198 Million US Voters Exposed, Vulnerable/Hearing Scheduled

Deep Root Analytics behind data breach on 198 million US voters: security firm

Anyone with an internet connection was able to access a huge database of personal information on US voters ahead of 2016 elections, a security firm says. The database helped the Republican Party’s presidential campaign.

A data analytics firm that helped US President Donald Trump’s election campaign exposed personal information on 198 million Americans, a security firm revealed on Monday.

Chris Vickery, a researcher at the consultancy Upguard, discovered a misconfigured database containing information on almost every registered US voter compiled by data analytics company Deep Root Analytics.

The information was used by the Republican National Committee to help win the 2016 presidential race.

The database contained “names, dates of birth, home addresses, phone numbers, and voter registration details,” as well as data described as predicted data about voter behavior on policy preferences and likelihood of choosing a particular candidate.

Upguard said the database “lacked any protection against access” and was available to “anyone with an internet connection.”

It described it as “a treasure trove of political data and modeled preferences used by the Trump campaign.” It said the information was used to help influence potential voters and accurately predict their behavior.

Deep Root takes responsibility

Deep Root released statements confirming that files were accessed without its knowledge. “The data that was accessed was, to the best of our knowledge, this proprietary information as well as voter data that is publicly available and readily provided by state government offices,” the statement said.

“Since this event has come to our attention, we have updated the access settings and put protocols in place to prevent further access.  We take full responsibility for this situation.”

“We do not believe that our systems have been hacked. To date, the only entity that we are aware of that had access to the data was Chris Vickery,” it added.

Data breach hunter

Analyst Chris Vickery, a self-described “data-breach hunter,” last year discovered a breach of 191 million voter records in Mexico. Upguard said the latest leak was the largest known breach of voter data in history, with the equivalent of 10 billion pages of text.

It said the database modeled voters’ position on almost 50 different issues with the files offering insights into the algorithmic strategy used by Trump’s campaign to target voters.

The exposure “raises significant questions about the privacy and security Americans can expect for their most privileged information,” the researchers said.

“It also comes at a time when the integrity of the US electoral process has been tested by a series of cyberassaults against state voter databases, sparking concern that cyber risk could increasingly pose a threat to our most important democratic and governmental institutions.”

Meanwhile:  Image result for electronic voting

A research group in New Jersey has taken a fresh look at postelection polling data and concluded that the number of noncitizens voting illegally in U.S. elections is likely far greater than previous estimates.

As many as 5.7 million noncitizens may have voted in the 2008 election, which put Barack Obama in the White House.

The research organization Just Facts, a widely cited, independent think tank led by self-described conservatives and libertarians, revealed its number-crunching in a report on national immigration.

Just Facts President James D. Agresti and his team looked at data from an extensive Harvard/YouGov study that every two years questions a sample size of tens of thousands of voters. Some acknowledge they are noncitizens and are thus ineligible to vote.

Just Facts’ conclusions confront both sides in the illegal voting debate: those who say it happens a lot and those who say the problem nonexistent.

In one camp, there are groundbreaking studies by professors at Old Dominion University in Virginia who attempted to compile scientifically derived illegal voting numbers using the Harvard data, called the Cooperative Congressional Election Study.

On the other side are the professors who conducted the study and contended that “zero” noncitizens of about 18 million adults in the U.S. voted. The liberal mainstream media adopted this position and proclaimed the Old Dominion work was “debunked.”

The ODU professors, who stand by their work in the face of attacks from the left, concluded that in 2008 as few as 38,000 and as many as 2.8 million noncitizens voted.

Mr. Agresti’s analysis of the same polling data settled on much higher numbers. He estimated that as many as 7.9 million noncitizens were illegally registered that year and 594,000 to 5.7 million voted.

These numbers are more in line with the unverified estimates given by President Trump, who said the number of ballots cast by noncitizens was the reason he lost the popular vote to Hillary Clinton.

Last month, the president signed an executive order setting up a commission to try to find on-the-ground truth in illegal voting. Headed by Vice President Mike Pence, the panel also will look at outdated voter lists across the nation with names of dead people and multiple registrants.

