An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
Robby and John Strikes me as a big problem that the NYT is having selected emails leaked to them and I I think we should do a call to discuss the proper way to handle. On Tue, Mar 17, 2015 at 3:39 PM, Philippe Reines <[email protected]<mailto:[email protected]>> wrote: There’s a lot to respond to here, but first and foremost the premise is wrong. There is nothing wrong with anyone having personal email addresses or her emailing someone’s private account or vice versa. Maybe she was wishing Jake a happy birthday. Or I was sending her a note about her mom. Or she asking Monica about Oscar disappearing. We’re allowed to have personal lives. Second, it was her practice, as well as ours, to conduct work on the .gov system. In those cases we didn’t, which could have been for any reason, including State.gov<http://State.gov> being down. In those cases the onus is on us to make sure that anything that should have ended up in the right place did. Now, depending on what they are looking at, you can’t easily determine if that happened. They are looking at HER email, not ours. They don’t know what next step we took. The most important thing to ascertain from State is whether they are looking at specific email from the “300” – because in those cases Heather and I went one by one to determine if a) it needed to end up on .gov, and b) it did indeed end up there. Since there are less than a dozen instances of this in the 300 it was easy. One is me sending her a clip, no commentary. Another is her emailing me & Huma about something that I subsequently followed up on my .gov account. We did that for each and could share that if need be. If they’ve somehow seen some of the other 55k, we’d need to see each to determine what they were. Lastly, we should warn Monica. Huma, unless you want to Nick or I can.
From: Nick Merrill Sent: Tuesday, March 17, 2015 3:13 PM
To: Jennifer Palmieri; Cheryl Mills; Philippe Reines; Heather Samuelson; Huma Abedin; Jacob Sullivan
Subject: NYT | Email Content Here is the story that I mentioned hearing from State about over the weekend. Specific questions are below. Jen when we talked over the weekend you noted that it was fairly irresponsible for them to cherry pick leaked emails and write it up as representative. And some of the questions below are a little ridiculous to say the least. I’ll call State now and see what they know and report back. I also asked what their deadline was. Nick
Date: Tuesday, March 17, 2015 at 2:53 PM To: NSM <[email protected]<mailto:[email protected]>> Subject: emails Nick, We’re preparing a story on how Mrs. Clinton’s top advisers at the State Department used their private email accounts for some of their email correspondences with her. We’ve learned that Huma Abedin, Cheryl Mills, Philippe Reines, Jake Sullivan and Monica Hanley, used personal email accounts to correspond with her on her personal account. She also corresponded with Sidney Blumenthal about inside information he had about Libya. We have the following questions for our article: Why did the advisers use private email accounts – instead of government ones – to correspond with Mrs. Clinton? Was this the normal practice? Why did Mrs. Clinton suggest that her emails were being captured in the State Department system when she was corresponding at times with her aides on their personal accounts? Were Mrs. Clinton’s advisers given legal advice about whether it was appropriate for them to correspond with her using their personal accounts? Why did Mrs. Clinton rely on the advice of Sidney Blumenthal? — Marissa E. Astor [email protected]<http://[email protected]> (301) 613–3675
**** Then we have Dallas, Texas:
Observer: In Washington, D.C., many things start with words printed on congressional letterhead. Earlier this year, 64 GOP members of Congress asked the IRS to investigate why the foundation can keep its nonprofit status. The letter includes “media reports” claiming pay-to-play relationships between former President Bill Clinton, who received large speaking fees, and decisions made by Hillary Clinton to approve choices that benefited foundation donors. The sources of these reports range from The New York Times to hit-piece investigative books.
In July, the IRS sent letters back to the Congress informing members the review had begun. The letter also noted that the Tax Exempt and Government Entities Division (TE/GE) office in Dallas would be conducting the review.
IRS spokespeople in Dallas and Washington won’t say why the review is being conducted in Dallas. Spokespeople claim even this information would violate rules — Code 6103, staff make sure to cite — that stop them from discussing ongoing examinations. IRS officials declined to provide details about the Dallas office, including its size, or comment on the TE/GE work in general.
Stoltz says the complexity of the Clinton Foundation’s work means such an examination would take months. The IRS said it began the review in July.
Staff with Texas Congressman Pete Sessions, who signed the letter, tell the Observer that they have not heard back from the IRS with any updates or an estimate of when their examination will be complete. No one expects a decision before Nov. 8.
The case against the Clinton Foundation is multifaceted. One common attack is that the foundation has overextended its original mandate. “The Foundation’s original application to the IRS in 1997 advised that it was formed to construct a library, maintain a historical site with records, and engage in study and research,” said Tennessee Republican Rep. Marsha Blackburn in an email to the Observer. “It did not indicate an intent to conduct activities outside of the United States, which was on one of the codes included in the IRS ‘Application for Recognition for Exemption’ in effect at the time. This would appear to prohibit much of the overseas work the Foundation has performed.” Read more here from the Dallas Observer.
The war of the wills, the war of the agencies and the war of politics in Washington DC is underway. This will advance into a governmental crisis of proportions that make Watergate look small by comparison.
In recent days, the FBI has released two interesting investigative documents that were part of the Bill Clinton administration which speaks to not only anger by FBI agents but also Clinton’s own participation in pay to play. One such document was the pardon investigation of Marc Rich and the other was the entire investigation into the death of Vince Foster who did in fact commit suicide. It was the later White House coverup that mattered with regard to Foster.
