Abolishing Columbus Day is Based on Lies

Roughly 10 states and 100+ U.S. cities observe some version of Indigenous Peoples Day this month.
• Native American advocates have been working since the early 1990s to get states to make the swap, the AP reports.
From today: Columbus statues in San Francisco and Providence, Rhode Island, were vandalized with red paint, CNN reports.
• “Vandals had chained a sign to the base of the statue that said ‘Stop Celebrating Genocide’ and spray painted the word ‘Genocide’ on the monument.”

***

You can be sure this all began within the education system where U.S. history was taught using Howard Zinn’s book titled A People’s History of the United States. This book was full of lies and distortions that educators and faculty including higher education administrators never bothered to validate any claim he made. Now we have legislators at the state level that have bought into the same falsehoods.

In part from the Federalist:

Zinn died in 2010, but his work continues on through the Zinn Education Project that in September collaborated with the Smithsonian in offering credit-bearing “teach-in” classes on abolishing Columbus Day for teachers. On October 8 they mailed out a newsletter that lauded two states, Maine and New Mexico, and cities, such as Columbus, Ohio, and Alexandria, Virginia, that in the past year replaced Columbus Day with Indigenous Peoples Day. Also just joining the list are Washington, D.C. and Princeton, New Jersey.

The newsletter urged teachers to purchase and download their materials to lead students in lobbying their schools and cities to join the effort to “Abolish Columbus Day.”

“Celebrating Columbus means celebrating colonialism, celebrating racism, celebrating genocide,” the newsletter announced. Instead, “tribute” should be paid “to the people who were here first, who are still here, and who are leading the struggle for a sustainable planet.”

The political agenda is clear. Like Zinn himself, the project presents the American Indian as one amorphous mass embodying the stereotype of communistic pacifist feminists. It’s the “Usable Indian,” which at one time embodied the “savage,” but then in the 1960s the hippie. The Indian serves as proxy in the never-ending “struggle.”

Truth be told, as an explorer, Columbus made four trips, never reaching what is known as America or any part of the mainland. In 1492, Columbus reached the Bahamian islands, arriving in San Salvador.

Whose History Matters? Students Can Name Columbus, But ... photo

He sailed around the islands such as Hispaniola and Dominican Republic. He soon departed leaving behind a handful of crew members. Arriving back in Spain, he had very little to offer the Queen. In 1493, he sailed again reaching Hispaniola finding the settlement destroyed and ordered it rebuilt. He did gift the Queen about 500 slaves and she was horrified ordering them to be returned. In 1498, sailing again reaching Trinidad and the South American mainland. Here there was a bloody revolt and Spanish authorities sent a new governor to take over.

There was one more trip in 1502. This time he reached what is known as Panama. Due to major storms there was such damage to two of his four ships, two had to be abandoned. He returned once again to Spain, for the most part again empty handed and he died in 1506.

He kept a journal which he gifted to the Queen.

Christopher Columbus Diary Quotes. QuotesGram photo

In all of the travels and in the end, the result was in fact more open trade between Spain and Latin America in goods such as wheat, coffee, sugar, corn, tomatoes and potatoes.

Ever wonder if the part about successful trade entered any part of the studies of Columbus?

Two Formal Challenges to Pelosi’s Impeachment Inquiry Mission

You read it here, House Speaker Nancy Pelosi is creating an off ramp to the early launch of the impeachment inquiry of President Trump. In previous months, Gerald Nadler, Chairman of the House Judiciary Committee has been on a quest to impeach listing all kinds of reasons to do so. Nothing was really sticking as far as Pelosi was concerned. But then came this phone call President Trump had with Ukraine that gave us a whistleblower and before all the facts and the complaint was released, Pelosi lit the impeach inquiry candle. Turns out all along, she knew about the call details and the whistleblower all due to Congressman Adam Schiff office secret work with authoring the whistleblower complaint in the first place. Deep state is getting deeper….
Meanwhile…..

Image result for congressman kevin mccarthy
Enter House Minority Leader Kevin McCarthy. He sent a letter to Pelosi challenging telling her to halt the whole inquiry thing because she is clearly not following rules, procedures and protocol. (I think she is doing that on purpose, read ‘off ramp)
In the McCarthy letter to Pelosi he demands answers to the following questions, which prove so far that Pelosi is not following procedures.

Those questions were as follows:

Do you intend to hold a vote of the full House authorizing our impeachment inquiry?
Do you intend to involve the full House in each critical step of this inquiry, including defining its scope and establishing its rules and procedures?
Do you intend to grant co-equal subpoena power to both the Chair and Ranking Member at the committee level?
Do you intend to require that all subpoenas be subject to a vote of the full committee at the request of either the Chair or Ranking Member?
Do you intend to provide the President’s counsel the right to attend all hearings and depositions?
Do you intend to provide the president’s counsel the right to present evidence?
Do you intend to provide the president’s counsel the right to object to the admittance of evidence?
Do you intend to provide the president’s counsel the right to cross-examine witnesses?
Do you intend to provide the president’s counsel the right to recommend a witness list?
Do you intend to refer all findings on impeachment to Chairman Nadler and the Judiciary Committee, as prescribed by Rule X of the Rules of the House, or is Chairman Schiff in charge of leading the inquiry as reported in the press?

“By answering ‘no’ to any of the above, you would be acting in direct contradiction to all modern impeachment inquiries of a sitting president,” McCarthy wrote.

Okay, hold on because here comes Congressman Doug Collins.

Image result for congressman doug collins

Collins is the top Republican on the House Judiciary Committee, is telling a federal judge that the Democrats’ impeachment investigation has no legal basis per his amicus brief.

The amicus brief: doug.collins.amicus

(in part)

That part of the text of the amicus brief echos that of Minority Leader’s letter to Pelosi.

All the while, the whole Ukraine phone call thing the House Democrats are using to pull the trigger on impeachment inquiries is also falling apart. The whole Biden scandal continues to fester.