For 2012, Just Facts said, 3.2 million to 5.6 million noncitizens were registered to vote and 1.2 million to 3.6 million of them voted.

Mr. Agresti lays out his reasoning in a series of complicated calculations, which he compares to U.S. Census Bureau figures for noncitizen residents. Polls show noncitizens vote overwhelmingly Democratic.

“The details are technical, but the figure I calculated is based on a more conservative margin of sampling error and a methodology that I consider to be more accurate,” Mr. Agresti told The Washington Times.

He believes the Harvard/YouGov researchers based their “zero” claim on two flawed assumptions. First, they assumed that people who said they voted and identified a candidate did not vote unless their names showed up in a database.

“This is illogical, because such databases are unlikely to verify voters who use fraudulent identities, and millions of noncitizens use them,” Mr. Agresti said.

He cites government audits that show large numbers of noncitizens use false IDs and Social Security numbers in order to function in the U.S., which could include voting.

Second, Harvard assumed that respondent citizens sometimes misidentified themselves as noncitizens but also concluded that noncitizens never misidentified themselves as citizens, Mr. Agresti said.

“This is irrational, because illegal immigrants often claim they are citizens in order to conceal the fact that they are in the U.S. illegally,” he said.

Some of the polled noncitizens denied they were registered to vote when publicly available databases show that they were, he said.

This conclusion, he said, is backed by the Harvard/YouGov study’s findings of consumer and vote data matches for 90 percent of participants but only 41 percent of noncitizen respondents.

As to why his numbers are higher than the besieged ODU professors’ study, Mr. Agresti said: “I calculated the margin of sampling error in a more cautious way to ensure greater confidence in the results, and I used a slightly different methodology that I think is more accurate.”

There is hard evidence outside of polling that noncitizens do vote. Conservative activists have conducted limited investigations in Maryland and Virginia that found thousands of aliens were registered.

These inquiries, such as comparing noncitizen jury pool rejections to voter rolls, captured just a snapshot. But conservatives say they show there is a much broader problem that a comprehensive probe by the Pence commission could uncover.

The Public Interest Legal Foundation, which fights voter fraud, released one of its most comprehensive reports last month.

Its investigation found that Virginia removed more than 5,500 noncitizens from voter lists, including 1,852 people who had cast more than 7,000 ballots. The people volunteered their status, most likely when acquiring driver’s licenses. The Public Interest Legal Foundation said there are likely many more illegal voters on Virginia’s rolls who have never admitted to being noncitizens.

Here comes the Congressional hearing: Image result for electronic voting NYTimes

The Senate Intelligence Committee will hold a hearing on U.S. election security Wednesday.

Sen. Mark Warner (D-Va.), who is a part of that probe into alleged Russian meddling, will be playing a leading role. Warner says there are states that have not publicly come forward to share that the Russians tried to hack their elections in 2016.

“I’m not trying to embarrass any state. I just want to make sure that Americans realize how serious this threat is,” Warner said.

Warner is working with Sen. Richard Burr (R-N.C.) this week to learn more about the nation’s election systems.

Hearings this week on Capitol Hill will cover Russia’s cyber efforts during the 2016 race, America’s response efforts, and potential threats to future elections.

“We have elections obviously this year in Virginia. I want to make sure that the integrity of our election system is safe from hacking and I’m not sure we’re fully prepared,” Warner said.

While Warner says Russia was not able to change any vote totals, more steps must be taken.

“If you can get into the overall statewide voter file, you could do some mischief. So I just want to make sure that we’re on guard,” Warner said.

One issue Warner raises is that if states faced hacking attempts in 2016, the federal government views them as a victim, and it’s up to the state to come forward.

“It’s up to the state to be willing to volunteer that. I don’t think that’s smart, is it in our country’s security to keep secret the fact that it was literally many many more states?” Warner said.

Virginia just held primaries last week, and now it’s time for the commonwealth to prepare for the general election in the fall.

“We’ve got to redouble our efforts to make sure that our most critical democratic process of free and fair elections continue to be free, fair and non-disputable,” Warner said.

Wednesday’s hearing is set to begin at 9:30 a.m. in Washington, D.C.