Moving beyond the document release on those two items it is also notable that every time Hillary Clinton changed her email address, Huma Abedin had to notify the White House to be placed on the ‘white-list’ in order for her emails to be accepted by the White House servers. Barack Obama did email Hillary several times using a pseudonym, hence speaking to the notion that he was communicating with a non dot gov email and insecure server. Obama has issued a protective order for his communications to be protected under executive privilege.
Peter Kadzik, the deputy attorney general under Loretta Lynch had and is a long time friend of John Podesta, a former White House chief of staff for Obama and current campaign architect for the Hillary run for the White House was the point person to shut down the Clinton Foundation investigation. Kadzik was also the point person for the IRS targeting investigation and he too protected Lois Lerner and declared the matter completed without any prosecution.
While it has now been confirmed that the FBI using several agent disciplines from a variety of departments within the agency has been investigating the Clinton Foundation, there is enough evidence to date for indictments including least of which is RICO. During this ongoing investigation into the Foundation, the FBI used hidden recording devices and informants to gain answers during interviews with several witnesses and in other cases re-interviews. This information was provided to the Justice Department where the top leadership at the DoJ stopped the process that was managed by McCabe. It was his wife that was given $700,000 for her run for Senate. McCabe wanted the investigative team to continue but the DoJ shut him down. The agents instead continued. The Clinton Foundation has taken the highest priority due to the 650,000 emails on Anthony Weiner’s computer that were the collection maintained by Huma Abedin. It is here that emails are spelling out the pay to play operations in all corners of the Clinton sphere.
1. The Clinton Foundation investigation is far more expansive than anybody has reported so far and has been going on for more than a year.
2. The laptops of Clinton aides Cherryl Mills and Heather Samuelson have not been destroyed, and agents are currently combing through them. The investigation has interviewed several people twice, and plans to interview some for a third time.
3. Agents have found emails believed to have originated on Hillary Clinton’s secret server on Anthony Weiner’s laptop. They say the emails are not duplicates and could potentially be classified in nature.
4. Sources within the FBI have told him that an indictment is “likely” in the case of pay-for-play at the Clinton Foundation, “barring some obstruction in some way” from the Justice Department.
5. FBI sources say with 99% accuracy that Hillary Clinton’s server has been hacked by at least five foreign intelligence agencies, and that information had been taken from it.
Beyond all of this, it must be further noted that Hillary also had her State Department bypass law and protocol when dealing with sanctioned individuals due in part to being listed on the terror list. Hani Noor Eldin was granted a visa to the United States to lobby powerbrokers to release the ‘blind sheik’ from prison. Omar Abdel Rahman was responsible for the first World Trade Center bombing.
James Comey has taken a meeting with his boss Loretta Lynch over the scope of investigations of the Clinton cases and it for the most part has been determine that Comey laid out the events to which Lynch has perhaps backed off and allowed Comey to pursue the work of the FBI into all phases not only domestically but internationally.
The computer shared by Huma and Anthony is also at the center of another part of the investigation and does contain communications and documents which are not duplicates.
Lastly but not completely in this story, Huma Abedin has been taken off the duty as Hillary’s aide and is full time tending to her son while the father, Anthony Weiner was been dispatched to rehab for pervert and cyber sex-texting.
Dark Money refers to political spending meant to influence the decision of a voter, where the donor is not disclosed and the source of the money is unknown. Depending upon the circumstances, Dark Money can refer to funds spent by a political nonprofit or a super PAC. Here’s how:
Political nonprofits are under no legal obligation to disclose their donors. When they choose not to, they are considered Dark Money groups.
Super PACs can also be considered Dark Money groups in certain situations. While these organizations are legally required to disclose their donors, they can accept unlimited contributions from political non-profits and “shell” corporations who may not have disclosed their donors, in these cases they are considered Dark Money groups. More here.
Boston law firm accused of massive straw-donor scheme
Last Updated Nov 2, 2016 12:04 PM EDT
CBS: Hillary Clinton’s campaign is returning thousands of dollars in donations linked to what may be one of the largest straw-donor schemes ever uncovered.
A small law firm that has given money to Sen. Elizabeth Warren, Sen. Harry Reid, President Obama and many others is accused of improperly funneling millions of dollars into Democratic Party coffers. The program was exposed by the Center for Responsive Politics and the same team of Boston Globe investigative reporters featured in the movie “Spotlight.”
The Thornton Law Firm has just 10 partners, but dollar for dollar, it’s one of the nation’s biggest political donors, reports CBS News correspondent Tony Dokoupil.
But according to the firm’s own documents – leaked by a whistleblower — days or even hours after making these donations, partners received bonuses matching the amount they gave.
“Once the law firm knew that we had these records, they didn’t deny that this was the case,” said Scott Allen, Boston Globe’s Spotlight editor.
“If you give a donation and then somebody else reimburses you for that contribution, that is a clear violation of the spirit and the letter of the law at the state and federal levels,” Allen added.
Federal law limits partnerships, like the Thornton Law Firm, to a maximum donation of $2,700 per candidate. But campaign finance watchdogs say the firm used its individual partners as straw donors, allowing it to funnel money to campaigns well above that legal limit.
“Straw donor reimbursement systems are something both the FEC and the Department of Justice take very seriously, and people have gone to jail for this,” Center for Responsive Politics editorial director Viveca Novak said.
