Refugees Have Temporary Status in U.S. but not under DHS

The United States has been taking in refugees, migrants and asylees from Latin America and several dozen countries for decades. This is supposed to be a temporary condition but the truth is it has never been temporary.

Image result for manbij

Now with 45 million people from just 2015 displaced from their home countries around the world, there is a crisis that is hard to define much less solve. The United Nations is the lead organization that is under pressure to find solutions and world leaders are not in any kind of collective agreement. Meanwhile, there are people, mostly innocent that are suffering. This is a historical time, one that was in fact not only predictable but solvable if civil war, conflicts and terrorism was addressed long before it manifested.

At issue is the total cost of war where there is no end in sight but more, the cost of creating a viable and living long term solution for migrants to include education, healthcare, law enforcement, jobs, entitlements to list a few. No country is monetarily prepared for the future costs many yet to be known, studied or funded.

Related reading: Bodies found off coast of Libya as migrant toll climbs

The United States had every opportunity in 2011 to launch humanitarian action missions to offset refugee conditions especially as Islamic State was born, and predicted to become a global terror operation directly after Abu Musab al-Zarqawi was killed. He is the original father of Islamic State…al Qaeda in Iraq.

Image result for zarqawi

As a result of the long war in Iraq, Syria and Afghanistan, the complete damage to cities and towns where normal infrastructure has been destroyed, there is no viable location to go back to. There are no schools, hospitals, roads, buildings and commerce has stopped except for black markets and smuggling. Further, no countries are stepping up with funds to help rebuild or as many call it, nation building.

In summary, refugees are in fact a new permanent status for wherever they are located, including the United States.

Consequently, the United Nations is chartered with drafting a global solution with world leaders.

The first cut a the draft is found here.

In part from the NewYorkTimes: Refugees and migrants will be the biggest issue at the gathering of world leaders at the United Nations next month. President Obama plans to lead a meeting at the General Assembly in an effort to nudge countries to take in more refugees and contribute to countries that have taken them in for years.

The United Nations secretary general, Ban Ki-moon, also plans to hold a meeting on the plight of refugees and migrants. The document under negotiation will be the centerpiece of his meeting.

While the draft text has no force of international law, every sentence has been argued and negotiated. The resulting language is sometimes so vague that it is likely to bring little comfort to the millions of men, women and children who are seeking safety and opportunity abroad.

Eritrea, for instance, recently complained that the many references to human rights in the document were “redundant.” (A United Nations committee earlier this year accused Eritrea of atrocities against its own citizens.)

Russia resisted a sentence that called for countries to share in the “burden” of taking in refugees. (Russia takes in very few, except lately, from parts of Ukraine.)

The United States suggested a phrase asserting that detention is “seldom” good for children. Activists for immigrants and refugees found that suggestion so appalling that they fired off a letter on Friday to President Obama. They argued that any international agreement should make clear that detention is “never in the best interests of children” and should commit to ending the practice. (The United States detains children who arrive from Mexico without legal papers.)

Amnesty International said in a statement over the weekend that “with some states trying to dilute the agreement to suit their own political agendas, we may end up with tentative half-measures that merely reinforce the status quo or even weaken existing protection.”

This draft agreement sets out a long list of principles, most already enshrined in existing laws. It says refugees deserve protection and should not be sent back to places where they could face war or persecution. It urges countries to allow refugees to work and to let their children attend school, though it stops short of saying refugees have a right to either jobs or schools.

It asserts that migration can be good for the world, which is wording that migrant-sending countries wanted. It also calls for countries to take back their citizens if they travel illegally and fail to get asylum, which is what migrant-receiving countries, especially in Europe, wanted.

An early draft had proposed a global compact to allocate where refugees could be permanently resettled, but that proposal failed. African and Latin American countries wanted to know why the compact was on refugees alone, according to diplomats involved in the negotiations. Why not also have a compact on the rights of migrants, they asked.

The latest draft sets a 2018 deadline for two compacts — one for refugees, a second for migrants.

The draft text also says nothing about the rights of the 40 million people who are displaced in their own countries, or about those who are leaving their homes because of climate change.

 

 

Fake URL’s and Shortening During Arab Spring/Iran

In 2014, it was reported but not widely so.