 

 

Senate Hearing to Protect Election Systems from Russia

At least there is a hearing to begin the discussion to harden the software systems related to election processes from further intrusions as 2018 and 2020 approaches.

Russia. Russia is a full-scope cyber actor that will remain a major threat to US Government, military, diplomatic, commercial, and critical infrastructure. Moscow has a highly advanced offensive cyber program, and in recent years, the Kremlin has assumed a more aggressive cyber posture. This aggressiveness was evident in Russia’s efforts to influence the 2016 US election, and we assess that only Russia’s senior-most officials could have authorized the 2016 US election-focused data thefts and disclosures, based on the scope and sensitivity of the targets. Outside the United States, Russian actors have conducted damaging and disruptive cyber attacks, including on critical infrastructure networks. In some cases, Russian intelligence actors have masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack. Russia has also leveraged cyberspace to seek to influence public opinion across Europe and Eurasia. We assess that Russian cyber operations will continue to target the United States and its allies to gather intelligence, support Russian decisionmaking, conduct influence operations to support Russian military and political objectives, and prepare the cyber environment for future contingencies.

Furthermore:

Military and Intelligence. Russia aims to improve intelligence collection, missile warning, and military communications systems to better support situational awareness and tactical weapons targeting. Russian plans to expand its imagery constellation and double or possibly triple the number of satellites by 2025. China intends to continue increasing its space-based military and intelligence capabilities to improve global situational awareness and support complex military operations. Many countries in the Middle East, Southeast Asia, and South America are purchasing dual-use imaging satellites to support strategic military activities, some as joint development projects.

Space Warfare. We assess that Russia and China perceive a need to offset any US military advantage derived from military, civil, or commercial space systems and are increasingly considering attacks against satellite systems as part of their future warfare doctrine. Both will continue to pursue a full range of anti-satellite (ASAT) weapons as a means to reduce US military effectiveness. In late 2015, China established a new service—the PLA Strategic Support Force—probably to improve oversight and command of Beijing’s growing military interests in space and cyberspace. Russia and China remain committed to developing capabilities to challenge perceived adversaries in space, especially the United States, while publicly and diplomatically promoting nonweaponization of space and “no first placement” of weapons in space. Such commitment continues despite ongoing US and allied diplomatic efforts to dissuade expansion of threats to the peaceful use of space, including international engagements through the UN.

Counterspace Weapons. The global threat of electronic warfare (EW) attacks against space systems will expand in the coming years in both number and types of weapons. Development will very likely focus on jamming capabilities against dedicated military satellite communications (SATCOM), Synthetic Aperture Radar (SAR) imaging satellites, and enhanced capabilities against Global Navigation Satellite Systems (GNSS), such as the US Global Positioning System (GPS). Blending of EW and cyber-attack capabilities will likely expand in pursuit of sophisticated means to deny and degrade information networks. Chinese researchers have discussed methods to enhance robust jamming capabilities with new systems to jam commonly used frequencies. Russia intends to modernize its EW forces and field a new generation of EW weapons by 2020. Iran and North Korea are also enhancing their abilities to disrupt military communications and navigation.

Some new Russian and Chinese ASAT weapons, including destructive systems, will probably complete development in the next several years. Russian military strategists likely view counterspace weapons as an integral part of broader aerospace defense rearmament and are very likely pursuing a diverse suite of capabilities to affect satellites in all orbital regimes. Russian lawmakers have promoted military pursuit of ASAT missiles to strike low-Earth orbiting satellites, and Russia is testing such a weapon for eventual deployment. A Russian official also acknowledged development of an aircraft-launched missile capable of destroying satellites in low-Earth orbit. Ten years after China intercepted one of its own satellites in low-Earth orbit, its ground-launched ASAT missiles might be nearing operational service within the PLA. Both countries are advancing directed energy weapons technologies for the purpose of fielding ASAT systems that could blind or damage sensitive space-based optical sensors. Russia is developing an airborne laser weapon for use against US satellites. Russia and China continue to conduct sophisticated on-orbit satellite activities, such as rendezvous and proximity operations, at least some of which are likely intended to test dual-use technologies with inherent counterspace functionality. For instance, space robotic technology research for satellite servicing and debris-removal might be used to damage satellites. Such missions will pose a particular challenge in the future, complicating the US ability to characterize the space environment, decipher intent of space activity, and provide advance threat warning.