The Spotlight team and the Center for Responsive Politics looked at donations from three of the firm’s partners from 2010 to 2014. The trio and one of their wives gave $1.6 million, mostly to Democrats. Over the same period, they received $1.4 million back in bonuses.
A Thornton spokesman said the bonuses are legal because they came out of each partner’s ownership stake in the firm. In other words, they were paid with their own money.
In a statement, the firm said:
“We would like to make it clear that the Thornton law firm has complied with all applicable laws and regulations regarding campaign contributions. Ten years ago, it hired an outside law firm to review how it wanted to handle donations to politicians. It was given a legal opinion on how it should structure its program and then it hired an outside accountant to review and implement the program. It was a voluntary program which only involved equity partners and their own personal after-tax money to make donations.”
Through its employees, the firm gave to Democrats running in some of this year’s most hotly contested races — ones that could determine control of the U.S. Senate.
Thornton Law Firm donated to Democrats running in some of this year’s most hotly contested races — ones that could determine control of the U.S. Senate
CBS News
Massachusetts Republicans are calling for an investigation.
“In the end, it’s about restoring integrity to a process that folks are already extremely wary of,” Massachusetts Republican Party chair Kirsten Hughes said.
Allen said he’s not “confident at all” that this is an isolated program at Thornton.
“We’ve had a number of parties coming forward to us saying, ‘Hey, they do this at our place too.’ So the issue is always, can you prove it?” Allen said.
CBS News has learned the non-partisan Campaign Legal Center will file a complaint with the Federal Elections Commission Wednesday.
Sen. Elizabeth Warren, who has received nearly $130,000 from the firm since 2007, told the Boston Globe she will not return any money unless investigators find the donations were illegal.
NEW DIRECTION: John Brennan at a Senate Intelligence Committee hearing on his nomination to be the director of the CIA in 2013. Brennan has restructured the agency to REUTERS/Jason Reed
The CIA director has put the U.S. spy agency through a historic restructuring to cope with the era of digital warfare. Many in the agency are unhappy with the shake-up. In a series of interviews, Brennan outlines his strategy. “I think CIA really needs to up its game.”
ReutersInvestigates:WASHINGTON – When America goes to the polls on Nov. 8, according to current and former U.S. intelligence officials, it will likely experience the culmination of a new form of information war.
A months-long campaign backed by the Russian government to undermine the credibility of the U.S. presidential election – through hacking, cyber attacks and disinformation campaigns – is likely to peak on voting day, the officials said.
Russian officials deny any such effort. But current and former U.S. officials warn that hackers could post fictional evidence online of widespread voter fraud, slow the Internet to a crawl through cyber attacks and release a final tranche of hacked emails, including some that could be doctored.
“Don’t underestimate what they can do or will do. We have to be prepared,” said Leon Panetta, who served as CIA director and defense secretary in President Barack Obama’s first term. “In some ways, they are succeeding at disrupting our process. Until they pay a price, they will keep doing it.”
John Brennan, the current CIA director, declined to comment on the Russian efforts. But he said Russian intelligence operatives have a long history of marrying traditional espionage with advances in technology. More broadly, Brennan said, the digital age creates enormous opportunities for espionage. But it also creates vulnerabilities.
Citing an array of new cyber, conventional and terrorist threats, Brennan announced the most sweeping reforms of the CIA in its 69-year history 18 months ago.
Weakening the role of the Directorate of Operations, the agency’s long-dominant arm responsible for gathering intelligence and conducting covert operations, Brennan created 10 new “mission centers” where CIA spies, analysts and hackers work together in teams focused on specific regions and issues. He also created a new Directorate for Digital Innovation to maximize the agency’s use of technology, data analytics and online spying.
The information age “has totally transformed the way we are able to operate and need to operate,” Brennan told Reuters in a series of interviews. “Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”
When a new American diplomat arrives for duty at the U.S. embassy in Moscow or Beijing, CIA official say, Russian and Chinese intelligence operatives run data analytics programs that check the “digital dust” associated with his or her name. If the newcomer’s footprint in that dust – social media posts, cell phone calls, debit card payments – is too small, the “diplomat” is flagged as an undercover CIA officer.
The Russian-backed campaign to discredit the U.S. election is not isolated. Hackers believed to have links to Chinese intelligence began stealing the personal information of 22 million federal employees and job applicants in 2014, the worst known data breach in U.S. government history. Islamic State’s online propagandists continue to inspire lone wolf attacks in the United States even as the group loses territory.
A senior official from the Directorate of Operations, who backs the shake-up, said the agency is experiencing its greatest test in decades.
“The amount of threats and challenges that are facing this organization and this nation are greater than at any time in the last 30 years,” said the official, who declined to be named. “The days of a black passport, a fistful of dollars and a Browning pistol are over.”
INNER CIRCLE: President Barack Obama with Brennan and Chief of Staff Denis McDonough at the White House in 2013. The president and the CIA chief are criticized by some former agents for being overly cautious in Syria, Russia and elsewhere. Courtesy Pete Souza/The White House/Handout via REUTERS
“Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”
James Clapper, the Director of National Intelligence, praised Brennan and his efforts to retool the CIA for a new era in an interview. So did Lisa Monaco, Brennan’s successor as the President Obama’s Homeland Security and Counterterrorism adviser.
But some current and former officials question Brennan’s strategy, arguing his reforms are too digitally focused and will create a more cautious, top-heavy spy agency. At a time when the agency needs to refocus its efforts on human espionage, they say, the concentration of power in the new mission centers weakens the ability of the Directorate of Operations to produce a new generation of elite American spies.