Stay tuned…

SF: Spy, Leave the Room Key at the Front Desk

This is a movie thing for sure not only that happened in San Francisco but went to Columbus, Georgia. China is operating with hired spies in the United States and Beijing is overtly stealing and buying from the United States.

Northern California Resident Charged with Acting as an Illegal Agent

American Citizen Arrested for Acting as an Illegal Foreign Agent of the People’s Republic of China

The Department of Justice unsealed charges today in a criminal complaint charging Xuehua Peng, also known as Edward Peng, 56, for acting as an illegal foreign agent in delivering classified United States national security information to officials of the People’s Republic of China’s Ministry of State Security (MSS).

“According to the allegations, Peng conducted numerous dead drops here in the United States on behalf of Chinese intelligence officers and delivered classified information to them in China.  His arrest exposes and disrupts an operation by those Chinese intelligence officers to collect such information without having to step foot in this country,” said Assistant Attorney General of National Security John C. Demers.  “Coming on top of our many recent Chinese espionage cases—involving both national defense and intellectual property information—this case illustrates the seriousness of Chinese espionage efforts and the determination of the United States to thwart them.”

“The conduct charged in this case alleges a combination of age-old spycraft and modern technology,” said U.S. Attorney David L. Anderson for the Northern District of California.  “Defendant Xuehua (Edward) Peng is charged with executing dead drops, delivering payments, and personally carrying to Beijing, China, secure digital cards containing classified information related to the national security of the United States.”  U.S. Attorney Anderson further stated, “The charges announced today provide a rare glimpse into the secret efforts of the People’s Republic of China to obtain classified national security information from the United States and the battle being waged by our intelligence and law-enforcement communities to protect our people, our ideas, and our national defense.”

“The FBI, along with our partners, will aggressively pursue foreign agents operating illegally in the United States attempting to steal our country’s most sensitive information.” said Assistant Director John Brown of the Counterintelligence Division. “This case should serve as a warning to the government of China as well as any other foreign adversary looking to replicate this activity. The FBI, and our intelligence and law enforcement partners, will not waiver.  We will bring all of our resources to bear to defeat hostile foreign intelligence services and protect our nation’s security. I would like to thank FBI counterintelligence personnel throughout the country who tirelessly worked this investigation over the course of many years, particularly those personnel in our Counterintelligence and San Francisco Divisions.”

“Putting an end to Mr. Peng’s alleged actions are an important and significant step in dismantling the PRC’s overall efforts against our country,” said Special Agent in Charge Bennett of the FBI San Francisco Division.  “Our message is clear: the FBI, along with our intelligence community partners, will pursue foreign adversaries -at any level of an operation- and disrupt their malicious activity when it is detected.”

According to the complaint filed Sept. 24, 2019, and unsealed this morning, Peng, 56, a U.S. citizen living in Hayward, California, acted at the direction and under the control of MSS officials in China in retrieving classified information passed to him by a confidential human source (the source), leaving money behind for the source, or both.  His activities included one dry run and at least five successful “dead drops” between October 2015 and July 2018.  The dead drops occurred in the Bay Area and in Columbus, Georgia.

The table below summarizes the allegations in the complaint about each successful dead drop, including the date of the dead drop, the location of the dead drop, what Peng left in the hotel room, and what Peng retrieved from the hotel:

Date

Location

Peng Left in the Hotel

Peng Retrieved from the Hotel

6/23/2015 Newark, CA n/a Empty package (dry run)
10/24/2015 Newark, CA n/a SD card
4/23/2016 Oakland, CA $20,000 SD card
7/1/2017 Columbus, GA $20,000 n/a
9/9/2017 Columbus, GA $10,000 SD card
6/30/2018 Columbus, GA $20,000 SD card

In the June 23, 2015, “dry run,” no information or money was exchanged.  Instead, an empty package was left by the source for Peng at the front desk of a hotel, and Peng later retrieved it.  In the first successful dead drop, Peng retrieved a package containing an SD card from the front desk of a hotel.  In each of the other four successful dead drops, Peng booked hotel rooms and left a room key to be picked up by the source.  Peng then left envelopes of cash in the room, retrieved a secure digital card left there by the source, or both.

In each instance in which he retrieved an SD card from the hotel room, Peng then traveled to Beijing, China, shortly thereafter.  The complaint further alleges that Peng was told by an MSS handler, in coded language, where and when to conduct the dead drops, how much money to leave in exchange for the SD cards, and when to return to China to deliver them.  As alleged in the Complaint, the FBI secretly filmed Peng conducting some of the dead drops, and intercepted Peng’s telephone conversations with his MSS handlers in China.

On Friday, Sept. 27, 2019, Peng was arrested at his residence in Hayward and made his initial appearance in federal court in San Francisco before U.S. Magistrate Judge Joseph C. Spero. Magistrate Judge Spero ordered Peng held without bond pending further proceedings. Peng’s next hearing has been scheduled for Oct. 2, 2019, at 10:30 am before the Honorable Jacqueline Corley, 450 Golden Gate Ave., 15th Floor, for a detention hearing and identification of counsel.

A complaint merely alleges that crimes have been committed, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt. If convicted, Peng faces a maximum sentence of 10 years, and a fine of $250,000 for acting as an agent of a foreign government without notifying the United States Attorney General in violation of 18 U.S.C. §  951.  However, any sentence following conviction would be imposed by the court after consideration of the U.S. Sentencing Guidelines and the federal statute governing the imposition of a sentence, 18 U.S.C. § 3553.

This case is being prosecuted by the Special Prosecutions Section of the United States Attorney’s Office for the Northern District of California and the Counterintelligence and Export Control Section of the Department of Justice, National Security Division.  The prosecution is the result of an investigation by the FBI.

 

The Ukraine Thing will Soon Lead to Cyprus, Meanwhile

It is a must to fully comprehend how far and wide the choreography was on the Russian collusion thing. Still much of that is unresolved, hence the reason for AG Barr spending a good deal of time in Europe, while John Durham is working his side of the case.
Then there was the massive anti-Kavanaugh Supreme Court thing such that two books were published describing that epic yet failed campaign with hundreds of players inside and outside of government.
Now we have Ukraine percolating while other embers are burning larger that include many of the usual players and others not so well known. This will eventually lead to Cyprus which is a well know hub for money laundering and shell companies.

