Hillary was Hacked, Data Virgin Islands/Ukraine

EmailGate courtesy of Hillary Clinton’s home server has taken on a life of its own.

From the Blaze:

Clinton Email Domain Hosted by a Company That Was Hacked in 2010 and Had Data Redirected to Ukraine — and IP Address Reveals Link to British Virgin Islands

As news of Hillary Clinton using a private email during her tenure as Secretary of State continues to emerge, TheBlaze has learned that the email domain was hosted by a “consumer grade” company whose data was hacked in 2010, with information being sent to Ukraine. Additionally, data reveals that the domain was hosted at one point in the British Virgin Islands. This, experts say, is a big security no-no.

Domain history data reveals Clintonemail.com was registered in 2009 with Network Solutions, shortly after Clinton was appointed as the nation’s top diplomat. But the decision to host the domain for such a high-profile person on a consumer registrar like Network Solutions is questionable to security experts.

Bill Sweetman, a domain registration expert based in Canada who describes himself as part of the “left-leaning camp,” told TheBlaze Friday that the whole Clinton email controversy has struck him as “naive on the part of the players.”

Image source: DomainTools.com
.

“If you’re someone that is concerned about security of your data, you don’t go and register your domain name with a consumer-oriented registrar like Network Solutions or GoDaddy,” Sweetman said.

Image source: DomainTools.com

“You would work either with a corporate domain registrar like MarkMonitor or CVSC, or you would talk to your employer – in this case the government – about their internal solutions that would protect the domain name and would protect the data associated with it.”

Sweetman isn’t alone in thinking this.

Rod Rasmussen, a leading expert on the abuse of domain name systems, wrote in a 2013 column for the trade publication Security Week, that any domain managers using a consumer-grade registrar for a “major enterprise” should lose their jobs. Rasmussen wrote the piece after Network Solutions was hacked in 2010, resulting in thousands of domains being transferred to Confluence Networks, a domain registrar traced to the British Virgin Islands.

“When it comes to Internet security, there is absolutely no way major corporations would use consumer grade anti-malware and anti-phishing solutions as a one-stop security solution. So why would major organizations – we’re talking major Fortune 500 companies, government agencies, financial services and critical infrastructure organizations – put their domains in the hands of consumer grade registrars?” Rasmussen wrote.

Among the companies whose domains were moved offshore at the time of Rasmussen’s column were organizations like LinkedIn, Fidelity, Craigslist, Yelp and the U.S. Postal Service

“We have received reports that Network Solutions customers are seeing malicious code added to their websites, and we are really sorry for this experience,” company spokesman Shashi Bellamkonda wrote in a company blog post at the time. Aside from that admission, Rasmussen wrote that Network Solutions has been “tight-lipped” about the details, only adding that the websites of a “small number” of customers were “inadvertently affected for up to several hours.”

Computer World reported in 2010 that throughout the course of the attack, users of up to 50 domains hosted by Network Solutions were redirected to a Ukrainian attack server.  Historical domain data associated with Clintonemail.com reveals the last recorded change to a Clintonemail.com IP address occurred Dec. 22, 2011. A simple lookup of that particular IP address shows it is hosted in Road Town, British Virgin Islands, although its unclear whether the offshore IP address is a direct result of the Network Solutions hack.

What’s also unclear is whether Clintonemail.com was one of the domains directly involved in the same attack that redirected to a Ukrainian attack server. What is evident, however, is that the security threat posed by Hillary Clinton using a “consumer-grade registrar” for her private email domain, potentially containing classified information, was greater than the threat that could have been posed had she decided to use the State.gov domain.

Since the New York Times broke the story, questions surrounding Clinton’s use of private email have circulated throughout the media and even some members of her own party. Republicans, especially those who are expected to be considering a 2016 presidential run, have also pounced on the issue. After days of silence, Clinton finally tweeted a response to the controversy Thursday.

Clinton’s successor, Secretary of State John Kerry, told the press during a visit to Saudi Arabia that the review would be conducted “as rapidly as possible,” Reuters reported.

But the review of the nearly 55,000 emails Clinton sent from her private email could take some time, as one State Department official acknowledged: ”The review is likely to take several months given the sheer volume of the document set.”   ***    SIX YEARS

Hillary Clinton was in violation of State Department rules governing the use of non-governmental email accounts during her entire tenure as secretary of state and for nearly two years after she left the job, ABC News has learned.

A senior State Department official tells ABC News that under rules in place while Clinton was secretary of state, employees could only use private email accounts for official business if they turned those emails over to be entered into government computers. They were also forbidden from including sensitive but unclassified information on private email, except under some very narrow exceptions.

This policy is still in place, according to the Department. Until any private emails are entered into government computers, the official says, an employee is in violation of the rules.

Clinton used a private email account for her entire tenure as secretary — and did not even have a government-issued email. She only turned over some 55,000 pages of emails to be entered into government computer systems late last year, nearly two years after she stepped down from the State Department.

