FCC Investigates Adam Schiff for Subpoena Abuse

Okay cool, but what could be the consequence in the end is the real question.

During the House impeachment proceedings, Rep. Adam Schiff (D-CA) released a report which included the phone records that included calls made or received by Rep. Devin Nunes(R-CA), journalist John Solomon, Rudy Giuliani, and others. The records in the report didn’t contain the content of the conversations but included who called who and how long the call lasted.

Devin Nunes Responds To Adam Schiff “Subpoenaing” Private ... source

The belief was that the records were obtained through subpoenas to the phone companies of records related to Giuliani and Lev Parnas, with the obvious purpose meant to try to impugn the people whose records were included without reason or cause.

What made it especially troubling was Schiff wouldn’t explain who was subpoenaed or how, and if it was a Congressional subpoena straight to the companies, it was a troubling abuse of power.

 

Now, as Kim Strassel at the Wall Street Journal is reporting, the FCC Commissioner, Brendan Carr, is calling Schiff out over what he believes are abuses of his subpoena power and Carr wants answers. Strassel called it an “incredible abuse” with Schiff publishing call records of his political rivals including Nunes, even the President’s attorney, Rudy Giuliani. Schiff even smeared Nunes during a press conference with the records, trying to suggest that Nunes was somehow “complicit.”


While Carr acknowledged that there might be instances in which Schiff could subpoena call records, Carr said the problem was that Schiff did this in secret, without giving the people whose records were grabbed the opportunity to respond or fight the request.

If that’s allowed, that’s a tremendous abuse of power if members of Congress can just demand phone records from the phone company about any American without any court and without any check.

Carr sent Schiff’s House Intel Committee a formal letter not only calling out their prior actions, but indicating that Schiff/the Committee may still be getting people’s records.

Carr points out in his letter that Schiff isn’t allowed to get the records from the phone company without consent from the citizen or in accordance with the law — that there has to be judicial review. Nor did they establish any legitimate legislative purpose in subpoenaing the records.

Moreover, as Carr notes, the recent decision involving the subpoena to former White House Counsel Don McGahn has now established that the subpoena power of the Congress as to such things might be questionable, without a court check on possible abuse of power.

Yes, please. It’s about time. Carr mentions substantial fines in his letter but there may be further action that could be taken.

ImageView image on Twitter

 

Judge Rules Hillary et.al Must be Deposed

A Washington federal trial judge said Clinton and a former longtime aide must be deposed in a public-records suit about Clinton’s use of a private email server. The impending depositions are “inappropriate, unnecessary, and a clear abuse of discretion,” lawyers at Williams & Connolly and Wilkinson Walsh contend.

Petitioners: Hillary Rodham Clinton; Cheryl Mills. Respondents:Judicial Watch, Inc.; United States Department of State.

Truth is, this all started with gaining records/emails regarding Benghazi. The saga continues while the Hillary Clinton lawyer of record continues to be David Kendall. The Hillary legal team petition to the court to prevent the depositions is found here.

***

U.S. District Court Royce Lamberth, a Reagan appointee, said in court filings that written answers provided by Clinton to questions from Judicial Watch were “incomplete, unhelpful, or cursory, at best.”

“As extensive as the existing record is, it does not sufficiently explain Secretary Clinton’s state of mind when she decided it would be an acceptable practice to set up and use a private server to conduct State Department business,” Lamberth wrote in his order. “Simply put, her responses left many more questions than answers.”

“Even years after the FBI investigation, the slow trickle of new emails has yet to be explained,” the judge added, referring to the rate at which emails from Clinton’s private email server have since been released.

*** source

Clinton’s legal team responded with an 83-page petition for a writ of mandamus filed with the U.S. Court of Appeals for the D.C. Circuit, calling the district ruling outrageous and asking the appeals court to order the lower court to correct the ruling.

The legal team for Clinton said reversing the order “is warranted because Judicial Watch’s impending depositions of Secretary Clinton and Ms. Mills are inappropriate, unnecessary, and a clear abuse of discretion.”

Judicial Watch President Tom Fitton said, “This desperate act is yet another attempt by the Clinton machine to delay truth and accountability for her email conduct and how it impacted the people’s ‘right to know’ under FOIA.”

