Porn Scandal in Federal Govt Continues

SMH = Shaking my Head

Feds Have Found ‘Unbelievable’ Amounts of Child Porn on National Security Computers. Is This the Solution?

A top National Security Agency official wants to keep tabs on national security personnel off-the-clock, in part by tracking their online habits at home. The aim is to spot behavior that might not be in America’s best interests.

Historically, some illicit activity, like downloading child pornography, which is different to perfectly legal and enjoyable content from sites similar to tubev, has occurred on government computers and been prosecuted.

But today, the digital lives of employees cleared to access classified information extend beyond the office.

About 80 percent of the National Security Agency workforce has retired since Sept. 11, 2001, says Kemp Ensor, NSA director of security. When the millennial and Gen Y staff that now populate the spy agency get home, they go online.

“That is where were we need to be, that’s where we need to mine,” Ensor said.

Currently, managers only look for aberrant computer behavior on internal, agency-owned IT systems – it’s a practice known as “continuous monitoring.”

But the military and intelligence communities are beginning to broaden checks on cleared personnel in the physical and digital worlds. It used to be that national security workers were re-investigated only every five or 10 years.

Under the evolving “continuous evaluation” model, the government will periodically search for signs of problems through, for example, court records, financial transactions, and — if authorized — social media posts.

Ensor and other federal officials spoke April 28 about new trends in personnel security at an Intelligence and National Security Alliance symposium in Chantilly, Virginia.

On government devices, “the amount of child porn I see is just unbelievable,” said Daniel Payne, director of the Pentagon’s Defense Security Service. The point being, there’s a need to routinely scan agency network activity and criminal records to gauge an individual’s suitability to handle classified information.

Payne, whose 34 years of counterintelligence experience have spanned the military, CIA and National Counterintelligence and Security Center, was not referring to any specific agency or any specific timeframe, his current employer told Nextgov.

Payne just returned to the Defense Security Service in February, after starting his career there.

“Director Payne provided this example to demonstrate the range of issues identified during the personnel security process, and the range and value of different data sources that have a bearing on an individual’s ability to access sensitive information,” the Defense Security Service said in an emailed statement.

Ensor echoed his colleague’s concerns, noting he sees child pornography on NSA IT systems. In the national security space, “what people do is amazing,” he said. Ensor’s guess about the presence of explicit material is that there are many “introverts staring at computer screens” day in and day out. This is why it is so important to look at individuals holistically when determining who might be a so-called insider threat, Ensor said.

In the past, military and intelligence personnel have exploited minors online, without notice, for years or even an entire career.

The Boston Globe broke a story in 2010 that a significant number of federal employees and contractors with high-level security clearances downloaded child pornography — sometimes on government computers — at NSA and the National Reconnaissance Office, among other defense agencies.

At least one NSA contractor holding a top secret clearance told investigators in 2007 he had been spending $50 to $60 monthly fees on various sexually explicit websites similar to hdpornvideo.xxx for the past three years, according to a Defense inspector general report on the matter. After each session on the porn sites, he would wipe the browsing history of that system. The Pentagon investigation did not state who owned the computer.

More recently, a military official pleaded guilty to pedophile crimes and accessing child pornography through the Internet — but at home.

On April 15, a U.S. district judge sentenced former Army Corps of Engineers official Michael Beeman, of Virginia, to 30 years in prison for molesting minors, beginning in the 1980s while working in public affairs at Patrick Air Force Base. He later downloaded child pornography to personal devices, court records show.

Case files state the illegal online activity occurred between 2010 and 2014, which according to LinkedIn, was when Beeman served as an Army Corps of Engineers public affairs regional chief.

Judge Signals Hillary for Deposition on Emails/Then Trump

Federal judge opens the door to Clinton deposition in email case

A federal judge on Wednesday opened the door to interviewing Democratic presidential front-runner Hillary Clinton as part of a review into her use of a private email server while secretary of State.

Judge Emmet Sullivan of the U.S. District Court for the District of Columbia laid out the ground rules for interviewing multiple State Department officials about the emails, with an eye toward finishing the depositions in the weeks before the party nominating conventions.

Clinton herself may be forced to answer questions under oath, Sullivan said, though she is not yet being forced to take that step.

“Based on information learned during discovery, the deposition of Mrs. Clinton may be necessary,” Sullivan said in an order on Wednesday. [READ THE ORDER BELOW] Discovery is the formal name for the evidence-gathering process, which includes depositions.

