U.S. Attorney Durham Seized 2 Interesting Blackberries

AG Barr assigned John Durham to investigate the origins of the FBI’s counter-intelligence operation known as Crossfire Hurricane. Durham is working the globe on the investigation and two key people are Joseph Mifsud and Stephan Halper. There may be others that include Alexander Downer, Azra Turk, Seems that Peter Strzok issued two Blackberries to Joseph Mifsud. Durham has those two phones in his possession. You can bet that Durham is working the channels to see who else has FBI issued phones. The FBI loves those phones.

US News on Flipboard by The Epoch Times

Mr. Mifsud, a university professor and well-traveled lecturer, told George Papadopoulos, a Trump campaign adviser, in London in April 2016 that Moscow owned thousands of Hillary Clinton emails. When the news reached the FBI in July, agent Peter Strzok initiated the probe.

Ms. Sidney Power is representing General Michael Flynn as she has added to the Mifsud intrigue with her motion before District Court Judge Emmet G. Sullivan asking him to order the government to turn over the BlackBerrys’ data. The filing lists the two phones’ model number, PIN and SIM card information. She filed a court motion on Monday disclosing the phones’ existence while tying them to Western intelligence.

She told the judge that on Oct. 11 she asked the prosecution for phone data. She was ignored until she sent notification days later that she planned to file the discovery motion.

The motion says: “Michael T. Flynn requests the government be ordered to produce evidence that has only recently come into its possession……… This information is material, exculpatory, and relevant to the defense of Mr. Flynn, and specifically to the “OCONUS LURES” and agents that western intelligence tasked against him likely as early as 2014 to arrange—unbeknownst to him—‘connections’ with certain Russians that they would then use against him in their false claims. The phones were used by Mr. Joseph Mifsud.”

“OCONUS LURES” is an FBI acronym for an operation to lure a person back to the U.S.

Ms. Powell has been filing motions demanding the government turn over exculpatory evidence. She wants to show it was withheld early on, violating Judge Sullivan’s order.

Reacting to the BlackBerry disclosure, Mr. Papadopoulos tweeted: “I lived this spy story. The government’s of the UK, Australia, Italy sent their agents: Mifsud, Downer, Halper, Azra Turk and many more. With the new info on Mifsud’s phones with the DOJ, my story was the one that exposed the greatest spying scandal in history. Downer is next!”

Alexander Downer was the Australian ambassador in London to whom Mr. Papadopoulos relayed the Mifsud gossip. Mr. Downer denies he was a spy. Stephan Halper and Azar Turk were FBI/western intelligence spies assigned to Mr. Papadopoulos in London.

Justice Department spokesperson Kerri Kupec declined to comment on the Flynn motion.

When news broke that Mr. Durham was in Rome, she released a statement:

“As the Department of Justice has previously announced, a team led by U.S. Attorney John Durham is investigating the origins of the U.S. counterintelligence probe of the Trump 2016 presidential campaign. Mr. Durham is gathering information from numerous sources, including a number of foreign countries. At Attorney General Barr’s request, the President has contacted other countries to ask them to introduce the Attorney General and Mr. Durham to appropriate officials.” More here for full story and context.

*** One other detail from the Daily Beast due to AG Barr’s travels to Rome with John Durham was to listen to a taped deposition of Joseph Mifsud. Meanwhile:

The Italian intelligence community had Mifsud on its radar for some years before he got involved in the Trump campaign’s troubles. His affiliations with both the Link University of Rome and London Center of International Law Practice—both often affiliated with Western diplomacy and foreign intelligence agencies—made him an easy target. So did the slew of apartments he owned in Malta that are allegedly tied to a racket involving Russians buying Maltese passports for cheap.

Two New Items on Biden and Burisma

Due to two recent testimonies, a few fascinating items have surfaced. Burisma was considered a money-laundering operation and in order to clean up the image of the company, they hired Hunter considering his last name would point to credibility and a boost in reputation.

George Kent, a top U.S. State Department official, told lawmakers Tuesday he warned the Obama administration that the Ukrainian company that employed then-Vice President Joe Biden’s son was corrupt.

Kent’s comments came during his deposition in the House Democrats’ impeachment probe.

Near the end of an article on his testimony, NBC News noted:

During his nearly 10 hours of testimony, Kent also told members of Congress and their staff that Burisma, the energy company where Hunter Biden was a board member, was corrupt, according to a separate person who was present in the room. Kent said he told the Obama administration in 2016 that they should not hold an event with Burisma because of the company’s extensive corruption in Ukraine. More here.

Then…

Deputy Assistant Secretary of State George Kent testified that he worried Ukrainian officials would use Hunter Biden’s position at the company, Burisma Holdings, as an opportunity to influence his father. Kent said he tried to convey his opinion to Joe Biden’s office, but that a staffer told him the vice president didn’t have the “bandwidth” to address the issue because his other son, Beau, was battling cancer.

This is the first known instance in which a career diplomat tried to raise concerns regarding Hunter Biden’s business holdings in Ukraine. Several of Joe Biden’s former advisers also reportedly had discussions about whether his son’s business dealings could be seen as a conflict of interest.