 

 

Hillary’s Emails, no Encryption and False Names

There was also stolen White House furniture and then Wall Street. The makings of a Hollywood movie in the text below:

Is the Mysterious ‘Eric Hoteham’ Actually Longtime Clinton Aide Eric Hothem? 

The name of the mysterious individual who registered the servers for Hillary Clinton’s private email address used at the State Department bears a striking resemblance to a longtime Clinton aide.

Clinton and her top aides in the State Department were using email addresses on a private server registered to the Clinton’s home in Chappaqua, New York, according to Internet records reviewed by the Associated Press.

The customer listed in records registering the Internet address to the Chappaqua home was “Eric Hoteham.” The AP, however, was unable to identify an “Eric Hoteham,” stating that the “name does not appear in public records databases, campaign contribution records, or Internet background searches.”

But the name is similar to that of Eric Hothem, who worked as a staff assistant for Clinton during her time as First Lady.

Hothem was involved in multiple personal matters during his service to Clinton and played a role in the controversy surrounding the pardon given to former President Bill Clinton’s half-brother Roger Clinton.

A congressional investigation into Clinton’s clemency decisions found that as Roger Clinton refused to testify to the committee in March 2001, he received a $15,000 wire transfer from a Citibank account in the care of Hothem.

The name of the account was “E.C. 934(A) c/o Eric Hothem.” Lawyers told the committee that “the account is a personal Citibank account of former President and Senator Clinton” and that the money was a loan for Roger Clinton to obtain legal counsel for the investigation.

The congressional report points out that the “payment occurred at the height of public outcry and investigative activity regarding the pardons and at a time when Roger Clinton was deciding whether to provide testimony.”

According to accounts of the final days of the Clinton administration, Hothem told chief White House usher Gary Walters that multiple items of furniture were “the Clintons’ personal property” even though they were not.

The Clintons would later have to return or pay for more than $100,000 in furnishings stolen from the White House.

Hothem also received a special acknowledgement in Hillary Clinton’s book Living History.

Hothem went to work for Citigroup, then moved to JP Morgan Chase in 2013, according to public disclosure reports accessed through the Securities and Exchange Commission.

The documents indicate that Hothem began his financial career in 2002, just a year after his last documented work as an aide to Clinton.

Members of Hothem’s JP Morgan office in Washington, D.C., said on Wednesday that they had “no comment” to any questions regarding Hothem and directed the Washington Free Beacon to the company’s media relations department.

Inquiries made to media relations were not answered by press time. An email sent to an account believed to be Hothem’s was also not returned.

An analysis of Clinton’s personal financial disclosure forms shows she maintained accounts worth millions of dollars at Citibank throughout her years in the Senate. She moved her largest accounts to JP Morgan in 2009.

Her most recent available public financial disclosure in 2012 shows that she holds up to $25 million worth of assets in a JP Morgan account. Hothem did not make the switch to JP Morgan until Clinton was out of federal office in May 2013.

Hothem has maintained ties to Democratic campaigns. His wife, Sue Hothem, has “raised millions of dollars in political contributions,” and helped found a political action committee worth nearly $1 million. She was also the director of development Democratic Leadership Council and the Progressive Policy Institute.

The Clinton Foundation did not respond to a request for comment by press time.

***    

Clinton’s E-Mail System Built For Privacy Though Not Security

No Encryption or protections and once the emails are gone…well they ARE gone?

A week before becoming Secretary of State, Hillary Clinton set up a private e-mail system that gave her a high level of control over communications, including the ability to erase messages completely, according to security experts who have examined Internet records.

“You erase it and everything’s gone,” Matt Devost, a security expert who has had his own private e-mail for years. Commercial services like those from Google Inc. and Yahoo! Inc. retain copies even after users erase them from their in-box.

Although Clinton worked hard to secure the private system, her consultants appear to have set it up with a misconfigured encryption system, something that left it vulnerable to hacking, said Alex McGeorge, head of threat intelligence at Immunity Inc., a Miami Beach-based digital security firm.

The e-mail flap has political significance because Clinton is preparing to announce a bid for the Democratic nomination for president as soon as April. It also reminds voters of allegations of secrecy that surrounded Bill Clinton’s White House. In those years, First Lady Hillary Clinton fought efforts by some White House advisers to turn over information to Whitewater investigators and, later, sought to keep secret records of her task force on health-care reform.

Representative Trey Gowdy, a South Carolina Republican who leads a special committee looking into the events surrounding the 2012 terrorist attack at a U.S. diplomatic facility in Benghazi, Libya, said he will subpoena Clinton’s e-mails.

“We’re going to use every bit of legal recourse at our disposal,” Gowdy said Wednesday during an interview on CNN.

Private Service

The committee also said Wednesday that it has discovered two e-mail addresses used by Clinton while secretary of state.

Nick Merrill, a Clinton spokesman, didn’t immediately respond to a request for comment, though he said in a statement Tuesday that her practices followed “both the letter and spirit of the rules.”