“If plaintiff believes Mrs. Clinton’s testimony is required, it will request permission from the Court at the appropriate time.”

The order, which came in the course of a lawsuit from conservative watchdog group Judicial Watch, leaves open the possibility that Clinton will be forced to answer detailed questions on the eve of her formal selection as the Democratic presidential nominee about her creation of the server.

Any deposition would surely roil the presidential race and force her campaign to confront the issue, which has dogged her for a year. “Her legal team is really going to fight that really hard,” predicted Matthew Whitaker, a former U.S. attorney who has raised questions about Clinton’s email setup.

“You have to take her deposition in this case to fully understand how it was designed and the whys and the what-fors.”

While leaving the door open to Clinton’s eventual deposition, Sullivan on Wednesday ordered at least six current and former State Department employees to answer questions from Judicial Watch, which has filed multiple lawsuits over the Clinton email case.

That list includes longtime Clinton aide Huma Abedin, former chief of staff Cheryl Mills, under secretary for management Patrick Kennedy, former executive secretary Stephen Mull and Bryan Pagliano, the IT official believed to be responsible for setting up and maintaining the server.

The judge also ordered the State Department to prepare a formal answer about Clinton’s emails. Donald Reid, a senior security official, may also be asked to answer questions, if Judicial Watch so decides.

That process is scheduled to be wrapped up within eight weeks, putting the deadline in the final week of June.

Judicial Watch brought suit against the State Department under the Freedom of Information Act (FOIA) in an effort to bring Abedin’s emails to light. The lawsuit has since evolved into a battleground over Clinton’s use of the private server.

Clinton’s Republican critics have repeatedly accused her of setting up the private server and then deleting roughly half its contents to evade public scrutiny. In the process, her critics say, Clinton may have made government secrets vulnerable to hackers.

The FBI and government inspectors general are conducting separate investigations related to the server, and the prospect that classified information might have been mishandled.

Clinton has said that she has yet to be contacted by the FBI to set up an interview as part of its investigation, despite long speculation that she will be.

But any deposition in the Judicial Watch case could frustrate that process for Clinton’s camp.

“You only want your client to tell their story once if at all,” said Whitaker. “If you’re going to stake out some ground in a deposition which is under oath, that’s really a dangerous opportunity to lay out a story that you say is true under penalty of perjury and then it might be used against you, ultimately, if you have to take the stand again.”

In his order, Sullivan pointed to revelations from the emails appearing to show officials trying to evade demands of FOIA.

In one email, for instance, Mull told Abedin that Clinton’s emails “would be subject to FOIA requests” if she used a department-issued BlackBerry, even though her identity would remain secret.

Abedin responded that the idea “doesn’t make a whole lot of sense.”

In February, Sullivan ruled that the evidence-gathering process could proceed, and the two sides have been haggling since then.

Sullivan had previously suggested that Clinton could be forced to respond to questions, but his order on Wednesday offered the clearest indication that it remains a real possibility.

In his order on Wednesday, Sullivan denied the organization’s efforts to combine his granting of depositions and a similar decision by another judge in a separate case.

******

In part from National Law Journal: Clinton’s personal lawyer, Williams & Connolly of counsel David Kendall, declined to comment. A spokeswoman for the U.S. Department of Justice did not immediately return a request for comment.

If Clinton is subpoenaed to testify, she wouldn’t be the only presidential candidate personally involved in litigation.

In February, a District of Columbia Superior Court judge ordered Donald Trump to sit for a deposition in his lawsuit against celebrity chef Geoffrey Zakarian, who abandoned plans for a restaurant in Trump’s new hotel in downtown Washington.

Superior Court Judge Brian Holeman said that Trump’s campaign schedule wasn’t a shield against deposition. “Neither the rules nor the controlling authority create a special exception for individuals that that ‘may have a busy schedule’ as a result of seeking public office,” Holeman wrote.

Trump could also be called as a witness in cases in California and New York about Trump University, a now-closed for-profit institution accused of fraud. Trump, according to news reports, is on the witness list in the case in California, and New York Attorney General Eric Schneiderman has said that Trump would be an “essential” witness at trial. Read more.

 

Judicial Watch v Dept of State by Julian Hattem

History and Money, Immigrants into the U.S.

Drug traffic route in the region

by: Susan Fitzpatrick Behrens

The porous 600-mile border between Guatemala and Mexico offers Central American immigrants a ready passage to “el norte“—the United States. It includes 63 uncontrolled transit points, 44 of which can be passed in a vehicle.

