California: Pay Bribe for Drivers License

California Governor Jerry Brown is perpetuating a national security crisis and yet no one in any Federal capacity is even considering discipline, a memo or other consequence.

Governor Brown opened the pathway for 1.4 million illegals to get a drivers license while others pay a bribe in the case they cannot read English or pass a written test.

In 2010, the illegal phenomena began by the Obama administration when it came to omitting background investigations of illegals and the trucking industry took notice.

Eleven employees of New York’s Department of Motor Vehicles have received indictments for participation in a fraudulent CDL testing scheme.

Brooklyn’s U.S. District Court issued indictments Oct. 24 for 11 DMV security workers at five NYC-area centers. Applicants allegedly paid $1,800 to $2,500 for test answers and escort assistance through the DMV process.

There was and continues to be a mission to stop illegal trucking with the mission statement noted here.

California DMV employees allegedly traded cash for licenses

FNC: At least 100 commercial truck drivers paid up to $5,000 each to bribe California Department of Motor Vehicles employees for illegal licenses, federal authorities said on Tuesday.

Officials said up to 23 traffic accidents could be related to the fraud, though there were no fatalities.

Emma Klem, a 45-year-old Salinas DMV employee, and trucking school owner Kulwidner Dosanjh Singh, 58, both pleaded guilty Tuesday to commit bribery and identity fraud, U.S. Attorney Benjamin Wagner said.

Two other DMV employees in Salinas and Sacramento and two other Central Valley trucking school operators have been arrested on similar charges.

The employees changed computer records to falsely show that drivers had passed written and behind-the-wheel tests after they were bribed by the owners of three truck-driving schools between June 2011 and March 2015, according to court documents.

“Individuals who use their positions to obtain commercial drivers’ licenses for unskilled and untested drivers jeopardize our nation’s security and safety. Allowing unqualified drivers to operate heavy commercial trucks on our highways is honestly quite chilling,” said Carol Webster, acting assistant special agent in charge of the U.S. Homeland Security Investigations office in Sacramento.

 

DMV examiners Andrew Kimura, 30, of Sacramento and Robert Turchin, 65, of Salinas were indicted last week on charges of conspiracy, bribery and fraud in connection with identification documents, along with trucking school owners Pavitar Dosangh Singh, 55, of Sacramento, and Mangal Gill, 55, of San Ramon.

Pavitar Singh and Kimura have pleaded not guilty, while Turchin and Gill are expected to be arraigned on Friday in U.S. District Court in Sacramento.

Kimura’s attorney, William Portanova, said his client is a good person caught in an unfortunate situation, “but we’re going to work through it and help this young man.”

Class A commercial drivers’ licenses are required to operate trucks, including 18-wheel cargo semitrailers. They are tougher to obtain than regular driver licenses. Applicants must pass both a written test and a behind-the-wheel test that is offered at a limited number of DMV locations, including Salinas.

The DMV has canceled or revoked more than 600 licenses that are potentially linked to fraud, including 100 that were pinpointed by investigators, DMV chief investigator Frank Alvarez said. Drivers can retake the tests, sometimes after a hearing, and Wagner said none are likely to be prosecuted during the ongoing probe because investigators are targeting the organizers.

It is the latest in several similar bribery schemes in recent years, including a Fresno case involving 15 people that resulted in a sentence of more than five years in federal prison for the DMV ringleader in 2013.

Alvarez said his department is considering additional safeguards to prevent employees from altering computer records, and it’s attempting to better screen its 10,000 employees and the way it issues commercial drivers’ licenses as it tries to prevent more bribery and fraud crimes.

The charges filed in federal court in Sacramento allege three separate conspiracies. Two of them purportedly involved Gill, who owns trucking schools in Fremont, Lathrop, Fresno and Salinas.

The third involved Pavitar Singh, owner of a school in Sacramento. His attorney, Anthony Capozzi of Fresno, and an attorney for Klem did not return telephone messages.

Christopher Morales of San Francisco, attorney for Kulwinder Singh, said his client is a good family man who recognizes that he erred when he “took shortcuts” to help members of the Indian community who had trouble passing the tests.

