Obama, don’t let secrecy be your legacy

Imagine what Congress does NOT know and then imagine what we, don’t know. Terrifying right?

Mr. Obama, don’t let secrecy be your legacy: Republican chairmen

Shrouding government action on everything from the environment to veterans health in darkness is a big step backwards.

USAToday: When President Obama took office, he vowed to run “the most transparent administration in history.” As his presidency draws to an end, those words would be laughable if the issue were not so serious.

At nearly every turn, this administration has blocked public disclosure and ignored almost every law intended to ensure open and accountable government.

Hillary Clinton’s private email server is just the latest, most public example. Numerous other incidents involve the concealment of documents, providing only partial information, slow-walking congressional requests and using private email accounts and secret meetings to avoid official records-keeping laws. These sorts of tactics have become common practice for this administration.

The most brazen examples occasionally get media attention: Former Environmental Protection Agency (EPA) Administrator Lisa Jackson created a fictitious email address under the alias name “Richard Windsor,” hiding official actions from public scrutiny. But more typically, the pervasive stonewalling does not make headlines.

Congress isn’t alone on the Obama administration’s enemies list. According to an analysis of federal data by the Associated Press (AP), the Obama administration set new records two years in a row for denying the media access to government files. According to the AP, “The government took longer to turn over files when it provided any, said more regularly that it couldn’t find documents and refused a record number of times to turn over files.”

Moreover, in an unprecedented letter to several congressional committees, 47 inspectors general, who are the official watchdogs of federal agencies, complained that the Justice Department, EPA and others consistently obstruct their work by blocking or delaying access to critical information. Worse yet, the White House and Secretary Clinton refused to install an Inspector General during her tenure at the State Department.

It is the job of Congress and our agency watchdogs to ensure the federal government is efficient, effective and accountable to the American people. But time and time again, this administration has dismissed Americans’ right to know.

When Department of Veterans Affairs bureaucrats place themselves ahead of the veterans they are charged with serving, it’s Congress’ job to get answers. But VA’s stonewall tactics are interfering with this vital task. It’s been more than 18 months since the House Committee on Veterans’ Affairs revealed VA’s delays in care crisis to the nation, yet the department is sitting on more than 140 requests for information from the committee regarding everything from patient wait times to disciplinary actions for failed employees. VA’s disregard for congressional oversight was on full display Oct. 21, when committee Democrats and Republicans voted unanimously to subpoena five bureaucrats VA had refused to make available to explain their role in a scheme that resulted in the misuse of more than $400,000 in taxpayer money. Later, at a Nov. 2 follow-up hearing, two of the subpoenaed VA employees invoked their Fifth Amendment right against self-incrimination.

When the Internal Revenue Service improperly targets conservative organizations, it’s Congress’ job to get answers. When the Bureau of Alcohol, Tobacco, Firearms and Explosives runs a failed and flawed sting operation intentionally providing hundreds of firearms to Mexican cartels, it’s Congress’ job to get answers. When events surrounding terrorist attacks in Benghazi on the anniversary of 9/11 are hidden from the public, it’s Congress’ job to get answers.

But Congress cannot do its job when an administration refuses to turn over information. That’s why Congress has increasingly resorted to the power of the pen and has issued numerous legally-binding subpoenas to various Obama Administration agencies, including the Department of Justice, the State Department, the Treasury Department, the Department of Homeland Security, the Federal Reserve Board, the Federal Reserve Bank of New York, the Environmental Protection Agency, the National Oceanic and Atmospheric Administration and the Office of Management and Budget, among others.

Whether it is the necessity of holding agency heads in contempt of Congress or pursuing civil litigation to gain access to clearly relevant material or the improper invocation of executive privilege or a new “confidential communications” privilege this administration made up out of whole cloth, Congress has been forced to spend far too much time and resources gaining access to documents which it is clearly entitled to.

But perhaps the honor of the least transparent agency in the federal government belongs to the EPA.

Everyone wants clean air and water. But Americans want environmental regulations to be based on sound science, not science  fiction or radical political manifestos. When the EPA refused to release the data it uses to justify its proposed air regulations, the historically bipartisan House Science Committee was compelled to issue its first subpoena in 21 years to retrieve the information.