The same conditions attracting Central American immigrants also make the Guatemala-Mexico border region home to a thriving drug trade. Guatemala’s Prensa Libre, recently reported that Guatemala’s three departments (or states) bordering Mexico—San Marcos, Huehuetenango, and the Petén—have come under the direct control of violent drug cartels.

In San Marcos, a single drug lord, Juan Ortiz Chamalé, owns virtually all of the properties on the frontier. Huehuetenango is the site of an increasingly violent conflict between Mexican and Guatemalan drug lords. The latest incident there involved a wholesale massacre of 17 to 40 people (estimates vary) at a horserace organized by narcos. While in the Petén, drug mafias, supported by the police, have forced small and large landowners to sell their lands.

Violence, promoted by the drug trade, delinquency, and death squads has become a part of daily life in these Guatemalan departments. Bodies riddled with bullet holes regularly appear by the sides of roads, along riverbeds, and in open fields. Well-documented evidence demonstrates that police and military forces are directly engaged in this violence through their links to drug cartels, the maras (gangs), and death squads.

Undocumented Central American immigrants, fleeing the struggling economies of their respective countries, are often victimized by this violence. And their plight is about to get worse. The recently implemented U.S.-Central American Free Trade Agreement (CAFTA) will surely devastate what is left of rural livelihoods. And, what’s more, the conditions that make the Guatemala-Mexico border an immigrant corridor and a Mecca for drug trafficking also make it a central target of Plan Mexico, the U.S.-financed anti-drug militarization program, pushed through the U.S. Congress by President George Bush in June 2008.

Undocumented Central American immigrants, already subjected to subhuman conditions in their search for viable livelihoods, now face the oppressive confluence of these powerful transnational forces—the drug trade, militarization, and free trade.

Plan Mexico

The U.S.-backed Plan Mexico, known as the “Mérida Initiative” in policy circles, provides $1.6 billion of U.S. taxpayer money to Mexico, Central America, and the Caribbean. The stated intention of the program involves “security aid to design and carry out counter-narcotics, counter-terrorism, and border security measures.”

U.S. Congressional leaders complained about the secrecy of negotiations for Plan Mexico and the absence of human rights guarantees, but they did nothing more than demand the paltry sum of $1 million in additional funding to support human rights groups in Mexico.

Researcher Laura Carlsen has noted that Plan Mexico is the “securitized” extension of trade agreements such as the North American Free Trade Agreement and CAFTA. Indeed, Plan Mexico is the successor project to the Security and Prosperity Partnership (SPP), a post-9/11 initiative negotiated by the NAFTA countries. The State Department’s Thomas Shannon made the link between free trade and security explicit: “We have worked through the Security and Prosperity Partnership to improve our commercial and trading relationship, we have also worked to improve our security cooperation. To a certain extent, we’re armoring NAFTA.”

Evidently, neoconservative policy framers have purposefully coupled free trade and security. Free trade agreements promote the free circulation of goods, while prohibiting the same circulation by workers. Since neoliberal trade deals eliminate agricultural subsidies and open poor countries to a flood of cheap imported goods, economically displaced workers will naturally seek new sources of income—even if that means crossing borders.

Militarizing borders and identifying undocumented workers who cross them as criminals (“illegal”) are the logical—though sordid—next steps in anticipating and “guarding against” the effects of free trade. The militarization of borders has done nothing to stop immigration, which provides an essential labor force to the United States. But the criminalization of undocumented mobile immigrant workers has deprived them of basic rights of citizenship, thereby making them vulnerable to increasing levels of violence and human rights violations.

The U.S.-driven designation of “internal enemies”—in this case immigrants—as a rationale for building an already mushrooming security apparatus and militarizing societies is, of course, nothing new, especially in Latin America. What is new is that this militarization has become nearly void of any social content. Even during the Cold War, U.S. “national security” doctrines were generally accompanied by social programs, such as the Alliance for Progress and the Peace Corps, which in small measure alleviated poverty and explicitly recognized economic conditions as a root of “the problem.”