In 2017, Russia is likely to be more assertive in global affairs, more unpredictable in its approach to the United States, and more authoritarian in its approach to domestic politics. Emboldened by Moscow’s ability to affect battlefield dynamics in Syria and by the emergence of populist and more pro-Russian governments in Europe, President Vladimir Putin is likely to take proactive actions that advance Russia’s great power status.

Putin will seek to prevent any challenges to his rule in the runup to presidential elections scheduled for 2018. Putin remains popular at home, but low turnout in the Duma elections in 2016 and sustained economic hardship will probably enhance Putin’s concerns about his ability to maintain control. Putin is likely to continue to rely on repression, state control over media outlets, and harsh tactics to control the political elite and stifle public dissent.

Russia is likely to emerge from its two-year recession in 2017, but the prospects for a strong recovery are slim. Russia is likely to achieve 1.3 percent GDP growth in 2017 and 1.7 percent in 2018, according to commercial forecasts. Putin has long sought to avoid structural reforms that would weaken his control of the country and is unlikely to implement substantial reforms before the presidential elections.

Russia is likely to emerge from its two-year recession in 2017, but the prospects for a strong recovery are slim. Russia is likely to achieve 1.3 percent GDP growth in 2017 and 1.7 percent in 2018, according to commercial forecasts. Putin has long sought to avoid structural reforms that would weaken his control of the country and is unlikely to implement substantial reforms before the presidential elections.

We assess that Russia will continue to look to leverage its military support to the Asad regime to drive a political settlement process in Syria on its terms. Moscow has demonstrated that it can sustain a modest force at a high-operations tempo in a permissive, expeditionary setting while minimizing Russian casualties and economic costs. Moscow is also likely to use Russia’s military intervention in Syria, in conjunction with efforts to capitalize on fears of a growing ISIS and extremist threat, to expand its role in the Middle East.

We assess that Moscow’s strategic objectives in Ukraine—maintaining long-term influence over Kyiv and frustrating Ukraine’s attempts to integrate into Western institutions—will remain unchanged in 2017. Putin is likely to maintain pressure on Kyiv through multiple channels, including through Russia’s actions in eastern Ukraine, where Russia arms so-called “separatists. Moscow also seeks to undermine Ukraine’s fragile economic system and divided political situation to create opportunities to rebuild and consolidate Russian influence in Ukrainian decisionmaking.

Moscow will also seek to exploit Europe’s fissures and growing populist sentiment in an effort to thwart EU sanctions renewal, justify or at least obfuscate Russian actions in Ukraine and Syria, and weaken the attraction of Western integration for countries on Russia’s periphery. In particular, Russia is likely to sustain or increase its propaganda campaigns. Russia is likely to continue to financially and politically support populist and extremist parties to sow discord within European states and reduce popular support for the European Union. More here from ODNI.

 

 

Kislyak’s Party, Sanctions and 39 U.S. States

Yup, it IS Russia, Russia, Russia. Why because Putin’s playbook is working and so many in America are useful dupes and unwitting accomplices. Does that include you?

Well it does include U.S. diplomats attending a party hosted by Russian Ambassador Sergei Kislyak for the sake of photos and social media. Were you there Monday night? It was a propaganda operation that included Russian intelligence officials as well.

Image result for russian embassy washington dc

Embattled Russian diplomat Sergey Kislyak played host to Washington insiders and diplomats at the Russian Embassy Monday night, greeting guests one-by-one in a long receiving line at the embassy in honor of Russia Day. Attendees were encouraged to pose for photos with signs that said “I love Russia” and post them on Facebook, Instagram and other social networks.

The frayed U.S.-Russia relationship was clearly on the embassy’s mind as they handed out a pamphlet highlighting the two countries’ close relationship. On the cover: “As an American, I love Russia – friend of Washington and Lincoln.” At the top of the second page, there was this: “As an American, I love Russia because if not for Russia, there may not have been a United States of America.”

Meanwhile, many Senators came together in a bipartisan fashion for a major piece of legislation on sanctions against Russia.

