IRS, that Operates on DOS, yes DOS is Still Targeting Americans

Then there was instant messaging at the IRS that few talk about.

The letter, the testimony, the documentation is found here along with the signatures from Congress.

From Americans for Tax Reform: The IRS used a “wholly separate” instant messaging system that automatically deleted office communications, according to documentation released by the House Oversight Committee on Monday. The system appears to have been purposefully used by agency officials responsible for the targeting of conservative non-profits, in order to evade public scrutiny.

The system, known as “Office Communication Server” or OCS was used by IRS officials, including many in the Exempt Organizations (EO) Unit, which was headed by Lois Lerner.

As the Oversight Committee report states, the instant messaging system did not archive any communications, so it is not possible to know what employees of the EO unit discussed on it.

However, in an email uncovered by the Committee Lerner warns her colleagues about evading Congressional oversight:

“I was cautioning folks about email and how we have had several occasions where Congress has asked for emails and there has been an electronic search for responsive emails – so we need to be cautious about what we say in emails.”

Lerner then asks whether OCS is automatically archived. When informed it was not, Lerner responded “Perfect.”

While it is possible to set the instant messaging system to automatically archive messages, the IRS chose not to do so, according to one employee interviewed by the Committee. The fact that the agency chose not to archive messages raises questions about the true purpose of OCS and what discussions took place.

Needless to say, the apparent use of OCS to evade Congressional oversight once again shows that the IRS does not want the American people to learn the truth about the Lois Lerner targeting scandal.

 

 

https://oversight.house.gov/wp-content/uploads/2015/07/2015-07-27-JC-to-Obama-WH-Koskinen-Resignation.pdf

 

ISIS Online Propagandists are Russian

Personally, I have investigated the matter of the Islamic State cyber-caliphate and all clues led back to Russia. Now others are investigating the same thing and forming the same conclusions. Fundamentally we are in a new dimension of a Cold War tactic using the internet as the platform. So far the Obama administration ignores this but military generals are sounding the alarms.

Why Are Russian Hackers Posing as ISIS Propagandists?

by: Helle Dale

The multi-front cyberspace information war in which we recently have found ourselves just got a little more complicated.

A group which calls itself Cyber Caliphate, assumed to have ties to the terrorist group ISIS, may in fact be a creation of Russian hackers taking advantage of the havoc wrecked on social media and the Internet by ISIS propagandists.

The complex picture this presents adds to the challenges faced by the U.S. government as it seeks to adjust its counterterrorism communication and cybersecurity measures to deal with rising threats from abroad.

According to a new report, “Who Is Cyber Caliphate? Re-examining the Online ISIL Threat,” produced by the State Department’s Office of Diplomatic Security (DS), a major cyber attack on French television TV5Monde last April by Cyber Caliphate hackers took the station off the air for 20 hours and exposed employee email accounts.

It was more sophisticated than anything previously seen from ISIS hackers.

French and American investigators tracking the electronic footprints of the hackers found they led to a Russian hacker group known as APT28, which usually hack in favor of the Russian government and directs its efforts at NATO.

In fact, they found no electronic tracks leading back to ISIS. Russian information warfare, which has intensified massively over the past several years, is taking ever changing twists and turns, and this one took investigators by surprise.

Russian hackers are greatly more sophisticated than the ISIS variety.

The Diplomatic Security report does, however, also stress the heavy influence of ISIS on Twitter in particular, as it seeks to create radicalized followers among disaffected and alienated Muslim youth in Western societies.

From September to December, 2014 alone, an estimated 46,000 Twitter accounts were associated with ISIS, the group’s most potent method to reach into impressionable minds.

Under the new leadership of Rashad Hussein at the U.S. Center for Strategic Counterterrorism Communication of the State Department (CSCC,) the policy of the U.S. government is to counter terrorism propaganda with a positive message, presenting a more attractive vision in the war of ideas.

This strategy dovetails with the administration’s dubious argument that terrorist acts arise from populations deprived of economic opportunity and have to be dealt with by addressing “root causes,” like poverty.

The new counterterrorism approach is a departure from the work of the Center for Strategic Counterterrorism Communication under the recently departed Ambassador Alberto Fernandez, who took a harder line, attacking ISIS (and Cyber Caliphate) propagandists head on, and exposing graphically the brutality and horrors perpetrated by ISIS terrorists.

For this tough and confrontational approach, Fernandez was heavily criticized in the U.S. media and shunned by the executive branch.

With Russian hackers parading as ISIS propagandists, we now seem to have a perfect storm.