The players and choreography here as well is a nasty monster.

Meanwhile…
Meet Karen Greenaway.

Recovery of assets stolen by Yanukovych regime: FBI admit they could not return even single ... She lived in Russia before becoming an FBI agent.

Lil miss Karen was a long-timer at the FBI as a case agent and supervisor managing and investigating crimes of money-laundering, financial crimes and international corruption. For context, she worked on Transnational Organized Crime in the former Soviet Union, Middle East, Africa and Asia. She speaks fluent Russian.
Having now left the FBI, she has been still quite busy. In 2018, she was a keynote speaker on those topics at a conference in Copenhagen. She was also included in the panel at the IACC in Seoul in 2020. Here she even mentions a ‘trail of blood that lead to the knife for the murder investigation’. Humm okay.

She must have impressed in her work at the FBI, as later she was also a top investigator on all things Paul Manafort. It is important to go back to 2013 when Viktor Yanukovych, the former president of Ukraine fled to Russia. It is thought he and his team, some that also successfully fled, while others did not pilfered billions in corruption schemes. Ms. Greenaway, at the FBI during that time, has the goods, but to what end is uncertain.

As John Soloman of The Hill published due to his stellar work, the Obama administration sent an envoy to Ukraine with an interesting list of people and companies that were not to be investigated, one of them being Burisma. But there is yet another operation that is much more influential and important and that is AntAC. Karen was investigating the Firtash case in Austria back in 2016 as she explained at a AntAC conference in December of 2016.

Now it gets even more interesting. Seems AntAC did not appreciate Solomon’s reporting. Oh, it must be noted that AntAC is a George Soros operation well know by the Obama White House and Victoria Nuland from the State Department.

Just this past February, there was an interesting briefing in the Dirksen Senate Office building dealing with ‘asset recovery’ in Eurasia. Karen Greenaway was there too. A large part of the matter was not only Ukraine but monies in the realm of an estimate trillion dollars, some of which belong to the U.S. government (read, taxpayer).

Greenaway recently retired, and Soros’s AntAC soon after announced she was joining its supervisory board.

It is all complicated and it really is complicated if you read the summary below. But….this was all going on during the Obama administration with John Kerry as Secretary of State.

This is long, but a must read:

The opinion article, which was published on March 26 on The Hill media platform, contained a number of allegations regarding AntAC. We would like to offer our fact check and explanations.

Quote from the opinion article: While the 2016 presidential race was raging in America, Ukrainian prosecutors ran into some unexpectedly strong headwinds as they pursued an investigation into the activities of a nonprofit in their homeland known as the Anti-Corruption Action Centre (AntAC).

The focus on AntAC was part of a larger probe by Ukraine’s Prosecutor General’s Office into whether $4.4 million in U.S. funds to fight corruption inside the former Soviet republic had been improperly diverted.

The prosecutors soon would learn the resistance they faced was blowing directly from the U.S. Embassy in Kiev, where the Obama administration took the rare step of trying to press the Ukrainian government to back off its investigation of both the U.S. aid and the group.”

The criminal case into alleged embezzlement of U.S. technical assistance of 4 million USD  of the US taxpayers money which had to be spent on the PGO’s reforms was opened on March 16, 2016 by the Prosecutor General’s Office under the leadership of the previous Prosecutor General Viktor Shokin.

On April 4, 2016 the PGO received the letter from the U.S. Embassy.

Yuriy Lutsenko, who was appointed to the position of the Prosecutor General in May 2016, fully agreed that the allegations were groundless, he even said that they ‘simply dishonor the Prosecutor General’s Office of Ukraine’.

As soon as Lutsenko was appointed, the case was closed in May 2016 by the PGO.

“Yuri Lutsenko, widely regarded as a hero in the West for spending two years in prison after fighting Russian aggression in his country, was named prosecutor general and invited to meet new U.S. Ambassador to Ukraine Marie Yovanovitch.”

Firstly, Yuri Lutsenko is widely regarded in the West as “hero” for his drunken and disorderly conduct in Frankfurt airport, where he was detained by the police in 2009 while serving as a Minister of Interior Affairs of Ukraine.

Secondly, Yuri Lutsenko was sentenced to four years in prison in early 2012, this was two years before Russian aggression that started in 2014. Allegations against Lutsenko were for embezzlement of funds of the Ministry of Interior under his leadership and abuse of office resulting in illicit allocation of state-owned apartment to his former driver, facilitating illicit social security payments to this person and illicit allocation of funds for the celebration of the Militia (police) day in 2008-2009. He was charged with causing damages of $125,000 to the state. Lutsenko submitted a claim to the European Court of Human Rights and in 2012 the court ruled that Lutsenko’s arrest and subsequent detention violated the European Convention on Human Rights.

“Lutsenko told me he was stunned when the ambassador “gave me a list of people whom we should not prosecute.” The list included a founder of the AntAC group and two members of Parliament who vocally supported the group’s anti-corruption reform agenda, according to a source directly familiar with the meeting.”

During the first possible meeting of Madam Ambassador with Lutsenko, which could not have happened earlier than late August 2016, there were no ongoing criminal prosecutions against AntAC Head of Board Vitaliy Shabunin.

The criminal case against AntAC on alleged embezzlement of the U.S. taxpayers money was already closed for around 3 months.

The criminal investigation into Shabunin’s punch of a bully-provocateur, which took place on June 8, 2017, was triggered in summer 2017. There is an ongoing trial in this case in the court.

It turns out the group that Ukrainian law enforcement was probing was co-funded by the Obama administration and liberal mega-donor George Soros.”

AntAC was founded in the end of 2011 by Vitaliy Shabunin and Daria Kaleniuk, who formerly were activists of youth NGO “Foundation of Regional Initiatives”. In 2012 AntAC was functioning without any financial support as a volunteer project of its founders.