The Senate has clinched a wide-ranging bipartisan agreement to slap new financial penalties on Russia and limit President Trump’s ability to lift sanctions without giving Congress a chance to weigh in.

“It’s as comprehensive as we could make it, and it’s going to be a very good piece of legislation,”

The agreement imposes new sanctions including “malicious cyber activity” on behalf of Moscow, individuals supplying weapons to Syrian President Bashar Assad’s government or individuals tied to Russia’s intelligence and defense sectors. More here.

So, how bad was this hacking/phishing scheme launched by Russia? Much wider than previously know. Some explain all this to Tucker Carlson.

Russian Cyber Hacks on U.S. Electoral System Far Wider Than Previously Known

Bloomberg: Russia’s cyberattack on the U.S. electoral system before Donald Trump’s election was far more widespread than has been publicly revealed, including incursions into voter databases and software systems in almost twice as many states as previously reported.

In Illinois, investigators found evidence that cyber intruders tried to delete or alter voter data. The hackers accessed software designed to be used by poll workers on Election Day, and in at least one state accessed a campaign finance database. Details of the wave of attacks, in the summer and fall of 2016, were provided by three people with direct knowledge of the U.S. investigation into the matter. In all, the Russian hackers hit systems in a total of 39 states, one of them said.

The scope and sophistication so concerned Obama administration officials that they took an unprecedented step — complaining directly to Moscow over a modern-day “red phone.” In October, two of the people said, the White House contacted the Kremlin on the back channel to offer detailed documents of what it said was Russia’s role in election meddling and to warn that the attacks risked setting off a broader conflict.

The new details, buttressed by a classified National Security Agency document recently disclosed by the Intercept, show the scope of alleged hacking that federal investigators are scrutinizing as they look into whether Trump campaign officials may have colluded in the efforts. But they also paint a worrisome picture for future elections: The newest portrayal of potentially deep vulnerabilities in the U.S.’s patchwork of voting technologies comes less than a week after former FBI Director James Comey warned Congress that Moscow isn’t done meddling.

“They’re coming after America,” Comey told the Senate Intelligence Committee investigating Russian interference in the election. “They will be back.”

A spokeswoman for the Federal Bureau of Investigation in Washington declined to comment on the agency’s probe.

Kremlin Denials

Russian officials have publicly denied any role in cyber attacks connected to the U.S. elections, including a massive “spear phishing” effort that compromised Hillary Clinton’s campaign and the Democratic National Committee, among hundreds of other groups. President Vladimir Putin said in recent comments to reporters that criminals inside the country could have been involved without having been sanctioned by the Russian government.

One of the mysteries about the 2016 presidential  election is why Russian intelligence, after gaining access to state and local systems, didn’t try to disrupt the vote. One possibility is that the American warning was effective. Another former senior U.S. official, who asked for anonymity to discuss the classified U.S. probe into pre-election hacking, said a more likely explanation is that several months of hacking failed to give the attackers the access they needed to master America’s disparate voting systems spread across more than 7,000 local jurisdictions.

***

Such operations need not change votes to be effective. In fact, the Obama administration believed that the Russians were possibly preparing to delete voter registration information or slow vote tallying in order to undermine confidence in the election. That effort went far beyond the carefully timed release of private communications by individuals and parties.

One former senior U.S. official expressed concern that the Russians now have three years to build on their knowledge of U.S. voting systems before the next presidential election, and there is every reason to believe they will use what they have learned in future attacks.

Secure Channel

As the first test of a communication system designed to de-escalate cyber conflict between the two countries, the cyber “red phone” — not a phone, in fact, but a secure messaging channel for sending urgent messages and documents — didn’t quite work as the White House had hoped. NBC News first reported that use of the red phone by the White House last December.

The White House provided evidence gathered on Russia’s hacking efforts and reasons why the U.S. considered it dangerously aggressive. Russia responded by asking for more information and providing assurances that it would look into the matter even as the hacking continued, according to the two people familiar with the response.