Last year, the House passed the Secret Science Reform Act of 2015 to require the EPA to base its regulations on publicly-available data, not secret science. This allows independent scientists the opportunity to evaluate EPA’s claims and check their work.  Who could argue against using open and transparent science to support regulation? Answer: the Obama administration.

It’s not surprising that the non-partisan Center for Effective Government gave the EPA a grade of “D” in its most recent report for poor performance in providing access to information.

This administration has created an unprecedented culture of secrecy that starts at the top and extends into almost every agency. While Congress is being thwarted in its efforts at oversight, it is really the American people who lose when those entrusted to enforce the law believe and act as if they are above it. It’s time to come clean, Mr. President. Don’t let a lack of transparency be your legacy.

Hillary Asks, ‘Will the Libya War Interrupt my Vacay’?

It must be noted that daily, when Hillary was at home at White Haven, her private residence that she DOES not share with Bill, a State Department driver would show up daily to deliver a package. Inside contents were usually her copy of the Presidential Daily Briefing, call sheets and other diplomatic operational actions, all in printed form. Note…PRINTED FORM. That is NOT protected material, just ask General Petraeus.

There are clear violations in the law in these emails with regard to her shadow intelligence point person, Sidney Blumenthal, known as the Logan Act, however, no one ever seems to be prosecuted under this law. The email exchanges also demonstrate that Syria was actually aiding Libya, an agreement Qaddafi made decades ago with Bashir al Assad’s father. Hummm.

Is there a shredder somewhere in this mess? Heh…read on. Did files and records get buried with Tyler Drumheller? Oh, has anyone interviewed Samantha Power, the current UN Ambassador? Well she was part of the Libya mess too.

Hillary’s team was particularly interested in a documentary:

 “The Oath of Tobruk,” Bernard-Henri Levy details how a self-promoting leftist intellectual persuaded a conservative French president to back the Libyan revolt.

Hillary Clinton Forwarded Huma Abedin Classified Info. for Printing

(Washington, DC) – Judicial Watch today released nearly 70 pages of State Department records that show that former Secretary of State Hillary Clinton and her top aides, Deputy Chiefs of Staff Huma Abedin and Jake Sullivan, received and sent classified information on their non-state.gov email accounts.  The documents, also available on the State Department website, were obtained in response to a court order from a May 5, 2015, lawsuit filed against the State Department (Judicial Watch, Inc. v. U.S. Department of State (No. 1:15-cv-00684)) after it failed to respond to a March 18 Freedom of Information Act (FOIA) request seeking:

  • All emails of official State Department business received or sent by former Deputy Chief of Staff Huma Abedin from January 1, 2009 through February 1, 2013 using a non-“state.gov” email address.

The new documents show that Hillary Clinton used the clintonemail.com system to ask Huma Abedin (also on a non-state.gov email account) to print two March 2011 emails, which were sent from former British Prime Minister Tony Blair (using the moniker “aclb”) to Jake Sullivan on Sullivan’s non-state.gov email account.  The Obama State Department redacted the Blair emails under Exemption (b)(1) which allows the withholding of classified material.  The material is marked as being classified as “Foreign government information” and “foreign relations or foreign activities of the US, including confidential sources.”

Another email shows that Clinton wanted to know how meetings in Washington, including a four-hour meeting concerning America’s war on Libya, would impact her Hampton vacation.  Responding to an email that details the sensitive meetings in DC, Clinton emails Abedin on August 26, 2011, “Ok. What time would I get back to Hamptons?”  Again, this email discussion takes place on non-state.gov email accounts.

The documents also include advice to Clinton on Libya from Sidney Blumenthal, a Clinton Foundation employee who, according to a Judicial Watch investigative report, also had business interests in Libya.  Clinton wanted Blumenthal’s March 9, 2011, Libya memo to be printed “without any identifiers.”

The newly released Abedin emails include a lengthy exchange giving precise details of Clinton’s schedule using unsecured government emails. The email from Lona J. Valmoro, former Special Assistant to Secretary of State Clinton, to Abedin and Clinton reveals exact times (including driving times) and locations of all appointments throughout the day. Another itinerary email provides details about a meeting at the United Nations in New York at 3:00 on Tuesday, January 31, 2012, with the precise disclosure, “that would mean wheels up from Andrews at approximately 12:00pm/12:15pm.”