In 2013 the NGO received first funding as a subgrant from the All-Ukrainian Network of People Living with HIV/AIDs supported by the Global Fund to Fight AIDS, Tuberculosis and Malaria for the public monitoring of public procurement of medications in Ukraine.

“In the end, no action was taken against AntAC and it remains thriving today.”

This is not true. The action was taken in May 2016 – the PGO closed the criminal case “due to the absence of criminal offence.” However, no-one from PGO officers who abused the power triggering criminal investigation on AntAC was punished disregarding organization’s requests. Information PGO obtained through the course of the investigation (banking statements) was later repeatedly leaked to media with the goal to discredit the organization.

“After the Obama Justice Department launched its Kleptocracy Asset Recovery Initiative a decade ago to prosecute corruption in other countries, the State Department, Justice Department and FBI outsourced some of its work in Ukraine to groups funded by Soros.”

In December 2013 in the middle of the Revolution of Dignity in Ukraine AntAC launched a campaign on freezing foreign assets of Ukraine’s former President Yanukovych and his associates. AntAC was running a webpage yanukovich.info, which gathered all publicly available facts about corrupt assets of Yanukovych’s allies and mapped the role of Western lawyers, banks and companies in covering and enabling grand corruption. The campaign was funded via crowdfunding from concerned citizens and was not financially supported by neither government of the U.S. nor Soros foundation.

Within the campaign AntAC reached out to the law enforcement agencies in the EU, Switzerland, the U.S. with request to investigate foreign assets of Yanukovych and his associates. DoJ Kleptocracy Asset Recovery initiative was part of a long list of foreign law enforcement agencies AntAC reached out in December 2013 – February 2014.

“One key U.S. partner was AntAC, which received 59 percent (or $1 million) of its nearly $1.7 million budget since 2012 from U.S. budgets tied to State and Justice, and nearly $290,000 from Soros’s International Renaissance Foundation, according to the group’s donor disclosure records.”

Apart from the projects, funded by abovementioned donors U.S. government and Open Society foundations, since 2013 AntAC was funded by a wide range of other donors, including:

  • The Global Fund via All-Ukraine Charitable Organization “All-Ukraininan Network of People living with HIV/AIDS”
  • The Government of the Kingdom of the Netherlands via Matra program
  • The Embassy of the United Kingdom
  • The Ministry of Foreign Affairs of the Czech Republic
  • European Union
  • Donations from individuals/legal entities

“The U.S.-Soros collaboration was visible in Kiev. Several senior Department of Justice (DOJ) officials and FBI agents appeared in pictures as participants or attendees at Soros-sponsored events and conferences.”

Right after the victory of the Revolution of Dignity and runaway of former President Yanukovych from Ukraine, AntAC activists were invited to the meetings with law enforcement officers from various countries willing to help Ukraine in tracing proceeds of corruption of ousted president Yanukovych. AntAC also met with representatives from DOJ and shared with them all publicly available information the organization gathered on corrupt officials under Yanukovych regime.

Recovery of proceeds of corruption of Yanukovych and his associates was one of the key priorities of work of AntAC, which was organizing specialized asset recovery conference in Ukraine in 2014, 2015, 2016. Law enforcement officers from Ukraine and abroad were invited to these conferences, including Karen Greenaway. Apart from DOJ officials  there were Ukrainian (including PGO), Italian, British, Swiss law enforcement officers speaking and participating at AntAC asset recovery conferences.

“Greenaway recently retired, and Soros’s AntAC soon after announced she was joining its supervisory board.”

In February 2019 Karen Greenaway agreed to join AntAC Supervisory Board after she will finish her other professional obligations.

AntAC Supervisory Board membership is a non-paid commitment from distinguished professionals who care about Ukraine and countering grand political corruption. Among AntAC Supervisory Board members there are Francis Fukuyama from Stanford University, Giovanni Kessler, former head of the EU Anti-Fraud Office, Oliver Bullough, British author and investigative journalists, Oleksa Shalayskyi, head of Nashi Groshi investigative project in Ukraine.

“Senior U.S. law enforcement officials confirmed to me that the early kleptocracy collaborations inside Ukraine led to highly visible U.S. actions against the oligarch Dmitri Firtash, a major target of the Soros group, and Manafort. Firtash is now represented by former Hillary Clinton lawyer Lanny Davis and former U.S. Attorney Dan Webb.”

Dmitri Firtash was never a major target of the Anti-corruption Action Centre.

AntAC collects publicly available evidence of alleged corruption and money laundering of all oligarchs in Ukraine, as well as all top corrupt officials. AntAC has been doing this under the regime of ousted president Yanukovych and continues to do that under the new government leaded by President Poroshenko since spring 2014.

“Ukrainian NGO Anticorruption Action Centre (AntAC) petitioned the United States Justice Department on behalf of Ukrainian civil society to dedicate the nearly $3 million in forfeited and seized assets allegedly laundered by former Ukrainian Prime Minister Pavlo Lazarenko, to creating an anti-corruption training facility,” a 2015 foundation document stated.

In 2013 AntAC submitted a petition to the DoJ with request to repatriate $250mln proceeds of corruption of Pavlo Lazarenko, a former Prime Minister of Ukraine, convicted in the US for money laundering back in 2006. Since 2004, the U.S. government started in rem forfeiture procedure aiming at recovery of proceeds of crime. The procedure is still pending.

In the petition supported by more than 10 civil society organizations AntAC called the US government to refrain from repatriation of stolen assets back to the corrupt government of Ukraine at that time headed by Yanukovych, which could steal them again. AntAC called the US Government to consider the success story of repatriating proceeds of corruption to Kazakhstan, where  independent BOTA foundation was set up for the repatriation of proceeds of corruption. In 2015, AntAC updated the petition given the abrupt changes in the country and emerged news in media claiming that Lazarenko’s funds were about to be confiscated by the DoJ.

“Spokespersons for AntAC and Open Society Foundations did not respond to repeated requests for comment.”