“Last year, as we detected intrusions into websites managed by election officials around the country, the administration worked relentlessly to protect our election infrastructure,” said Eric Schultz, a spokesman for former President Barack Obama. “Given that our election systems are so decentralized, that effort meant working with Democratic and Republican election administrators from all across the country to bolster their cyber defenses.”

Illinois Database

Illinois, which was among the states that gave the FBI and the Department of Homeland Security almost full access to investigate its systems, provides a window into the hackers’ successes and failures.

In early July 2016, a contractor who works two or three days a week at the state board of elections detected unauthorized data leaving the network, according to Ken Menzel, general counsel for the Illinois board of elections. The hackers had gained access to the state’s voter database, which contained information such as names, dates of birth, genders, driver’s licenses and partial Social Security numbers on 15 million people, half of whom were active voters. As many as 90,000 records were ultimately compromised.

But even if the entire database had been deleted, it might not have affected the election, according to Menzel. Counties upload records to the state, not the other way around, and no data moves from the database back to the counties, which run the elections. The hackers had no way of knowing that when they attacked the state database, Menzel said.

The state does, however, process online voter registration applications that are sent to the counties for approval, Menzel said. When voters are added to the county rolls, that information is then sent back to the state and added to the central database. This process, which is common across states, does present an opportunity for attackers to manipulate records at their inception.

Patient Zero

Illinois became Patient Zero in the government’s probe, eventually leading investigators to a hacking pandemic that touched four out of every five U.S. states.

Using evidence from the Illinois computer banks, federal agents were able to develop digital “signatures” — among them, Internet Protocol addresses used by the attackers — to spot the hackers at work.

The signatures were then sent through Homeland Security alerts and other means to every state. Thirty-seven states reported finding traces of the hackers in various systems, according to one of the people familiar with the probe. In two others — Florida and California — those traces were found in systems run by a private contractor managing critical election systems.

(An NSA document reportedly leaked by  Reality Winner, the 25-year-old government contract worker arrested last week, identifies the Florida contractor as VR Systems, which makes an electronic voter identification system used by poll workers.)

In Illinois, investigators also found evidence that the hackers tried but failed to alter or delete some information in the database, an attempt that wasn’t previously reported. That suggested more than a mere spying mission and potentially a test run for a disruptive attack, according to the people familiar with the continuing U.S. counterintelligence inquiry.

States’ Response

That idea would obsess the Obama White House throughout the summer and fall of 2016, outweighing worries over the DNC hack and private Democratic campaign emails given to

Wikileaks and other outlets, according to one of the people familiar with those conversations. The Homeland Security Department dispatched special teams to help states strengthen their cyber defenses, and some states hired private security companies to augment those efforts.

In many states, the extent of the Russian infiltration remains unclear. The federal government had no direct authority over state election systems, and some states offered limited cooperation. When then-DHS Secretary Jeh Johnson said last August that the department wanted to declare the systems as national critical infrastructure — a designation that gives the federal government broader powers to intervene — Republicans balked. Only after the election did the two sides eventually reach a deal to make the designation.

Relations with Russia remain strained. The cyber red phone was announced in 2011 as a provision in the countries’ Nuclear Risk Reduction Centers to allow urgent communication to defuse a possible cyber conflict. In 2008, what started during the Cold War as a teletype messaging system became a secure system for transferring messages and documents over fiber-optic lines.

After the Obama administration transmitted its documents and Russia asked for more information, the hackers’ work continued. According to the leaked NSA document, hackers working for Russian military intelligence were trying to take over the computers of 122 local election officials just days before the Nov. 8 election.

While some inside the Obama administration pressed at the time to make the full scope of the Russian activity public, the White House was ultimately unwilling to risk public confidence in the election’s integrity, people familiar with those discussions said.

 

 

 

 

 

 

It is Better than Putin Planned

Timelines and context are important and must be adhered to when it comes to controversy and chaos. America and the world is full of it for sure and personally I lay blame at the feet of Barack Obama.

Let’s begin in September of 2015 shall we? ODNI James Clapper warned in not only Congressional testimony but it presidential dialing briefings to the Obama White House that the Russians had launched a cyber military command. In addition to Russia, Clapper singled out China, Iran, and North Korea as the primary nation states capable of conducting sophisticated cyber attacks and espionage.