The complexity of cyber conflict certainly suggests that the U.S. government must intensify and improve its own efforts to outsmart our enemies.

***

By Jack Murphy at SofRep in part:

ISIS feeds the West loaded information

There is no proof that Russian intelligence has a hand in ISIS information/propaganda operations. However, considering what we have discussed thus far, this scenario should be taken seriously. ISIS is actively gaming the psychological makeup of Western audiences in order to provoke the United States and allied nations into a full-blown military confrontation with the Islamic State in Syria and Iraq. If the hypothesis about Russian influence agents in ISIS is correct, and if they are participating in ISIS propaganda efforts, then we should ask why Russia would be interested in doing this to begin with.

The answer is fairly straightforward. Keeping America bogged down and preoccupied in the Middle East is of massive benefit to the Russian Federation. By goading America into another war in the Middle East, Russia has more opportunity to engage in military aggression in Ukraine, Dagestan, Chechnya, Georgia, Moldova, Akbazia, Nagorno-Karabakh, Uzbekistan, Tajikistan, Turkmenistan, and on and on throughout Russia’s near abroad. For sure, there would also be some more specific tactical and strategic goals, but in the general sense, the Gulf War III would help keep America off Russia’s back.

ISIS, and perhaps Russian intelligence, understands America’s future rationalizations for war very well. In the past we could justify war as being battles against communism or fascism for the preservation of the American way of life. Before that, more jingoistic narratives about manifest destiny were brought into play. But these justifications for war, racial or nationalistic, will have no place in future liberal Western nations. Instead wars will be justified as fights for gay rights, women’s rights, and other equality issues. One hypothetical example: Americans will be told that we have to invade Iran because gays are stoned to death or beheaded by the Iranian regime.

The Islamic State knows that there is no better way to terrify and incite Americans than to use mass executions, the murder of Christians, the use of sex slaves, the destruction of ancient relics, and the killing of homosexuals. ISIS is at war with Western consciousness, and it is a very deliberate effort.

Read more

Hillary: A Woman’s Right to Choose Reproduction of Emails?

Perhaps Hillary has some confusion in her social engineering thinking. She touts that women have a right to choose on personal reproduction but does that really apply to her emails?

Hillary Clinton turned over emails to the State Department after her term as Secretary of State from her private server. Apparently not being too tech savvy, someone else in her inner circle reviewed and processed tens of thousands of emails, printed them and delivered them to the State Department. The question is who did that and did they have security clearance for such action or access?

The intelligence community inspector generals reviewed the emails and declared that at least so far, 4 emails contained classified information. Read on and learn the basis of those emails.

What’s in those classified Clinton emails?

22 emails already made public were classified after they were sent

They’re different from 4 that were the subject of a New York Times report

It’s possible to figure out at least the general topics

 

 

Abbas Araqchi, Man Behind the IAEA Side Deals with Iran

Araqchi is the top hidden negotiator for Iran’s Supreme leader when it comes to inspections, the IAEA and missiles.

From the Deputy Minister of Iran’s Foreign Affairs: Araqchi underscored that Iran attaches great importance to implementation of the nuclear agreement and the commitment of the other party to the deal.

Touching upon Iran`s relations with its neighboring countries, Azerbaijan in particular, in the post-sanctions era, Araqchi underscored that Iran wants to expand its economic cooperation with the international community.

Iran attaches due attention to expansion of relations with its neighboring countries, Azerbaijan, in particular, he said.

Araqchi said in Tehran on Wednesday that the S-300 air defense system is not subject to Security Council resolution.

Speaking in a press conference, he reiterated that the weapons that their sales to Iran would be subject to the restrictions are seven items and this would not include S-300.

Purchasing the S-300 air defense system is out of the jurisdiction of the Security Council`s recent resolution, he added.

Touching upon the wave of European officials trips to Iran, he said European Union Foreign Policy Chief Federica Mogherini and French Foreign Minister Laurent Fabius are set to visit Iran next week.

Araqchi reiterated that the Vienna agreement has paved the way for economic cooperation of Iran with several countries that were deprived of fostering ties with Islamic Republic due to imposed sanctions.

Pointing to the continuation of trilateral relations between Iran, Russia and China, he stressed that Iran enjoys cordial, positive and constructive ties with Russia and China.

Iranian Deputy Foreign Minister said Wednesday that Iran`s policy on global hegemony has not changed.

***

From the Iran Project: Speaking to Al-Alam News Network, Araqchi said that access to Iran’s military sites has been divided into two areas – one area is about the issues related to the country’s past military activities, wrongly referred to Possible Military Dimensions (PMD), and the other is about Tehran’s future activities.