Edward Snowden leaked a top-secret GCHQ document which details the operations and the techniques used by JTRIG unit for propaganda and internet deception.

SecurityAffairs: The JTRIG unit of the British GCHQ intelligence agency has designed a collection of applications that were used to manipulate for internet deception and surveillance, including the modification of the results of the online polls. The hacking tools have the capability to disseminate fake information, for example artificially increasing the counter of visit for specific web sites, and could be also used to censor video content judged to be “extremist.” The set of application remembers me the NSA catalog published in December when the Germany’s Der Spiegel has revealed another disturbing article on the NSAsurveillance, the document leaked by tge media agency was an internal NSA catalog that offers spies backdoors into a wide range of equipment from major vendors.

The existence of the tools was revealed by the last collection of documents leaked by Edward Snowden, the applications were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG) and are considered one of the most advanced system for propaganda and internet deception. JTRIG is the secret unit mentioned for the first time in a collection of documents leaked by Snowden which describe the Rolling Thunder operation, the group ran DoS attack against chatrooms used by hacktivists. More here.

It is being reported again and it may be just good tradecraft by British intelligence.

British Spies Used a URL Shortener to Honeypot Arab Spring Dissidents

Motherboard: A shadowy unit of the British intelligence agency GCHQ tried to influence online activists during the 2009 Iranian presidential election protests and the 2011 democratic uprisings largely known as the Arab Spring, as new evidence gathered from documents leaked by Edward Snowden shows.

The GCHQ’s special unit, known as the Joint Threat Research Intelligence Group or JTRIG, was first revealed in 2014, when leaked top secret documents showed it tried to infiltrate and manipulate—using “dirty trick” tactics such as honeypots—online communities including those of Anonymous hacktivists, among others.

The group’s tactics against hacktivists have been previously reported, but its influence campaign in the Middle East has never been reported before. I was able to uncover it because I was myself targeted in the past, and was aware of a key detail, a URL shortening service, that was actually redacted in Snowden documents published in 2014.

THE HONEYPOT

A now-defunct free URL shortening service—lurl.me—was set up by GCHQ that enabled social media signals intelligence. Lurl.me was used on Twitter and other social media platforms for the dissemination of pro-revolution messages in the Middle East.

These messages were intended to attract people who were protesting against their government in order to manipulate them and collect intelligence that would help the agency further its aims around the world. The URL shortener made it easy to track them.

I was able to uncover it because I was myself targeted in the past

The project is linked to the GCHQ unit called the Joint Threat Research Intelligence Group or JTRIG, whose mission is to use “dirty tricks” to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, according to leaked documents.

The URL shortening service was codenamed DEADPOOL and was one of JTRIG’s “shaping and honeypots” tools, according to a GCHQ document leaked in 2014.

Leaked GCHQ document listing shaping and honeypot tools used by JTRIG.

Earlier in the same year, NBC News released a leaked document showing that JTRIG attacked the hacktivist outfits Anonymous and LulzSec by launching Distributed Denial of Service (DDoS) attacks on chatroom servers know as Internet Relay Chat (IRC) networks.

The group also identified individuals by using social engineering techniques to trick them into clicking links—a technique commonly used by cybercriminals.

One slide showed a covert agent sending a link—redacted by NBC in the slide—to an individual known as P0ke. According to the slide, this enabled the signals intelligence needed to deanonymize P0ke and discover his name, along with his Facebook and email accounts.

In the fall of 2010, I was an early member of the AnonOps IRC network attacked by JTRIG and used by a covert GCHQ agent to contact P0ke, and in 2011 I co-founded LulzSec with three others. The leaked document also shows that JTRIG was monitoring conversations between P0ke and the LulzSec ex-member Jake Davis, who went by the pseudonym Topiary.

Through multiple sources, I was able to confirm that the redacted deanonymizing link sent to P0ke by a covert agent was to the website lurl.me.

Leaked GCHQ slide from document titled “Hacktivism: Online Covert Action.”

COVERT DISRUPTION

Further investigation of the URL shortener using public data on the web exposed a revealing case study of JTRIG’s other operations that used the DEADPOOL tool, including covert operations in the Middle East.