His client and Klem face up to five years in prison when they are sentenced Nov. 17.

No attorneys were listed for the two defendants who have yet to appear in court

ISIS Hacking Division Takes on Military and Govt Personnel

Alleged ISIS leak compromises hundreds of U.S. military & intelligence emails — Dept of Defense is ‘looking into it’

The top of the page containing the leak appears to show an unconfirmed link to ISIS

Above: The top of the page containing the leak appears to show an unconfirmed link to ISIS

A Twitter account claiming to be the “IS Hacking Division” has published what appears to be an extensive directory of government emails, passwords, credit cards, phone numbers, and addresses spanning U.S. military departments and divisions, the FBI, U.S. embassies, the Library of Congress, U.S. city officials, the British Embassy, the FTC, and NASA, as well as possible personnel at Wells Fargo.

VentureBeat is able to confirm that the U.S. Department of Defense is “looking into” this alleged hack. We’ve also independently verified that at least several of the items included on that list contained accurate information, but that several of the people were not aware that the leak had occurred.

Other details in the document appear inaccurate or outdated; it lists two Intel Corporation email accounts which apparently do not exist in Intel’s “company email directory,” an Intel spokesperson told VentureBeat.

IS hacking division tweet

The content was published onto a site entitled “zonehmirrors.org,” a domain which was registered under the name Redi Alberto in the city of Lugano, Switzerland.

ISIS Group Claims to Have Hacked Information on U.S. Military Personnel
NBC: A hacker group claiming to be affiliated with the terror organization ISIS on Tuesday posted what it said was the personal information of hundreds of members of the military and government personnel, and urged terrorists to carry out attacks.

Flashpoint Intelligence, a global security firm and NBC News consultant, said it could not authenticate the claim by the so-called “Islamic State Hacking Division” or the accuracy of the information. Islamic State is another name by which ISIS is known.
The Twitter account used has been affiliated with infamous ISIS fighter Abu Hussain Al Britani, Flashpoint said. The account has since been suspended.

The group claimed the information contained names, emails, passwords, and phone numbers of personnel that included individuals from the Air Force, the Marines, NASA and the Port Authority of New York and New Jersey. There is no indication as to how old the information is, or whether the email addresses and passwords are still valid.

“We are aware of the report but cannot confirm credibility at this time,” a spokesperson for the Department of Defense said in an email. “The safety of our service members is always a primary concern.”

The group had previously claimed it hacked American servers and distributed information on military personnel, but analysts believe that claim was overstated, and the information was instead culled from freely available social media accounts, Flashpoint said.
T he information released Tuesday also included the purported credit card information of several U.S. State Department officials as well as screenshots of private Facebook messages between purported U.S. servicememebers.

Flashpoint analysts said the “hack” — if true — could be significant as it would represent a growing effort by pro-ISIS groups to distribute personal information that could be used in lone-wolf attacks.

The list of those hacked with names, locations, government divisions, embassies and P/W’s is here.  I was just notified that the original link has been taken offline, after some searching I located this link. http://tu3ek4yox26tber2.onion.nu/   Consider the risk if you choose to open it.

The Hillary Email Server Scandal Runs Deeper at State Dept.

The Hillary email scandal-palooza began on July 31 with Judge Sullivan’s declaration demanding Hillary and her staff certify certain conditions with regard to all the emails being turned over to the State Department.

On August 8, 2015, Hillary signed a certification document under penalty of perjury that all materials within server communications have been provided to the State Department. Concurrent to this action, the FBI visited the Denver IT company, Platt River that provided email support and redundant systems to the Hillary server established in her home in 2009. Of note, this server was NOT Bill’s server as she previously stated.

The two page certification signed by Hillary is found here.

Most important to readers here is the fact that the communications of the two emails in question that originated from the CIA were transmitted via a controlled pathway to the State Department, from there, someone(s) at State had to find a unclassified printer and computer to create hard copies, re-format them into electronic form and then email them to Hillary meaning that others at State are surely going to be investigated and caught up in the web or dragnet of culpability.

A 7 page email document chain is found here where the classified material is simply chilling.