Clinton’s lead attorney David Kendall said, “The district court’s order inappropriately discounts this Court’s prior finding that there are no remaining recoverable emails, the extraordinary discovery that Judicial Watch has already obtained, and the vast public record on Secretary Clinton’s emails.” He claimed, “Judicial Watch could not possibly show the extraordinary circumstances required to depose (or re-depose) former high-ranking officials regarding their reasons for taking official actions, and the court abused its discretion in finding otherwise.”

The Clinton team laid out three main arguments for why the lower court’s order should be reversed. First, they referenced a prior D.C. appeals court ruling in a Judicial Watch v. Pompeo case in 2018 that they said should render this FOIA case “moot.” Next, they claimed the district court’s order “violates the well-established principle that high-ranking government officials should not be subjected to depositions absent extraordinary circumstances.” And they claimed the lower court “lacked jurisdiction to order additional discovery because the FOIA requests were submitted only after Secretary Clinton left office.”

The district court ruling earlier this month was the latest twist in a nearly six-year-long case related to Clinton’s reasons for setting up her unauthorized private email server and whether she was attempting to avoid Freedom of Information Act requests.

Lamberth listed some remaining questions for Clinton: “How did she arrive at her belief that her private server emails would be preserved by normal State Department processes for email retention? … Did she realize State was giving ‘no records’ responses to her FOIA requests for emails? … And why did she think that using a private server to conduct State Department business was permissible under the law in the first place?”

The FBI investigated Clinton’s use of the server, hosted in the basement of her home in Chappaqua, New York, while she was secretary of state from 2009 to 2014. Although former FBI Director James Comey found that Clinton was “extremely careless” in handling classified emails, no criminal charges were recommended against anyone following the bureau’s “Midyear Exam” investigation.

“Judicial Watch argued that Secretary Clinton’s existing testimony has only scratched the surface of the inquiry into her motives for setting up and using a private server,” Lamberth said.

The judge said Clinton’s written answers to questions in this case and related ones “were either incomplete, unhelpful, or cursory at bes,” and that “her responses left many more questions than answers.”

 

China Says Immoral of US Officials to Blame China for Virus

FNC: If you listened to Chinese state-run media, you’d think President Trump went to China and released vials of COVID-19 on groups of unsuspecting men, women and children.

Beijing has been bending over backward trying to convince the world that the United States is the real culprit behind the quickly spreading virus that’s already claimed more than 4,600 lives across the globe.

It’s a high-stakes strategy for the Asian nation fighting to keep its superpower status amid a national lockdown and palpable anger over claims that Wuhan, China, the epicenter of the coronavirus, at first covered it up, triggering a worldwide health and economic crisis.

The Chinese government has already published a book in English — with translations in the works in French, Spanish, Russian and Arabic — touting its handling of the deadly disease.

A Battle Against Epidemic: China Combatting COVID-19 in 2020” is a mishmash of glowing state media reports on the accomplishments of President Xi Jinping, the Communist Party and the dominance of the Chinese system in fighting the crisis.

biosafety-level-IV (P4) opened in 2017 in Wuhan

At best, China’s aggressive new campaign can be chalked up to ambitious propaganda.  At its worst, it’s a reckless display from a country that has actively misled the world while working overtime to save its own skin, foreign affairs expert Gordon G. Chang told Fox News.

Chang believes Beijing has been laying the groundwork for a PR attack against the United States for more than a month, first by throwing doubt on the origin of COVID-19 and second, by slamming America’s handling of previous diseases like the swine flu, which decimated China’s pork industry.

On Sunday, Lin Songtian, China’s ambassador to South Africa, said: “Although the epidemic first broke out in China, it did not necessarily mean that the virus is originated from China, let alone ‘made in China.’

 

Vague and misleading statements like the one from Lin are ripped right out of China’s propaganda playbook and attempt to sow doubt about the global crisis.

Chinese officials have also pushed back on the expression “Wuhan coronavirus” — saying the name used frequently by U.S. conservative commentators unfairly stigmatizes the world’s most populous country.

Chang said it’s just another tactic in China’s playbook, carefully choreographed to make Americans look petty and racist.

“This an all-out assault on the United States,” Chang said.

In December, when the coronavirus was first detected in Wuhan, many media around the world began referring to it as the “Wuhan virus.” But last month, the World Health Organization renamed the illness COVID-19 so as not to link it to a specific location or group of people.

The name change didn’t stop some, like Secretary of State Mike Pompeo, who blew past warnings and deliberately referred to it as the “Wuhan virus” after China’s foreign ministry called it “highly irresponsible” to do so.

