals, and drug traffickers,” Sen. Patrick Leahy (D-Vt.), ranking member of the Judiciary Committee, said in a statement. “Law enforcement officials have complained for years that they lack effective tools necessary to investigate and deter straw purchasers and gun traffickers.  Today’s arrest of the individual who provided the rifles for the San Bernardino shooters is a reminder that we need to strengthen our laws to give law enforcement agents and prosecutors the tools they need to fight terrorism and violent crime.”

Leahy said he would reintroduce legislation to make straw purchasing a federal crime and establish tough penalties for those who traffic guns to terrorists and criminals.

Law enforcement authorities searched Marquez’s home three days after the shooting. At the time, Marquez was not charged with a crime, and officials said he was cooperating with the investigation. He had checked himself into a mental-health facility in the aftermath of the shooting, but has cooperated with the FBI after he was tracked down.

Two days before his Riverside home was raided, Marquez had posted a garbled message on Facebook: “I’m. Very sorry sguys. It was a pleasure.” When he didn’t show up for work the next day as a doorman at a pirate-themed neighborhood bar, his co-workers began to worry that he may have become suicidal. Much more detail here.