On August 11, the Intelligence Community Inspector General briefed several members of the Senate as well as James Clapper, the Director of the Office of National Intelligence on the exact classifications of at least 2 newly discovered emails, which at the time of transmission were given the classification rating of TS/SI/TK/NF. This classification is the top confidential rating designation. Of particular note is the ‘TK’ rating which means Talent Keyhole, stemming from signals intelligence/geo-spatial via the CIA. These communications are only done on highly controlled systems and within a SCIF system.

Embedded image permalink

Senator Chuck Grassley took the aggressive and positive step on August 11 to provide voters with the new information noted here.

From Associated Press dates August 11:

Also Tuesday, Kendall gave to the Justice Department three thumb drives containing copies of work-related emails sent to and from her personal email addresses via her private server.

Kendall gave the thumb drives, containing copies of roughly 30,000 emails, to the FBI after the agency determined he could not remain in possession of the classified information contained in some of the emails, according to a U.S. official briefed on the matter who was not authorized to speak publicly.

The State Department previously had said it was comfortable with Kendall keeping the emails at his Washington law office.

Word that Clinton had relented on giving up possession of the server came as Republican Sen. Chuck Grassley of Iowa said two emails that traversed Clinton’s personal system were deemed “Top Secret, Sensitive Compartmented Information” — a rating that is among the government’s highest classifications. Grassley said the inspector general of the nation’s intelligence community had reported the new details about the higher classification to Congress on Tuesday.

“Secretary Clinton’s previous statements that she possessed no classified information were patently untrue,” House Speaker John Boehner said in a statement. “Her mishandling of classified information must be fully investigated.”

Those two emails were among four that had previously been determined by the inspector general of the intelligence community to have been classified at the time they were sent. The State Department disputes that the emails were classified at that time.

Shin Bet’s Latest Hamas Captive Reveals the Plan

Jerusalem Post: A Hamas fighter and tunnel digger has given his interrogators in Israel a bevy of intelligence about the group’s recent tunnel construction, planned attacks on Israel, battlefield strategy, and military cooperation with Iran, the Shin Bet General Security Service said Tuesday, after news of the operative’s arrest was made public.

The fighter, Ibrahim Adal Shahada Sha’ar, a 21-year-old native of Rafah in the southern Gaza Strip, was arrested by the Shin Bet and the Israel Police last month at Erez Crossing on the Israel border, after he arrived at the installation to submit an application to enter Israel. An official with the Shin Bet said that Sha’ar’s application to enter was for “personal or humanitarian reasons” and that officers at the crossing knew who he was and arrested him on the spot.

The Shin Bet on Tuesday said Sha’ar gave up to his interrogators a trove of intelligence relating to Hamas operations in Gaza and in Rafah in particular, including about their plans to use tunnels along the border to carry out attacks on Israel, like they did with brutal effectiveness during last summer’s Operation Protective Edge.

The Shin Bet said Sha’ar also gave details about Hamas battlefield strategy, the make-up and capabilities of their “elite” infantry unit, as well as the anti-aircraft and surveillance capabilities of the Hamas armed wing.

Sha’ar himself took part in a series of battlefield tasks during last summer’s war, the Shin Bet said, including field logistics, and transporting fighters and firearms on the battlefield. He also admitted to laying an anti-tank IED on one occasion.

The Rafah native had allegedly been spending recent months working on tunnel construction, during which he learned of tunnels heading for the Kerem Shalom crossing on the Israel border, potentially for use in an infiltration attack. Under questioning he also gave up the location of digging sites, tunnel openings, and the routes of tunnels currently under construction in the Gaza Strip. He also reportedly told his interrogators that a road recently built by Hamas along the Gaza border with Israel is meant in part to be used for attacks on Israel, during which vehicles will use the road to charge across the border.

He also reportedly gave details on his observations about the military cooperation between Hamas and Iran. The Shin Bet said he described how they transfer money to the organization and supply firearms and electronics, including devices meant for jamming radio frequencies, meant to be used to take down Israeli drones flying over Gaza. He also observed how they attempted to train Hamas fighters in the use of hang gliders for attacks on Israel.