The Internet Archive shows that the website was active as early as June 2009 and was last seen online on November 2013. A snapshot of the website shows it was a ”free URL shortening service” to ”help you get links to your friends and family fast.”

Snapshot of lurl.me.

Public online resources, search engines and social media websites such as Twitter, Blogspot and YouTube show it being used to fulfill GCHQ geopolitical objectives outlined in previously leaked documents. Almost all 69 Twitter pages that Google has indexed referencing lurl.me are anti-government tweets from supposed Iranian or Middle Eastern activists.

The vast majority are from Twitter accounts with an egg avatar only active for a few days and have a few tweets, but there were a couple from legitimate accounts that have been tweeting for years, who have retweeted or quoted the other accounts tweeting from the URL shortener.

According to agency documents published by The Intercept, one of the strategies for measuring the effectiveness of an operation is to check online to see if a message has been “understood accepted, remembered and changed behaviour”. This could for example involve tracking those who shared or clicked on the lurl.me links created by GCHQ.

The group also identified individuals by using social engineering techniques to trick them into clicking links

Another JTRIG document published by The Intercept titled “Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations” can be used to understand the content associated with social media accounts that used the URL shortener.

JTRIG has an operations group for global targets, which then has a subteam for Iran, According to the document. It further states that “the Iran team currently aims to achieve counter-proliferation by: (1) discrediting the Iranian leadership and its nuclear programme; (2) delaying and disrupting access to materials used in the nuclear programme; (3) conducting online HUMINT; and (4) counter-censorship.”

The document goes on to detail the methods that JTRIG employs to achieve these goals, such as creating false personas, uploading YouTube videos, and starting Facebook groups to push specific information or agendas. Many of the techniques outlined are evident in social media accounts that aggressively use the URL shortener.

Page from leaked GCHQ document titled “Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations,” published at The Intercept.

AGENTS OF THE CAMPAIGN

There appear to be a small number of Twitter accounts that were only active during the month of June 2009, have very few followers, and repeatedly tweet the same content and links from lurl.me. One of the earliest and prolific accounts to tweet using the URL shortener is 2009iranfree.   Read more here from Motherboard.