Setting up a private e-mail service was once onerous and rare. Now, it’s relatively easy, said Devost, president of FusionX LLC, based in Arlington, Virginia.

“There are tons of disadvantages of not having teams of government people to make sure that mail server isn’t compromised,” McGeorge said. “It’s just inherently less secure.”

Former Florida Governor and likely 2016 Republican presidential candidate Jeb Bush and used a personal e-mail while he was governor and has done so since, according to his spokeswoman, Kristy Campbell. He kept a server he owned in his state office and didn’t have a private server at home, Campbell said in a phone interview.

Bush E-Mails

Bush differed from Clinton in that it was known he was using a personal e-mail, his aides had regular access to the server and “his office consistently throughout his term complied with Florida’s public records laws,” Campbell said.

In order to ensure her e-mails were private, Clinton’s system appeared to use a commercial encryption product from Fortinet — a good step, McGeorge said.

However, when McGeorge examined the set-up this week he found it used a default encryption “certificate,” instead of one purchased specifically for Clinton’s service. Encryption certificates are like digital security badges, which websites use to signal to incoming browsers that they are legitimate.

“It’s bewildering to me,” he said. “We should have a much better standard of security for the secretary of state.”

Confirmation Hearing

Clinton’s private e-mail — [email protected] — was on a domain set up Jan. 13, 2009, the same day a Senate committee held her confirmation hearing. She was confirmed and sworn in on Jan. 21 as President Barack Obama’s first Secretary of State.

It’s entirely possible that Clinton had a private e-mail system set up at her home as a way to maintain administrative and legal control over her communications, said Tim “T.K.” Keanini, chief technology officer for network security company Lancope Inc. based in Atlanta.

“What we know is that she cared about that communication channel so much that she went out of her way,” and likely hired an expert to configure it for her, Keanini said in a phone interview.

Even so, there’s no guarantee she had complete control over what happened to the e-mails, Keanini said.

Keanini searched Internet records to determine that the computer server supporting Clinton’s e-mail was located in her hometown of Chappaqua, New York. An exact physical address could not be determined. The Internet Protocol address for the server was registered to a person by the name of Eric Hoteham, according to the records.

Kerry’s E-Mail

Supporters note that e-mails sent to State Department employees would have been retained on the government’s system.

However, the e-mail system was also used by at least some close staff, including Huma Abedin, Clinton’s deputy chief of staff at the State Department.

Clinton has yet to speak publicly about her motivation for setting up the system or what discussions she had with her advisers at the time.

Secretary of State John Kerry is the first in his position to rely primarily on a state.gov e-mail account, Deputy Press Secretary Marie Harf said. Harf said that the State Department has “no indication that Secretary Clinton used her personal e-mail account for anything but unclassified purposes.”

While Clinton didn’t have a classified e-mail system, she had multiple ways of communicating in a classified manner, including assistants printing documents for her, secure phone calls and secure video conferences.

Top Aide

Clinton’s top aide during that period, Cheryl Mills, is a respected scandal-defense lawyer. As a member of the White House counsel’s office, Mills helped guide President Bill Clinton through a series of investigations in the 1990s and won praise for her performance in successfully defending him when the Senate voted not to remove him from office in 1999.

Mills would go on to combine two of the most powerful posts at the State Department — chief of staff and counselor — under Hillary Clinton. In that job, she spoke for Clinton on management matters within the department.

Mills didn’t reply to an e-mail seeking comment.

Not long after resigning as secretary of state, Clinton’s private e-mail service was transferred to a commercial provider, MX Logic, Devost said.

“The timing makes sense,” Devost said. “When she left office and was no longer worried as much about control over her e-mails, she moved to a system that was easier to administer.”

Encrypted Connection

It took less than a day for researchers to find potential problems with the Clinton’s system.

Using a scanning tool called Fierce that he developed, Robert Hansen, a web-application security specialist, found what he said were the addresses for Microsoft Outlook Web access server used by Clinton’s e-mail service, and the virtual private network used to download e-mail over an encrypted connection. If hackers located those links, they could search for weaknesses and intercept traffic, according to security experts.

Using those addresses, McGeorge discovered that the certificate appearing on the site Tuesday appeared to be the factory default for the security appliance, made by Fortinet Inc., running the service.

Those defaults would normally be replaced by a unique certificate purchased for a few hundred dollars. By not taking that step, the system was vulnerable to hacking.

Fortinet Statement

It’s unclear whether the site’s settings were the same before news of the private e-mail account emerged this week.

Fortinet issued a statement saying it wasn’t aware the company’s technologies were used by Clinton.

“If they were, our recommendation is to replace provided self-signed certificates with valid digital certificates for the protected domains,” said Andrea Cousens, a Fortinet spokeswoman.

“It may have fallen in the realm of acceptable risk,” Devost said. “They wanted to make sure that when she was in Egypt all of the traffic from her phone to the mail server was encrypted and that was their priority.”

