Nunes RICO Lawsuit v. Fusion GPS

This is a 3 part RICO case against Glenn Simpson, all things Fusion GPS and Campaign for Accountability, Inc..

Very interesting of the details that Nunes and his lawyer provide in detail. While Conngressman Nunes is suing for at least $9.9 million, it is not so much about an end result but more about the discovery process in the case. That means in layman’s terms, a document production requirement which is all the Republicans have been demanding of government agencies during the whole Russian collusion case. Government agencies, including the Department of Justice and the FBI for the most part have either slow-walked responses, redacted documents or have been completely non-responsive. In this type of lawsuit, where a jury is demanded, documents must be produced.

California Rep. Devin Nunes named to Trump's transition ...

Read the complaint here.

Meanwhile, Congressman Nunes could have a real ally in this lawsuit. He is one Bill Browder, a former U.S. citizen, now a citizen of Britain. You may remember Mr. Browder as he has been on the quest to have foreign government adopt the Magnitsky Act, a law fully adopted by the United States several years ago.

Northwest Research | & Covert Book Report

You may also remember that little meeting that got so much press that included Trump Jr., Paul Manafort, Jared Kushner and Natalia Veselnitskaya. Fusion GPS did the same thing to Mr. Browder that Congressman Nunes is alleging in his complaint.

Following California GOP Rep. Devin Nunes’ $9.9M lawsuit against Fusion GPS over alleged “smear” tactics, businessman and Magnitsky Act advocate Bill Browder told Fox News that the opposition research firm behind the anti-Trump Steele dossier also targeted him with an organized misinformation campaign.

Browder is the CEO and co-founder of Hermitage Capital, which was once the largest foreign portfolio investor in Russia. He told Fox News that Fusion GPS and founder Glenn Simpson were working with Russians who wanted the Magnitsky Act repealed — and that they “played dirty.”

“It appears on a whole range of stories they are in the lying and smear campaigning business,” Browder said. “My experience does not look like an isolated incident. These guys play dirty, and I have seen it firsthand.”He continued: “I had an experience with Glenn Simpson and Fusion GPS in spring 2016 where they were paid agents for individuals connected to the Russian government. They lied to journalists and other thought leaders in Washington about me and the Magnitsky case to have the act repealed.”

***

In part from the Washington Examiner:

Veselnitskaya was a Russian prosecutor, then performed government-related lobbying in the U.S. against the Magnitsky Act. Prevezon was a company alleged to have laundered fraudulent money exposed by Magnitsky, so Veselnitskaya hired BakerHostetler to help Prevezon in court — and the law firm hired Fusion GPS.

Russian lawyer questions why Mueller hasn't contacted her

Glenn Simpson, the opposition research firm’s founder, testified he started working with Veselnitskaya in 2014 and said “she would have arranged for Prevezon to pay Baker Hostetler which paid us.” Simpson knew the research he conducted opposing the Magnitsky Act, criticizing Magnitsky advocate and friend Bill Browder and defending Prevezon, made its way to Veselnitskaya. And Simpson met with Veselnitskaya the day before the Trump Tower meeting, the day of it, and the day after. Simpson claimed he didn’t know she was connected to the Kremlin and didn’t know about the Trump Tower meeting beforehand.

Veselnitskaya attended the meeting with a Russian translator and fellow Russian anti-Magnistky Act lobbyists and Prevezon case workers. Veselnitskaya presented a document echoing official Kremlin talking points criticizing the Magnitsky Act and attacking Browder and others by alleging financial misconduct in their support for Democrats. When Don Jr. asked for proof, she had none. The Russians also complained about U.S. sanctions imposed under the Magnitsky Act and Putin’s response banning U.S. adoption of Russian children. Trump associates expecting dirt on Clinton considered the meeting a waste of time. The media revealed the meeting’s existence in July 2017.

Operation No Safe Haven V

If you see a Democrat, ask them what they know about this operation and have them explain it to you please. Let just see if they get it right, OR if they know about it at all….

BTW, have you seen this guy? Martinez-Rojas, Severiano

ATLANTA – On May 21, 2013, U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI) Atlanta and the FBI conducted search and arrest warrants for several individuals suspected of human trafficking.