Old School by ni-kit-a

Then…

Hunter Biden worked for the Boies Schiller Flexner law firm that consulted for Burisma. Biden was in charge for the company’s legal affairs with international companies, according to a press release, but Biden has disputed that characterization. At the time, Burisma’s founder faced multiple investigations into alleged tax evasion and money laundering.

Hunter Biden later stepped down from the board in April 2019 when his term expired. More here.

Rudy Giuliani claimed Monday that he's learned that a Ukrainian laundered $3 million through Joe Biden's son, and the Obama administration had a prosecutor fired to cover the scandal up

Coming from NPR in part:

Burisma is registered in Cyprus and is invisible in Kyiv. Lucian Kim of NPR: That’s Alexander Paraschiy, the chief of research at the Ukrainian investment bank Concorde Capital. After the bloody revolution on Kyiv’s streets five years ago, Mykola Zlochevsky, like many other government officials, fled the country. Burisma was facing a money laundering investigation and questions over how it had obtained its licenses.

PARASCHIY: Hiring some reputable guys with recognition in the world is one of the easiest and maybe cheapest ways to protect your business in Ukraine.

KIM: Burisma appointed Hunter Biden, son of then-Vice President Joe Biden, to its board of directors. A former president of Poland also joined the board.

DARIA KALENIUK: I believe the only reason Burisma and Zlochevsky were inviting people with such names was to whitewash their reputation and to present themselves as the company which is doing legitimate business in Ukraine.

KIM: In other words, the appearance of a conflict of interest arose because Hunter Biden’s father, Joe Biden, was responsible for U.S. policy on Ukraine as vice president. But Joe Biden, like many other Western leaders, was criticizing Ukraine exactly because it failed to convict a single high-level official for corruption, including Mykola Zlochevsky, the owner of Burisma.

As for Burisma, the company has continued to try burnishing its reputation. In 2017, it added another American to its board, Cofer Black, a former CIA official and a foreign policy adviser to Mitt Romney’s presidential campaign.

KIM: But for a company with global ambitions, it’s hardly transparent. Burisma is registered in Cyprus, keeps a low profile in Kyiv and has ignored NPR’s repeated requests for comment. Nobody knows where its owner, Mykola Zlochevsky, lives. But behind the scenes, he’s continuing to buy influence.

Burisma supports the Atlantic Council, a Washington think tank, and hosts an annual energy conference on the French Riviera attended by the prince of Monaco and former European and U.S. government officials. Hunter Biden, for one, no longer works at Burisma. He left the company earlier this year as his father was launching his presidential campaign. More details and context here.

Burisma was founded in 2002. Consolidation of Burisma Group took mainly place in 2006–2007. It became a major shareholder of Sunrise Energy Resources, a Delaware Corporation, which in 2004 acquired Ukrainian companies Esko-Pivnich and Pari, which owned natural gas exploration licenses.

What is really weird about Sunrise Energy, while being a registered Delaware corporation, the official address is 5353 Memorial Drive, Houston, Texas suite 4012. This is NOT an office building but rather a luxury high rise residential building. This is noted to be the address of the principal executive offices.

5353 Memorial Dr, Houston, TX 77007 photo

In a filing with the Securities and Exchange Commission, 570 7th Ave., New York is also listed as an address. Well this is a tall building that is also multi-use condos.

There will likely be more….stay tuned.

Under Obama, the Russians Breached FBI Communications

So, at the time we had Comey, Mueller, Brennan, Clapper, Holder, Lynch, Rice, Power, Monaco, Donilon, McDonough, Rhodes and more.

Anyone remember when there was a pile of Russian spies that Obama expelled and traded? Remember at the very end of the Obama presidency when he expelled another pile of Russians from 3 locations and closed Russian dachas?

A big question remains that has yet to be answered and that is why did the Obama administration wait so long to impose a consequence?

Okay, well sit back this is a long read but it for sure explains the way too casual approach by Obama to Russia.

Simply put, the entire Obama administration and those democrats in congress had to be really embarrassed. With all the later Russian collusion stuff, that operation had to be a huge head-fake cover-up thing.

Whew what a mess. The Russians punked the FBI and that hurt America’s national security and policy badly…so we dispatched Hillary to do that Russian reset with that pesky red button.

Okay, here we go….

Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil

YahooNews: On Dec. 29, 2016, the Obama administration announced that it was giving nearly three dozen Russian diplomats just 72 hours to leave the United States and was seizing two rural East Coast estates owned by the Russian government. As the Russians burned papers and scrambled to pack their bags, the Kremlin protested the treatment of its diplomats, and denied that those compounds — sometimes known as the “dachas” — were anything more than vacation spots for their personnel.

The Obama administration’s public rationale for the expulsions and closures — the harshest U.S. diplomatic reprisals taken against Russia in several decades — was to retaliate for Russian meddling in the 2016 presidential election. But there was another critical, and secret, reason why those locations and diplomats were targeted.