The end of the Cold War eliminated an even token emphasis on poverty and with it, all but the most minimal efforts to offer social assistance. The Washington Office on Latin America (WOLA) found that the Bush administration granted $874 million in military and police assistance to Latin America in 2004 an amount almost equal to the $946 million provided in economic and social programs. WOLA reported that with the exception of Colombia, military and police aid has historically been less than half of the total provided for economic and social aid. Moreover, military and police aid used to be directed by the U.S. State Department, assuring a degree of congressional oversight. Now, this aid is increasingly managed by the Department of Defense, thereby eliminating this oversight and effectively making militarization the predominant rationale of U.S. foreign policy.

Living on the Border

The situation of Central American immigrants on Mexico’s southern border illustrates the central problems and contradictions of Washington’s emphasis on free trade and militarization. And the situation is certain to get worse as thousands of immigrants are deported by the United States to their countries of origin in Central America.

Immigrants are fully aware of the risks they take, but economic conditions leave them few alternatives. With a look of desperation following a three-day journey from his home, one Honduran immigrant in the Mexican border town of Tapachula explained, “We don’t do this by choice. We don’t want to leave our families. But imagine a man looking at his children and seeing them hungry.” Back home, he faces wages averaging $6 per day in Honduras and a scarcity of opportunities.

When asked about the dangers they anticipate on their journey north, Central American immigrants offer a catalog of terrors: beatings, sexual assaults, robberies, kidnappings, and murders. Ademar Barilli, a Catholic priest and director of the Casa del Migrante in Guatemala’s border town of Tecún Umán, observed, “Immigrants almost expect that their rights will be violated in every sense because they are from another country and are undocumented.”

Heyman Vasquez, a Catholic priest who directs a shelter for migrants in the town of Arriaga in Chiapas, Mexico, maintains detailed records of the violations suffered by migrants passing through his shelter. In a five-month period in 2008, a third of the men and 40% of the women he serves reported assault or some other form of abuse in their 160-mile journey from the Mexico-Guatemala region to Arriaga.

Police are often the perpetrators of these violations. In Guatemala, Father Barilli and others described cases of police forcing Salvadoran and Honduran immigrants to disembark from buses, where they take their documents and demand money. Once they make it into Mexico, immigrants are subject to abuse by Los Zetas, a notorious drug-trafficking network composed of former law enforcement and military agents linked with the Gulf Cartel.

Los Zetas are known to work with Mexican police in the kidnapping of immigrants to demand money from their family members in the United States. Immigrants also report robberies, beatings, and rapes at the hands of Los Zetas. Recently, in Puebla, Mexico, 32 undocumented Central Americans were kidnapped and tortured by the Zetas with the support of municipal police. In this case, after the migrants escaped, local community members captured a number of the responsible police agents and held them until Federal authorities arrived.

A U.S. State Department report on human rights in Mexico from 2007 concluded, “Many police were involved in kidnapping, extortion, or providing protection for, or acting directly on behalf of organized crime and drug traffickers. Impunity was pervasive to an extent that victims often refused to file complaints.”

That impunity means abused migrants have few places to turn is painfully obvious to one Salvadoran immigrant in the Mexican border town of Tapachula. He had just been deported from the United States, where his wife, a legal resident, and two U.S.-born children live in Los Angeles. “The police are involved. You can’t file complaints,” he said. Besides, the wheels of Mexican justice turn notoriously slow—if at all.

Despite the dire scenario, it is not uncommon for many Central American immigrants to receive a helping hand along the way in their journey to El Norte, whether its food, water, money, or shelter. As one undocumented Honduran explained in Tapachula, “Almost everyone has someone in their family who has migrated. Most understand the need.”

“Security” and Violence

Security initiatives in Central America are notoriously violent and further militarize societies still recovering from decades of brutal civil wars. And, historically, when the Pentagon gets involved, repressive tactics increase.

The Bush administration’s principle security concerns in Central America of drug trafficking and “transnational gangs” have led to a series of “security cooperation” agreements. The first regional conference on “joint security” was chaired by El Salvador’s president, Tony Saca, who first introduced the “Mano Dura” (Iron Fist) initiative—a package of authoritarian militarized policing methods aimed at youth gangs adopted throughout the region. In attendance was then-U.S. Attorney General Alberto Gonzales, responsible for advocating torture of prisoners in Guantánamo.

The conference took place in El Salvador in February 2007 and resulted in the creation of a transnational anti-gang unit (TAG), which El Salvador’s justice and security minister, René Figueroa described as “an organized offensive at a regional level,” with the US State Department and the FBI coordinating with national police forces. Gonzales, promised Washington would finance a new program to train regional police forces and this promise has been fulfilled partially with the establishment of a highly controversial police-training academy in El Salvador, which is closed to public scrutiny and includes little support for human rights.