Russia Weaponizing the Arctic

Russian Military Build-Up in Arctic Highlights Kremlin’s Militarized Mindset

Image result for russia arctic  Image result for russia arctic

Jamestown: Despite Russia’s economic crisis, which has already imposed restrictions on military spending (see EDM, May 3), the Kremlin is trying to implement a questionable buildup in the Arctic, aimed at strengthening Russian military might. During a recent board session of the Russian Ministry of Defense, Minister Sergei Shoigu paid special attention to the implementation of the “2020 Activity Plan by the Northern Fleet.” He reminded participants that the Northern Fleet, an “inter-service strategic formation,” was formed over two years ago “in order to protect [the] northern borders of Russia” (Mil.ru, July 27). He mentioned in particular that the construction of “closed-loop” (self-sustaining) military towns will be finished on the Franz Josef Land archipelago and the Novosibirsk Islands in 2016. A joint situational awareness system is being created to support air defense.   The Russian defense ministry intends to build or reconstruct ten airfields in the Arctic. “Russia’s Federal Agency for Special Construction [Spetsstroy] is building military infrastructure facilities on six islands in the Arctic,” Izvestia quotes a ministry official. According to this source, over 100 tons of military equipment for more than 150 facilities are planned to be delivered to these remote military garrisons. In addition to the materiel supply, more than 190 tons of construction materials—including precast concrete, cement, metal, pipes, fittings and equipment—will be delivered to the Arctic for building the facilities (Izvestia, July 11). The construction and renovation of runways and other structures is ongoing at Severomorsk-1 airfield (Murmansk oblast) as well as Nagurskoye air base (Alexandra Land Island, in the Franz Josef Archipelago). The airfields at Rogachevo (Arkhangelsk oblast), Tiksi (Yakutia Republic) and Temp (Kotelny Island in the Arctic Ocean) are also under construction. It was announced that beginning next year, Tiksi is to become the permanent base for a formation of high-altitude MiG-31 interceptors (Rossiiskaya Gazeta, July 19).   Meanwhile, troops deployed in the Arctic are undergoing intensive training. Specifically, units of mobile rapid-reaction forces are being exposed to the conditions of the Far North. During several snap inspection exercises in the past year, the Russian General Staff has concentrated on the ability to reinforce three land-based brigades in Murmansk oblast—the 200th Motorized Rifle Brigade (Pechenga), the 80th Arctic Motorized Rifle Brigade (Alakurtti) and the 61st Marine Brigade (Sputnik)—with airborne units based in Ivanovo and Pskov (western-central Russia) (Mil.ru April 9, 2015).   Over the last decade, the Russian leadership has become obsessed with the notion that climate change will result in the imminent melting of the polar ice cap in the Arctic Ocean. At this point, these politicians argue, Russia will be able to tap a wealth of heretofore inaccessible natural resources, such as oil and natural gas from the seabed. In addition, the role of the Northern Sea Route (which hugs Russia’s Arctic coast) will increase dramatically, providing huge revenues to Moscow from cargo ships allowed to pass through this transit corridor connecting Europe, Asia and North America.   However, climate change is unlikely to bring only benefits for Russia. In addition to polar ice, the Arctic permafrost will also melt. Consequently, a belt of Russia’s northern coast is expected to turn into a swamp many kilometers deep, making it impossible to build the infrastructure necessary to serve the Northern Sea Route or the facilities required to extract the region’s oil and gas. Moreover, the United Nations Convention on the Law of the Sea (UNCLOS) prohibits parties to the agreement from placing restrictions on foreign ships passing along the Northern Sea Route. Thus, Russia (a party to UNCLOS) is obligated to provide passing foreign vessels with communications as well as meteorological, hydrological and rescue services at its own expense. This means that President Vladimir Putin’s dream of cashing in on the route is wishful thinking. Even now, his plans clearly diverge from reality. Transit traffic via the Northern Sea Route has dropped catastrophically: from 1.18 million tons in 2013, to 39,000 tons in 2015 (Regnum, December 8, 2015).   For almost 80 years of this route’s existence, no one had any reason to question its economic viability. Military bases and prison camps were the main destination and departure points along the Northern Sea Route. Now, with transcontinental cargo traffic having collapsed, Moscow’s main hope is that this route will be used for transporting offshore oil. However, all major Western oil companies have so far refused to develop the Arctic shelf: it is too dangerous and expensive. Furthermore, sections of the Northern Sea Route are inaccessible to larger ships. Vessels with a draught of over 12 meters cannot operate in the vicinity of the Novosibirsk Islands, for example (Fni.no, November 8, 1999).   Future prosperity in the Arctic looks highly doubtful, but the Kremlin lives according to a different logic. It believes that the possession of even hypothetical treasures in the Far North will inevitably encourage other countries to forcibly take them from Russia. Therefore, the Kremlin has demanded that the defense ministry “strengthen the battle capability” in the region.   In executing this order, the Russian military is bound to redevelop old Cold War–style scenarios, even though none of the other Arctic-region countries have shown any sign of militarization in recent years. Nearly Russia’s entire military potential in the Far North is currently concentrated on the Kola Peninsula—the extreme west of the Russian Arctic. This was no accident, and it stems from the Arctic region’s role as a zone of military confrontation between the Soviet Union and the United States throughout the Cold War. It was convenient to deliver nuclear strikes against the enemy from the depths of the ice-covered ocean. The main task of all Soviet Armed forces in the Arctic—the naval surface fleet, the air force and ground troops—was to ensure nuclear submarine combat patrols and the protection of their bases on the Kola Peninsula. No one at that time suggested the need to control and defend thousands of miles of ice desert. Surface vessels of the Northern Fleet, in fact, cannot operate east of Novaya Zemlya—beyond this point they lack ground support and air protection. To ensure wide-scale patrols, it is not enough to restore Soviet-era airfields and station there a few dozen jets. Thousands of tons of fuel will also be required. Deploying small garrisons in the Arctic makes no military sense either. Thus, Russia is spending massive resources simply for Shoigu to be able to report to Putin that the country’s unobtainable natural wealth is being protected.

 

–Aleksandr Golts

Russian spies claim they can now collect crypto keys

Filed under Vlad’s Glad…ah ha ha

Russian spies claim they can now collect crypto keys—but don’t say how

Putin gave KGB’s successor agency two weeks to deal with encrypted services.