“These emails show that Hillary Clinton isn’t the only Obama official who should be worried about being prosecuted for mishandling classified information.  Her former top State aides (and current campaign advisers) Huma Abedin and Jake Sullivan should be in the dock, as well,” said Judicial Watch President Tom Fitton.  “The Obama State Department has now confirmed that Clinton, Abedin, and Sullivan used unsecured, non-government email accounts to communicate information that should now be withheld from the American people ‘in the interest of national defense or foreign policy, and properly classified.’ When can we expect the indictments?”

Obama’s Final Cyber Offense, Einstein?

Sheesh, just the name points to a misguided failure since 2008. Einstein has a price tag, $ 5 billion. There are other questions to be asked like what does the NSA have to offer or the countless cyber security professionals in the private sector?

From the White House, there has been a 12 point plan and it has not advanced at all.

In May 2009, the President accepted the recommendations of the resulting Cyberspace Policy Review, including the selection of an Executive Branch Cybersecurity Coordinator who will have regular access to the President.

Meanwhile, hacks are real, dangerous and coming at mach speed. Using old software language such as COBOL speaks volumes as to how antiquated protections are and how dysfunctional all agencies are in maintaining crack-proof.

The Department of Homeland Security appears to be the lead agency for Einstein compliance, what could go wrong and has? The fact sheet from DHS is here.

Obama makes final push to cement cyber legacy

TheHill: President Obama on Tuesday made what is likely his last major push to bolster the government’s digital defenses before leaving office.

As part of the annual White House budget proposal, the Obama administration rolled out a sweeping plan to inject billions of extra dollars into federal cybersecurity funding, establish a new senior federal cyber official and create a presidential commission on cyber that will establish a long-term road map.

The move is likely to complete Obama’s cyber legacy, which will include an historic attention to digital security, unprecedented executive orders on the topic, and shepherding through Congress the largest-ever cyber bill, as well as numerous bruising hacks at federal agencies and allegations that government networks were woefully outdated.

In a release, the White House called the plan “the capstone of more than seven years of determined effort.”

“[Obama] is the first president that is making a big cybersecurity push and I think that’s tremendously important,” Rep. Ted Lieu (D-Calif.), one of Congress’s most prominent cyber voices, told The Hill.

The proposal aims to inject more than $5 billion in new funding across the government to strengthen network defenses that have been repeatedly infiltrated by suspected foreign government spies.

The ask is a 35-percent increase over last year’s allotment of $14 billion, and would put overall federal cyber spending at over $19 billion.

The budget request earmarks $3.1 billion for an “Information Technology Modernization Fund” that the White House described as a “down payment on the comprehensive overhaul” of federal IT systems.

Lieu said this fund could help solve one of the inherent budgeting problems when it comes to defending interconnected networks from hackers.

“What’s important about [the fund] is it can go across agencies and upgrade systems that touch more than one agency,” said Lieu, who sits on both the House Budget and Oversight committees.

Currently, each agency has its own individual cybersecurity budget that can be spent on its network, but that cannot necessarily be expended on portions of the agency’s IT infrastructure at other agencies.

Hackers have exploited this balkanized budgeting process.

Over the summer, suspected Chinese cyber spies cracked into the Office of Personnel Management (OPM), pilfering over 22 million people’s personal information in two separate hacks. The initial intrusion — which exposed roughly 4.2 federal workers’ personnel files — occurred at an OPM database that was housed at the Interior Department.

The OPM hacks also exposed the antiquated legacy systems the government relied on to run its networks.

Congress bashed OPM officials for not fully encrypting all their sensitive data. But the agency’s systems were simply too old to even accept modern encryption, they repeatedly explained.

The network also relied on the dated COBOL programming language, which initially became popular in the 1960s and is now eschewed by younger programmers.

A new federal official will oversee much of these update efforts.

As part of its proposal, the White House is establishing a federal chief information security officer, or CISO. The official will be housed within the Office of Management and Budget (OMB) and report to federal chief information officer, Tony Scott, who oversees government technology.

“This is the first time that there will be a dedicated senior official who is solely focused on developing, managing, and coordinating cybersecurity strategy, policy and operations across the entire federal domain,” the White House said.

Centralizing cybersecurity oversight is an attempt to help overcome the lack of agency-to-agency communication on the subject.