Not Just Hillary Who Ignored .Gov Emails

Heck America….ask every employee if they use or have used outside secret emails to do the business of government. It seems it began with Lisa Jackson at the EPA. What about secret emails to other secret email accounts? There is no .gov record and there is law on this. So back to lil miss Hillary…

.

Maybe Hillary’s covert and cover-up agenda started back at TravelGate.

The computer server that transmitted and received Hillary Rodham Clinton’s emails – on a private account she used exclusively for official business when she was secretary of state – traced back to an Internet service registered to her family’s home in Chappaqua, New York, according to Internet records reviewed by The Associated Press.

Clinton has not described her motivation for using a private email account – [email protected], which traced back to her own private email server registered under an apparent pseudonym – for official State Department business.

Operating her own server would have afforded Clinton additional legal opportunities to block government or private subpoenas in criminal, administrative or civil cases because her lawyers could object in court before being forced to turn over any emails. And since the Secret Service was guarding Clinton’s home, an email server there would have been well protected from theft or a physical hacking. Read more here and then lets track down Sidney Blumenthal and see what he has to say.

Source: Top Clinton Aides Used Secret Email Accounts at State Dept.

by J.K. Trotter

Hillary Clinton is defending her use of a private email address, hosted at ClintonEmail.com, to conduct official State Department business by claiming that her emails were captured by official @state.gov accounts that other agency employees were instructed to use to contact her. But according to a knowledgeable source, at least two other top Clinton aides also used private email accounts to conduct government business—placing their official communications outside the scope of federal record-keeping regulations. “Her top staffers used those Clinton email addresses” at the agency, said the source, who has worked with Clinton in the past. The source named two staffers in particular, Philippe Reines and Huma Abedin, who are said to have used private email addresses in the course of their agency duties. Reines served as deputy assistant secretary of state, and Abedin as Clinton’s deputy chief of staff. Both rank among Clinton’s most loyal confidantes, in and out of the State Department.

We were able to independently verify that Abedin used a ClintonEmail.com address at some point in time. There are several email addresses associated with Abedin’s name in records maintained by Lexis-Nexis; one of them is [email protected]. An email sent to that address today went through without bouncing.

In an email to Gawker, Clinton spokesman Nick Merrill denied that Reines was ever given, or ever used, a ClintonEmail.com address. “He has never had one, not for communicating with anyone about anything,” he wrote.Merrill did not respond, however, to questions about whether Reines used a private account at a different provider, such as Yahoo! or Gmail, to conduct official agency business. He also refused to address multiple questions regarding how Abedin used her ClintonEmail.com address.

The use of private email addresses may explain the State Department’s puzzling response to several FOIA requests filed by Gawker in the past two years. One of our requests, in September 2012, sought correspondence between Reines and a variety of reporters, including former BuzzFeed reporter Michael Hastings, who engaged in a profanity-flecked exchange with Reines in 2012. That request was confoundingly denied on the grounds that the State Department had no record of Reines—whose job it was to communicate with reporters—emailing Hastings or any other journalists (Gawker is currently appealing the rejection). Another request in June 2011 sought Abedin’s email correspondence; the State Department rejected that one as well, although we could not immediately locate the denial letter to determine on what grounds.

“It pokes a big hole in her explanation,” the source added, referring to spokesman Nick Merrill’s statement to Business Insider. “Like Secretaries of State before her,” Merrill told the site, she used her own email account when engaging with any Department officials. For government business, she emailed them on their Department accounts, with every expectation they would be retained.”

Putin Goes Beyond Ukraine to Artic..

While the world is fretting with good cause over Islamic State, then al Qaeda and Ukraine, how come no one is fretting over Russia in the Artic? Where is Greenpeace or Tom Steyer? Heck where is Barack Obama?

In part from the Strategic Studies Institute , part of the U.S. Army War College:

The Arctic has reemerged as a strategic area where vital U.S. interests are at stake. The geopolitical and geo-economic importance of the Arctic region is immense, as its mineral wealth is likely to turn the region into a booming economic frontier in the 21st century. The Arctic coasts and continental shelf are estimated to hold large deposits of oil, natural gas, methane hydrate (natural gas) clusters, and large quantities of valuable minerals.
With the shrinking of the polar ice cap, navigation through the Northwest Passage along the northern coast of North America may become increasingly possible with the help of icebreakers. Similarly, Russia is seeking to make the Northern Sea Route along the northern coast of Eurasia navigable for considerably longer periods during the year and is listing it as part of its national boundaries in the Kremlin’s new Arc- tic strategy. Passage through these shorter routes will significantly cut the time and costs of shipping. (See Map 1-1.) In recent years, Russia has been particularly active in the Arctic, aggressively advancing its interests and claims by using international law and also establishing a comprehensive presence in the Arctic, including the projection of military might into the region.

Thanks to Jeff at Newsweek:

What Is Russia Up To in the Arctic?