In many ways, Plan Mexico, is a mano dura campaign writ large. For 2008, Plan Mexico will provide $400 million to Mexico and $65 million to Central America. More than half of the total funds will go directly to providing police and military weapons and training, even though the police and military in these countries have been implicated in crime and human rights violations.

As Plan Mexico arms and trains military and police forces implicated in violent crime, it also provides millions of dollars for an immigration institute responsible for tightening Mexico’s southern borders through monitoring, bio-data collection, a Guatemalan guest-worker program, and border control.

Undocumented immigrants will be caught in the web of this violence, particularly since Plan Mexico also continues the trend toward the criminalization of migrants. As Laura Carlsen, observes, “By including ‘border security’ and explicitly targeting ‘flows of illicit goods and persons,’ the initiative equates migrant workers with illegal contraband and terrorist threats.”

The dehumanization of undocumented immigrants in the United States, and elsewhere, and the growing infringement of their basic rights should serve as a dire warning to all “citizens.” The undocumented are the canaries in the coalmine: the violation of their rights signals a growing repressive climate that jeopardizes everyone’s liberties.

Fire on the Border

Free trade agreements create the conditions that force people to migrate to the United States as an underpaid, politically disenfranchised, and therefore unprotected labor force. Now the economic crisis in the United States has increased pressure to expel undocumented workers, violating a host of human rights standards in the process. Deportations also increase labor pressure in immigrants’ countries of origin, where the global economic crisis stands to further decrease the already limited opportunities for work in “legitimate” industries.

From a purely humanitarian perspective, the governments of the United States, Mexico, and Central America need to address this crisis by developing policies that improve the conditions of poverty that cause immigration. Throwing guns at the problem will only make things worse.

Sure, drug lords are firmly entrenched in the Guatemala-Mexico border region. But Plan Mexico will no more eliminate their presence, than the Mano Dura campaigns eliminated the gangs. Or, for that matter, any more than the militarization of borders has eliminated immigration. Instead, Plan Mexico, like its predecessors, will increase the level of violence in the region by providing more weapons to corrupt police and military forces.

As more and more resources shift toward militarization, policing and surveillance, fewer resources are available for programs that ease pressure to emigrate—namely, education, jobs, medical care, food subsidies, housing, and legal recourse. Meanwhile, governments are increasingly ceding responsibility for protection of even narrowly defined human rights to under-funded non-governmental organizations.

Repressive immigration policies, narcotrafficking, and free trade all combined to form a combustible situation along the Mexico-Guatemala border. Plan Mexico is the spark, and once the flames start, no one will be able to put out the fire. And it’s the undocumented migrants who will continue to get burned.

Obama/Kerry Cant Modify Iran, Cyber Army

Iran’s cyber army – the latest in a series of maleficence

TheHill: In July, when the P5+1 struck a nuclear deal with Iran dubbed as “historic,” administration officials spun it as a first step on a path toward improving Tehran’s behavior. That path hit yet another bump in recent weeks, when Iran launched nuclear-capable missiles in defiance of a United Nations Security Council resolution that endorsed the nuclear deal.

In a letter to the U.N., the U.S., France, Great Britain and Germany decried the missile tests. Secretary of State John Kerry speaking on a visit to Bahrain on April 7, 2016, condemned “the destabilising actions of Iran.”

Iran’s Minister of Defense Brig. Gen. Hossein Dehghan shot back: “If John Kerry actually thought about these subjects, he would no longer utter nonsense and foolish words.” The U.S., he said, should “leave the region and stop supporting terrorists.”

The Iranian regime, in contrast, clearly has no plans to curtail its regional meddling. According to reports from inside the Iranian regime, Supreme Leader Ali Khamenei has dispatched hordes of Islamic Revolutionary Guard Corps (IRGC), mercenary militias, as well as groups of regular army forces to Syria in anticipation of new attacks against the opposition and Free Syrian Army (FSA).

In a move unparalleled since the Iran-Iraq war, Khamenei has deployed his military on a large scale abroad.

The missile launches, coupled with the Iranian regime’s expanding role in wreaking havoc in Syria, naturally grabbed the headlines, overshadowing a no less disturbing report by the U.S. Justice Department that Iran was behind a series of cyber attacks against the U.S., targeting at least 46 companies and a dam by 2013. Now, new and stunning intelligence about the scope and depth of the Iranian regime’s investment in a cyber war against the U.S. are widening the anti-terror focus.