Since 2006, Severiano Martinez-Rojas, along with family members Arturo Rojas-Coyotl, Odilon Martinez-Rojas, Daniel Garcia-Tepal and others, all from Tenancingo, Tlaxcala, Mexico, conspired and brought multiple women into the United States from Mexico and Guatemala, all for the purpose of forcing them to engage in prostitution.

Eight victims from Mexico and Guatemala were rescued during the course of the investigation.

Odilon Martinez-Rojas and Rojas-Coyotl have been sentenced to 21 years and 16 years in prison, respectively. Severiano Martinez-Rojas is believed to have returned to Mexico prior to the warrant execution and remains a fugitive in this case.

***

WASHINGTON — U.S. Immigration and Customs Enforcement (ICE) arrested 39 fugitives – 30 males and nine females – sought for their roles in known or suspected human rights violations during a nationwide operation that took place from Aug. 27 to 29.

The ICE National Fugitive Operations Program in coordination with the ICE Human Rights Violators and War Crimes Center, and the ICE Office of the Principal Legal Advisor, worked with ICE’s Enforcement and Removal (ERO) Atlanta, Baltimore, Chicago, Dallas, Houston, Los Angeles, Miami, New Orleans, New York City, Newark, Salt Lake City, and San Francisco field offices to arrest these fugitives.

The foreign nationals arrested during this operation all have outstanding removal orders and are subject to repatriation to their countries of origin. Of the 39 known or suspected human rights violators arrested during Operation No Safe Haven V, 16 individuals are also criminal aliens in the U.S. with convictions for crimes including, but not limited to, domestic violence, driving under the influence of liquor, drug distribution, firearm possession, grand theft, reckless endangerment, robbery, fraud and theft. Their countries of origin include: El Salvador, Guatemala, China, Liberia, Cambodia, Chad, Chile, Colombia, the Ivory Coast, Ghana, Haiti, Honduras, Jamaica, Nicaragua, Sierra Leone, and Sudan. This operation more than doubled the number of known or suspected human rights violators arrested during the first nationwide No Safe Haven operation, which took place in September 2014.

“ICE will not allow war criminals and human rights abusers to use the U.S. as a safe haven,” said Acting Director Matthew Albence. “We will never stop looking for them and we will never cease seeking justice for the victims of their crimes.”

Those arrested across the country included:

  • Fourteen individuals from Central America implicated in numerous human rights violations against civilians, to include the capture, arrest and/or transport of civilians who were subsequently mistreated, and in some cases, beaten, electrocuted, and killed;
  • Four known or suspected human rights violators from China, complicit in collaborating with the government to assist in forced abortions and sterilizations against victims;
  • Four individuals from West Africa connected to a range of atrocities, including civilian massacres, mutilations, recruitment of child soldiers, extrajudicial killings, and other human rights violations.
  • An individual from Europe implicated in human rights abuses against political opponents through work with a security agency.

ICE is committed to identifying, investigating, prosecuting and removing known or suspected human rights violators who seek a safe haven in the United States. ICE’s Human Rights Violators and War Crimes Center (HRVWCC) investigates human rights violators who try to evade justice by seeking shelter in the United States, including those who are known or suspected to have participated in persecution, war crimes, genocide, torture, extrajudicial killings, severe violations of religious freedom, female genital mutilation/cutting and the use or recruitment of child soldiers. These individuals may use fraudulent identities or falsified documents to enter the country in an attempt to blend into communities in the United States.

Members of the public who have information about foreign nationals suspected of engaging in human rights abuses or war crimes are urged to contact ICE by calling the toll-free ICE tip line at 1-866-347-2423 or internationally at 001-1802-872-6199. They can also email [email protected] or complete ICE’s online tip form.

The HRVWCC was established in 2009 to further ICE’s efforts to identify, locate and prosecute human rights abusers in the United States. The HRVWCC leverages the expertise of a select group of agents, lawyers, intelligence and research specialists, historians and analysts who direct the agency’s broader enforcement efforts against these offenders.