The reforms have hurt morale, created confusion and consumed time and attention at a time of myriad threats, according to interviews with ten former officials.
Glenn Carle, a former CIA covert officer, supports Brennan and his reforms but said they have sparked a mixed reaction among directorate of operations officials who believe human intelligence is getting short shrift.
“The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention,” the often inscrutable aims of foreign leaders, Carle said. “Obtaining that is a human endeavor.”
At the same time, Brennan has stirred a different sort of criticism – that he has defied Congressional oversight. Liberal Democrats and libertarian Republicans in Congress say the Brennan-Obama tenure has been tarnished by a lack of transparency with congressional oversight committees and the public regarding surveillance, drone strikes and the agency’s use of torture against terrorism suspects during the administration of George W. Bush.
“While I think John’s overall legacy will be as a reformer, that legacy will suffer from his refusal to come to grips with the CIA’s troubled torture program,” said Senator Dianne Feinstein, D-Calif, vice chair of the Senate’s intelligence committee. “I think the new president’s CIA director must prioritize a high level of trust between the CIA and Congress to insure proper oversight is conducted.”
It’s unclear how closely the country’s next president will hew to Brennan’s strategy.
The front-runner, Democrat Hillary Clinton, has an incentive to beef up American cyber-espionage: U.S. intelligence officials blame the continuing leak of emails from her campaign on Russian-backed hacking. Clinton also expressed support for covert action in a transcript of a 2013 speech she gave to Goldman Sachs that was recently released by Wikileaks.
Republican Donald Trump, meanwhile, pledged to make cybersecurity a top priority in his administration in an October 3 speech. “For non-state terror actors, the United States must develop the ability – no matter how difficult – to track down and incapacitate those responsible and do it rapidly,” Trump said. “We should turn cyber warfare into one of our greatest weapons against the terrorists.”
In interviews at agency headquarters in Langley, Virginia, Brennan declined to comment on either candidate or discuss operational details of the CIA. But he and eight other senior CIA officials gave the most detailed description yet of their rationale for the most radical revamp of the agency since its founding in 1947.
“I look out at the next 10, 20, 30 years, and I look at technology, I look at complexity, I look at the global environment,” Brennan said. “I think CIA really needs to up its game.”
JUST-WAR THEORIST
Brennan, a 61-year-old native of north New Jersey, looks like a linebacker but talks like a technocrat. He speaks excitedly about how the CIA and other government bureaucracies can be configured in “a way to ensure optimal outcomes.”
The son of devout-Catholic Irish immigrants, Brennan speaks reverently of CIA officers as public servants who risk their lives without public accolades. He joined the agency in 1980, at the age of 24, after receiving a Master’s Degree in government with a concentration in Middle Eastern studies from the University of Texas.
“The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention. Obtaining that is a human endeavor.”
Educated in various Catholic schools, including Fordham University, Brennan says he is an adherent of just war theory – a centuries-old Christian theological argument that war is justified when it is waged in self defense, as a last resort and minimizes civilian casualties. Those beliefs, he says, have guided him in one of the most controversial aspects of his tenure in the Obama administration.
As Obama’s White House counter-terrorism adviser and CIA director, Brennan played a central role in carrying out 473 U.S. airstrikes outside conventional war zones between 2009 and 2015, primarily by drone. U.S. officials estimate the attacks have killed 2,372 to 2,581 people, including 64 to 116 civilians. Human rights groups say the totals are vastly higher. Last year, for instance, a U.S. drone strike in Pakistan accidentally killed American aid worker Warren Weinstein and Italian aid worker Giovanni Lo Porto, who were both being held captive by al Qaeda.
Brennan declined to comment on specific strikes, but said, “I still can look myself in the mirror everyday and believe that I have tried to do what is morally right, what is necessary, and what is important to keep this country safe.” He also acknowledged mistakes.
“You question yourself. You beat yourself up. You try to learn from it,” Brennan said, in a rare display of emotions. “But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”
Today, Brennan says the United States faces the most complex array of threats he has seen since joining the agency 36 years ago. As a CIA analyst, operative and executive, he has lived through the Cold War espionage duels of the 1980s; the disintegration of nation-states after the 1989 fall of the Berlin Wall; the rise of non-state terrorist groups since 2001; and the current digital disruption. Now, he says, all four dynamics are converging at once.
BOLD AND INNOVATIVE RIVALS
CIA officials say their greatest state competitors are the Russian and Chinese intelligence services. While smaller countries or terrorist groups may want to strike at the United States, Russia and China are the only two adversaries with the combination of skills, resources and motivation needed to challenge Washington.
In recent years, Moscow’s Federal Security Service, or FSB, has become adept at waging “gray zone” conflicts in Ukraine, Crimea and Syria, the officials said. In all three countries, Russian intelligence operatives have deftly shrouded protagonists, objectives and war crimes in ambiguity.
GREAT RIVALS: U.S. President Barack Obama with his Chinese and Russian counterparts, Xi Jinping and Vladimir Putin, in Beijing in 2014. Washington has faced barrages of digital threats from Beijing and Moscow; CIA insiders say the two nations remain the biggest challenge for the United States. REUTERS/Pablo Martinez Monsivais
“You beat yourself up…. But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”
One target is America’s increasingly politically polarized democracy. As Russian-backed hacking unfolded this summer, the Obama White House’s response fueled frustration among law enforcement and intelligence officials, according to current and former officials. The administration, they said, seemed to have no clear policy for how to respond to a new form of information warfare with no rules, norms or, it seemed, limits.