On Iran’s past military activities, Iran and the agency reached an agreement or roadmap on the day Iran deal was clinched in Vienna by Tehran and the six world powers, Araqchi said.

Araqchi said that there is no need for concern about solving the issues related to Tehran’s past nuclear activities. He said that Iran and the IAEA have agreed upon solving the issues.

To ensure the agency of the future of its nuclear activities, Iran has agreed to implement the Additional Protocol, Araqchi said.

He noted that the Additional Protocol is nothing beyond the international regulations and there is no need for concern in this regard.

The leader of Hezbollah, Hassan Nasrallah received his guarantee of financial support due to the Iran JPOA deal and is spiking the football.

Beirut:

“Did Iran sell its allies down the river during the nuclear talks? No, there was no bargaining” between Iran and the United States, he said in a speech broadcast on a large screen to supporters in Beirut’s southern suburbs, a party stronghold.

Supreme leader “Ayatollah Ali Khamenei reiterated Iran’s position on the resistance movements and its allies, and Hezbollah occupies a special place among them,” Nasrallah added.

“The United States remains the ‘Great Satan’, both before and after the nuclear accord” reached last week after tough negotiations between Iran and permanent UN Security Council members Britain, China, France, Russia and the United States, plus Germany.

On July 18, Khamenei warned that, despite the deal, Iran would continue its policy towards the “arrogant” United States and also its support for its friends in the region.

Founded in the 1980s by Iran’s Guardians of the Revolution and financed and armed by Tehran, Hezbollah has become a powerful armed party advocating armed struggle against Israel.

The party, which the United States classifies as a terrorist organisation, is also fighting alongside President Bashar al-Assad’s forces against rebels in Syria, itself an ally of Iran.

On Friday, Syrian Foreign Minister Walid Muallem also said the nuclear deal would not affect Iranian support for the Damascus government.

 

 

Secret Service On the Anti-Govt Crowd on the Internet

The Secret Agents Who Stake Out the Ugliest Corners of the Internet

From the Atlantic:

 

A team tasked with protecting the president of the United States is constantly sifting through hateful online comments to find would-be assassins or terrorists.

When President Obama launched his Twitter account in May, people noticed his rapid accumulation of followers, a silly back-and-forth with President Clinton, but also something more serious: the number of hostile and threatening messages directed at the president.

Sifting through those messages to determine which, if any, need to be taken seriously is the responsibility of the Secret Service Internet Threat Desk, a group of agents tasked with identifying and assessing online threats to the president and his family. The first part of this mission—finding threats—is in many ways made easier by the Internet: all you have to do is search! Pulling up every tweet which uses the words “Obama” and “assassinate” takes mere seconds, and the Secret Service has tried to make it easier for people to draw threats to its attention by setting up its own Twitter handle, @secretservice, for users to report threatening messages to.

But if the Internet makes it easier to find threats directed at the president, it can also make it harder to figure out which ones should be taken seriously. The sheer volume of threatening messages online, the lack of context, and the ease with which users can shield their identities all contribute to the challenges of assessing online threats. One series of tweets addressed to @POTUS that caught the Secret Service’s attention—at least enough to warrant an in-person visit from an agent—came from a user with the handle @jeffgully49 and included a picture showing a doctored version of the president’s campaign posters with his head in a noose and the word “HOPE” changed to “ROPE.” The messages were apparently posted by Jeff Gullickson of Plymouth, Minnesota, who was later visited at his home by a Secret Service agent. “The agent from the secret service was cordial,” Gullickson wrote in an email to MPR News, adding that the agent just wanted to be sure his tweets were not serious threats.

Making sure that Gullickson was not a threat required more than just an analysis of his online comments—it called for offline contact, an in-person visit, an assessment of who he was and what he was like face-to-face, not just on the Internet. Context is crucial for evaluating the seriousness of threats—both digital and analog—but online threats offer a slightly different set of contextual clues than their offline counterparts. And while much of the hate-filled commentary on the Internet is routinely written off as hyperbole and ranting, threats directed at the president are not so easily dismissed. So, every day, the Secret Service Internet Threat Desk is faced with the unenviable task of taking seriously some of the most extreme online rhetoric and trying to identify potential assassins or terrorists in the deluge of venomous messages directed at the president and his family.