Since 2003, ICE has arrested more than 415 individuals for human rights-related violations of the law under various criminal and/or immigration statutes. During that same period, ICE obtained deportation orders against and physically removed more than 990 known or suspected human rights violators from the United States. Additionally, ICE has facilitated the departure of an additional 152 such individuals from the United States.

Currently, ICE has more than 170 active investigations into suspected human rights violators and is pursuing more than 1,600 leads and removals cases involving suspected human rights violators from 95 different countries. Since 2003, the HRVWCC has issued more than 75,000 lookouts for individuals from more than 110 countries and stopped over 300 human rights violators and war crimes suspects from entering the U.S.

ICE credits the success of this operation to the efforts of the U.S. National Central Bureau-Interpol Washington.

Judge to Release 1000’s More Epstein Documents?

Sealed court records contain the names of at least hundreds of third parties who were mentioned in a civil case involving sexual abuse allegations against the late financier Jeffrey Epstein, a federal judge said Wednesday. The records also include hundreds of pages of investigative reports, said Jeff Pagliuca, an attorney for former Epstein girlfriend Ghislaine Maxwell. About one-fifth of all documents filed in the case were done so under seal, a level of secrecy the 2nd Circuit ruled was unjustified. The appellate court, in unsealing the records, issued an unusual warning to the public and the media “to exercise restraint” regarding potentially defamatory allegations contained in the depositions and other court filings. More here from the Miami Herald.

Hundreds more will be implicated in the Jeffrey Epstein scandal, claims Ghislaine Maxwell, as his victims ask judge to open 10,000 pages of secret files detailing the pedophile’s sex crimes

DM: As many as 1,000 people including celebrities are implicated in thousands of pages of court documents from a Jeffrey Epstein lawsuit which remains under seal.

The documents, some 10,000 of them, were part of a 2015 lawsuit by Virginia Giuffre Roberts, Epstein’s ‘sex slave’, who sued him and Ghislaine Maxwell, a British socialite who many of Epstein’s victims say was his madam.

Ghislaine Maxwell   Virginia Giuffre Roberts,

They settled their lawsuit in 2017 and the case docket was made private, keeping all the allegations secret.

In August, in light of the pedophile’s arrest on human trafficking charges, an appeals court ordered that any pages of the case files which represented public interest should no longer be kept secret.

Around 2,000 have been released but thousands more are still under lock and key.

On Wednesday, Judge Loretta Preska listened to lawyers for Maxwell and Roberts at a hearing in New York court to determine if and how she should release any more of them.

Preska did not decide on whether or not to release the remaining pages on Wednesday, but has instructed the attorneys on both sides to file written briefings about them.

They have to categorize the documents into three types and then decide which will be released.

Roberts’ attorneys had argued that all but the social security numbers and names of underage victims should be released but the judge rejected her argument.

Maxwell, who has been named as Epstein’s madam by several of his accusers, was not in court.

Her attorneys are arguing against releasing the remaining pages, claiming that the names of the 1,000 ‘non parties’ should not become public.

‘There are literally hundreds of pages of investigative reports that mention hundreds of people,’ Jeffrey Pagliuca, Maxwell’s attorney, told the court on Wednesday.

The lawyers must now submit written briefings on how they think the remaining files should be split up and released.

The hearing follows a letter to the court from a John Doe – one of the many people named – who said it would be unfair for him and others to be dragged into the public scandal engulfing Epstein’s world.

‘As a non-party to these proceedings, Doe lacks specific knowledge about the contents of the Sealed Materials,’ his lawyers wrote.

‘But it is clear that these materials implicate the privacy and reputational interests of many persons other than the two primary parties to this action, Giuffre and Maxwell,’ they added.

The documents contain ‘a range of allegations of sexual acts involving Plaintiff and non-parties to this litigation, some famous, some not; the identities of non-parties who either allegedly engaged in sexual acts with Plaintiff or who allegedly facilitated such acts.’

The files that have already been released include Roberts’ unpublished memoirs about her years with Epstein and Maxwell.

She describes in the memoir how she was forced to have threesomes with the pair when she was a teenager and claims she spent her youth in sexual servitude to them before escaping in 2002.