On July 31st, Sha’ar was indicted at the Beersheba District Court on charges of membership in an illegal organization, attempted murder, and contact with a foreign agent, and taking part in illegal military training.

***  Then we need to go back to John Kerry’s testimony before Congress, where his answers turn out to be thin on substance and essentially false and uninformed.

Iran Funding Hamas Preparations for War

 

When asked repeatedly by Republicans about Iran’s repeated threats to destroy Israel during Congressional testimony about the Iran nuclear deal, Secretary of State John Kerry sighed and looked at his questioners the way an exasperated teacher regards dumb students. Yes, he admitted, they say that but he explained patiently, he’s seen no evidence of them planning anything to put that into effect. Kerry repeated that answer, though no doubt without the look of disdain on his face, to The Atlantic’s Jeffrey Goldberg saying “I haven’t seen anything that says to me” that their “ideological confrontation with Israel at this moment” [my emphasis] will “translate into active steps.” For all intents and purposes, President Obama says the same thing when he dismisses threats to Israel from Iran’s Supreme Leader Grand Ayatollah Ali Khamenei even if he just published a book outlining his plans.

But, as Israel’s Shin Bet intelligence agency made public today, Iran is taking active steps toward war with Israel. The Israelis revealed that information obtained from a prisoner as well as from other sources showed that Iran is taking an active role in allowing Hamas to rebuild its military infrastructure as well as terror tunnels aimed at facilitating murder and kidnapping. Though the administration pretends that its negotiations with Iran are proof that the Islamist regime is moderating, evidence on the ground shows that its role as the world’s leading state sponsor of terror is unchanged. So, too, is its role in aiding the ongoing war on Israel’s existence.

As Haaretz reports:

During his interrogation, [Hamas operative Ibrahim] Sha’er also told of the links between Iran and Hamas, under which Iran has transferred military support into the Gaza Strip to strengthen the organization. The Iranians provide funds, advanced weaponry and electronic equipment such as equipment for disrupting radio communications to bring down Israeli unmanned aerial vehicles over Gaza, Sha’er told the Shin Bet. Iran has also trained Gaza fighters in the use of hang gliders for the purpose of penetrating into Israel, he said.

Perhaps to Obama and Kerry, these efforts should be considered minor annoyances to Israel. After all, what possible impact can terror attacks or giving Hamas the ability to wage and sustain a new war against Israel have to do with Israel’s existence? The Israeli military is strong and presumably is capable of dealing with anything that Hamas can come up with. Perhaps, the same is true of Hezbollah, which even Kerry admitted to Goldberg, had 80,000 rockets pointed at Israel.

The point is that Iran using its wealth and military know-how to build up Hezbollah (which operates as an Iranian surrogate, even sending its fighters into Syria to bolster Iran’s ally Bashar Assad) and now Hamas isn’t a mere detail to be swept under the rug. Nor is it tangential to the main thrust of Iranian foreign policy, as Khamenei’s new book makes plain.

Moreover, despite the administration’s blind faith in a shift in Iran’s policies once the nuclear deal is put into effect, there’s no evidence that the flood of cash into Tehran’s coffers will do anything but encourage it to continue its efforts to have its terrorist auxiliaries wage war on Israel.

To the contrary, once the deal sneaks through Congress and Obama begins the process of suspending sanctions by executive order and the Europeans begin a Tehran gold rush, the incentive to regard violations of any of the understandings as too minor to provoke a break will be too great. Kerry may speak of snapping back sanctions, but it’s clear the will to do so on the part of the West will be lacking.

That means that not only will Iran spend the next decade preparing for building its own bomb. It will also spend that time employing its wealth in its struggle for regional hegemony, a key part of which is its surrogate war on Israel. Once the deal expires, Hamas and Hezbollah won’t just be increasingly annoying Israel with deadly terror funded by Iran. They’ll then have a nuclear umbrella. At best, Israel — and moderate Arab states — will live under a terrible threat. The worst-case scenario is too awful to contemplate.

That means that contrary to Kerry’s belief about Iran having no plans in place to eliminate Israel, the entire process that will unfold from the deal is part and parcel of just such a plan. The only difference is that unlike past efforts, what will follow will happen while it has become America’s diplomatic and business partner. That is more than enough reason for anyone who cares about U.S. security, its interests in the Middle East and Israel’s survival, to rethink the deal.