“For a while, I’ve seen the argument that there are too many lines of authority in the federal government on cybersecurity,” said Lieu. “Sometimes it’s not clear who is responsible for what.”

The CISO will also help monitor the government’s digital defense spending, which has been knocked as cost-ineffective.

Recently, a federal watchdog report concluded that the government’s main cyber defense system, known as “Einstein,” was largely ineffectual at thwarting sophisticated hackers. The report echoed long-standing criticism from security experts who say the program is a much-delayed boondoggle that is already obsolete.

Federal officials insist the system is in its final phase of implementation and will soon serve as a platform to add on leading cyber tools.

This budget infusion and new federal CISO will with these technology updates, the White House said.

The proposal also includes a robust research and public awareness component.

In a bid to build a bridge to the next administration, Obama is launching a “Commission on Enhancing National Cybersecurity.”

The administration is directing a bipartisan group of lawmakers to appoint top industry representatives and leading technologists to the commission. The group will be tasked with taking the long view.

“The commission will make recommendations on actions that can be taken over the next decade to strengthen cybersecurity in both the public and private sectors while protecting privacy,” the White House said.

Security experts almost unanimously agree that one of these actions will be eliminating the traditional online password.

Since 2011, the White House has been trying to push people away from passwords. Tuesday’s plan includes a last bid to encourage stronger people to adopt stronger login practices.

The proposal creates a new public awareness campaign that includes leading tech firms such as Google, Facebook and Microsoft.

“By judiciously combining a strong password with additional factors, such as a fingerprint or a single-use code delivered in a text message, Americans can make their accounts even more secure,” the White House said.

The proposal is likely Obama’s concluding statement on cybersecurity.

During his presidency, cybersecurity has gone from a fringe issue to one that most leaders acknowledge is vital to national and economic security. The topic received an increasing amount of attention in all but Obama’s final State of the Union address.

In recent years, the U.S. has seen the dramatic rise of global cyber crime syndicates that have pillaged banks, department stores and hotels.

According to an October report from Hewlett Packard and the Ponemon Institute, cyber crime costs the average American firm $15.4 million annually, up 82 percent over the last six years. By 2019, it’s believed the cost of data breaches will reach $2.1 trillion globally.

Digital adversaries such as China, Russia, Iran and North Korea have also swooped in unexpectedly, plundering health insurers, airlines, nuclear plants, government agencies and, most memorably, a major movie studio.

Even terrorist groups such as the Islamic State in Iraq and Syria (ISIS) are causing fears by hijacking high-profile twitter accounts and digitally defacing websites around the world.

These trends are bound to continue after Obama leaves the White House, but this ultimate cyber thrust could help cement his reputation as the first president to actively address the digital security challenge.

“If we can get this through, the funding, I think that would be very positive for his legacy,” Lieu said. “This is not just a federal government problem, it’s endemic in the private sector.”

Was bin Ladin in the IRS Files for Obamacare?

I remember very well saying a few years ago that any foreigner, including Usama bin Ladin could get Obamacare benefits. Never understood how true my conclusions were. Further, there was a movement in the House to impeach the IRS Commissioner. Then we learned that more hard drives have been destroyed, others were found in storage and billions in refunds went to a handful of same mail address locations in obscure places outside the United States.

Not only is Obamacare a failure itself, but it really does not become full law until 2017 and it is a law we can no longer begin to afford when the IRS cant recover bogus subsidies to illegals.

Fasten your seat belt.

Senate report: Illegal immigrants benefited from up to $750M in ObamaCare subsidies

FNC: Illegal immigrants and individuals with unclear legal status wrongly benefited from up to $750 million in ObamaCare subsidies and the government is struggling to recoup the money, according to a new Senate report obtained by Fox News.

The report, produced by Republicans on the Senate Homeland Security and Governmental Affairs Committee, examined Affordable Care Act tax credits meant to defray the cost of insurance premiums. It found that as of June 2015, “the Administration awarded approximately $750 million in tax credits on behalf of individuals who were later determined to be ineligible because they failed to verify their citizenship, status as a national, or legal presence.”

The review found the credits went to more than 500,000 people – who are either illegal immigrants or whose legal status was unclear due to insufficient records.