Both compounds, and at least some of the expelled diplomats, played key roles in a brazen Russian counterintelligence operation that stretched from the Bay Area to the heart of the nation’s capital, according to former U.S. officials. The operation, which targeted FBI communications, hampered the bureau’s ability to track Russian spies on U.S. soil at a time of increasing tension with Moscow, forced the FBI and CIA to cease contact with some of their Russian assets, and prompted tighter security procedures at key U.S. national security facilities in the Washington area and elsewhere, according to former U.S. officials. It even raised concerns among some U.S. officials about a Russian mole within the U.S. intelligence community.

“It was a very broad effort to try and penetrate our most sensitive operations,” said a former senior CIA official.

American officials discovered that the Russians had dramatically improved their ability to decrypt certain types of secure communications and had successfully tracked devices used by elite FBI surveillance teams. Officials also feared that the Russians may have devised other ways to monitor U.S. intelligence communications, including hacking into computers not connected to the internet. Senior FBI and CIA officials briefed congressional leaders on these issues as part of a wide-ranging examination on Capitol Hill of U.S. counterintelligence vulnerabilities.

These compromises, the full gravity of which became clear to U.S. officials in 2012, gave Russian spies in American cities including Washington, New York and San Francisco key insights into the location of undercover FBI surveillance teams, and likely the actual substance of FBI communications, according to former officials. They provided the Russians opportunities to potentially shake off FBI surveillance and communicate with sensitive human sources, check on remote recording devices and even gather intelligence on their FBI pursuers, the former officials said.

“When we found out about this, the light bulb went on — that this could be why we haven’t seen [certain types of] activity” from known Russian spies in the United States, said a former senior intelligence official.

The compromise of FBI systems occurred not long after the White House’s 2010 decision to arrest and expose a group of “illegals” – Russian operatives embedded in American society under deep non-official cover – and reflected a resurgence of Russian espionage. Just a few months after the illegals pleaded guilty in July 2010, the FBI opened a new investigation into a group of New York-based undercover Russian intelligence officers. These Russian spies, the FBI discovered, were attempting to recruit a ring of U.S. assets — including Carter Page, an American businessman who would later act as an unpaid foreign policy adviser to Donald Trump’s 2016 presidential campaign.

The breaches also spoke to larger challenges faced by U.S. intelligence agencies in guarding the nation’s secrets, an issue highlighted by recent revelations, first published by CNN, that the CIA was forced to extract a key Russian asset and bring him to the U.S. in 2017. The asset was reportedly critical to the U.S. intelligence community’s conclusion that Russian President Vladimir Putin had personally directed the interference in the 2016 presidential election in support of Donald Trump.

Yahoo spoke about these previously unreported technical breaches and the larger government debates surrounding U.S. policies toward Russia with more than 50 current and former intelligence and national security officials, most of whom requested anonymity to discuss sensitive operations and internal discussions. While the officials expressed a variety of views on what went wrong with U.S.-Russian relations, some said the United States at times neglected to appreciate the espionage challenge from Moscow, and paid a significant price for a failure to prioritize technical threats.

“When I was in office, the counterintelligence business was … focused entirely on its core concern, which is insider threats, and in particular mole hunting,” said Joel Brenner, the head of U.S. counterintelligence and strategy from 2006 to 2009. “This is, in fact, the core risk and it’s right that it should be the focus. But we were neither organized nor resourced to deal with counterintelligence in networks, technical networks, electronic networks.”

The discovery of Russia’s newfound capacity to crack certain types of encryption was particularly unnerving, according to former U.S. officials.

“Anytime you find out that an adversary has these capabilities, it sets off a ripple effect,” said a former senior national security official. “The Russians are able to extract every capability from any given technology. … They are singularly dangerous in this area.”

The FBI’s discovery of these compromises took place on the heels of what many hoped would be a breakthrough between Washington and Moscow — the Obama administration’s 2009 “reset” initiative, which sought to improve U.S.-Russia relations. Despite what seemed to be some initial progress, the reset soon went awry.

In September 2011, Vladimir Putin announced the launch of his third presidential campaign, only to be confronted during the following months by tens of thousands of protesters accusing him of electoral fraud. Putin, a former intelligence officer, publicly accused then-Secretary of State Hillary Clinton of fomenting the unrest.

It was around this time that Putin’s spies in the United States, operating under diplomatic cover, achieved what a former senior intelligence official called a “stunning” technical breakthrough, demonstrating their relentless focus on the country they’ve long considered their primary adversary.

That effort compromised the encrypted radio systems used by the FBI’s mobile surveillance teams, which track the movements of Russian spies on American soil, according to more than half a dozen former senior intelligence and national security officials. Around the same time, Russian spies also compromised the FBI teams’ backup communications systems — cellphones outfitted with “push-to-talk” walkie-talkie capabilities. “This was something we took extremely seriously,” said a former senior counterintelligence official.

The Russian operation went beyond tracking the communications devices used by FBI surveillance teams, according to four former senior officials. Working out of secret “listening posts” housed in Russian diplomatic and other government-controlled facilities, the Russians were able to intercept, record and eventually crack the codes to FBI radio communications.

Russians leave country retreats in the U.S., ordered out ...

Some of the clandestine eavesdropping annexes were staffed by the wives of Russian intelligence officers, said a former senior intelligence official. That operation was part of a larger sustained, deliberate Russian campaign targeting secret U.S. government communications throughout the United States, according to former officials.