The Mågerø air defense monitoring base is inside a mountain at the end of an unmarked country road two hours south of Oslo, Norway. With only a rudimentary sentry box, a simple draw gate and a lone soldier guarding its entrance, the installation looks more like the set for a movie about the Nazi occupation of the country than a key link in the country’s state-of-the-art defenses.

At the end of a long, narrow tunnel into the mountain, in a cavernous room filled with computers and radar monitor screens, intelligence specialists stare at blinking icons marking the movement of aircraft around Norwegian airspace. On an all-too-typical afternoon recently, they watched as two nuclear-capable Tu-95 Russian Bear Bombers floated like fireflies across the top right of their monitors. A few desks away, an airman picked up phone and called Bodø, a military base on Norway’s northern coast. Moments later, two F-16s rose to eyeball the intruders.

It turned out the Russian bombers were just practicing some kind of circling maneuver outside of Norway’s Arctic air space. But on January 28 two more Tu-95 bombers, escorted by tankers and Russia’s most advanced MiG-31 fighter jets, showed up off the coast. One of them was carrying “a nuclear payload,” according to the London Sunday Express, which cited intercepted radio traffic. And last fall, a Russian Tu-22 supersonic bomber skirting Norway’s northern airspace was photographed carrying a cruise missile in launching position, according to the Barents Observer blog. Similar examples abound.

Adding to the potential for an unintended catastrophe, Russian warplanes typically lift off without filing a flight plan and cruise the busy commercial flight lanes with their transponders off, riling airline and NATO pilots alike. In recent months Russian warplanes have been engaging in Top Gun–style stunts far from home, popping up unannounced aside an SAS airliner on a flight between Copenhagen, Denmark, and Oslo and buzzing a Norwegian F-16 pilot. (A widely watched cockpit video of the incident, released by the defense ministry, shows the pilot yelping “Holy shit!” as a MiG-31 darts past his wingtip.)

“We haven’t seen this kind of activity for many years,” Colonel Arvid Halvorsen, Mågerø’s base commander, says as he watches the blinking icons for the Russian Tu-95s on a radar screen. “The missions are also more complex lately,” he says, with larger and larger groups of bombers escorted by MiGs, tankers and surveillance aircraft.

Although Moscow isn’t threatening the West with anything near the number of warplanes deployed by the Soviet Union during the Cold War, its air sorties around Norway have increased dramatically each year since 2007, when Russian President Vladimir Putin ordered his strategic bombers to resume flights in international airspace.

But late last year, with the world’s attention riveted on Ukraine, Putin put a little-noticed exclamation mark on his Arctic strategy. For the first time, the Kremlin’s announced military doctrine included instructions to prepare to defend Russia’s interests in the Arctic. Plans for two new Arctic army brigades were drawn up. An abandoned military base at Alakurtti, Russia, less than 30 miles from the Finnish border, was reopened. And military construction crews began refurbishing a string of Cold War–era bases on islands in the Arctic. “Our main objective is research and evaluation of conditions in the Arctic and the suitability of our weapons and equipment this far north,” Vladimir Kondratov, commander of the surface ships group of the Northern Fleet, told Russia Today.

New Red Dawn?

No one knows what Putin’s endgame is. And while the Norwegians would rather prepare quietly than stoke fears of a Crimean-style Russian grab in the Arctic, the country’s memory of the Nazi invasion 75 years ago remains fresh. At Mågerø and two dozen other bases scattered from Norway’s southern tip to its northern frontier with Russia, Oslo’s armed forces are preparing for the worst.

But “the worst” is a mystery. “I’d agree that the Russians have been very active,” says Keith Stinebaugh, a longtime Defense Department civilian intelligence specialist who is now a senior fellow in Arctic Security Policy at the Institute of the North in Anchorage. But “aggressive” may be overstating it, he adds. “You’d have to define what is meant by aggressive and compare it to what they did during the Cold War.… They are certainly more active around the world, not just in the Arctic.”

A Russian-speaking former CIA officer, who spent more than a dozen years operating undercover in the former Soviet Union, agrees. Today’s activities are “nothing like the Soviet air incursions that occurred on a weekly basis at the height of the Cold War,” the former officer says. And while Moscow’s armed forces, are “much improved over the past few years, [they] are still a shadow of their former Soviet selves.… Putin is very aware of this,” the officer adds, “but his beefed-up forces enhance national prestige and have allowed Russia to command more respect on the international scene.”

Which is a waste of money for Moscow, argues Ernie Regehr, a senior fellow in Arctic security at the Vancouver, British Columbia–based Simons Foundation. “Does it ever make sense to threaten to do what you know will never be in your interests to do?” Regehr recently argued in a paper for the foundation. “Symbolic flights of fighter aircraft and bombers are intended to remind the adversary that these weapons are available for use. But in any rational world, they are clearly not available for use by Russia against NATO or by NATO against Russia. There is no circumstance under which this would make sense or serve the interests of either side. Neither side wants them to be used.”