White House officials said the administration is still considering various methods of responding, but the responses won’t necessarily be made public.
China presents another challenge. Chinese businessmen and students continue trying to scoop up American state and economic secrets. In one bright spot, Beijing appears to be abiding by a 2015 pact signed by Obama and Chinese leader Xi Jinping that the two governments would not conduct economic espionage against one another. Chinese hacking appears to have slowed from the voracious rate of the past, which included hacking into the computers of the 2008 presidential campaigns of John McCain and Barack Obama but not releasing what was found.
“The question is whether or not it is due to greater care in terms of covering one’s tracks,” Brennan said of the apparent change. “Or whether or not they realize that they’re brand is being tarnished by this very rapacious appetite for vacuuming up things.”
Regional powers are also increasing their digital espionage efforts.
In 2014, the Obama administration blamed North Korea for the hacking of Sony Pictures’ computer system. This spring, U.S. prosecutors indicted seven Iranian hackers for allegedly trying to shut down a New York dam and conducting a cyber attack on dozens of U.S. banks. They also indicted three Syrian members of the “Syrian Electronic Army,” a pro-Syrian government group, who hacked into the websites of U.S. government agencies, corporations and news organizations.
In a 2015 case that U.S. officials said marks a worrying new trend, federal prosecutors indicted a 20-year-old hacker from Kosovo. With the help of a criminal hacker, Ardit Ferizi stole the home addresses of 1,300 members of the U.S. military, providing the information to Islamic State and posting it online, and calling for attacks on the individuals. Ferizi was arrested in Malaysia, where he was studying computer science. In September, he pleaded guilty in a U.S. federal court and was sentenced to 20 years in prison.
“This blend of the criminal actor, the nation-state actor and the terrorist actor, that’s going to be the trend over the next five years,” said John Carlin, who recently stepped down as head of the Justice Department division that monitors foreign espionage in the United States.
But some active clandestine officers argue that the intelligence community has grown too reliant on technology, a trend they trace back four decades to the directorship of Stansfield Turner. Satellite photography, remote sensors and communications intercepts have become more sophisticated, but so have encryption techniques and anti-satellite weapons.
More important, they argue, is that technology is no substitute for “penetrations” – planting or recruiting human spies in foreign halls of power. The CIA missed India’s 1998 nuclear tests and misjudged Saddam Hussein’s arsenal in 2003 because it lacked spies in the right places.
Today, these current and former CIA officials contend, American policymakers have little insight into the thinking of Vladimir Putin’s inner circle. Presidents, kings and dictators often don’t share their true intentions electronically, putting this valuable information largely beyond the scope of digital spying. The best sources are still people, and these officials believe the agency is not mounting the kind of bold human spying operations it did in the past.
Brennan and other CIA officials flatly denied downplaying human intelligence. They said aggressive, high-risk human spying is under way but they cannot go into operational detail.
One of Brennan’s predecessors, Michael Hayden, former CIA chief under President George W. Bush, says the agency strayed from its core mission during the Bush years. After the Al Qaeda attacks of Sept. 11, 2001, Hayden said, the CIA had to shift to become a paramilitary organization that devoted its most talented officers to tracking and killing terrorists. It now needs to reverse that trend by focusing on espionage against rival nations, he said.
“The constant combat of the last 15 years has pushed the expertise of the case officer in the direction of the battlefield and in the direction of collecting intelligence to create physical effects,” said Hayden, using an intelligence euphemism for killing. “At the expense of what the old guys called long-range, country-on-country intelligence gathering.”
‘OPTIMIZING CAPABILITIES’
Brennan and the eight other senior CIA officials made the case that their modernization effort will address the needs and threats described by Hayden and others. Technological advances, they said, have leveled the intelligence playing field. The web’s low cost of entry, creativity and speed benefits governments, hackers and terrorists alike.
A veteran covert operative who runs a new CIA mission center compared Brennan’s reforms to the Goldwater-Nichols Act. The landmark 1986 legislation reorganized the U.S. military into a half dozen regional commands where the Army, Navy, Air Force and Marines work together. It was a response to inter-service rivalries that bedeviled the American military in Vietnam.
The CIA equivalent involves having the agency’s five main directorates – Operations (covert spies), Analysis (trends and prediction), Science and Technology (listening devices and other gadgetry) and Digital Innovation (online sleuthing) and Support (logistics) – provide the personnel needed by each regional mission center.
CORE MISSION: Former CIA Director Michael Hayden says the agency went deeply into anti-terrorist operations during the Bush years and needs to return to its traditional mission of spying. REUTERS/Brendan McDermid
Andrew Hallman, director of the new Directorate for Digital Innovation, said the CIA has embraced cloud computing as a way to better share intelligence. In a move that shocked insiders and outsiders, the CIA awarded an $600 million contract to Amazon in 2013 to build a secure cloud computing system where multiple CIA databases can be quickly accessed.
For decades, different directorates maintained their own separate databases as a security measure, said Hallman. Some of the applications the agency used were so old – up to 30 years – that the manufacturer was no longer in business.
Turning to Amazon was designed to immediately put private-sector computing advances at the fingertips of CIA operatives. It was also an admission that it was easier for the agency to buy innovation from the private sector than try to create it internally.