According to the U.S. indictment, between 2011 and 2013, hackers linked to the IRGC attacked U.S. financial institutions as well as a flood-control dam 25 miles north of New York City. Other targets included the New York Stock Exchange, Bank of America, and AT&T.

The hackers broke into the command and control system of the dam in 2013, according to Washington, and may have been able to release water from behind the dam if not for the fact that the sluice gate had been manually disconnected at the time of intrusion.

This is an unequivocal warning that the Iranian regime is preparing to mount a larger cyber attack against American infrastructure.

According to new reports from inside the Iranian regime, IRGC commander Mohammad-Ali Jafari has thrown his weight behind designating a “Cyber Force” to act as the IRGC’s “sixth force” – alongside its ground forces, navy, aerospace, extraterritorial Qods (Jerusalem) Force, and domestic Bassij militia.

The IRGC has been deeply involved in cyber warfare aimed at domestic suppression and supporting terrorists abroad since 2007. IRGC Brigadier General Hossein Hamedani (killed in late 2015 leading the charge in Syria) announced in 2010, “The Bassij cyber council has trained over 1,500 active ‘cyber jihadis,’” promising that their activities would increase in the near future.

When the IRGC’s Intelligence Organization was formed following the 2009 nationwide uprisings against the theocracy, the Cyber Army was placed under it. In November 2010, the Cyber Army claimed that it had hacked 500 sites simultaneously, while disrupting the intelligence networks and private websites of other counties.

Tehran has no intention of getting “right with the world,” as President Obama once suggested. The Iranian regime is committed to pursuing a strategic war against the U.S. and its allies. Any hopes of change in behavior are illusory at best.

Washington needs to develop a more comprehensive strategy to confront this threat before it’s too late. Since the regime’s cyber force, now targeting U.S. sites was formed to counter social protests and political activism inside Iran, America’s natural allies in this war are the Iranian people and the organized opposition.

Related: 2013: The Iranian Cyber Threat, Revisited

Statement before the U.S. House of Representatives Committee on Homeland Security/Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies

******

In 2014: As international scrutiny remains focused on the Islamic Republic of Iran’s nuclear program, a capability is developing in the shadows inside Iran that could pose an even greater threat to the United States. The 2010 National Security Strategy discusses Iran in the context of its nuclear program, support of terrorism, its influence in regional activities, and its internal problems. There was no mention of Iran’s cyber capability or of that ability to pose a threat to U.S. interests. This is understandable, considering Iran has not been a major concern in the cyber realm. Furthermore, Russia and China’s cyber activities have justifiably garnered a majority of attention and been widely reported in the media over the past decade. Iran’s cyber capabilities have been considered third-tier at best. That is rapidly changing. This report discusses the growing cyber capability of Iran and why it poses a new threat to U.S. national interests.

Iran in a Cyber Context.
      Just as computing power grows exponentially each year, so can an adversary’s cyber capabilities. When one considers the origins of world-class cyber threats to the United States, two countries immediately come to mind—Russia and China. Yet with its growing cyber capabilities and intent to use them, Iran is rapidly striving to earn a position among the ranks of this nefariously elite group. For decades, the U.S. Government has publicly acknowledged concern over Iran’s efforts to develop a nuclear program to counter U.S. military capabilities. Recently, the 2014 Quadrennial Defense Review stated that, “Over the past 5 years, a top Administration priority in the Middle East has been preventing Iran from acquiring a nuclear weapon.”2 This focus on Iran’s nuclear ambitions has distracted many from Iran’s other developing capability. In the last few years, Iran’s cyber proficiency has garnered the attention of a select few government officials and private industry leaders. In late-2011, the executive chairman of Google stated, “The Iranians are unusually talented in cyber war for some reason we don’t fully understand.”3 Stopping a cyber adversary from disrupting activity or stealing intellectual property has been the primary concern of government and private sector organizations, but in the military and intelligence communities, there are other concerns about Iran. More here.

Clintons Paying Legal Fees for email Server Agent

 

In 2014, the Hillary server domain registration was changed to Perfect Privacy, a proxy company that allows domain users to shield their identities. It’s a common practice among domain owners who don’t want their personal information listed on a public database.

Per Gawker: A source says at least two top Clinton aides used her private email accounts to conduct government business, putting their official communications outside the control of federal record-keeping regulations.