She also describes nights on Epstein’s Caribbean island during which Al Gore and Bill Clinton were present as dinner guests.

There are mentions of the Simpsons creator Matt Groening, whose feet she says she massaged on a private jet, and of Prince Andrew who she claims she had sex with multiple times – a claim he vehemently denies.

Roberts lawsuit also includes the names of other women who say they are victims of Epstein and women who Roberts says worked for the disgraced pedophile as ‘recruiters’.

Epstein died in his cell in Manhattan at the beginning of August.

His attorneys say his death is suspicious and that the injuries on his neck indicate he was murdered.

Apply More Shame to Facebook

Okay, so without much media attention, YouTube was just fined $170 million for children’s privacy violations. Hello Google? WTH? This was a settlement by the way between Google and the Federal Trade Commission.

But what about Facebook and protecting our data? We have heard and read items about how casual Facebook is with out data. But hold on, there is more.

Primer: Cambridge Analytica was a cyber spy network with political operations and twisted tactics.

In part:

The company at the centre of the Facebook data breach boasted of using honey traps, fake news campaigns and operations with ex-spies to swing election campaigns around the world, a new investigation reveals.

Executives from Cambridge Analytica spoke to undercover reporters from Channel 4 News about the dark arts used by the company to help clients, which included entrapping rival candidates in fake bribery stings and hiring prostitutes to seduce them.

In one exchange, the company chief executive, Alexander Nix, is recorded telling reporters: “It sounds a dreadful thing to say, but these are things that don’t necessarily need to be true as long as they’re believed.” More here.

Meanwhile:

Techcrunch: Hundreds of millions of phone numbers linked to Facebook accounts have been found online.

The exposed server contained more than 419 million records over several databases on users across geographies, including 133 million records on U.S.-based Facebook users, 18 million records of users in the U.K., and another with more than 50 million records on users in Vietnam.

But because the server wasn’t protected with a password, anyone could find and access the database.

Each record contained a user’s unique Facebook ID and the phone number listed on the account. A user’s Facebook ID is typically a long, unique and public number associated with their account, which can be easily used to discern an account’s username.

But phone numbers have not been public in more than a year since Facebook restricted access to users’ phone numbers.

TechCrunch verified a number of records in the database by matching a known Facebook user’s phone number against their listed Facebook ID. We also checked other records by matching phone numbers against Facebook’s own password reset feature, which can be used to partially reveal a user’s phone number linked to their account.

Some of the records also had the user’s name, gender and location by country.

fb 3 2

This is the latest security lapse involving Facebook data after a string of incidents since the Cambridge Analytica scandal, which saw more than 80 million profiles scraped to help identify swing voters in the 2016 U.S. presidential election.

Since then the company has seen several high-profile scraping incidents, including at Instagram, which recently admitted to having profile data scraped in bulk.

This latest incident exposed millions of users’ phone numbers just from their Facebook IDs, putting them at risk of spam calls and SIM-swapping attacks, which relies on tricking cell carriers into giving a person’s phone number to an attacker. With someone else’s phone number, an attacker can force-reset the password on any internet account associated with that number.

Sanyam Jain, a security researcher and member of the GDI Foundation, found the database and contacted TechCrunch after he was unable to find the owner. After a review of the data, neither could we. But after we contacted the web host, the database was pulled offline.

Jain said he found profiles with phone numbers associated with several celebrities.

Facebook spokesperson Jay Nancarrow said the data had been scraped before Facebook cut off access to user phone numbers.

“This data set is old and appears to have information obtained before we made changes last year to remove people’s ability to find others using their phone numbers,” the spokesperson said. “The data set has been taken down and we have seen no evidence that Facebook accounts were compromised.”

But questions remain as to exactly who scraped the data, when it was scraped from Facebook and why.

Facebook has long restricted developers‘ access to user phone numbers. The company also made it more difficult to search for friends’ phone numbers. But the data appeared to be loaded into the exposed database at the end of last month — though that doesn’t necessarily mean the data is new.

This latest data exposure is the most recent example of data stored online and publicly without a password. Although often tied to human error rather than a malicious breach, data exposures nevertheless represent an emerging security problem.