Though most of the public cases involving the Internet threat desk have to do with threats made via Twitter or Facebook, the desk actually predates both platforms. Founded in 2000, the desk was reportedly expanded in 2009 around the same time that threats against President Obama spiked in the early months of his first term. Ronald Kessler, author of In the President’s Secret Service, said that when he visited the Internet threat desk several years ago it was “just a small room with a few people,” but added, “I’m sure it’s much bigger now.” Secret Service spokesman Robert Hoback declined to comment.

Since the Internet threat desk’s founding, Kessler said, more of the threats the Secret Service assesses have originated online, but the overall number of threats directed at the first family that require investigation has stayed relatively steady at about 10 per day—except for the period when Obama was first elected, when the Secret Service had to follow up on roughly 50 threats per day. “That includes threats on Twitter,” Kessler said. “It makes no difference to [the Secret Service] how a threat is communicated,” he added. “They can’t take that chance of assuming that because it’s on Twitter it’s less serious.”

The Secret Service categorizes all threats, online and offline alike, into one of three categories, according to Kessler. Class 3 threats are considered the most serious, and require agents to interview the individual who issued the threat and any acquaintances to determine whether that person really has the capability to carry out the threat. Class 2 threats are considered to be serious but issued by people incapable of actually follow up on their intentions, either because they are in jail or located at a great distance from the president. And Class 1 threats are those that may seem serious at first, but are determined not to be.

Classifying threats into these categories is partly a matter of wording and specificity—whether the speaker has developed a detailed plan, whether they state that they will kill the president or just that someone should kill the president—but also depends largely on the background of the people who issue them. “The Secret Service looks at whether this person has expressed similar plans previously, whether this person has a criminal record, or is mentally ill,” Kessler said. Presumably, that’s why an agent showed up at Gullickson’s house—to assess the person who issued the Twitter threat, not just the threat itself.

At a 2011 hearing before the House Subcommittee on Counterterrorism and Intelligence, then-Secret Service Director Mark Sullivan emphasized the importance of identifying the people who threaten the president for Secret Service investigations. “When I was a new agent, a lot of times if you got a threat, it would come in the mail, and if the person who was making the threat was very courteous, they would put their return address on there. You would know who to go out and talk to,” Sullivan said. “But regardless of whether it is by mail or over the internet, our people are extremely aggressive with [figuring out who issued threats] … when we do identify that individual who has made that threat or that inappropriate interest that they are displaying, whether it is 2 o’clock in the morning or 2 o’clock in the afternoon, our people are out there looking for that individual to interview them.”

But the Secret Service can’t very well interview everyone who directs hostile comments at the president online—there are just too many of them—especially as the government’s embrace of social media platforms creates an increasing number of channels for lashing out at the president. “What you’ve done with the POTUS Twitter account is created a one-stop shopping for people who don’t like the president to blow off steam and convey their view that they don’t like the president,” said University of Maryland law professor Danielle Citron. “That could perfectly well be political protest: ‘I hate you and I want to throw you in the river’ could mean ‘I hate your ideas and want to throw them in the river,’ or it could mean ‘I’m a neo-Nazi and I want to kill you because you’re a black president.’ For the president, [the Secret Service] is going to err on the side of over-inclusion and more false positives.”

Paring down those false positives may be even more of a challenge online than off. The Internet threat desk “comb[s] the internet” and has people “working 24 hours a day just going through the Internet looking for any type of buzzwords or any type of threatening or inappropriate activity out there that we may see that involves any of our protectees,” Sullivan said at the 2011 hearing.

In other words, the Secret Service is actively seeking out threats made online, rather than waiting for others to report them, or for the people issuing threats to contact the White House directly. “Online threats are much more findable—I can set up some structured queries and find out who’s making threats in real time,” said Andy Sellars, a fellow at Harvard’s Berkman Center for Internet & Society. “You can essentially have a column on TweetDeck for every time someone says ‘president’ and ‘kill’ in the same tweet. A lot of tools being sold to law enforcement are basically just glorified versions of TweetDeck.”

Finding the threats is the easy part, though. “It’s a lot easier to figure out the context of speech in the physical world than in the online world,” said Hanni Fakhoury, a senior staff attorney at the Electronic Frontier Foundation. “You need that context in order to see what that speech really means.”

The cases that the Secret Service has pursued in recent years offer some clues as to which types of threats they seem to take most seriously. Repeat offenders, unsurprisingly, seem to come in for particular attention. For instance, Jarvis Britton of Birmingham, Alabama, was arrested and sentenced to a year in prison in 2013 after posting a series of tweets over the course of several months. In a 2012 affidavit, Secret Service Special Agent Phillip Holly described the series of events that led up to Britton’s arrest, beginning with two tweets on June 28, 2012, that read: “Free speech? Really? Let’s test this! Let’s kill the president!” and “I’m going to finish this, if they get me, they get me! #ohwell. I think we could get the president with cyanide. #MakeItSlow.” The next day, Britton tweeted “Barack Obama, I wish you were DEAD!”