The source named Philippe Reines and Abedin as the employees who used Clinton’s private email addresses in the course of their agency duties.

Reines served as deputy assistant secretary of state, and Abedin as Clinton’s deputy chief of staff. They are two of Clinton’s most loyal confidantes in and out of the State Department, Gawker reported. More here.

Related: Lawyers for Hillary’s team

Report: Clintons Are Paying Legal Bills For Aide Who Registered Private Email Address

DailyCaller: The Clintons have paid “hundreds of thousands of dollars” to cover the legal bills for a Bill Clinton aide who sits at the center of the FBI’s investigation into Hillary Clinton’s private email server.

That’s according to Washington Times opinion editor Monica Crowley who reports in a new column that a knowledgeable source tells her that the Clintons are covering legal expenses for Justin Cooper, a longtime aide to the former president.

Such an arrangement would raise questions over whether the Clintons are paying Cooper’s bills in order to ensure that they have some oversight of his interactions with federal investigators. It would also raise questions about whether the Clintons are paying other aides’ legal costs.

Cooper registered clintonemail.com in his own name on Jan. 13, 2009. That email domain is the same one Hillary Clinton exclusively used to send work-related emails as secretary of state. Emails sent on that account were stored on a server that the Clintons kept at their personal residence in New York.

According to Crowley, Cooper’s role in helping set up Clinton’s mysterious email arrangement has put him in the FBI’s cross hairs. She reports:

A source familiar with Mr. Cooper’s arrangement with the Clintons tells me that they have paid his legal fees associated with the FBI investigation, amounting to “hundreds of thousands of dollars.” They aren’t paying those costs out of a sense of decency. They’re paying them because he knows the “why” of the server, which may very well have been to make it easier for the foundation to hustle big donations.

One wonders what, if anything, Mr. Cooper is telling the FBI —and whether the whole sordid Clinton house of cards will be left standing.

The FBI seized Clinton’s server last year after it was determined that some of her emails contained classified information. And now, investigators are reportedly poised to interview aides who have knowledge about the system.

And according to a Fox News report from earlier this year, the FBI’s investigation has expanded to a public corruption probe which centers on the intersection of the Clinton Foundation and State Department.

Cooper could also be embroiled in that aspect of the investigation, according to Crowley, who also works as a Fox News analyst.

The little-known Cooper has worked for the Clinton Foundation and Teneo Holdings, a consulting firm with close ties to the Clintons. Along with Doug Band — Bill Clinton’s former “body man,” a former counselor to the Clinton Foundation, and a co-founder of Teneo — Cooper kept in contact with Clinton’s State Department aides, emails from Clinton’s account show. One of those aides is Huma Abedin, who served as Clinton’s deputy chief of staff while also working for Teneo.

The overlap has raised questions over whether the Clinton Foundation and Teneo were using access to the State Department to help raise money and attract clients.

The possibility that the Clintons are paying legal bills for aides embroiled in the FBI investigation has already been broached by Congress.

Senate Judiciary Committee chairman Chuck Grassley has asked lawyers for the Clintons and Abedin — as well as for former Clinton aides Cheryl Mills, Philippe Reines, and Jake Sullivan — if they have entered any “joint defense agreements.”

The Iowa Republican has asserted that such arrangements could pose conflicts of interest because they would help ensure that the Clinton insiders refrained from providing evidence that could be detrimental to the Clintons.

The lawyers have refused to say if those arrangements have been made.

Grassley has also asked whether the Clintons are covering legal costs for Bryan Pagliano, the former information technology specialist who set up and managed Clinton’s private email server. But Pagliano’s lawyer, Mark MacDougall of the Clinton-connected law firm Akin Gump, has also refused to say if such an arrangement is in place. Pagliano has since entered an immunity deal with the FBI in exchange for his cooperation in the investigation.

Some evidence has emerged suggesting that the Clintons are paying legal bills for those embroiled in the email fiasco.

In October it was reported that the Denver-based IT company that handled Clinton’s server after she left the State Department had submitted an invoice to Clinton seeking payment for legal and public relations expenses.

The company, Platte River Networks, had control of Clinton’s server when it was turned over to the FBI. It billed Clinton’s accountant, Marcum LLP., nearly $50,000 for legal and PR expenses.

The Clinton campaign and the Clinton Foundation did not respond to The Daily Caller’s requests for comment.