ArsTechnica: Russia’s intelligence agency the FSB, successor to the KGB, has posted a notice on its website claiming that it now has the ability to collect crypto keys for Internet services that use encryption. This meets a two-week deadline given by Vladimir Putin to the FSB to develop such a capability. However, no details have been provided of how the FSB is able to do this.

The FSB’s announcement follows the passage of Russia’s wide-ranging surveillance law, which calls for metadata and content to be stored for six months, plus access to encrypted services, as Ars reported back in June.

The new capability seems to go even further, since the FSB notice (in Russian) speaks of obtaining the “information necessary for decoding the electronic messaging received, sent, delivered, and (or) processed by users of the ‘Internet’ network.”

Being able to decode Internet communications would seem to imply getting hold of any crypto keys that are used. However, as an article on The Daily Dot points out, it is still not clear what the new laws will require: “No one seems to know what this new law means in the slightest. Or, more accurately, the people who do know are keeping mum.”

Three of the services that are likely to be most affected by the new requirements are Facebook’s WhatsApp, Telegram, and Viber. Ars has asked all three for clarification on what the Russian authorities have asked for, and what information the companies are or will be providing, but has not yet received any reply. This post will be updated with responses when they are received.

Related reading: Is the U.S. Hacking Back? Uh Huh

The Daily Dot quotes Russian technologist Anton Nesterov as saying that it’s not even clear whether the new legislation applies to VPNs or basic SSL keys, nor whether mainstream electronic payment systems must hand over their keys as a matter of routine.

Nesterov also points out the dangers involved in providing this information, not least because leaks of such valuable data are always a risk.

***** 

In part from CSO: Networks at some 20 organizations in Russia — including scientific and military institutions, defense contractors, and public authorities — were found to be infected with the malware, the Russian Federal Security Service (FSB) said Saturday. The range of infected sites suggests that the targets were deliberately selected as part of a cyber-espionage operation, the FSB said.

Analysis of the attack showed that filenames, parameters and infection methods used in the malware are similar to those involved in other high-profile cyber-espionage operations around the world.

The software was adapted to the characteristics of each PC targeted, and delivered in a malicious email attachment, the FSB said.

Once installed, it downloaded additional modules to perform tasks such as monitoring network traffic, capturing and transmitting screenshots and keystroke logs, or recording audio and video using the PC’s microphone and webcam.

The FSB is working with ministries and other government agencies to identify all the victims of the malware, and to limit its effects, it said.

Russia is said to be the source, not the target, of another government-related cyber-attack. Last week, evidence emerged suggesting Russian involvement in an attack on computers at the Democratic National Committee, where recent data leaks have tarnished the campaign of presidential candidate Hillary Clinton.

 

 

Partial List of Documents Hacked from the Clinton Foundation

Guccifer 2.0: In the post he says the following:

Zerohedge: This’s time to keep my word and here’re the docs I promised you.

It’s not a report in one file, it’s a big folder of docs devoted to Hillary Clinton that I found on the DNC server.

The DNC collected all info about the attacks on Hillary Clinton and
prepared the ways of her defense, memos, etc., including the most
sensitive issues like email hacks.

As an example here’re some files:

This’s time to keep my word and here’re the docs I promised you.

It’s not a report in one file, it’s a big folder of docs devoted to Hillary Clinton that I found on the DNC server.

The DNC collected all info about the attacks on Hillary Clinton and
prepared the ways of her defense, memos, etc., including the most
sensitive issues like email hacks.

As an example here’re some files:

2016er Attacks – HRC Defense Master Doc [updated]

04.29.15 CGEP

2016 Democrats Positions Cheat Sheet 7-7-15

20150426 MEMO- Clinton Cash Unravels

Attacks on Clinton Family Members

Clinton Foundation Donors $25K+

Clinton Foundation Vulnerabilities Master Doc FINAL

Clintons PFD 2015

HRC Defense – Emails

HRC Travel – Private Jets FINAL

MEMO — Clinton Cash Claims (2)

Most notable among these files is the file called “Clinton Foundation Vulnerabilities Master Doc FINAL” which, as the title implies, is an extensive 42-page summary of how the Clinton Foundation views its biggest vulnerabilities based on mentions, references and attacks from the press.