President Donald Trump’s national security adviser, Robert O’Brien, went even further Wednesday.

“Unfortunately, rather than using best practices, this outbreak in Wuhan was covered up,” O’Brien said at the Heritage Foundation, a conservative-leaning think tank in Washington. “There’s lots of open-source reporting from China, from Chinese nationals, that the doctors involved were either silenced or put in isolation, or that sort of thing, so that the word of this virus could not get out. It probably cost the world community two months.”

O’Brien said if experts would have had those two months to get ahead of the spread of the virus, “I think we could have dramatically curtailed what happened both in China and what’s now happening across the world.”

Sen. Marco Rubio, R-Fla., said the Communist Party is pointing the finger at the U.S. so it can dampen discontent back home.

“The Chinese military portal Xilu.com recently published an article baselessly claiming that the virus is ‘a biochemical weapon produced by the U.S. to target China,’” Rubio said.

Arkansas Republican Sen. Tom Cotton, has frequently used the term “Wuhan virus” on the Senate floor.

Earlier this week, several social media users took House Minority Leader Kevin McCarthy, R-Calif., to task when he referred to it as “the Chinese coronavirus.”

Instead of backing down, Chang believes officials should keep calling COVID-19 the “Wuhan virus” and push back on accusations of racism.

“This isn’t a Republican thing. We all need to unite and for people to say, ‘this is racist’ is irresponsible,” Chang said. “There is no race known as Wuhanese.”

Chang also said calling COVID-19 the “Wuhan virus” or “Chinese coronavirus” keeps pressure on the Chinese government and forces it to be held accountable by the rest of the world for its initial response to the global crisis, which was widely regarded as abysmal.

China, though, is using everything in its arsenal to paint itself as a global hero, rewriting history and going so far as to demand a thank you for containing the virus as long as it did.

“We should say righteously that the U.S. owes China an apology, the world owes China a thank you,” an editorial on state news agency Xinhua read.

Also peculiar is that Beijing — which is normally quick to censor news — has refused to step in as a wave of anti-American conspiracy theories flood the internet. Among the rumors is that the U.S. created the coronavirus to make China look bad as well as one that accuses the government of covering up thousands of deaths by classifying them as the regular flu.

“It’s more than just some disinformation or an official narrative,” Xiao Qiang, an adjunct professor at the University of California at Berkeley’s Schools of Information, told The Washington Post. “It’s an orchestrated, all-out campaign by the Chinese government through every channel at a level you rarely see. It’s a counteroffensive.”

Hey Amb. Yovanovitch and Adam Schiff, Call Holding Line 3

Remember the accusations during the Trump impeachment trial that Ukraine had cleaned up corruption? President Trump withheld aid for a couple of very legitimate reasons including corruption in the Ukraine military, corruption in the banking system and money-laundering. The Democrats continued to place guilt of dying Ukrainians because of the military conflict with Russia in the lap of President Trump. Then there was that pesky Internet Research Agency in St. Petersburg that spread propaganda across the world.

Ladies and gentlemen…it is still happening over there…where is the media? Where is Shifty Schiff and Nasty Nadler? Maria Yovanovitch is retired but gotta wonder what she knew.

Anyway read on….this is yet but only part of what continues to go on in Ukraine…Rudy Giuliani is working many other channels.

Hat tip to the REAL investigative reporters on the case…well done.

Image result for milton group kiev source

Luxury cars line the parking lot of the upscale Mandarin Plaza mall in Kyiv, while their well-heeled owners flaunt their wealth in its jewellery and designer clothes stores.

But hidden on its upper floors, protected by armed guards and under the constant surveillance of security cameras, a very different product is being sold.

Sitting elbow-to-elbow under fluorescent lights, a multi-lingual army of call center staff hawk get-rich-quick dreams across the world in the form of cryptocurrency and stock investments for a company called Milton Group.

Now, a cache of documents handed to the Swedish daily Dagens Nyheter by a whistleblower from inside the call center, and shared with OCCRP, exposes the inner workings of this type of fraud: an old-fashioned boiler-room scam that leverages the power of social media to operate on a global scale.

Armed with a list of over 1,000 people targeted by the call center, reporters from 21 countries and dozens of media outlets spoke to more than 180 victims, revealing a trail of ruined lives from Sweden’s Arctic Circle to the Ecuadorian Amazon, passing through small industrial towns in the Balkans and major world cities like London and Sydney.