Following the June tweets, the Secret Service spoke with Britton and advised him of “the seriousness of the matter,” according to Holly, but “no further action was taken” until Britton resumed tweeting threats several months later. On September 14, 2012, he posted the message “Let’s kill the president. F.E.A.R.” After learning of the September threats from the Internet Threat Desk, Holly concludes: “Based upon the foregoing, I have probable cause to believe that Jarvis M. Britton did knowingly and willfully threaten to take the life of, kidnap, or inflict bodily harm upon the President of the United States.”

Donte Jamar Sims of Charlotte, North Carolina, was also sentenced in 2013 to serve jail time for a series of threatening tweets directed at the president. Sims’ tweets, posted during the 2012 Democratic National Convention, included the messages: “Ima Assassinate president Obama this evening!” and “The Secret Service is gonna be defenseless once I aim the Assault Rifle at Barack’s Forehead.”

The Internet Threat Desk’s investigations are not limited to Twitter. One 2012 investigation centered on a Facebook photo of several young men from Arizona posing with guns and a T-shirt with the president’s face on it riddled with bullet holes. A 2008 case focused on a series of pseudonymous comments made by the user californiaradial on the Yahoo Finance website, including “Shoot the nig. Country fkd for another 4 years+, what nig has done ANYTHING right???? Long term???? Never in history, except sambos.” And “Fk the niggar, he will have a 50 cal in the head soon.” In court documents, Special Agent Gregory Becker identified californiaradial as Walter Edward Bagdasarian after the Internet Threat Desk “obtained the IP address from which the messages had been sent, as well as the subscriber information for that account.”

When people who issue online threats are identified, they sometimes try to provide context for those threats that might excuse their behavior. Sims, for instance, claimed he was high on marijuana when he threatened the president. Britton’s lawyer similarly insisted his client had no intentions to actually harm the president. Other times, the real world context of online threats makes them seems more concerning—when the Secret Service searched Bagdasarian’s house, they found a .50 caliber rifle among his possessions, which appeared to lend credence to the prediction “he will have a 50 cal in the head soon.”

Ultimately, however, it is the content of the threat itself—not the context—that seems to matter most in court. Sims, Britton, and Bagdasarian all allegedly issued multiple violent threats at the president in online forums. But Sims and Britton were sent to jail, regardless of the claims both made about their respective mental states when they issued the threats—while Bagdasarian’s conviction was ultimately reversed by a federal appeals court in California because he had not specifically said that he himself would kill the president but, rather, suggested more generally that someone should do so.

Making these distinctions between the people who really intended harm—the people who, in legal language, issued threats that they should have reasonably foreseen would be interpreted as “serious expressions of intent to inflict bodily harm upon that person”—and the people who were merely venting political frustrations or indulging in some hyperbolic anger is a very murky area of law, particularly when it comes to online threats. “It is harder to separate the wheat from the chaff online,” said Fakhoury, the Electronic Frontier Foundation lawyer, of distinguishing “true threats” from speech that is protected by the First Amendment. “Part of that is the speed with which people can communicate online, part of it is that people are somewhat removed from what they say online, part of it is the breadth of the audience that exists online,” he explained.

The ease with which anyone can fire off a threat to the president’s Twitter account does not necessarily make such threats less concerning, Citron noted. “Sometimes people say online threats are never to be taken seriously because we’re behind a screen and we tend to just kind of mouth off without thinking, but on the other hand when someone writes something down then there’s the perception that its thoughtful—someone took the time to write this down,” she said.

“The anonymous part doesn’t make it less threatening, but it makes it harder for us to gauge whether it’s a joke or not.”

Many online threats are not even anonymous, Sellars pointed out. “People are making a shocking number of these threats posting on Facebook using their real names,” he said, calling to mind Sullivan’s comment about the letter writers who included their return addresses.

In a recent decision for the case Elonis v. United States, about a man accused of threatening his wife on Facebook, the Supreme Court avoided establishing any clear test for how to identify true threats online. Their decision to dodge the issue leaves not just the Secret Service but everyone who is the victim of online harassment to figure out how to draw the line between true threats and free speech on the Internet.

When it comes to protecting the president, however, that distinction may not be so vital, either online or offline. Kessler noted, “Actual assassinations are usually not preceded by threats.”