The Spy Next Door: What Went On in Russia's Shuttered U.S ...

The two Russian government compounds in Maryland and New York closed in 2016 played a role in the operation, according to three former officials. They were “basically being used as signals intelligence facilities,” said one former senior national security official.

Russia to U.S.: Return Seized Diplomatic Compounds, or Else

Russian spies also deployed “mobile listening posts.” Some Russian intelligence officers, carrying signals intelligence gear, would walk near FBI surveillance teams. Others drove vans full of listening equipment aimed at intercepting FBI teams’ communications. For the Russians, the operation was “amazingly low risk in an angering way,” said a former senior intelligence official.

The FBI teams were using relatively lightweight radios with limited range, according to former officials. These low-tech devices allowed the teams to move quickly and discreetly while tracking their targets, which would have been more difficult with clunkier but more secure technology, a former official said. But the outdated radios left the teams’ communications vulnerable to the Russians. “The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,” said the former official.

A former senior counterintelligence official blamed the compromises on a “hodgepodge of systems” ineffective beyond the line of sight. “The infrastructure that was supposed to be built, they never followed up, or gave us the money for it,” said the former official. “The intelligence community has never gotten an integrated system.”

The limitations of the radio technology, said the former senior officials, led the FBI’s surveillance personnel to communicate on the backup systems.

“Eventually they switched to push-to-talk cellphones,” said a former counterintelligence executive. “The tech guys would get upset by that, because if they could intercept radio, they might be able to intercept telephones.”

That is indeed what happened. Those devices were then identified and compromised by Russian intelligence operatives. (A number of other countries’ surveillance teams — including those from hostile services — also transitioned from using radios to cellphones during this time, noted another former official.)

U.S. intelligence officials were uncertain whether the Russians were able to unscramble the FBI conversations in real time. But even the ability to decrypt them later would have given the Russians critical insights into FBI surveillance practices, including “call signs and locations, team composition and tactics,” said a former intelligence official.

U.S. officials were also unsure about how long the Russians had been able to decipher FBI communications before the bureau realized what was happening. “There was a gap between when they were really onto us, and when we got onto them,” said a former senior intelligence official.

Even after they understood that the Russians had compromised the FBI teams’ radios, U.S. counterintelligence officials could not agree on how they had done it. “The intel reporting was they did break our codes or got their hands on a radio and figured it out,” said a former senior intelligence official. “Either way, they decrypted our comms.”

Officials also cautioned, however, that the Russians could only crack moderately encrypted communications, not the strongest types of encryption used by the U.S. government for its most sensitive transmissions. It was nonetheless “an incredible intelligence success” for the Russians, said the former senior official.

While the Russians may have developed this capability by themselves, senior counterintelligence officials also feared that someone from within the U.S. government — a Russian mole — may have helped them, said former officials. “You’re wondering, ‘If this is true, and they can do this, is this because someone on the inside has given them that information?’’ said another former senior intelligence official.

Russia has a clear interest in concealing how it gets its information, further muddying the waters. According to a former senior CIA officer who served in Moscow, the Russians would often try to disguise a human source as a technical penetration. Ultimately, officials were unable to pinpoint exactly how the Russians pulled off the compromise of the FBI’s systems.

Mark Kelton, who served as the chief of counterintelligence at the CIA until he retired in 2015, declined to discuss specific Russian operations, but he told Yahoo News that “the Russians are a professionally proficient adversary who have historically penetrated every American institution worth penetrating.”

This remains a core worry for U.S. spy hunters. The number of ongoing espionage investigations into U.S. government personnel — at the CIA, the FBI and elsewhere — including those potentially recruited by Russia, “is not a little, it’s a lot,” said another former senior counterintelligence official.

Once the compromises of FBI communications devices were confirmed, U.S. officials scrambled to minimize the exposure of mobile surveillance team operations, quickly putting countermeasures in place, according to former senior officials. There was a “huge concern” about protecting the identities of the individuals on the teams — an elite, secret group — said the former senior counterintelligence official. U.S. officials also conducted a damage assessment and repeatedly briefed select White House officials and members of Congress about the compromise.

After the FBI discovered that its surveillance teams’ cellphones had been compromised, they were forced to switch back to encrypted radios, purchasing different models, according to two former officials. “It was an expensive venture,” said one former counterintelligence official.

But the spying successes went both ways. The U.S. intelligence community collected its own inside information to conclude that the damage from the compromises had been limited, partly due to the Russians’ efforts to keep their intelligence coup secret, according to a former senior intelligence official. “The Russians were reticent to take steps [that might reveal] that they’d figured it out,” the former senior official said.

Even so, the costs to U.S. intelligence were significant. Spooked by the discovery that its surveillance teams’ communications had been compromised, the FBI worried that some of its assets had been blown, said two former senior intelligence officials. The bureau consequently cut off contact with some of its Russian sources, according to one of those officials.

At the time of the compromise, some of the FBI’s other Russian assets stopped cooperating with their American handlers. “There were a couple instances where a recruited person had said, ‘I can’t meet you anymore,’” said a former senior intelligence official. In a damage assessment conducted around 2012, U.S. intelligence officials concluded the events may have been linked.