Here are some of the section titles:

  • THE CLINTON FOUNDATION RECEIVED DONATIONS FROM INDIVIDUALS TIED TO SAUDI ARABIA WHILE CLINTON SERVED AS SECRETARY OF STATE
  • AN EMBATTLED BUSINESSMAN WITH “TIES TO BAHRAIN’S STATE-OWNED ALUMINUM COMPANY” GAVE BETWEEN $1 MILLION AND $5 MILLION TO THE CLINTON FOUNDATION
  • A VENEZUELAN MEDIA MOGUL WHO WAS ACTIVE IN VENEZUELAN POLITICS DONATED TO THE CLINTON FOUNDATION DURING CLINTON’S TENURE AS SECRETARY OF STATE
  • GERMAN INVESTOR WHO HAS LOBBIED CHANCELLOR MERKEL’S ADMINISTRATION GAVE BETWEEN $1 MILLION AND $5 MILLION TO THE CLINTON FOUNDATION, SOME OF WHICH WAS DURING MRS. CLINTON’S TENURE AT THE STATE DEPARTMENT
  • THE CEO OF AN AMSTERDAM BASED ENERGY COMPANY DONATED AT LEAST $1 MILLION TO THE CLINTON FOUNDATION AND LATER ANNOUNCED AT THE 2009 CGI MEETING A $5 BILLION PROJECT TO DEVELOP ENVIRONMENTALLY FRIENDLY POWER GENERATION IN INDIA AND CHINA
  • INDIAN POLITICIAN AMAR SINGH, WHO HAD DONATED AT LEAST $1 MILLION TO THE CLINTON FOUNDATION, MET WITH HILLARY CLINTON IN SEPTEMBER 2008 TO DISCUSS AN INDIA-U.S. CIVIL NUCLEAR AGREEMENT
  • THE CLINTON FOUNDATION RECEIVED ADDITIONAL DONATIONS FROM INDIAN BUSINESS INTERESTS PRIOR TO HER BECOMING SECRETARY OF STATE
  • BILLIONAIRE STEEL EXECUTIVE AND MEMBER OF THE FOREIGN INVESTMENT COUNCIL IN KAZAKHSTAN LAKSHMI MITTAL GAVE $1 MILLION TO $5 MILLION TO THE CLINTON FOUNDATION BEFORE CLINTON BECAME SECRETARY OF STATE
  • SOON AFTER SECRETARY CLINTON LEFT THE STATE DEPARTMENT, THE CLINTON
    FOUNDATION “RECEIVED A LARGE DONATION FROM A CONGLOMERATE RUN BY A
    MEMBER OF CHINA’S NATIONAL PEOPLE’S CONGRESS”
  • …AND THE CLINTON FOUNDATION DEFENDED ITS PARTNERSHIPS WITH BOTH FOREIGN AND DOMESTIC CORPORATE INTERESTS
  • POWERFUL AND CONTROVERSIAL CORPORATE INTERESTS BASED IN THE U.S. ALSO DONATED TO THE CLINTON FOUNDATION
  • AMONG THE CLINTON FOUNDATION DONORS REVEALED IN 2009 WERE SEVERAL FOREIGN GOVERNMENTS WHO HAD GIVEN MILLIONS OF DOLLARS
  • WHEN HILLARY CLINTON BECAME SECRETARY OF STATE IN 2009, BILL CLINTON AGREED TO STOP ACCEPTING CONTRIBUTIONS TO THE CLINTON FOUNDATION FROM MOST FOREIGN COUNTRIES
  • IN THE PAST, SOME OBSERVERS HAD LINKED FOREIGN GOVERNMENT DONATIONS TO THE CLINTON FOUNDATION AND SECRETARY CLINTON’S WORK AT THE STATE DEPARTMENT
  • THE CLINTON FOUNDATION CAME UNDER INTENSE SCRUTINY IN FEBRUARY 2015 WHEN IT WAS REVEALED THAT THE FOUNDATION HAD ACCEPTED DONATIONS FROM FOREIGN GOVERNMENTS AFTER SECRETARY CLINTON LEFT THE STATE DEPARTMENT
  • THE WALL STREET JOURNAL TIED FOREIGN GOVERNMENT DONORS TO THE CLINTON FOUNDATION’S ENDOWMENT FUNDRAISING UNDER SECRETARY CLINTON
  • CLINTON FOUNDATION ANNOUNCED THAT SHOULD HILLARY CLINTON DECIDE TO RUN FOR PRESIDENT, THE FOUNDATION WOULD FOLLOW APPROPRIATE PROCEDURES FOR ACCEPTING DONATIONS FROM FOREIGN DONATIONS, JUST LIKE IT HAD HAD UNDER SECRETARY CLINTON…
  • REPORTS THAT STATE DEPARTMENT LAWYERS DID NOT EXHAUSTIVELY VET BILL CLINTON’S PAID SPEECHES DURING SECRETARY CLINTON’S TENURE RAISED QUESTIONS ABOUT THE ROLE CLINTON FOUNDATION DONATIONS MAY HAVE PLAYED IN ORGANIZING THOSE SPEECHES
  • SOME CONSERVATIVES USED THE FOREIGN DONATIONS CONTROVERSY TO IMPLY THAT THE CLINTON FOUNDATION IS NOT A CHARITY AND QUESTION THE FOUNDATION’S CHARITABLE WORK
  • THE CLINTON FOUNDATION HAS ACCEPTED DONATIONS FROM INDIVIDUALS, SOME OF WHOM HAD TIES TO FOREIGN GOVERNMENTS, DURING HER TENURE AS SECRETARY OF STATE
  • THE CLINTON FOUNDATION RECEIVED MONEY FROM A FOUNDATION FORMED BY FORMER UKRAINIAN PARLIAMENT MEMBER VICTOR PINCHUK
  • WALL STREET JOURNAL COLUMNIST MARY O’GRADY CITED A CONTRACT BETWEEN TWO CLINTON DONORS FOR HAITI AID AS EVIDENCE OF A CONFLICT OF INTEREST FOR THE CLINTONS