AntAC did not receive any requests for the comments by John Solomon following recent Lutsenko’s interview. The only request from him to provide answers to the questions was received back in October 2018 (six months before publication of Lutsenko’s interview). At that time, AntAC did not provide any response to Solomon after the background checks on him. AntAC became aware of John Solomon’s controversial reputation in American media for spreading manipulative and biased messages. For instance, last year, the staffers of the Hill expressed their concerns over Solomon’s biased reporting. AntAC was rightfully concerned that our answers would be misused and manipulated by Solomon.

 

 

 

Under Obama, the Russians Breached FBI Communications

So, at the time we had Comey, Mueller, Brennan, Clapper, Holder, Lynch, Rice, Power, Monaco, Donilon, McDonough, Rhodes and more.

Anyone remember when there was a pile of Russian spies that Obama expelled and traded? Remember at the very end of the Obama presidency when he expelled another pile of Russians from 3 locations and closed Russian dachas?

A big question remains that has yet to be answered and that is why did the Obama administration wait so long to impose a consequence?

Okay, well sit back this is a long read but it for sure explains the way too casual approach by Obama to Russia.

Simply put, the entire Obama administration and those democrats in congress had to be really embarrassed. With all the later Russian collusion stuff, that operation had to be a huge head-fake cover-up thing.

Whew what a mess. The Russians punked the FBI and that hurt America’s national security and policy badly…so we dispatched Hillary to do that Russian reset with that pesky red button.

Okay, here we go….

Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil

YahooNews: On Dec. 29, 2016, the Obama administration announced that it was giving nearly three dozen Russian diplomats just 72 hours to leave the United States and was seizing two rural East Coast estates owned by the Russian government. As the Russians burned papers and scrambled to pack their bags, the Kremlin protested the treatment of its diplomats, and denied that those compounds — sometimes known as the “dachas” — were anything more than vacation spots for their personnel.

The Obama administration’s public rationale for the expulsions and closures — the harshest U.S. diplomatic reprisals taken against Russia in several decades — was to retaliate for Russian meddling in the 2016 presidential election. But there was another critical, and secret, reason why those locations and diplomats were targeted.

Both compounds, and at least some of the expelled diplomats, played key roles in a brazen Russian counterintelligence operation that stretched from the Bay Area to the heart of the nation’s capital, according to former U.S. officials. The operation, which targeted FBI communications, hampered the bureau’s ability to track Russian spies on U.S. soil at a time of increasing tension with Moscow, forced the FBI and CIA to cease contact with some of their Russian assets, and prompted tighter security procedures at key U.S. national security facilities in the Washington area and elsewhere, according to former U.S. officials. It even raised concerns among some U.S. officials about a Russian mole within the U.S. intelligence community.

“It was a very broad effort to try and penetrate our most sensitive operations,” said a former senior CIA official.

American officials discovered that the Russians had dramatically improved their ability to decrypt certain types of secure communications and had successfully tracked devices used by elite FBI surveillance teams. Officials also feared that the Russians may have devised other ways to monitor U.S. intelligence communications, including hacking into computers not connected to the internet. Senior FBI and CIA officials briefed congressional leaders on these issues as part of a wide-ranging examination on Capitol Hill of U.S. counterintelligence vulnerabilities.

These compromises, the full gravity of which became clear to U.S. officials in 2012, gave Russian spies in American cities including Washington, New York and San Francisco key insights into the location of undercover FBI surveillance teams, and likely the actual substance of FBI communications, according to former officials. They provided the Russians opportunities to potentially shake off FBI surveillance and communicate with sensitive human sources, check on remote recording devices and even gather intelligence on their FBI pursuers, the former officials said.

“When we found out about this, the light bulb went on — that this could be why we haven’t seen [certain types of] activity” from known Russian spies in the United States, said a former senior intelligence official.

The compromise of FBI systems occurred not long after the White House’s 2010 decision to arrest and expose a group of “illegals” – Russian operatives embedded in American society under deep non-official cover – and reflected a resurgence of Russian espionage. Just a few months after the illegals pleaded guilty in July 2010, the FBI opened a new investigation into a group of New York-based undercover Russian intelligence officers. These Russian spies, the FBI discovered, were attempting to recruit a ring of U.S. assets — including Carter Page, an American businessman who would later act as an unpaid foreign policy adviser to Donald Trump’s 2016 presidential campaign.

The breaches also spoke to larger challenges faced by U.S. intelligence agencies in guarding the nation’s secrets, an issue highlighted by recent revelations, first published by CNN, that the CIA was forced to extract a key Russian asset and bring him to the U.S. in 2017. The asset was reportedly critical to the U.S. intelligence community’s conclusion that Russian President Vladimir Putin had personally directed the interference in the 2016 presidential election in support of Donald Trump.

Yahoo spoke about these previously unreported technical breaches and the larger government debates surrounding U.S. policies toward Russia with more than 50 current and former intelligence and national security officials, most of whom requested anonymity to discuss sensitive operations and internal discussions. While the officials expressed a variety of views on what went wrong with U.S.-Russian relations, some said the United States at times neglected to appreciate the espionage challenge from Moscow, and paid a significant price for a failure to prioritize technical threats.

“When I was in office, the counterintelligence business was … focused entirely on its core concern, which is insider threats, and in particular mole hunting,” said Joel Brenner, the head of U.S. counterintelligence and strategy from 2006 to 2009. “This is, in fact, the core risk and it’s right that it should be the focus. But we were neither organized nor resourced to deal with counterintelligence in networks, technical networks, electronic networks.”

The discovery of Russia’s newfound capacity to crack certain types of encryption was particularly unnerving, according to former U.S. officials.

“Anytime you find out that an adversary has these capabilities, it sets off a ripple effect,” said a former senior national security official. “The Russians are able to extract every capability from any given technology. … They are singularly dangerous in this area.”

The FBI’s discovery of these compromises took place on the heels of what many hoped would be a breakthrough between Washington and Moscow — the Obama administration’s 2009 “reset” initiative, which sought to improve U.S.-Russia relations. Despite what seemed to be some initial progress, the reset soon went awry.