The impact was not limited to the FBI. Alerted by the bureau to concerns surrounding Russia’s enhanced interception capabilities, the CIA also ceased certain types of communications with sources abroad, according to a former senior CIA official. The agency “had to resort to a whole series of steps” to ensure the Russians weren’t able to eavesdrop on CIA communications, the former senior official said. There was a “strong hint” that these newly discovered code-breaking capabilities by Russia were also being used abroad, said another former senior intelligence official.

The CIA has long been wary of Russian spies’ eavesdropping efforts outside of the United States, especially near U.S. diplomatic facilities. U.S. officials have observed Russian technical officers repeatedly walking close to those compounds with packages in their hands, or wearing backpacks, or pushing strollers, or driving by in vehicles — all attempts, U.S. officials believe, to collect information on the different signals emanating from the facilities. While the tools used by the Russians for these activities were “a bit antiquated,” said a former senior CIA official, they were still a “constant concern.”

It’s not unusual for intelligence officers operating from diplomatic facilities, including the United States’s own operatives, to try and intercept the communications of the host nation. “You had to find ways to attack their surveillance,” said Rolf Mowatt-Larssen, former head of counterintelligence at the Department of Energy and a former CIA officer who first served in Moscow in the 1980s. “The Russians do everything in the U.S. that we did in Moscow.”

Indeed, the focus on cracking radio communications was no different.

“We put extraordinary effort into intercepting and monitoring the FSB surveillance radio networks for the purpose of understanding whether our officers were under surveillance or not,” said another former senior CIA officer who also served in Moscow.

The discovery of the Russians’ new code-breaking capabilities came at a time when gathering intelligence on Russia and its leaders’ intentions was of particular importance to the U.S. government. U.S. national security officials working on Russia at the time received rigorous security training on how to keep their digital devices secure, according to two former senior officials. One former U.S. official recalled how during the negotiations surrounding the reset, NSC officials, partially tongue in cheek, “would sometimes say things on the phone hoping [they] were communicating things to the Russians.”

According to a former CIA official and a former national security official, the CIA’s analysts often disagreed about how committed Russia was to negotiations during the attempted reset and how far Putin would go to achieve his strategic aims, divergences that confused the White House and senior policy makers.

“It caused a really big rift within the [National Security Council] on how seriously they took analysis from the agency,” said the former CIA official. Senior administration leaders “went along with” some of the more optimistic analysis on the future of U.S.-Russia relations “in the hopes that this would work out,” the official continued.

Those disagreements were part of a “reset hangover” that persisted, at least for some inside the administration, until the 2016 election meddling, according to a former senior national security official. Those officials clung to the hope that Washington and Moscow could cooperate on key issues, despite aggressive Russian actions ranging from the invasion of Ukraine to its spying efforts.

“We didn’t understand that they were at political war with us already in the second term once Putin was reelected and Obama himself was reelected,” said Evelyn Farkas, the former deputy assistant secretary of defense for Russia, Ukraine, and Eurasia during the Obama administration.

As high-level hopes for the U.S.-Russia “reset” withered, concerns about the threat of Russian spying made their way to Capitol Hill. Top officials at the FBI and CIA briefed key members of Congress on counterintelligence issues related to Russia, according to current and former U.S. officials. These included briefings on the radio compromises, said two former senior officials.

Mike Rogers, a former Republican lawmaker from Michigan who chaired the House Permanent Select Committee on Intelligence from 2011 to 2015, alluded to counterintelligence concerns at a conference earlier this year in Washington, D.C.

One of those concerns was a massive intelligence failure related to the secret internet-based communications system the CIA used to communicate with agents. The extent of that failure, first reported publicly by Yahoo News in 2018, got the attention of Congress earlier.

But the problems were broader than that issue, according to Rogers.

“Our counterintelligence operations needed some adjustments,” said Rogers, adding that he and his Democratic counterpart from Maryland, Dutch Ruppersberger, requested regular briefings on the subject from agency representatives. “We started out monthly until we just wore them out, then we did it quarterly to try to make sure that we had the right resources and the right focus for the entire community on counter[intelligence].”

Rogers later told Yahoo News that his request for the briefings had been prompted by “suspected penetrations, both physical and technical, which is the role of those [Russian and Chinese] intelligence services,” but declined to be more specific.

The former committee chairman said he wanted the intelligence community to make counterintelligence a higher priority. “Counterintelligence was always looked at as the crazy uncle at the party,” he said. “I wanted to raise it up and give it a robust importance.”

The briefings, which primarily involved counterintelligence officials from the FBI and CIA and were limited to the committee leadership and staff directors, led to “some useful inquiries to help focus the intelligence community,” Rogers said. The leaders of the Senate Select Committee on Intelligence were also included in some of the inquiries, according to Rogers and a current U.S. government official.

Spokespeople for the current House and Senate intelligence committees did not respond to a request for comment. The FBI and CIA declined to comment. The Russian Embassy in Washington, D.C. did not respond to a request for comment.