“Politically motivated cyber attacks are now a growing reality, and foreign actors are reconnoitering and developing access to U.S. critical infrastructure systems, which might be quickly exploited for disruption if an adversary’s intent became hostile,” Clapper said in prepared remarks for the House Permanent Select Committee on Intelligence.

The testimony on Sept. 10 represents a break from past public testimony on cyber threats. Previous intelligence statements and testimony limited public mention of explicit links between nations and their cyber strikes.

Clapper revealed that Russian cyber warfare specialists are developing the capability to remotely access industrial control systems used in managing critical infrastructure. More here.

Barack Obama did nothing. Obama never established a cyber policy due to rogue countries and cyber attack. Why? Establishing committees and having hearings is theater….this is the kind of stuff that is an act of war…but read on….context, timelines, facts and perspective is noted below.

In May of 2016, Clapper tried again and then attended a breakfast and made it all know more publically. Did anyone listen then? Nope. Further, while on the campaign trail, did any candidate make this an issue? Nope.

Further, Clapper said:

“The transcendent issue here is the Russian interference in our election process, and what that means to the erosion of the fundamental fabric of our democracy,” former DNI Clapper told the Senate Judiciary Committee on May 8. “And that to me is a huge deal. And they’re going to continue to do it. And why not? It proved successful.”

Russia’s success in sowing discord perhaps makes it harder for the US to focus on and fight the cyber intrusion that officials say stole Democratic Party emails and planted false news stories about the election. The purpose of this operation was to amplify division and turmoil in US politics. Well, mission accomplished.”

Barack Obama was convinced as was Hillary she was going to win, so Russian intrusion(s) were minimized. That is until she lost. Leading however into October, Obama kinda sorta decided to get serious. This was not until it was determined by the NSA that Russia did intrude into the voting software company based in Florida known as VR Systems where attempts to phish email accounts of 100+ company officials. So Obama’s best response was to trot out DHS Secretary Jeh Johnson ordering him to visit a handful of states to be vigilant.

That was the best Obama could do? No, he should have embarrassed Russia globally as the same thing was happening in other allied countries least of which was Ukraine and later so many more in Europe. Obama should have ordered the entire United States after embarrassing Putin’s operation to go to paper ballots and state the reason(s) why.

Image result for putin military cyber hacking unit

Former ODNI Clapper recently said the matter of Russia is not the only concern, China is just as aggressive. Anyone paying attention to that? Nope. China and Russia have a cyber pact.

Image result for putin military cyber hacking unit DailyStar

Hillary lost and now Obama decides to expel Russians and shutter 2 dachas in Maryland and New York. Was that enough? Nope.

Now the media stepped in to point to Trump as having to collude with the Russians on the election system. Former FBI Director said to Trump on at least 3 occasions along with the other intelligence community leaders, such was not the case. The media stayed with it, why? Because of the secondary track of investigation and that is the collection of Trump people have undisclosed and in some cases unreported meetings with Russian officials beyond that of Russian Ambassador Sergei Kislyak. That track continues by the FBI.

Here is where at least Jeff Sessions is caught up in the snare. Sessions is in fact an honorable man as proven in his long political history. However, during his confirmation hearing for the top job at the Department of Justice, he omitted all his meetings in oral and written form. The meeting at the Mayflower Hotel is still under dispute. Why? Likely he was told too. Later, Sessions had a ‘duty to correct’ and he did. So, the recusal chatter started and later it was official. It has been reported by ‘sources’ that President Trump is furious at Sessions for his recusal. That too is suspect since those ahem…sources are unnamed. It is also reported that Sessions offered to tender his resignation over this mess, that too is suspect due to unnamed sources.

Now we have a recused AG, then later one Rod Rosenstein is confirmed at Deputy AG and the whole Russian probe fell into his lap. It never should have gotten this far if Trump himself had taken heed of his White House and outside personnel and quit tweeting and perpetuating the whole topic. Instead, his anger fired Comey. While I agree there is reason to be challenging Comey and his work as Director at the FBI least of which is the Hillary thing…one too must remember the FBI does NOT bring formal charges, but rather the DoJ does. Lynch was not going there. Comey covered for her and that was a mistake, until later Lynch abused that chain of command and met with Bill Clinton on the tarmac and told Comey to assume political speak with regard to investigation, commanding him to use matters rather than investigation. He capitulated again.