Several former CIA officials criticized the new team-focused system, saying it dilutes the cultures that made each agency directorate strong. The best analysts are deeply skeptical and need to be separated from covert operatives to avoid group-think, they said. And the best covert operatives are famously arrogant, a trait needed to carry out the extraordinarily difficult task of convincing foreigners to spy for America.
Richard Blee, a former CIA clandestine officer, said the agency needed reform but highlighted a separate problem created by technological change. Instant secure communications between CIA headquarters and officers in the field has centralized decision-making in Washington, Blee said. And regardless of administration, senior officials in Washington are less willing to take a risk than field officers – virtually all of whom complain about headquarters’ excessive caution.
“The mentality across the board in Washington is to take the lowest common denominator, the easiest option, the risk-free option,” Blee said. “The Chinese are taking tough decisions, the Russians are taking tough decisions and we are taking risk-averse decisions. And we are going to pay a price for that down the road.”
Brennan says his reforms will empower CIA officers: The integrated teams in each new mission center will improve speed, adaptability and effectiveness.
“To me, that’s going to be the secret of success in the future, not just for CIA but for other organizational structures,” Brennan said. “Taking full advantage of the tools, capabilities, people and expertise that you have.”
The old ways of spycraft, Brennan argues, are no longer tenable. Asked what worries him most, he gave a technocratic answer: Twentieth century American government management practices are being rendered obsolete in the digital age.
“U.S. decision making processes need to be streamlined and accelerated,” he said. “Because the problems are not going to wait for traditional discussions.”
THE LONG VIEW: CIA headquarters in Langley, Virginia. “I look out at the next 10, 20, 30 years, and I look at technology, I look at complexity, I look at the global environment,” Brennan says. “I think CIA really needs to up its game.” REUTERS/Jason Reed
SEPARATION OF POWERS: Brennan at his Senate Intelligence Committee confirmation hearing with Senator Dianne Feinstein (D-CA). The two later crossed swords over the Senate’s probe into the Bush era CIA’s use of torture. REUTERS/Gary Cameron
Supporters hail CIA director John Brennan as a devoted public servant with a strong moral core and a tenacious work ethic. He has increased the recruitment of minority intelligence officers and promoted women to senior posts. He wears a lanyard around his neck every day that celebrates LGBT diversity at the CIA.
But some former covert operatives say Brennan is too cautious and political. Liberals accuse Brennan of protecting the CIA instead of forcing it to become more accountable to Congress. In particular, they blame Brennan for convincing President Barack Obama to oppose the release of the full 6,000-page U.S. Senate report detailing torture by the CIA during the presidency of George W. Bush. In private hearings, they said, Brennan bristled at questions from senators regarding the report.
After CIA officials searched the computer of a Senate staffer investigating torture, an outraged Sen. Dianne Feinstein accused Brennan’s CIA of provoking a “constitutional crisis” by thwarting Congress’ ability to perform its mandated right to oversee the executive-branch agency. Two other Democratic Senators called for Brennan’s resignation. Obama and White House Chief of Staff Denis McDonough aggressively defended Brennan, who eventually apologized to Feinstein.
“The exhaustive 6,000-page Senate Intelligence Committee report fully documented the program,” Feinstein told Reuters, “but the CIA under John’s leadership has had difficulty confronting this dark chapter and learning from its mistakes.”
Leon Panetta, who served as President Obama’s first CIA director, said he understood Brennan’s desire to protect CIA officers who carried out interrogation methods deemed legal at the time by the Bush administration. But he said it was important to also be open with Congress and the public.
“I think you can do both,” Panetta said. “You can protect people there [at the CIA]. And be honest with the American people.”
Brennan and his aides vehemently defend his reforms, his transparency and his response to the Senate torture investigation, which they say exaggerated the scale of CIA abuse. They say Brennan, who opposes waterboarding, successfully struck a middle course – ending torture while protecting the identities of CIA operatives.
“He did more to stand up for human rights than any other official in the administration,” said Harold Hongju Koh, a Yale Law School professor who served as Hillary Clinton’s top legal adviser in the State Department.
In the interview, Brennan said the actions of CIA officials who exceeded the Bush-era interrogation guidelines were “reprehensible.” But he said the Senate report exaggerated the scale of abuse. Brennan contended that the vast majority of CIA officers followed the Bush-era guidelines and were being unfairly “maligned by individuals who have political agendas.”
“When we do things that are within our authorized mandate, things that we are directed to do by our presidents, things that are deemed lawful by our Department of Justice,” Brennan said, “for us to be dragged through the coals on that, I find that reprehensible as well.”
Friends say Brennan say he has privately expressed frustration with the White House’s cautious response to the war in Syria and growing Russian assertiveness. But, they add, he is in many ways similar to Obama himself, questioning America’s ability to unilaterally change the world.
Brennan declined to comment on his own policy views. But he said, “I really feel as though my moral compass is pretty similar” to Obama’s. And he echoed a central tenet of Obama’s worldview.
The U.S. should act as the “world’s organizer of support to countries that are in desperate need,” Brennan said, but “recognize that our influence and power over the course of events is limited.”
—————
Digitizing the CIA
By David Rohde
Additional reporting by John Walcott and Jonathan Landay
Controls in place at the DoJ…uh huh and it is part of the Executive Branch..uh huh again.