There is much more in the full document presented below (link).

* * *

One important thing to note: according to an interview that Motherboard conducted with Guccifer2 on Tuesday, the hacker makes it clear he is not Russian. He is, in fact, from Romania, just like the Original Guccifer. 

“I’m a hacker, manager, philosopher, women lover,” Guccifer 2.0 told Motherboard on Tuesday in a Twitter chat. “I also like Gucci! I bring the light to people. I’m a freedom fighter! So u can choose what u like!”

The hacker, who claimed to have chosen the name in reference to the notorious hacker who leaked the George W. Bush paintings and claims to have hacked Hillary Clinton’s email server, denied working for the Russian government, as several experts believe.

“I don’t like Russians and their foreign policy. I hate being attributed to Russia,” he said, adding that he was from Romania, just like the first Guccifer.

When asked to explain how he hacked into the DNC in Romanian, “he seemed to stall us, and said he didn’t want to “waste” his time doing that. The few short sentences he sent in Romanian were filled with mistakes, according to several Romanian native speakers.”

The hacker said he left Russian metadata in the leaked documents as his personal ”watermark.” He also said he got kicked out of the network on June 12, when the DNC “rebooted their system.”

A senior DNC official said in an emailed statement that “our experts are confident in their assessment that the Russian government hackers were the actors responsible for the breach detected in April, and we believe that the subsequent release and the claims around it may be a part of a disinformation campaign by the Russians.”

Guccifer 2.0 also said the DNC isn’t the only victim of his hacks, but declined to name any others because “my safety depends on it.”

It appears the Clinton Foundation was one of the other hacks.

Finally, when asked why he targeted the DNC, “Guccifer 2.0 said he simply did it to follow the lead of Marcel Lazar, the original Guccifer, and that he doesn’t “care at all” about Donald Trump. The hacker declined to say whether he knew him personally, “cause I care for Marcel.” “I think we must fight for freedom of minds,” he wrote. “Fight for the world without Illuminati.”

Good luck.

* * *

So while we are going through the full data dump (found here), here is the leaked document revealing the “Clinton Foundation’s Vulnerabilities.”

 

Clinton Foundation Vulnerabilities Master Doc Final by zerohedge on Scribd