The briefings were designed to “get the counterintelligence house in order,” said Jamil Jaffer, senior counsel at the House intelligence committee from 2011 to 2013, and to ensure that Congress and the intelligence agencies were “on the same page” when it came to such matters. “There were some concerns about what the agencies were doing, there were some concerns about what Congress knew, and all of these issues, of course, had China-Russia implications.”

Rogers and Jaffer declined to provide further details about what specific counterintelligence issues the committee was addressing, but other former officials indicated that worries weren’t limited to the compromise of FBI radio systems. Senior U.S. officials were contemplating an even more disturbing possibility: that the Russians had found a way to penetrate the communications of the U.S. intelligence community’s most sensitive buildings in and around Washington, D.C.

Suspected Russian intelligence officers were seen conspicuously loitering along the road that runs alongside the CIA’s headquarters, according to former senior intelligence officials. “Russian diplomats would be sitting on Route 123, sometimes in cars with diplomatic plates, other times not,” a former senior intelligence executive said. “We thought, they’re out doing something. It’s not just taking down license plates; those guys are interrogating the system.”

Though this behavior dated back at least to the mid-2000s, former officials said those activities persisted simultaneously with the compromise of the FBI’s communication system. And these were not the only instances of Russian intelligence operatives staking out locations with a line of sight to CIA headquarters. They were “fixated on being in neighborhoods” that gave them exposure to Langley, said a former senior official.

Over time, U.S. intelligence officials became increasingly concerned that Russian spies might be attempting to intercept communications from key U.S. intelligence facilities, including the CIA and FBI headquarters. No one knew if the Russians had actually succeeded.

“The question was whether they had capabilities to penetrate our comms at Langley,” said a former senior CIA official. In the absence of any proof that that was the case, the working theory was that the Russian activities were provocations designed to sow uncertainty within the CIA. “We came to the conclusion that they were trying to get into our heads,” the former senior official said.

A major concern was that Russian spies with physical proximity to sensitive U.S. buildings might be exfiltrating pilfered data that had “jumped the air gap,” i.e., that the Russians were collecting information from a breach of computers not connected to the Internet, said former officials.

One factor behind U.S. intelligence officials’ fears was simple: The CIA had already figured out how to perform similar operations themselves, according to a former senior CIA officer directly familiar with the matter. “We felt it was pretty revolutionary stuff at the time,” the former CIA officer said. “It allowed us to do some extraordinary things.”

While no one definitively concluded that the Russians had actually succeeded in penetrating Langley’s communications, those fears, combined in part with the breach of the bureau’s encrypted radio system, drove an effort by U.S. intelligence officials around 2012 to fortify sensitive Washington-area government buildings against potential Russian snooping, according to four former officials.

At key government facilities in the Washington area, entire floors were converted to sensitive compartmented information facilities, or SCIFs. These are specially protected areas designed to be impenetrable to hostile signals intelligence gathering.

The normal assumption was that work done in a SCIF would be secure, but doubts arose about the safety of even those rooms. “The security guys would say, your windows are ‘tempested’”—that is, protected against the interception of emissions radiating from electronic equipment in the building —“you’re in a SCIF, it’s fine,” a former senior counterintelligence executive recalled. “The question was, ‘Is it true?’”

Increasingly, U.S. officials began to fear it was not.

New security practices were instituted in sensitive government facilities like the FBI and CIA headquarters, according to former officials. “It required many procedural changes on our part to make sure we were not susceptible to penetrations,” said a former senior CIA official. These included basic steps such as moving communication away from windows and changing encryption codes more frequently, as well as more expensive adjustments, said four former officials.

Revelations about the Russian compromise of the radio systems, recalled a former senior intelligence official, “kick-started the money flowing” to upgrade security.

While the breaches of the FBI communications systems appeared to finally spur Congress and the intelligence agencies to adopt steps to counter increasingly sophisticated Russian eavesdropping, it took the Putin-directed interference in the 2016 election to get the White House to expel at least some of those officials deemed responsible for the breaches, and to shut down the facilities that enabled them.

Even then, the decision was controversial. Some in Washington worried about retribution by the Russians and exposure of American intelligence operations, according to a former senior U.S. national security official directly involved in the discussions. The FBI consistently supported expulsions, said another former national security official.

More than two years later, the Russian diplomatic compounds used in the FBI communications compromises remain shuttered. The U.S. government has prevented many of the Russian spies expelled by the United States from returning, according to national security experts and senior foreign intelligence officials. “They are slowly creeping back in, but [the] FBI makes it hard,” said a senior foreign intelligence official. “The old guard is basically screwed. They need to bring in a whole new generation.”

In the meantime, those familiar with Russian operations warn that the threat from Moscow is far from over. “Make no mistake, we’re in an intelligence war with the Russians, every bit as dangerous as the Cold War,” said a former senior intelligence officer. “They’re trying all the time … and we caught them from time to time,” he said. Of course, he added, “you don’t know what you don’t know.”

That’s the same message that special counsel Robert Mueller tried to convey during the highly contentious hearings to discuss his report on Russian interference in the 2016 election. “They are doing it as we sit here, and they expect to do it during the next campaign,” Mueller told lawmakers on the House Intelligence Committee about covert Russian involvement in U.S. politics.