In September 2011, Vladimir Putin announced the launch of his third presidential campaign, only to be confronted during the following months by tens of thousands of protesters accusing him of electoral fraud. Putin, a former intelligence officer, publicly accused then-Secretary of State Hillary Clinton of fomenting the unrest.

It was around this time that Putin’s spies in the United States, operating under diplomatic cover, achieved what a former senior intelligence official called a “stunning” technical breakthrough, demonstrating their relentless focus on the country they’ve long considered their primary adversary.

That effort compromised the encrypted radio systems used by the FBI’s mobile surveillance teams, which track the movements of Russian spies on American soil, according to more than half a dozen former senior intelligence and national security officials. Around the same time, Russian spies also compromised the FBI teams’ backup communications systems — cellphones outfitted with “push-to-talk” walkie-talkie capabilities. “This was something we took extremely seriously,” said a former senior counterintelligence official.

The Russian operation went beyond tracking the communications devices used by FBI surveillance teams, according to four former senior officials. Working out of secret “listening posts” housed in Russian diplomatic and other government-controlled facilities, the Russians were able to intercept, record and eventually crack the codes to FBI radio communications.

Russians leave country retreats in the U.S., ordered out ...

Some of the clandestine eavesdropping annexes were staffed by the wives of Russian intelligence officers, said a former senior intelligence official. That operation was part of a larger sustained, deliberate Russian campaign targeting secret U.S. government communications throughout the United States, according to former officials.

The Spy Next Door: What Went On in Russia's Shuttered U.S ...

The two Russian government compounds in Maryland and New York closed in 2016 played a role in the operation, according to three former officials. They were “basically being used as signals intelligence facilities,” said one former senior national security official.

Russia to U.S.: Return Seized Diplomatic Compounds, or Else

Russian spies also deployed “mobile listening posts.” Some Russian intelligence officers, carrying signals intelligence gear, would walk near FBI surveillance teams. Others drove vans full of listening equipment aimed at intercepting FBI teams’ communications. For the Russians, the operation was “amazingly low risk in an angering way,” said a former senior intelligence official.

The FBI teams were using relatively lightweight radios with limited range, according to former officials. These low-tech devices allowed the teams to move quickly and discreetly while tracking their targets, which would have been more difficult with clunkier but more secure technology, a former official said. But the outdated radios left the teams’ communications vulnerable to the Russians. “The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,” said the former official.

A former senior counterintelligence official blamed the compromises on a “hodgepodge of systems” ineffective beyond the line of sight. “The infrastructure that was supposed to be built, they never followed up, or gave us the money for it,” said the former official. “The intelligence community has never gotten an integrated system.”

The limitations of the radio technology, said the former senior officials, led the FBI’s surveillance personnel to communicate on the backup systems.

“Eventually they switched to push-to-talk cellphones,” said a former counterintelligence executive. “The tech guys would get upset by that, because if they could intercept radio, they might be able to intercept telephones.”

That is indeed what happened. Those devices were then identified and compromised by Russian intelligence operatives. (A number of other countries’ surveillance teams — including those from hostile services — also transitioned from using radios to cellphones during this time, noted another former official.)

U.S. intelligence officials were uncertain whether the Russians were able to unscramble the FBI conversations in real time. But even the ability to decrypt them later would have given the Russians critical insights into FBI surveillance practices, including “call signs and locations, team composition and tactics,” said a former intelligence official.

U.S. officials were also unsure about how long the Russians had been able to decipher FBI communications before the bureau realized what was happening. “There was a gap between when they were really onto us, and when we got onto them,” said a former senior intelligence official.

Even after they understood that the Russians had compromised the FBI teams’ radios, U.S. counterintelligence officials could not agree on how they had done it. “The intel reporting was they did break our codes or got their hands on a radio and figured it out,” said a former senior intelligence official. “Either way, they decrypted our comms.”

Officials also cautioned, however, that the Russians could only crack moderately encrypted communications, not the strongest types of encryption used by the U.S. government for its most sensitive transmissions. It was nonetheless “an incredible intelligence success” for the Russians, said the former senior official.

While the Russians may have developed this capability by themselves, senior counterintelligence officials also feared that someone from within the U.S. government — a Russian mole — may have helped them, said former officials. “You’re wondering, ‘If this is true, and they can do this, is this because someone on the inside has given them that information?’’ said another former senior intelligence official.

Russia has a clear interest in concealing how it gets its information, further muddying the waters. According to a former senior CIA officer who served in Moscow, the Russians would often try to disguise a human source as a technical penetration. Ultimately, officials were unable to pinpoint exactly how the Russians pulled off the compromise of the FBI’s systems.

Mark Kelton, who served as the chief of counterintelligence at the CIA until he retired in 2015, declined to discuss specific Russian operations, but he told Yahoo News that “the Russians are a professionally proficient adversary who have historically penetrated every American institution worth penetrating.”

This remains a core worry for U.S. spy hunters. The number of ongoing espionage investigations into U.S. government personnel — at the CIA, the FBI and elsewhere — including those potentially recruited by Russia, “is not a little, it’s a lot,” said another former senior counterintelligence official.

Once the compromises of FBI communications devices were confirmed, U.S. officials scrambled to minimize the exposure of mobile surveillance team operations, quickly putting countermeasures in place, according to former senior officials. There was a “huge concern” about protecting the identities of the individuals on the teams — an elite, secret group — said the former senior counterintelligence official. U.S. officials also conducted a damage assessment and repeatedly briefed select White House officials and members of Congress about the compromise.

After the FBI discovered that its surveillance teams’ cellphones had been compromised, they were forced to switch back to encrypted radios, purchasing different models, according to two former officials. “It was an expensive venture,” said one former counterintelligence official.

But the spying successes went both ways. The U.S. intelligence community collected its own inside information to conclude that the damage from the compromises had been limited, partly due to the Russians’ efforts to keep their intelligence coup secret, according to a former senior intelligence official. “The Russians were reticent to take steps [that might reveal] that they’d figured it out,” the former senior official said.