The Centers for Medicare and Medicaid Services confirmed to FoxNews.com on Monday that 471,000 customers with 2015 coverage failed to produce proper documentation on their citizenship or immigration status on time – but stressed that this does not necessarily mean they’re ineligible.

“Lack of verification does not mean an individual is ineligible for financial assistance, but only that a Marketplace did not receive sufficient information to verify eligibility in the time period outlined in the law,” CMS spokesman Aaron Albright said.

The Senate report also accused the administration of lacking a solid plan to get that money back – and predicted that in the end, the IRS will be “unable to fully recoup the funds.”

“The information provided to the Committee by the IRS and HHS reveals a troubling lack of coordination between the two agencies … and demonstrates that the IRS and HHS neglected to consider how they would recover these wasteful payments,” the report says.

Under the law, the feds can dole out these payments on a temporary basis if a recipient’s legal status is unclear, but are supposed to cut off funding and coverage if the recipient does not later come up with the paperwork. Up to a half-million “ineligible” people, according to the report, applied in this way — with their credits paid in advance to the insurers. The IRS, though, is supposed to get overpayments back from the individuals themselves.

The Senate report, based on a review launched by committee Chairman Sen. Ron Johnson, R-Wis., derisively describes this approach as “pay and chase.”

In other words, the Centers for Medicare and Medicaid Services pays credits and subsidies to the insurance companies on behalf of the applicants – and the feds then “chase” after any overpayments to ineligible people once they are discovered.

“This ‘pay and chase’ model has potentially cost taxpayers approximately $750 million,” the report says. The 500,000 individuals in question have been removed from coverage, according to the findings, as the government seeks to get the money back.

The Senate report says the IRS and HHS initially failed to coordinate on a plan for recouping funds, and claimed that a subsequent plan from the IRS to recoup the money is still “ineffective and insufficient.”

In a July letter to Johnson, IRS Commissioner John Koskinen assured that the agency is “committed to identifying and efficiently addressing” improper payments. He reiterated that anyone “not lawfully present” who enrolls for ObamaCare coverage “must repay” the advance premium credit payments, and would be breaking the law if they don’t.

What is YOUR Profile? Ask Google and Facebook

You have been profiled, but is it accurate? You have been sold and sold out.

Scary New Ways the Internet Profiles You

Morrison/DailyBeast: Facebook, Google, and the other Internet titans have ever more sophisticated and intrusive methods of mining your data, and that’s just the tip of the iceberg.

The success of the consumer Internet can be attributed to a simple grand bargain. We’ve been encouraged to search the web, share our lives with friends, and take advantage of all sorts of other free services. In exchange, the Internet titans that provide these services, as well as hundreds of other lesser-known firms, have meticulously tracked our every move in order to bombard us with targeted advertising. Now, this grand bargain is being tested by new attitudes and technologies.

Consumers who were not long ago blithely dismissive of privacy issues are increasingly feeling that they’ve lost control over their personal information. Meanwhile, Internet companies, adtech firms, and data brokers continue to roll out new technologies to build ever more granular profiles of hundreds of millions, if not billions, of consumers. And with next generation of artificial intelligence poised to exploit our data in ways we can’t even imagine, the simple terms of the old agreement seem woefully inadequate.

In the early days of the Internet, we were led to believe that all this data would deliver us to a state of information nirvana. We were going to get new tools and better communications, access to all the information we could possibly need, and ads we actually wanted to receive. Who could possibly argue with that?

For a while, the predictions seemed to be coming true. But then privacy goalposts were (repeatedly) moved, companies were caught (accidentally) snooping on us, and hackers showed us just how easy it is to steal our personal information. Advertisers weren’t thrilled either, particularly when we adopted mobile phones and tablets. That’s because the cookies that track us on our computers don’t work very well on mobile devices. And with our online activity split among our various devices, each of us suddenly appeared to be two or three different people.

This wasn’t a bad thing for consumers, because mobile phones emit data that enable companies to learn new things about us, such as where we go, who we meet, places we shop, and other habits that help them recognize and then predict our long-term patterns.

But now, new cross-device technologies are enabling the advertising industry to combine all our information streams into a single comprehensive profile by linking each of us to our desktop, mobile phone, and iPad. Throw in wearable devices like a Fitbit, connected TVs, and the Internet of Things, and the concept of cross-device tracking expands to potentially include anything that gives off a signal.