Stinebaugh, who spent 38 years in the Defense Department, suggests there may be a more prosaic reason for Russia’s Arctic buildup: money. “It may be that one way to get a project funded in the Russian military system today is to attach the word ‘Arctic’ to it, just like U.S. projects got funded by invoking [the global war on terror] and now get funded with ‘cyber’ even if the connection is tenuous,” he says.

Yet few Norwegians can completely banish the specter of the Russian bear on their doorstep, says Reidun Samuelsen, the editor at Aftenposten, Norway’s leading newspaper. “It’s never far from our minds,” she tells Newsweek.

Norwegian Nightmares

As was the case in the U.S. during the Cold War, when fears of nuclear conflict found outlets in films such as Dr. Strangelove Norwegians’ anxieties over Russian intentions will soon burst forth in Occupied, a political thriller conceived by Jo Nesbø, Norway’s internationally best-selling crime writer.

Scheduled to debut on Norwegian TV next year, the weekly drama “follows events in the close future” when Russia has carried out a “silk glove invasion” of Norway “in order to take control of its oil resources,” according to a news release.

“My idea was this,” Nesbø told Newsweek by email. “The Norwegian Green/left-wing government has decided it will stop producing fossil energy.” Russia moves in, seizing its oil facilities. When the U.S. and E.U. issue only paper protests, he says, Norwegian leaders “don’t see the point in military action, they try to negotiate while the Russians quietly take over the few things they [need] to take over to control the oil. And it’s a gentle occupation. Most Norwegians can’t really tell the difference. There are few Russians present, most of them are in suits, and there’s seemingly no censorship and Norwegians can travel freely and keep on living their lives as one of the richest populations in the world.”

News of the series emerged at about the same time Norway’s security service uncovered evidence of real-life subversion in the capital. Some foreign intelligence service—the main suspects were Russia and China, which also covets the Arctic’s future shipping routes—had planted so-called IMSI catchers, devices that can secretly capture the signals of cellphones, around Oslo’s government buildings. Officially, the perpetrator remains a mystery, but Norwegian sources tell Newsweek the government knows who did it but has shied from fingering the guilty party out of fear of triggering a full-scale international scandal.

Nesbø, whose 20 novels have sold 23 million copies in 40 countries, says the plausibility of Occupied’’s plot is beside the point. The real drama revolves around “a situation where it’s hard to pinpoint what you’ve lost in your everyday material world,” he says. “What would people be willing to sacrifice for phrases like freedom, independence and democracy? And who would be the first ones to resist? And would the nation follow?”

Guerrillas in the Arctic

Such questions are likely to rekindle unsavory memories of Norway’s capitulation to Germany in 1940 with the help of local Nazis led by the infamous Vidkun Quisling. The Norwegian king and tens of thousands of patriots escaped to England, where they set up a government in exile and formed a resistance movement eager to go back and fight. Trained by Britain’s secret services, the guerrillas of Norwegian Independent Company 1 eventually snuck back into the country and wreaked havoc on the Nazis.

Norwegians can’t get enough of this version of themselves. Every Sunday night for six weeks in January and February, more than one of every five Norwegians sat down to watch the latest episode of The Heavy Water War, a dramatization of the heroic guerrillas’ sabotage of Norway’s stocks of deuterium oxide, which the Germans seized to produce a nuclear weapon.

The guerrilla mentality remains an important strain in Norway’s military forces. Last year, Nils Johan Holte, the rangy, 57-year-old rear admiral who heads Norway’s Special Operations Command, took 10 of his officers back to the training camp in Scotland, where the first guerrillas learned hand-to-hand fighting and explosives. “It was about connecting with our origins.… ” Holte said as heavy snow fell outside his office in Oslo, “and for [the men] to understand that there’s a seriousness today about this.” It seems no accident that the headquarters of today’s Norwegian guerrillas is on the grounds of the hulking, medieval Akershus Fortress, built to defend the city from sea raiders 700 years ago. In 1940, it was occupied by the Nazis.

In 1988 the Norwegian government nearly disbanded its special operations force, which was initially set up as a small, discreet anti-terrorist unit inside the armed forces, as a money-saving move. Protests, including from the oil industry, which feared attacks on its North Sea drilling platforms—saved it. Since then, its commandos have seen action from the Balkans to Afghanistan and many secret places in between. And last year, the unit became independent, reporting directly to the chief of defense.

Like other Norwegian commanders and politicians, Holte is discreet when it comes to characterizing the recent Russian moves as sinister. Asked directly about the threat, he leans back in his chair, folds his hands behind his head, and smiles. His lone message for any potential adversary: “Do not attack Norway. We can defend ourselves.”