Even so, the costs to U.S. intelligence were significant. Spooked by the discovery that its surveillance teams’ communications had been compromised, the FBI worried that some of its assets had been blown, said two former senior intelligence officials. The bureau consequently cut off contact with some of its Russian sources, according to one of those officials.

At the time of the compromise, some of the FBI’s other Russian assets stopped cooperating with their American handlers. “There were a couple instances where a recruited person had said, ‘I can’t meet you anymore,’” said a former senior intelligence official. In a damage assessment conducted around 2012, U.S. intelligence officials concluded the events may have been linked.

The impact was not limited to the FBI. Alerted by the bureau to concerns surrounding Russia’s enhanced interception capabilities, the CIA also ceased certain types of communications with sources abroad, according to a former senior CIA official. The agency “had to resort to a whole series of steps” to ensure the Russians weren’t able to eavesdrop on CIA communications, the former senior official said. There was a “strong hint” that these newly discovered code-breaking capabilities by Russia were also being used abroad, said another former senior intelligence official.

The CIA has long been wary of Russian spies’ eavesdropping efforts outside of the United States, especially near U.S. diplomatic facilities. U.S. officials have observed Russian technical officers repeatedly walking close to those compounds with packages in their hands, or wearing backpacks, or pushing strollers, or driving by in vehicles — all attempts, U.S. officials believe, to collect information on the different signals emanating from the facilities. While the tools used by the Russians for these activities were “a bit antiquated,” said a former senior CIA official, they were still a “constant concern.”

It’s not unusual for intelligence officers operating from diplomatic facilities, including the United States’s own operatives, to try and intercept the communications of the host nation. “You had to find ways to attack their surveillance,” said Rolf Mowatt-Larssen, former head of counterintelligence at the Department of Energy and a former CIA officer who first served in Moscow in the 1980s. “The Russians do everything in the U.S. that we did in Moscow.”

Indeed, the focus on cracking radio communications was no different.

“We put extraordinary effort into intercepting and monitoring the FSB surveillance radio networks for the purpose of understanding whether our officers were under surveillance or not,” said another former senior CIA officer who also served in Moscow.

The discovery of the Russians’ new code-breaking capabilities came at a time when gathering intelligence on Russia and its leaders’ intentions was of particular importance to the U.S. government. U.S. national security officials working on Russia at the time received rigorous security training on how to keep their digital devices secure, according to two former senior officials. One former U.S. official recalled how during the negotiations surrounding the reset, NSC officials, partially tongue in cheek, “would sometimes say things on the phone hoping [they] were communicating things to the Russians.”

According to a former CIA official and a former national security official, the CIA’s analysts often disagreed about how committed Russia was to negotiations during the attempted reset and how far Putin would go to achieve his strategic aims, divergences that confused the White House and senior policy makers.

“It caused a really big rift within the [National Security Council] on how seriously they took analysis from the agency,” said the former CIA official. Senior administration leaders “went along with” some of the more optimistic analysis on the future of U.S.-Russia relations “in the hopes that this would work out,” the official continued.

Those disagreements were part of a “reset hangover” that persisted, at least for some inside the administration, until the 2016 election meddling, according to a former senior national security official. Those officials clung to the hope that Washington and Moscow could cooperate on key issues, despite aggressive Russian actions ranging from the invasion of Ukraine to its spying efforts.

“We didn’t understand that they were at political war with us already in the second term once Putin was reelected and Obama himself was reelected,” said Evelyn Farkas, the former deputy assistant secretary of defense for Russia, Ukraine, and Eurasia during the Obama administration.

As high-level hopes for the U.S.-Russia “reset” withered, concerns about the threat of Russian spying made their way to Capitol Hill. Top officials at the FBI and CIA briefed key members of Congress on counterintelligence issues related to Russia, according to current and former U.S. officials. These included briefings on the radio compromises, said two former senior officials.

Mike Rogers, a former Republican lawmaker from Michigan who chaired the House Permanent Select Committee on Intelligence from 2011 to 2015, alluded to counterintelligence concerns at a conference earlier this year in Washington, D.C.

One of those concerns was a massive intelligence failure related to the secret internet-based communications system the CIA used to communicate with agents. The extent of that failure, first reported publicly by Yahoo News in 2018, got the attention of Congress earlier.

But the problems were broader than that issue, according to Rogers.

“Our counterintelligence operations needed some adjustments,” said Rogers, adding that he and his Democratic counterpart from Maryland, Dutch Ruppersberger, requested regular briefings on the subject from agency representatives. “We started out monthly until we just wore them out, then we did it quarterly to try to make sure that we had the right resources and the right focus for the entire community on counter[intelligence].”

Rogers later told Yahoo News that his request for the briefings had been prompted by “suspected penetrations, both physical and technical, which is the role of those [Russian and Chinese] intelligence services,” but declined to be more specific.

The former committee chairman said he wanted the intelligence community to make counterintelligence a higher priority. “Counterintelligence was always looked at as the crazy uncle at the party,” he said. “I wanted to raise it up and give it a robust importance.”

The briefings, which primarily involved counterintelligence officials from the FBI and CIA and were limited to the committee leadership and staff directors, led to “some useful inquiries to help focus the intelligence community,” Rogers said. The leaders of the Senate Select Committee on Intelligence were also included in some of the inquiries, according to Rogers and a current U.S. government official.

Spokespeople for the current House and Senate intelligence committees did not respond to a request for comment. The FBI and CIA declined to comment. The Russian Embassy in Washington, D.C. did not respond to a request for comment.

The briefings were designed to “get the counterintelligence house in order,” said Jamil Jaffer, senior counsel at the House intelligence committee from 2011 to 2013, and to ensure that Congress and the intelligence agencies were “on the same page” when it came to such matters. “There were some concerns about what the agencies were doing, there were some concerns about what Congress knew, and all of these issues, of course, had China-Russia implications.”

Rogers and Jaffer declined to provide further details about what specific counterintelligence issues the committee was addressing, but other former officials indicated that worries weren’t limited to the compromise of FBI radio systems. Senior U.S. officials were contemplating an even more disturbing possibility: that the Russians had found a way to penetrate the communications of the U.S. intelligence community’s most sensitive buildings in and around Washington, D.C.