The stories were strikingly similar. Many first came into contact with the scam through Facebook ads promising remarkable returns on investments. After entering their contact details to find out more, victims would be deluged with high-pressure sales calls. They would make a small “investment” that quickly yielded impressive — but fake — profits. But requests to withdraw the full funds were not honored.

Those worst affected were preyed upon by the call center’s “retention” desk, whose job was to conjure up new ways to extract more money, often through brutal psychological pressure. Some were harassed into taking out huge loans, threatened by forged letters from UK financial regulators demanding taxes, or contacted by fake lawyers offering to help get their money back — for yet another fee. In the most extreme cases, Milton Group’s retention specialists would convince victims to install software on their computers that allowed the scammers to control them remotely, and steal more money in the process. Some lost more than $200,000.

The victims, fooled by foreign names and addresses, and assurances of sky-high returns, believed they were on the phone with a legitimate investment business based in Western Europe. They had no inkling that the people on the other end of the line were largely young Ukrainians or Middle Eastern and African migrants in Kyiv.

Ukrainian Milton Group scheme source

Some tried to report their losses to police in their countries, but law enforcement largely failed to connect the dots. Cyber-crime units in multiple countries affected by the call center, including Spain and Italy, told OCCRP and its partners that they were aware of such cross-border frauds, but that they are hard to detect, often go unreported, and require cooperation between law enforcement bodies across many jurisdictions.

However, Swedish authorities have now opened an investigation based on the whistleblower’s extensive evidence, and have been in touch with Europol about the allegations.

“This company what they do, everything is fake,” said Alexey, the whistleblower. (His real name cannot be used to protect his safety.) “They just steal money from people.”

He said staff were told the Kyiv center took in a massive 65 million euros in sales in 2019. To celebrate, the company’s leaders threw a lavish New Year’s party themed around the novel “The Great Gatsby,” about a Jazz-Age bootlegger and con artist. Under neon lights, hundreds of Milton staffers watched contortionists and fire-dancers perform, and were awarded prizes, including cars, cash, and free lodging, for especially good salesmanship.

Milton is apparently tied to other call centers in Albania, Georgia, and North Macedonia employing hundreds more staff.

While it is impossible to determine whether every investment that passed through the Kyiv center was fraudulent, reporters from DN and across OCCRP’s network spoke to more than 180 victims listed in Milton’s client database who confirmed they had lost their money in investment scams. A few had been able to withdraw some funds, likely in an attempt to encourage further investments, or remained hopeful they would be able to cash out their “earnings” one day.

The supposed investments were made by transferring funds through Western Union, bank accounts, credit cards, and cryptocurrencies. Milton salespeople received a higher commission if they could convince their clients to pay in bitcoins and other cryptocurrencies, since they are harder to trace. Many of the bank-to-bank transfers were routed through the private accounts of individuals with a UK financial company, with clear instructions not to indicate the money was for investing.

In many cases identified by OCCRP, online credit-card payments were handled by a Cyprus-based company called Naspay, which bills itself as a “state-of-the-art payment gateway” and is owned by David Todua — the same Georgian-Israeli man the whistleblower identified to law enforcement as the person behind Milton Group. (Todua vigorously denies holding any “formal or informal position” in the company, although he conceded that he had attended Milton Group’s New Year’s party as a guest. He also said that Naspay does not process payments, but merely “transfers information” between websites that accept payments and financial institutions. OCCRP did not find evidence Todua has any ownership of Milton.)

After their initial investments, some victims were told they needed to send additional fees in cash to individuals in far-flung countries such as Colombia and Uganda rather than company bank accounts.

Leif Nixon, a Swedish cryptocurrency expert who helps law enforcement investigate bitcoin-related crime, analyzed the bitcoin addresses used by Milton Group to accept payments from its customers. He said the set-up did not appear to be that of a legitimate operator.

He noted several indications that clients’ money was not being invested as promised, including the fact that many different people were told to send their bitcoins to the same few addresses. Clients were also given different addresses each time they made a payment.

“It’s like opening a bank account, but you don’t get an account number; instead, for every deposit you make you get a different account number,” Nixon explained.

Ultimately, he said, $5.9 million in bitcoins from seven of Milton Group’s addresses disappeared into East Asian exchanges in 2019.