But a number of observers believe Mueller’s message about the threat from Russia was largely lost amid a partisan battle on Capitol Hill over President Trump.

During his Washington conference appearance earlier this year, Rogers, the former chair of the House Intelligence Committee, also lamented that the current politicized state of the intelligence committees would make spy agencies more hesitant to admit their failures.

“They’re not going to call you to say, ‘I screwed up.’ They’re going to say, ‘God, I hope they don’t find that,’” he said. “That’s what’s going to happen. I’ll guarantee it’s happening today.”

What Can Be Purchased at Canadian RX Pharmacies?
The best thing about Canadian drugstores is the abundance of medications they offer to their clients. As a rule, at such websites, you may find effective remedies or medical solutions to any kind of disorders, which refers to not just RX medications available on prescription, but also personal care products, vitamins and nutritional supplements. Canadian pharmacy Canadapharmrxon.com even offer a broad assortment of generic medications which are just as good as prescription drugs but are available at a more affordable price. So, what can be found at Canadian drugstores? Here is a list of the most popular options:
Anti-inflammatory medicines;
Medicines to fight infectious diseases such as antibiotics;
Antipsychotic drugs and other mental health solutions;
Men’s health goods;
Women’s skin care products;
High blood pressure solutions;
Weight control medicines;
Personal care products;
Drugs to treat stomach disorders;
Over-the-counter medicines such as herbal drugs or supplements.

 

Nunes RICO Lawsuit v. Fusion GPS

This is a 3 part RICO case against Glenn Simpson, all things Fusion GPS and Campaign for Accountability, Inc..

Very interesting of the details that Nunes and his lawyer provide in detail. While Conngressman Nunes is suing for at least $9.9 million, it is not so much about an end result but more about the discovery process in the case. That means in layman’s terms, a document production requirement which is all the Republicans have been demanding of government agencies during the whole Russian collusion case. Government agencies, including the Department of Justice and the FBI for the most part have either slow-walked responses, redacted documents or have been completely non-responsive. In this type of lawsuit, where a jury is demanded, documents must be produced.

California Rep. Devin Nunes named to Trump's transition ...

Read the complaint here.

Meanwhile, Congressman Nunes could have a real ally in this lawsuit. He is one Bill Browder, a former U.S. citizen, now a citizen of Britain. You may remember Mr. Browder as he has been on the quest to have foreign government adopt the Magnitsky Act, a law fully adopted by the United States several years ago.

Northwest Research | & Covert Book Report

You may also remember that little meeting that got so much press that included Trump Jr., Paul Manafort, Jared Kushner and Natalia Veselnitskaya. Fusion GPS did the same thing to Mr. Browder that Congressman Nunes is alleging in his complaint.

Following California GOP Rep. Devin Nunes’ $9.9M lawsuit against Fusion GPS over alleged “smear” tactics, businessman and Magnitsky Act advocate Bill Browder told Fox News that the opposition research firm behind the anti-Trump Steele dossier also targeted him with an organized misinformation campaign.

Browder is the CEO and co-founder of Hermitage Capital, which was once the largest foreign portfolio investor in Russia. He told Fox News that Fusion GPS and founder Glenn Simpson were working with Russians who wanted the Magnitsky Act repealed — and that they “played dirty.”

“It appears on a whole range of stories they are in the lying and smear campaigning business,” Browder said. “My experience does not look like an isolated incident. These guys play dirty, and I have seen it firsthand.”He continued: “I had an experience with Glenn Simpson and Fusion GPS in spring 2016 where they were paid agents for individuals connected to the Russian government. They lied to journalists and other thought leaders in Washington about me and the Magnitsky case to have the act repealed.”

***

In part from the Washington Examiner:

Veselnitskaya was a Russian prosecutor, then performed government-related lobbying in the U.S. against the Magnitsky Act. Prevezon was a company alleged to have laundered fraudulent money exposed by Magnitsky, so Veselnitskaya hired BakerHostetler to help Prevezon in court — and the law firm hired Fusion GPS.

Russian lawyer questions why Mueller hasn't contacted her

Glenn Simpson, the opposition research firm’s founder, testified he started working with Veselnitskaya in 2014 and said “she would have arranged for Prevezon to pay Baker Hostetler which paid us.” Simpson knew the research he conducted opposing the Magnitsky Act, criticizing Magnitsky advocate and friend Bill Browder and defending Prevezon, made its way to Veselnitskaya. And Simpson met with Veselnitskaya the day before the Trump Tower meeting, the day of it, and the day after. Simpson claimed he didn’t know she was connected to the Kremlin and didn’t know about the Trump Tower meeting beforehand.

Veselnitskaya attended the meeting with a Russian translator and fellow Russian anti-Magnistky Act lobbyists and Prevezon case workers. Veselnitskaya presented a document echoing official Kremlin talking points criticizing the Magnitsky Act and attacking Browder and others by alleging financial misconduct in their support for Democrats. When Don Jr. asked for proof, she had none. The Russians also complained about U.S. sanctions imposed under the Magnitsky Act and Putin’s response banning U.S. adoption of Russian children. Trump associates expecting dirt on Clinton considered the meeting a waste of time. The media revealed the meeting’s existence in July 2017.