Suspected Russian intelligence officers were seen conspicuously loitering along the road that runs alongside the CIA’s headquarters, according to former senior intelligence officials. “Russian diplomats would be sitting on Route 123, sometimes in cars with diplomatic plates, other times not,” a former senior intelligence executive said. “We thought, they’re out doing something. It’s not just taking down license plates; those guys are interrogating the system.”

Though this behavior dated back at least to the mid-2000s, former officials said those activities persisted simultaneously with the compromise of the FBI’s communication system. And these were not the only instances of Russian intelligence operatives staking out locations with a line of sight to CIA headquarters. They were “fixated on being in neighborhoods” that gave them exposure to Langley, said a former senior official.

Over time, U.S. intelligence officials became increasingly concerned that Russian spies might be attempting to intercept communications from key U.S. intelligence facilities, including the CIA and FBI headquarters. No one knew if the Russians had actually succeeded.

“The question was whether they had capabilities to penetrate our comms at Langley,” said a former senior CIA official. In the absence of any proof that that was the case, the working theory was that the Russian activities were provocations designed to sow uncertainty within the CIA. “We came to the conclusion that they were trying to get into our heads,” the former senior official said.

A major concern was that Russian spies with physical proximity to sensitive U.S. buildings might be exfiltrating pilfered data that had “jumped the air gap,” i.e., that the Russians were collecting information from a breach of computers not connected to the Internet, said former officials.

One factor behind U.S. intelligence officials’ fears was simple: The CIA had already figured out how to perform similar operations themselves, according to a former senior CIA officer directly familiar with the matter. “We felt it was pretty revolutionary stuff at the time,” the former CIA officer said. “It allowed us to do some extraordinary things.”

While no one definitively concluded that the Russians had actually succeeded in penetrating Langley’s communications, those fears, combined in part with the breach of the bureau’s encrypted radio system, drove an effort by U.S. intelligence officials around 2012 to fortify sensitive Washington-area government buildings against potential Russian snooping, according to four former officials.

At key government facilities in the Washington area, entire floors were converted to sensitive compartmented information facilities, or SCIFs. These are specially protected areas designed to be impenetrable to hostile signals intelligence gathering.

The normal assumption was that work done in a SCIF would be secure, but doubts arose about the safety of even those rooms. “The security guys would say, your windows are ‘tempested’”—that is, protected against the interception of emissions radiating from electronic equipment in the building —“you’re in a SCIF, it’s fine,” a former senior counterintelligence executive recalled. “The question was, ‘Is it true?’”

Increasingly, U.S. officials began to fear it was not.

New security practices were instituted in sensitive government facilities like the FBI and CIA headquarters, according to former officials. “It required many procedural changes on our part to make sure we were not susceptible to penetrations,” said a former senior CIA official. These included basic steps such as moving communication away from windows and changing encryption codes more frequently, as well as more expensive adjustments, said four former officials.

Revelations about the Russian compromise of the radio systems, recalled a former senior intelligence official, “kick-started the money flowing” to upgrade security.

While the breaches of the FBI communications systems appeared to finally spur Congress and the intelligence agencies to adopt steps to counter increasingly sophisticated Russian eavesdropping, it took the Putin-directed interference in the 2016 election to get the White House to expel at least some of those officials deemed responsible for the breaches, and to shut down the facilities that enabled them.

Even then, the decision was controversial. Some in Washington worried about retribution by the Russians and exposure of American intelligence operations, according to a former senior U.S. national security official directly involved in the discussions. The FBI consistently supported expulsions, said another former national security official.

More than two years later, the Russian diplomatic compounds used in the FBI communications compromises remain shuttered. The U.S. government has prevented many of the Russian spies expelled by the United States from returning, according to national security experts and senior foreign intelligence officials. “They are slowly creeping back in, but [the] FBI makes it hard,” said a senior foreign intelligence official. “The old guard is basically screwed. They need to bring in a whole new generation.”

In the meantime, those familiar with Russian operations warn that the threat from Moscow is far from over. “Make no mistake, we’re in an intelligence war with the Russians, every bit as dangerous as the Cold War,” said a former senior intelligence officer. “They’re trying all the time … and we caught them from time to time,” he said. Of course, he added, “you don’t know what you don’t know.”

That’s the same message that special counsel Robert Mueller tried to convey during the highly contentious hearings to discuss his report on Russian interference in the 2016 election. “They are doing it as we sit here, and they expect to do it during the next campaign,” Mueller told lawmakers on the House Intelligence Committee about covert Russian involvement in U.S. politics.

But a number of observers believe Mueller’s message about the threat from Russia was largely lost amid a partisan battle on Capitol Hill over President Trump.

During his Washington conference appearance earlier this year, Rogers, the former chair of the House Intelligence Committee, also lamented that the current politicized state of the intelligence committees would make spy agencies more hesitant to admit their failures.

“They’re not going to call you to say, ‘I screwed up.’ They’re going to say, ‘God, I hope they don’t find that,’” he said. “That’s what’s going to happen. I’ll guarantee it’s happening today.”

What Can Be Purchased at Canadian RX Pharmacies?
The best thing about Canadian drugstores is the abundance of medications they offer to their clients. As a rule, at such websites, you may find effective remedies or medical solutions to any kind of disorders, which refers to not just RX medications available on prescription, but also personal care products, vitamins and nutritional supplements. Canadian pharmacy Canadapharmrxon.com even offer a broad assortment of generic medications which are just as good as prescription drugs but are available at a more affordable price. So, what can be found at Canadian drugstores? Here is a list of the most popular options:
Anti-inflammatory medicines;
Medicines to fight infectious diseases such as antibiotics;
Antipsychotic drugs and other mental health solutions;
Men’s health goods;
Women’s skin care products;
High blood pressure solutions;
Weight control medicines;
Personal care products;
Drugs to treat stomach disorders;
Over-the-counter medicines such as herbal drugs or supplements.