“I can’t see why a legitimate operation would make these kinds of transactions,” he said. “It doesn’t make any sense.”

Call center staff were well aware that their job was to steal, the whistleblower says. Alexey told DN that on one of his first days at Milton, the sales manager joked that even when she was as young as six, she dreamed of being a “motherfucker and stealing people’s money.”

At a training session for new staff at a Tbilisi call center linked to the Milton Group, attended by an undercover reporter last month, a trainer explained that the company’s goal was for customers “to lose their money in a realistic way.” Asked why, she laughed: “It’s naive to ask, to be honest. When they lose the money, it stays with us.”

An internal customer database reviewed by reporters is laced with expletives about “fucking” clients out of money, as well as highlighting their vulnerabilities and how they might best be targeted. In one note from October 2019, a Milton staff member wrote of a 67-year-old Swedish woman: “Sold her home to pay, no money, crying.”

That woman, reached by Dagens Nyheter in a rural part of central Sweden, told journalists she was tricked into investing over $100,000 by Milton staff who took out loans on her behalf.

She, like many other victims, was initially sucked in by the illusion that she was making huge profits: “You become hypnotized and brainwashed.”

But when she wanted to withdraw her supposed earnings, “they disappeared.” Today she cannot afford to buy food or pay her rent. “I have nothing to live for,” she said. While Milton Group’s fake investments have brought its victims financial ruin, the picture is very different for the firm’s alleged managers.

A review of their social media profiles shows that they have a penchant for expensive cars, foreign holidays, and guns. Some also have high-level political connections.

The CEO of Milton Group is Jacob Keselman, who declares himself “the Wolf of Kiev” on his Instagram account, a nod to “The Wolf of Wall Street,” the Hollywood film about a notorious penny-stock scammer. His social media profiles are replete with photos of luxury cars, foreign holidays, and the occasional gun. In one photo he can be seen working in a room with a spectacular view of the Eiffel Tower. He writes: “The one who loves his job is truly happy.”

OCCRP could not obtain official information about Keselman’s national origin, but on his LinkedIn profile he writes that his native language is Russian, he attended university in Kyiv, and he did two stints in sales in Israel before joining Milton Group.

Contacted for comment, Keselman denied that Milton Group had defrauded anyone. “You know how it is working, investment and forex brands … a lot of clients lose money because they don’t understand how it’s working,” he said. He went on to claim that Milton only provided IT support for companies selling investments. He did not respond to follow-up questions.

David Todua, a 38-year-old Georgian-born Israeli citizen, is a frequent visitor to the call center office in Mandarin Plaza, where according to Alexey the staff knew him as one of Milton Group’s owners.

Alexey said he saw Todua there at least six times, including once in November 2019, when he congratulated the staff on their performance and said Milton had brought in $50 million that year to date. The whistleblower said Todua always travelled with multiple bodyguards.

No official documents connect Todua to the scam call center, which on paper is owned by a different Georgian, Irakli Dadivadze. OCCRP was unable to track down any information about him.

However, Todua does own Naspay, a Cyprus-based payment platform through which Milton processes many of its “investments,” internal documents show.

At the firm’s New Year’s party, a man named David was called up to the stage by Keselman, the CEO, identified as the company’s “father,” and presented with a cake with three candles in it, representing the three years Milton Group had been in operation. The whistleblower identified this “father” as David Todua.

“In December, the company turned three years old,” Keselman said, according to an audio recording of the event obtained by OCCRP. “We are big kids, and our father is proud of us, while we are proud of him. And firstly [we] want to say a big thank you, David. And we want to give a cake, because what birthday is without a cake? And David will blow out the candle today.”

Todua told OCCRP he had been at the firm’s New Year’s party as a guest of Keselman, but denied holding any role in the company. “I am not father of any company, I am a proud father of 5 children,” he said.

On Instagram, he calls himself david_todua_007 and poses with a golden Kalashnikov, shoots with a sniper rifle, celebrates birthdays with a champagne tower, and posts photos of expensive cars parked outside his home. (“Hunting is indeed one of my hobbies,” he told OCCRP.)

He also has business ties with a surprising number of politicians from several countries, including ministers and other figures from the United National Movement party, which governed Georgia under President Mikheil Saakashvili for almost a decade until 2012. Saakashvili later became a Ukrainian citizen and forged a political career in the country.