Obama White House Navigates with Muslim Brotherhood

The Betrayal Papers – Part II of V: In Plain Sight: A National Security “Smoking Gun”

Primer:

The first article of the Betrayal Papers asserted that the Muslim Brotherhood was not only influential in the United States government, but in fact dominated the administration of President Barack Hussein Obama. This article will name several key people who were or are in the Obama administration and who have various, documented associations with organizations who are directly tied to and/or funded by the Muslim Brotherhood and the State of Qatar (home to their Spiritual Leader, Yusuf al-Qaradawi). These individuals have helped dictate national security policies that have crippled counterterrorism efforts at home and abroad.

The Muslim Brotherhood’s Network of Civic Organizations: Apologists for Terror

In 1963, the first Muslim Brotherhood front group established itself in the United States and Canada: the Muslim Students Association of the U.S. and Canada (MSA), a group based on college campuses in North America. Through this organizational foothold, the Brotherhood has recruited and indoctrinated generations of American and Canadian Muslims into an Islamic belief system that pits Islam against the world. In more than a few cases, Muslims who join MSA chapters at their colleges have taken this ideology to its logical extreme: terrorism.

For example, it was recently reported by the Canadian Military Association that eleven (11) of Canada’s highest profile terrorists were tied to the MSA.

Since the early 1960s, the Muslim Brotherhood’s MSA has birthed a large number of purported “civic organizations,” which are anything but civil. We shall now name some of the groups, and establish the facts that link them to their parent organization, the Muslim Brotherhood.

Council on American-Islamic Relations (CAIR): CAIR was founded by two individuals with close ties to a Hamas operative. Hamas, according to its own charter, is the branch of the Muslim Brotherhood in Palestine. In 2007, founder Omar Ahwad was named as an unindicted co-conspirator in the Holy Land Foundation terrorist financing trial. In November 2014, CAIR was designated a terrorist organization by the United Arab Emirates.

Muslim American Society (MAS): MAS was founded in 1992 by members of the Muslim Brotherhood, according to MAS secretary-general Shaker Elsayed. MAS, and the Muslim Brotherhood, advocate for Sharia law in the United States. MAS identifies the Islamic Society of North American (ISNA) and Muslim Students Association (MSA) as organizations with the same goal: the “Islamic revival movement.” In November 2014, MAS was designated a terrorist organization by the United Arab Emirates.

Islamic Society of North America (ISNA): ISNA was created out of four Islamic organizations, including the Muslim Students Association. Its former president Mohamed Magid was appointed an advisor to DHS and the National Security Council by Barack Obama in 2011, and was a recent guest at the White House.

Muslim Public Affairs Council (MPAC): MPAC was founded by members of the Muslim Brotherhood, specifically Hassan and Maher Hathout, both whom were acolytes of Muslim Brotherhood founder, Hassan al-Banna. MPAC supports the Tunisian Ennahda (Muslim Brotherhood) Party leader, Rachid Ghannouchi, whom they termed “one of the most important figures in modern Islamic political thought and theory.” Its current President is Salam Al-Marayati, who represented the US to the United Nations and UNESCO in 2010.

Muslim Students Association (MSA): The MSA, the first Muslim Brotherhood organization to gain a foothold in the United States, was founded in 1963. Many founding members were Muslim Brothers or had connections to the Muslim Brotherhood. The three most significant founders of MSA were Hisham al Talib, Jamal Barzinji, and Ahmed Totanji, and all of whom were MB leaders of Iraqi descent. While a student at George Washington University, Hillary Clinton’s personal aide Huma Abedin was on the Executive Board of her MSA.

Additionally, a 1991 internal memorandum of the Muslim Brotherhood identifies, specifically, CAIR, ISNA, and the MSA in “A list of our organizations and organizations of our friends.” (Note: CAIR’s organizational predecessor, the Islamic Association of Palestine, is named.)

Finally, CAIR and ISNA were named un-indicted co-conspirators which materially supported terrorism by a federal court, in connection with the infamous Holy Land Foundation trial, an alleged humanitarian charity for Palestine. An incorporating member of MAS, Dr. Jamal Badawi, was named an unindicted co-conspirator. MPAC and MSA members are on the record supporting the Holy Land Foundation against government terrorism charges.

This evidence begs some questions from the honest reader:

  • If these are all independent organizations, why is it that each of them is so neatly tied to the same parent organization, the Muslim Brotherhood?
  • Why are most of them named by the Muslim Brotherhood in their own memorandum?
  • Why were all involved, directly as unindicted co-conspirators or indirectly as defenders, with the Holy Land Foundation trial?

It doesn’t take a super sleuth to realize that these organizations are in fact assets of one organization, the Muslim Brotherhood. All one has to do is glance at the published information on their backgrounds, and the fact reveals itself.

The Anschluss of Georgetown and the Brookings Institution

You know the sayings. Money makes the world go ’round, and Follow the money, and Money is the root of all evil. These are important to keep in mind when considering the influence that Qatari money has had on two institutions as American as apple pie: Georgetown University and the Brookings Institution.