So, what we have here are political operatives that have established a covert governmental mafia operation that works the system by a limitless team of lawyers, damage control organizations and by manipulating media, all of which are willing accomplices. While most that are paying attention consider the missing Hillary emails relate to Benghazi, it is more likely the larger inventory of communications deal with the Clinton Foundation of which the Department of Justice is a government funded operation protecting RICO collusion. Andy McCarthy describes it all in a perfect summary.
Why is Lynch rushing the search for classified e-mails but blocking the pay-to-play corruption probe?
The Wall Street Journal’s report that, for over a year, the FBI has been investigating the Clinton Foundation for potential financial crimes and influence peddling is, as Rich Lowry said Monday, a blockbuster.
As I argued over the weekend, the manner in which the State Department was put in the service of the Foundation during Hillary Clinton’s tenure as secretary is shocking. It is suggestive of a pattern of pay-to-play bribery, the monetizing of political influence, fraud, and obstruction of justice that the Justice Department should be investigating as a possible RICO conspiracy under the federal anti-racketeering laws.
The Journal’s Devlin Barrett buries the Clinton Foundation lede in the 14th paragraph of his report. Even more astonishing are his final three paragraphs:
In September, agents on the foundation case asked to see the emails contained on nongovernment laptops that had been searched as part of the Clinton email case, but that request was rejected by prosecutors at the Eastern District of New York, in Brooklyn. Those emails were given to the FBI based on grants of partial immunity and limited-use agreements, meaning agents could only use them for the purpose of investigating possible mishandling of classified information. Some FBI agents were dissatisfied with that answer, and asked for permission to make a similar request to federal prosecutors in Manhattan, according to people familiar with the matter. [FBI Deputy Director Andrew] McCabe, these people said, told them no and added that they couldn’t “go prosecutor-shopping.”
Not long after that discussion, FBI agents informed the bureau’s leaders about the Weiner laptop, prompting Mr. Comey’s disclosure to Congress and setting off the furor that promises to consume the final days of a tumultuous campaign. Let me unpack this. Readers are unlikely to know that the Eastern District of New York in Brooklyn is not just any United States attorney’s office. It is the office that was headed by Attorney General Loretta Lynch until President Obama elevated her to attorney general less than two years ago. It was in the EDNY that Ms. Lynch first came to national prominence in 1999, when she was appointed U.S. attorney by President Bill Clinton — the husband of the main subject of the FBI’s investigations with whom Lynch furtively met in the back of a plane parked on an Arizona tarmac days before the announcement that Mrs. Clinton would not be indicted. Obama reappointed Lynch as the EDNY’s U.S. attorney in 2010. She was thus in charge of staffing that office for nearly six years before coming to Main Justice in Washington. That means the EDNY is full of attorneys Lynch hired and supervised. When we learn that Clinton Foundation investigators are being denied access to patently relevant evidence by federal prosecutors in Brooklyn, those are the prosecutors — Loretta Lynch’s prosecutors — we are talking about.
Recall, moreover, that it was Lynch’s Justice Department that: refused to authorize use of the grand jury to further the Clinton e-mails investigation, thus depriving the FBI of the power to compel testimony and the production of evidence by subpoena; consulted closely with defense attorneys representing subjects of the investigation; permitted Cheryl Mills and Heather Samuelson — the subordinates deputized by Mrs. Clinton to sort through her e-mails and destroy thousands of them — to represent Clinton as attorneys, despite the fact that they were subjects of the same investigation and had been granted immunity from prosecution (to say nothing of the ethical and legal prohibitions against such an arrangement); drastically restricted the FBI’s questioning of Mills and other subjects of the investigation; and struck the outrageous deals that gave Mills and Samuelson immunity from prosecution in exchange for providing the FBI with the laptops on which they reviewed Clinton’s four years of e-mails.
That arrangement was outrageous for three reasons:
1) Mills and Samuelson should have been compelled to produce the computers by grand-jury subpoena with no immunity agreement; 2) Lynch’s Justice Department drastically restricted the FBI’s authority to examine the computers;
and 3) Lynch’s Justice Department agreed that the FBI would destroy the computers following its very limited examination.
As I have detailed, it was already clear that Lynch’s Justice Department was stunningly derelict in hamstringing the bureau’s e-mails investigation. But now that we know the FBI was simultaneously investigating the Clinton Foundation yet being denied access to the Clinton e-mails, the dereliction appears unconscionable. It had to be screamingly obvious that the Clinton State Department e-mails, run through a server that also supported Clinton Foundation activities, would be critically important to any probe of the Foundation. Consider, for example, the issue of criminal intent, over which much has been made since Director Comey stressed the purported lack of intent proof in recommending against an indictment of Mrs. Clinton for mishandling classified information.
I believe, to the contrary, that there is abundant intent evidence. The law presumes that people intend the natural, foreseeable consequences of their actions: When you’re the secretary of state, and you systematically conduct your government business on private, non-secure e-mail rather than the government’s secure servers, you must know it is inevitable that classified information will be transmitted through and stored on the private server.