Little is known about Todua’s life in Israel, where he migrated with his family in 1993, but court records and posts from his social media accounts show that he lived until recently in a villa near Tel Aviv. Today he lives in Cyprus.

In Albania, which boasts a 400-strong call center that also appears to be linked to Milton Group, the company operating it is owned by an adviser to a senior minister.

?The Georgian Connections

Although David Todua’s family left Georgia for Israel when he was just 11, as an adult he has ties to a surprising number of prominent political figures from his home country.

Most notably, his business partner in two Ukrainian companies is Davit Kezerashvili, an ex-defense minister and former chief of Georgia’s financial police under Saakashvili.

Todua and Kezerashivili co-own Project Partners, a real-estate and construction firm that is based out of a neighboring office building in Kyiv as Milton Group. Its head is Gia Getsadze, a former deputy justice minister in both Georgia and Ukraine.

Project Partners, in turn, co-owns a construction and civil engineering firm, Elitekomfortbud, with another former Georgian official, Petre Tsiskarishvili, a minister of agriculture under Saakashvili and a former leader of his United National Movement party.

Kezerashvili was charged in 2013 with accepting some $12 million in bribes to turn a blind eye to massive smuggling of alcohol from Ukraine to Georgia. He was ultimately cleared of the charges, which he says were politically motivated, but continues to live outside Georgia.

OCCRP has found no evidence that any of the former ministers are involved in the call center. In an email, Kezerashvili said he had never heard of Milton Group and had no knowledge of its activities, but confirmed that he was a business partner of Todua.

“You Will Never Regret This Decision”

Milton Group’s Kyiv call center does not appear unusual at first glance: Hundreds of phone sellers sit side by side, headsets on, using modern telephone and customer management systems.

Workers make up to 300 calls a day to clients around the world in an attempt to reach their monthly sales targets and secure bonuses.

The center is split into different sales desks by language — including Russian, English, Italian, and Spanish — each targeting their own areas of the world. Sellers use so-called “stage names” to build trust with the person on the other end of the call: A Senegalese man on the German desk goes by the name “Todd Kaiser,” while a Ukrainian woman whose real name is Daria calls herself “Diana Swan” or “Kira Lively.”

But undercover footage from inside Mandarin Plaza, as well as leaked internal documents, confirm that Milton was no ordinary call center.”

It is protected by burly guards and personal mobile phones are forbidden.

On the walls, next to posters of sports cars, a whiteboard sets out sellers’ monthly targets: $40,000 for the Russian market; $60,000 for Spanish, and $100,000 for those working the English-speaking desk.

The staffers in the sales department are provided with a set of notes explaining exactly how to target “clients” by nationality.

Scandinavians, the notes say, are mostly “old people and they really need someone to talk to.”

People from the UK, Australia, and New Zealand, on the other hand, like to believe they know everything and are certain that their countries are the best in the world, so call center workers are advised to pump them up.

“The only way to Handle [sic] such people is not to argue with them on whatever direction they take and make them feel that they are intelligent,” the notes explain.

“Later talk to them about how important the financial market has become because of great countries like Australia, UK, and New Zealand.”

“You will never regret this decision” is another line suggested to entice customers.

Those targeted by Milton Group are offered the chance to invest in cryptocurrency, stocks, or foreign currencies through a variety of different “brands,” all of which have generic-sounding names and similar websites, and are moved out of the rotation over time. Recently, Milton Group’s brands have included CryptoMB, Cryptobase, and VetoroBanc. All have been subject to recent investor warnings from regulators in the UK, Italy, and Spain.

The precise relationship between the call center and the brands they market is not always clear. Brands are sometimes not associated with any legal entity; when they are, they hide behind offshore secrecy. CryptoMB and VetoroBanc are run by offshore firms in the Marshall Islands and St. Vincent & Grenadines, respectively, while OCCRP could find no evidence that Cryptobase was tied to any specific company.

Alexey told journalists that the supposed VetoroBanc was entirely fabricated inside the Milton offices, with the name chosen by the Italian retention manager because it sounded “like one of the Italian banks.” The VetoroBanc website uses stock images for its staff that appear to have been taken from the internet. “Sylvia Moreno,” a supposed market analyst, is in fact an American pediatrician.

Alexey explained that staff had no specific expertise in financial products, but were carefully taught to sell “emotions.”

“It doesn’t matter which emotions, positive or negative: You can sell those fake products if people are really thinking about that,” he explained.