 

Advances and Secret Information on Hacking of Classified Systems

Hacking never has the sizzle when it comes to terror or scandals, yet it is the cheapest and most effective means of destruction.

So, below are some items you cannot overlook.

A few weeks ago, the unclassified email and information system at the Pentagon, mostly used by the Joint Chiefs of Staff was taken offline due to suspicious malware activity. That system is back online as of this week after all clues pointed to the hack by Russians which led to up to 4000 Pentagon employees losing access to email.

***

Then it has been determined the Chinese have accessed top government officials private emails since 2010.

Chinese hackers have been accessing the private mails of some top United States officials since April of 2010, which coincides with Hillary Clinton’s tenure as secretary of state and her decision to use a private email server, Morning Joe’s Willie Geist reported Tuesday.

“The email grab, first code-named Dancing Panda, targeted top national security and trade officials,” Geist said. “It continued as late as 2014. The timing does overlap with Hillary Clinton’s time as secretary of state and her use of a private email server.”

“Many” top officials have been hacked, according to a high-level intelligence source and a top-secret document obtained by NBC News.

***

Now comes a global network of hacking and their successful and criminal activities.

Exposing a new front in cybercrime, U.S. authorities broke up an alleged insider trading ring that relied on computer hackers to pilfer corporate press announcements and then profited by trading on the sensitive information before it became public.

In morning raids in Georgia and Pennsylvania, federal agents arrested five men in the plot, while four others indicted on hacking and securities fraud charges remain at large.

The hackers, who are thought to be in Ukraine and possibly Russia, allegedly infiltrated the computer servers of PRNewswire Association LLC, Marketwired and Business Wire, a unit of Warren Buffett’s Berkshire Hathaway Inc., over a five-year period.

They siphoned more than 100,000 press releases including corporate data on earnings that could be used to anticipate stock market moves and make profitable trades. The hackers passed the information to associates in the U.S., who allegedly used it to buy and sell shares of dozens of companies, including Panera Bread Co., Boeing Co., Hewlett-Packard Co., Caterpillar Inc. and Oracle Corp., through retail brokerage accounts. A must read for the rest of the details is here.

***

Most chilling of all is the forward leaning and creative uses of drones.

LAS VEGAS, Nev. – Forget Facebook drones that broadcast Wifi. The future is drones that hack from above. A company called Aerial Assault has turned a quadcopter into a flying hacker that scans the world below for insecure devices and vulnerable Wifi ports. Its makers say they built the tool for penetration testing — to help “good guys” diagnose their own weaknesses — but they concede that with a bit of modification, it could be used to exploit those vulnerabilities and install malware from the air. This is why it’s paramount to get your I.T. network looked at by a penetration testing company, you may think this is a scary thing for your company to undergo however, it will actually prevent people (hackers) from stealing your companies information as all of the weak spots would of been identified and then rectified.

The unnamed drone, which may be the first unmanned aerial penetration tool for sale to the public, was on display at the DEF CON hacker conference here last week. It uses a small Raspberry Pi computer running the Kali Linux penetration tester software with the broadcast range extended by alpha radio antennas. It will retail for $2,500 when the Web site goes up in a few days, its makers say.

“We’ve set it up so it does some basic [penetration] testing stuff and coordinates all that data with GPS coordinates from the flight controller. From that, you can extend it with every type of capability that you want Kali Linux to do,” said David Jordan, a representative from Aerial Assault who was selling it on the floor at the DEF CON conference in Las Vegas, Nevada on Sunday.

While the drone isn’t specifically designed to distribute malware, Jordan acknowledged it could be modified to do so. “It is up to the user to decide what they do with it. If the user, they have Raspberry Pi with Kali on it, they can reprogram custom scripts. That’s good for doing more extensive [penetration] testing. But, you know, scripts can be whatever they are,” he said. “Our intended use is for pentesters to be able to diagnose vulnerabilities and help people understand what their Wifi accessibility is, even up in the air.”