In recent months, financial giant First American left data exposed, as did MoviePass and the Senate Democrats.

Feds Prepare States for Foreign Voting Interference

The Democrats have really lost their argument against voter ID if they are being fully candid about foreign interference. It is without question that several cities and states are victims of ransomware and Florida is especially concerned. Remember that a foreign actor, where clues point to Russia were able to gain access to voter registration databases and it stands to reason China will attempt the same.

Continually, the Democrats say that the Trump administration is virtually doing nothing to protect the election system. Read on as the Democrats know the mission and actions of the Cyber division of the Department of Homeland Security.

Image result for foreign hackers us voting systems photo
As Reuters reports:

The U.S. government plans to launch a program in roughly one month that narrowly focuses on protecting voter registration databases and systems ahead of the 2020 presidential election.

These systems, which are widely used to validate the eligibility of voters before they cast ballots, were compromised in 2016 by Russian hackers seeking to collect information. Intelligence officials are concerned that foreign hackers in 2020 not only will target the databases but attempt to manipulate, disrupt or destroy the data, according to current and former U.S. officials.

“We assess these systems as high risk,” said a senior U.S. official, because they are one of the few pieces of election technology regularly connected to the Internet.

The Cybersecurity Infrastructure Security Agency, or CISA, a division of the Homeland Security Department, fears the databases could be targeted by ransomware, a type of virus that has crippled city computer networks across the United States, including recently in Texas, Baltimore and Atlanta.

“Recent history has shown that state and county governments and those who support them are targets for ransomware attacks,” said Christopher Krebs, CISA’s director. “That is why we are working alongside election officials and their private sector partners to help protect their databases and respond to possible ransomware attacks.”

A ransomware attack typically locks an infected computer system until payment, usually in the form of cryptocurrency, is sent to the hacker.

The effort to counter ransomware-style cyberattacks aimed at the election runs parallel to a larger intelligence community directive to determine the most likely vectors of digital attack in the November 2020 election, according to current and former U.S. officials.

“It is imperative that states and municipalities limit the availability of information about electoral systems or administrative processes and secure their websites and databases that could be exploited,” the FBI said in a statement, supporting the Homeland Security initiative.

CISA’s program will reach out to state election officials to prepare for such a ransomware scenario. It will provide educational material, remote computer penetration testing, and vulnerability scans as well as a list of recommendations on how to prevent and recover from ransomware.

These guidelines, however, will not offer advice on whether a state should ultimately pay or refuse to pay ransom to a hacker if one of its systems is already infected.

“Our thought is we don’t want the states to have to be in that situation,” said a Homeland Security official. “We’re focused on preventing it from happening.”

Over the last two years, cyber criminals and nation state hacking groups have used ransomware to extort victims and create chaos. In one incident in 2017, which has since been attributed to Russian hackers, a ransomware virus was used to mask a data deletion technique, rendering victim computers totally unusable.

That attack, dubbed “NotPetya,” went on to damage global corporations, including FedEx and Maersk, which had offices in Ukraine where the malware first spread.

The threat is concerning because of its potential impact on voting results, experts say.

“A pre-election undetected attack could tamper with voter lists, creating huge confusion and delays, disenfranchisement, and at large enough scale could compromise the validity of the election,” said John Sebes, chief technology officer of the ESET Institute, an election technology policy think tank.

The databases are also “particularly susceptible to this kind of attack because local jurisdictions and states actively add, remove, and change the data year-round,” said Maurice Turner, a senior technologist with the Center for Democracy and Technology. “If the malicious actor doesn’t provide the key, the data is lost forever unless the victim has a recent backup.”

Nationwide, the local governments that store and update voter registration data are typically ill-equipped to defend themselves against elite hackers.

State election officials told Reuters they have improved their cyber defenses since 2016, including in some cases preparing backups for voter registration databases in case of an attack. But there is no common standard for how often local governments should create backups, said a senior Homeland Security official.

“We have to remember that this threat to our democracy will not go away, and concern about ransomware attacks on voter registration databases is one clear example,” said Vermont Secretary of State Jim Condos. “We’re sure the threat is far from over.”