So Rosenstein names a special counsel for the Russian probe, one Robert Mueller. He does have a career history with James Comey. So, how come the White House and all the pundits did not blow a cork when Mueller was named?

Further, President Trump’s long time attorney, Marc Kasowitz comes out in support for his client as he should. But, has Kasowitz been forthcoming about his own Russian clients like Oleg Deripaska? One has to go look for that, it is in open source and Deripaska has deep connections with the Kremlin and Putin. Head tilt on this one.

Meanwhile the issue of Flynn was still brewing and then came memos and well, Comey’s testimony. So, Putin wins again. We don’t trust anyone, much less each other and certainly we don’t trust the political bunch on both sides of the aisle in Washington DC. This is just how Putin planned it.

Where is Trump on all this now? Sadly he is not launching any punishment at Russia either on the hacking/phishing front or that of the chaos in Syria, Afghanistan, Libya, Yemen or Crimea or Ukraine….and on and on. Why is the big question.

Thoughts?

 

NSA Leaker, Reality Leigh Winner Charged, Russian Hacks

The search warrant is located here. The warrant was issued on June 3 and she was arrested the same day and charged.

A criminal complaint was filed in the Southern District of Georgia today charging Reality Leigh Winner, 25, a federal contractor from Augusta, Georgia, with removing classified material from a government facility and mailing it to a news outlet, in violation of 18 U.S.C. Section 793(e).

Winner was arrested by the FBI at her home on Saturday, June 3, and appeared in federal court in Augusta this afternoon.

“Exceptional law enforcement efforts allowed us quickly to identify and arrest the defendant,” said Deputy Attorney General Rod J. Rosenstein. “Releasing classified material without authorization threatens our nation’s security and undermines public faith in government. People who are trusted with classified information and pledge to protect it must be held accountable when they violate that obligation.”

According to the allegations contained in the criminal complaint:

Winner is a contractor with Pluribus International Corporation assigned to a U.S. government agency facility in Georgia. She has been employed at the facility since on or about February 13, and has held a Top Secret clearance during that time. On or about May 9, Winner printed and improperly removed classified intelligence reporting, which contained classified national defense information from an intelligence community agency, and unlawfully retained it. Approximately a few days later, Winner unlawfully transmitted by mail the intelligence reporting to an online news outlet.

Once investigative efforts identified Winner as a suspect, the FBI obtained and executed a search warrant at her residence. According to the complaint, Winner agreed to talk with agents during the execution of the warrant. During that conversation, Winner admitted intentionally identifying and printing the classified intelligence reporting at issue despite not having a “need to know,” and with knowledge that the intelligence reporting was classified. Winner further admitted removing the classified intelligence reporting from her office space, retaining it, and mailing it from Augusta, Georgia, to the news outlet, which she knew was not authorized to receive or possess the documents.

An individual charged by criminal complaint is presumed innocent unless and until proven guilty at some later criminal proceedings.

The prosecution is being handled by Trial Attorney Julie A. Edelstein of the U.S. Department of Justice’s National Security Division’s Counterintelligence and Export Control Section, and Assistant U.S. Attorney Jennifer Solari of the U.S. Attorney’s Office for the Southern District of Georgia. The investigation is being conducted by the FBI.

***

Winner’s lawyer, Titus T. Nichols, said he had not yet seen any of the evidence in the case, so he could not discuss the specific accusations. He said his client has served in the Air Force for six years, including a recent assignment at Fort Meade, home of the NSA.

According to court documents, Winner had a top-security clearance as an active-duty member of the Air Force from January 2013 until February of this year, when she began working for Pluribus International Corporation, a government contractor, at a facility in Georgia.

Winner remains in jail pending a detention hearing later this week, said the lawyer, adding that he expects the government will seek to keep her behind bars pending trial. Nichols said his client should be released.    More here. Intercept is known to be the media outlet to which she mailed the documents. See the full story from Intercept here.

nsa-russia-hacking-election-3-1496690296