Operation No Safe Haven V

If you see a Democrat, ask them what they know about this operation and have them explain it to you please. Let just see if they get it right, OR if they know about it at all….

BTW, have you seen this guy? Martinez-Rojas, Severiano

ATLANTA – On May 21, 2013, U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI) Atlanta and the FBI conducted search and arrest warrants for several individuals suspected of human trafficking.

Since 2006, Severiano Martinez-Rojas, along with family members Arturo Rojas-Coyotl, Odilon Martinez-Rojas, Daniel Garcia-Tepal and others, all from Tenancingo, Tlaxcala, Mexico, conspired and brought multiple women into the United States from Mexico and Guatemala, all for the purpose of forcing them to engage in prostitution.

Eight victims from Mexico and Guatemala were rescued during the course of the investigation.

Odilon Martinez-Rojas and Rojas-Coyotl have been sentenced to 21 years and 16 years in prison, respectively. Severiano Martinez-Rojas is believed to have returned to Mexico prior to the warrant execution and remains a fugitive in this case.

***

WASHINGTON — U.S. Immigration and Customs Enforcement (ICE) arrested 39 fugitives – 30 males and nine females – sought for their roles in known or suspected human rights violations during a nationwide operation that took place from Aug. 27 to 29.

The ICE National Fugitive Operations Program in coordination with the ICE Human Rights Violators and War Crimes Center, and the ICE Office of the Principal Legal Advisor, worked with ICE’s Enforcement and Removal (ERO) Atlanta, Baltimore, Chicago, Dallas, Houston, Los Angeles, Miami, New Orleans, New York City, Newark, Salt Lake City, and San Francisco field offices to arrest these fugitives.

The foreign nationals arrested during this operation all have outstanding removal orders and are subject to repatriation to their countries of origin. Of the 39 known or suspected human rights violators arrested during Operation No Safe Haven V, 16 individuals are also criminal aliens in the U.S. with convictions for crimes including, but not limited to, domestic violence, driving under the influence of liquor, drug distribution, firearm possession, grand theft, reckless endangerment, robbery, fraud and theft. Their countries of origin include: El Salvador, Guatemala, China, Liberia, Cambodia, Chad, Chile, Colombia, the Ivory Coast, Ghana, Haiti, Honduras, Jamaica, Nicaragua, Sierra Leone, and Sudan. This operation more than doubled the number of known or suspected human rights violators arrested during the first nationwide No Safe Haven operation, which took place in September 2014.

“ICE will not allow war criminals and human rights abusers to use the U.S. as a safe haven,” said Acting Director Matthew Albence. “We will never stop looking for them and we will never cease seeking justice for the victims of their crimes.”

Those arrested across the country included:

  • Fourteen individuals from Central America implicated in numerous human rights violations against civilians, to include the capture, arrest and/or transport of civilians who were subsequently mistreated, and in some cases, beaten, electrocuted, and killed;
  • Four known or suspected human rights violators from China, complicit in collaborating with the government to assist in forced abortions and sterilizations against victims;
  • Four individuals from West Africa connected to a range of atrocities, including civilian massacres, mutilations, recruitment of child soldiers, extrajudicial killings, and other human rights violations.
  • An individual from Europe implicated in human rights abuses against political opponents through work with a security agency.

ICE is committed to identifying, investigating, prosecuting and removing known or suspected human rights violators who seek a safe haven in the United States. ICE’s Human Rights Violators and War Crimes Center (HRVWCC) investigates human rights violators who try to evade justice by seeking shelter in the United States, including those who are known or suspected to have participated in persecution, war crimes, genocide, torture, extrajudicial killings, severe violations of religious freedom, female genital mutilation/cutting and the use or recruitment of child soldiers. These individuals may use fraudulent identities or falsified documents to enter the country in an attempt to blend into communities in the United States.

Members of the public who have information about foreign nationals suspected of engaging in human rights abuses or war crimes are urged to contact ICE by calling the toll-free ICE tip line at 1-866-347-2423 or internationally at 001-1802-872-6199. They can also email [email protected] or complete ICE’s online tip form.

The HRVWCC was established in 2009 to further ICE’s efforts to identify, locate and prosecute human rights abusers in the United States. The HRVWCC leverages the expertise of a select group of agents, lawyers, intelligence and research specialists, historians and analysts who direct the agency’s broader enforcement efforts against these offenders.

Since 2003, ICE has arrested more than 415 individuals for human rights-related violations of the law under various criminal and/or immigration statutes. During that same period, ICE obtained deportation orders against and physically removed more than 990 known or suspected human rights violators from the United States. Additionally, ICE has facilitated the departure of an additional 152 such individuals from the United States.

Currently, ICE has more than 170 active investigations into suspected human rights violators and is pursuing more than 1,600 leads and removals cases involving suspected human rights violators from 95 different countries. Since 2003, the HRVWCC has issued more than 75,000 lookouts for individuals from more than 110 countries and stopped over 300 human rights violators and war crimes suspects from entering the U.S.

ICE credits the success of this operation to the efforts of the U.S. National Central Bureau-Interpol Washington.