The ad industry is drooling over this technology because it can follow and target us as we move through our daily routines, whether we are searching on our desktop, surfing on our iPad, or out on the town with our phone in hand.

There are two methods to track people across devices. The more precise technique is deterministic tracking, which links devices to a single user when that person logs into the same site from a desktop computer, phone, and tablet. This is the approach used by Internet giants like Facebook, Twitter, Google, and Apple, all of which have enormous user bases that log into their mobile and desktop properties.

A quick glance at Facebook’s data privacy policy shows it records just about everything we do, including the content we provide, who we communicate with, what we look at on its pages, as well as information about us that our friends provide. Facebook saves payment information, details about the devices we use, location info, and connection details. The social network also knows when we visit third-party sites that use its services (such as the Like button, Facebook Log In, or the company’s measurement and advertising services). It also collects information about us from its partners.

Most of the tech giants have similar policies and they all emphasize that they do not share personally identifiable information with third parties. Facebook, for example, uses our data to deliver ads within its walled garden but says it does not let outsiders export our information. Google says it only shares aggregated sets of anonymized data.

Little-known companies—primarily advertising networks and adtech firms like Tapad and Drawbridge—are also watching us. We will never log into their websites, so they use probabilistic tracking techniques to link us to our devices. They start by embedding digital tags or pixels into the millions of websites we visit so they can identify our devices, monitor our browsing habits, look for time-based patterns, as well as other metrics. By churning massive amounts of this data through statistical models, tracking companies can discern patterns and make predictions about who is using which device. Proponents claim they are accurate more than 90 percent of the time, but none of this is visible to us and is thus very difficult to control.

In recent comments to the Federal Trade Commission, the Center for Democracy and Technology illustrated just how invasive cross-device tracking technology could be. Suppose a user searched for sexually transmitted disease (STD) symptoms on her personal computer, used a phone to look up directions to a Planned Parenthood clinic, visited a pharmacy, and then returned home. With this kind of cross-device tracking, it would be easy to infer that the user was treated for an STD.

That’s creepy enough, but consider this: by using the GPS or WiFi information generated by the patient’s mobile phone, it would not be difficult to discover her address. And by merging her online profile with offline information from a third-party data broker, it would be fairly simple to identify the patient.

So, should we be concerned that companies use cross-device tracking to compile more comprehensive profiles of us? Let us count the reasons:

Your data could be hacked: Privacy Rights Clearinghouse reports that in 2015 alone, hackers gained access to the records of 4.5 million patients at UCLA Health System, 37 million clients of online cheating website Ashley Madison, 15 million Experian accounts, 80 million Anthem customers, as well as more than 21 million individuals in the federal Office of Personnel Management’s security clearance database. And these were just the headliners that garnered media attention. No site or network is entirely safe and numerous researchers have already demonstrated how incredibly easy it is to “reidentify” or “deanonymize” individuals hidden in anonymized data.

Your profile could be sold: In fact, it typically is, in anonymized fashion. That’s the whole point. But in many cases, Internet companies’ privacy policies also make it clear our profiles are assets to be bought and sold should the company change ownership. This was the case when Verizon bought AOL and merged their advertising efforts, creating much more detailed profiles of their combined user base. Yahoo might be next should it decide to spin off its Internet properties.

Your data could be used in ways you did not anticipate: Google, Facebook, and other companies create customized web experiences based on our interests, behavior, and even our social circles. On one level, this makes perfect sense because none of us want to scroll through reams of irrelevant search results, news stories, or social media updates. But researchers have demonstrated that our online profiles also have real world consequences, including the prices we pay for products, the amount of credit extended to us, and even the job offers we may receive.

Our data is already used to build and test advanced analytics models for new services and features. There is much more to come. The Googles and the Facebooks of the Internet boast that newly emerging artificial intelligence will enable them to analyze greater amounts of our data to discern new behavioral patterns and to predict what we will think and want before we actually think and want it. These companies have only begun to scratch the surface of what is possible with our data.

We are being profiled in incredible and increasingly detailed ways, and our data may be exploited for purposes we cannot yet possibly understand. The old bargain—free Internet services in exchange for targeted advertising—is rapidly become a quaint relic of the past. And with no sense of how, when, or why our data might be used in the future, it is not clear what might take its place.