Still, even though Clinton’s misconduct was thus willful and grossly negligent, no sensible person believes she was trying to harm the United States; the damage she did to national security was an easily foreseeable consequence of her scheme, but that damage was not what motivated her actions. In such circumstances, it is a common tactic of defense lawyers to confound motive and criminal intent. Every criminal statute has an intent element (i.e., a requirement to prove that conduct was knowing, willful, intentional, or grossly negligent). Prosecutors, however, are virtually never required to prove motive. To be sure, they usually do introduce evidence of motive, because establishing a motive often helps to prove intent. But motive can sometimes confuse matters, so proving it is not mandatory. A common, concrete example is helpful here: the guy who robs a bank because he is strapped for cash and his mom needs an operation. Although it was not the robber’s purpose to petrify the bank teller, proving that he had a desperate need for money helps demonstrate that his theft of money was quite intentional — not an accident or mistake. So even though we can all agree that our bank robber did not have a motive to do harm, his benign motive does not absolve him of guilt for the bank robbery he fully intended to commit.
Yet, such absolution is exactly what Comey offered in claiming there was insufficient proof of criminal intent to charge Clinton with mishandling classified information. It was a rationale that echoed public comments by President Obama and Lynch’s Justice Department. They would have you believe that because Clinton was not motivated by a desire to harm national security she cannot have intended to violate the classified-information laws. It is sleight-of-hand, but it was good enough for Democrats and the media to pronounce Clinton “exonerated.” Now, however, let’s consider the Clinton Foundation. While Clinton may not have been motivated to harm our national security, she was precisely motivated to conceal the corrupt interplay of the State Department and the Clinton Foundation.
That was the real objective of the home-brew server system: Mrs. Clinton wanted to shield from Congress, the courts, and the public the degree to which she, Bill, and their confederates were cashing in on her awesome political influence as secretary of state. That is exactly why she did business outside the government system that captures all official e-mails; and, critically, it perfectly explains why she deleted and attempted to destroy 33,000 e-mails — risibly claiming they involved yoga routines, Chelsea’s wedding, and the like. While knowing the purpose of the private server system may not advance our understanding of the classified-information offenses, it greatly advances our understanding of the scheme to make the Clinton Foundation a State Department pay-to-play vehicle.
Consequently, the Clinton e-mails generated in the course of this scheme are apt to be highly probative of public-corruption offenses. With that in mind, let’s go back to the Journal’s account of why Loretta Lynch’s EDNY prosecutors have blocked the FBI’s Clinton Foundation investigators from examining the Clinton e-mails found on the laptop computers of Cheryl Mills and Heather Samuelson: Those emails were given to the FBI based on grants of partial immunity and limited-use agreements, meaning agents could only use them for the purpose of investigating possible mishandling of classified information.
The Journal’s report says the FBI’s Clinton Foundation team was “dissatisfied” with this explanation — as well they should have been. The grants of immunity and limited-use agreements were disgraceful for the reasons outlined above. Significantly, however, the limitations imposed on the classified-information investigation should not, in the main, be binding on the Clinton Foundation investigation. Of course, the immunity grants to Mills and Samuelson must be honored even though they should never have been given in the first place. But those agreements only protect Mills and Samuelson. They would not prevent evidence found on the computers and retained by the FBI from being used against Hillary Clinton or any other possible conspirator.
Clearly, that is why agents on the FBI’s Clinton Foundation team wanted to get their investigation out of the EDNY’s clutches and move it to the U.S. attorney’s office in the Southern District of New York (my office for many years, as well as Jim Comey’s). The SDNY has a tradition of relative independence from the Justice Department and a well-earned reputation for pursuing political-corruption cases aggressively — a reputation burnished by U.S. attorney Preet Bharara’s prosecutions of prominent politicians from both parties. Alas, the Clinton Foundation agents were said to be barred from “prosecutor shopping” by FBI Deputy Director Andrew McCabe — the official whose wife’s Virginia state senate campaign was infused with $675,000 in cash and in-kind contributions by political committees controlled by Governor Terry McAuliffe, a notorious Clinton fixer and former Clinton Foundation board member.
Because of Democratic and media furor over Director Comey’s reopening of the Clinton e-mails investigation last week, the FBI is now under enormous pressure to review tens of thousands of e-mails stored on the laptop shared by Huma Abedin and Anthony Weiner. The point is to hound the bureau into announcing before Election Day (seven days from now) whether any new classified e-mails have been found. If none are found, this outcome will be spun as yet another “exoneration” of Hillary Clinton.
Here, however, is the real outrage: Beneath all this noise, Loretta Lynch’s Justice Department is blocking the FBI from examining Clinton e-mails in connection with its investigation of the Clinton Foundation — an investigation that is every bit as serious. Were it not for the Clinton Foundation, there probably would not be a Clinton e-mail scandal. Mrs. Clinton’s home-brew communications system was designed to conceal the degree to which the State Department was put in the service of Foundation donors who transformed the “dead broke” Clintons into hundred-millionaires.
At this point, the reopened classified-information investigation is a distraction: Under the Comey/DOJ “insufficient intent evidence” rationale, there would be no charges even if previously undiscovered classified e-mails were found on the Abedin/Weiner computer. Instead, what is actually essential is that the FBI’s Clinton Foundation investigators get access to all the thousands of Clinton e-mails, including those recovered from the Mills and Samuelson laptops. The agents must also have the time they need to piece together all the Clinton e-mails (from whatever source), follow up leads, and make their case. No one seems to notice that they are being thwarted. Hillary hasn’t even been elected, but already we are benumbed by Clinton Scandal Exhaustion Syndrome.
— Andrew C. McCarthy is a policy fellow at the National Review Institute. His latest book is Faithless Execution: Building the Political Case for Obama’s Impeachment.