In 2005, Georgetown University established a new campus for their prestigious School of Foreign Service in Doha, Qatar. (It bears stating here that the State of Qatar was the driving Arab force behind the Arab Spring, which resulted in the Muslim Brotherhood coming to power in Tunisia, Libya, and Egypt.) Today they have a faculty of more than 35 academics.

As part of Qatar’s Education City, Georgetown has had all SFS-Q campus development costs covered by the Qatar Foundation, a charity with noted links to terrorism. May this, perchance, have some influence over the education that Georgetown is giving to future American diplomats in Qatar? At the very least, it may explain some of the blatant anti-Semitic comments in Georgetown’s student newspaper.

Likewise, the Brookings Institution is also heavily funded by Qatar. In 2013, they received $14.8 million; in 2012, $100,000; and in 2011 $2.9 million. This explains why Obama had Brookings Vice President (and purported diplomat) Martin Indyk, negotiating the ‘peace terms’ between Israel and Hamas. Today, Indyk is busy negotiating with an aggressive and nuclear-aspiring Iran.

Is it any wonder why Israel doesn’t trust this administration? By all reasonable logic, they are on the side of Qatar and Hamas, which is officially the Palestinian franchise of the Muslim Brotherhood.

The Obama Administration’s Agents

Given that these organizations function in a coordinated ideological manner, indeed they derive from the same root, it follows naturally that an individual associated with one organization would likely be associated with many, if not most of the others – not to mention the proxies of Georgetown and Brookings.

An experiment: Let’s choose seven Obama administration appointees with suspected ties to the Muslim Brotherhood. Where to pluck these seven from? In December 2013, the Egyptian political magazine Rose El-Youssef, in an article entitled Not Huma Abedin Alone, named six (plus one Huma Abedin) Obama appointees it claimed were operatives of the Muslim Brotherhood. You can read an English translation here. Let’s see if their claims stack up, based on the information above.

Here are the seven named and their titles in the Obama administration:

Arif Alikhan – Assistant Secretary for Homeland Security for Policy Development. 2009-2010. Eboo Patel – Member of the President’s Advisory Council to the Office of Faith Based and Neighborhood Partnerships. 2009-Present. Huma Abedin – Personal Aide/Chief of Staff to Secretary of State Hillary Clinton. 2009-2013. Mohamed Magid – DHS Countering Violence and Extremism Working Group. 2011-Present. Mohammed Elibiary – Senior Member of DHS’s Homeland Security Advisory Council. 2010-2014. Rashad Hussain – U.S. Special Envoy to the Organisation of Islamic Cooperation (OIC). 2010-Present. Deputy Associate Counsel to Barack Obama. 2009-2010. Salam Al-Marayati – Administration representative to UNESCO and United Nations. 2010.

(Dates in administration are best efforts based on publicly available information.)

Now let’s compare their affiliations and associations, officially and less formally, across the above named organizations. We’ll also include the Department of Homeland Security, which earlier this week was praised by CAIR for identifying “right-wing sovereign citizen extremist groups,” not Islamic terrorism, the prime terrorist threat facing the United States.

MB graph 1

 

Color Key

Green: Has worked or works in an official capacity for organization; is a named member of the organization. Yellow: Has been associated with org., e.g., authored paper on their behalf; spoke on their behalf and/or at their events; proven personal relationship between the individual and organization’s leadership, etc. Grey: No known/documented association.

No Coincidences

Notice the heavy concentration of green and yellow boxes, including for Georgetown and Brookings, in the table above. Notice the relatively few grey boxes. Individually these associations mean little; likewise, had this been just one random appointee in the entire administration, this story wouldn’t warrant the attention of the American public.

The complex of individuals and organizations, of Muslim Brotherhood money and policy recommendations, round out a picture of a carefully constructed conspiracy operating in plain sight.   It has hijacked the American government and military and used it as a tool to build a global Islamic Caliphate. The conspirators are changing the culture at home to accommodate sharia law and using law enforcement to demonize ordinary American citizens as national security threats.

These are Barack Hussein Obama’s appointees. This is Barack Hussein Obama’s administration and these are people chosen to advise him on national security and Islam.

From expunging from DHS considerations the threat posed by Islamic terrorism, to corrupting American foreign policy, the policy implications of these and similar appointments will be explored in the next articles.

* This analysis was completed after a careful survey of available press releases, news reports, and credible published information. They will be published in an upcoming report. Source material available upon request.

The Betrayal Papers is a collaborative effort by the Coalition of Concerned Citizens, which includes: Andrea Shea King, Dr. Ashraf Ramelah, Benjamin Smith, Brent Parrish, Charles Ortel, Chris Nethery, Denise Simon, Dick Manasseri, Gary Kubiak, Gates of Vienna, Hannah Szenes, IQ al Rassooli, Jeff Bayard, Leslie Burt, Marcus Kohan, Mary Fanning, General Paul E. Vallely, Regina Thomson, Scott Smith, Terresa Monroe-Hamilton, Colonel Thomas Snodgrass, Trever Loudon, Wallace Bruschweiler, and William Palumbo.