Clients were often shown huge profits to encourage them to invest further funds, but the money was always just numbers on a screen, the whistleblower explained. The only time victims were allowed to receive any of their funds back was in order to encourage an even bigger investment.

The most promising — and vulnerable — investors were passed on to the “retention team,” where the top salesmen work.

Their job is to “squeeze the money from the clients to the last cent,” Alexey explained, pushing them to borrow money and sell their cars and apartments. In one case, he said, a heavily pregnant Russian woman was convinced to hand over the small nest egg she had scraped together for her baby.

The most prolific and ingenious scammer at Milton Group is a man on the retention team who tells prospective investors his name is “William Bradley.”

In fact, he is a young Iranian who uses images of well-known US salesman and motivational speaker Marc Wayshak — who dubs himself “America’s sales strategist” — to disguise his identity on video calls.

OCCRP was unable to verify his real name, but at work and on social media he goes by “Hamze” and speaks fluent Farsi. Alexey claimed he takes in a massive $450,000 a month.

The call center’s internal customer database tracks how much each client has “invested,” as well as the potential to extract more money from them. Comments seen by OCCRP are laced with profanities and details of clients’ vulnerabilities.

One reads: “I saw 800 EUR in his bank and he is sick, he have problem and he told me I want someone fuck me and I said Foster [another call center operator] will fuck you.”

Another reads: “Getting fucked every month for at least 1000 EUR. Gets pension on the 20th/works every tuesday.”

Notes from the Milton Group’s internal customer database describing the situation of one of their victims, Östen Morian. Credit: Alexander Mahmoud/DN

Of another man, a call center staffer wrote: “Very Old man/pushed him to get the commission payment, hoping he can sort that out today, should call back at 3pm Sweden time.”

A month later, another note appears: “He is at his friend’s home because he doesn’t have money for food. Call him back on Monday, lost 400 k.”

That client was 75-year-old Östen Morian, a retired carpenter who lives close to the Arctic Circle in remote northern Sweden.

Contacted by DN, Morian confirmed he had lost around 400,000 Swedish krona (about $41,000) to the scammers after taking out loans, at 39 percent interest, to make what turned out to be fake investments. He was left heavily indebted.

“I don’t know what I can do,” he said. “Wait to die only.”

Go here for citations, photos and video

 

Govt Report on Prevention of Nationwide Cyber Catastrophe

A good first step for sure, however there needs to be a government-wide decision on cyber attacks being an act of war and how to respond.

***

The Cyberspace Solarium Commission’s proposes a strategy of layered cyber deterrence. Our report consists of over 80 recommendations to implement the strategy. These recommendations are organized into 6 pillars:
  1. Reform the U.S. Government’s Structure and Organization for Cyberspace.
  2. Strengthen Norms and Non-Military Tools.
  3. Promote National Resilience.
  4. Reshape the Cyber Ecosystem.
  5. Operationalize Cybersecurity Collaboration with the Private Sector.
  6. Preserve and Employ the Military Instrument of National Power.

Click here to download the full report.

A much-anticipated government report aimed at defending the nation against cyber threats in the years to come opens with a bleak preview of what could happen if critical systems were brought down.

“The water in the Potomac still has that red tint from where the treatment plants upstream were hacked, their automated systems tricked into flushing out the wrong mix of chemicals,” the Cyberspace Solarium Commission wrote in the opening lines of its report.

“By comparison, the water in the Lincoln Memorial Reflecting Pool has a purple glint to it. They’ve pumped out the floodwaters that covered Washington’s low-lying areas after the region’s reservoirs were hit in a cascade of sensor hacks,” it continues.

So begins the report two years in the making from a congressionally mandated commission made up of lawmakers and top Trump administration officials, pointing to the vulnerabilities involved with critical systems being hooked up to the internet.

The report, which includes more than 75 recommendations for how to prevent the cyber doomsday it spells out, and the commission that made it were both mandated by the 2019 National Defense Authorization Act (NDAA).

The commissioners, who include co-chairmen Sen. Angus King (I-Maine) and Rep. Mike Gallagher (R-Wis.), highlight a range of issues to address, but zero in on election security as “priority.”

“The American people still do not have the assurance that our election systems are secure from foreign manipulation,” King and Gallagher wrote in the report. “If we don’t get election security right, deterrence will fail and future generations will look back with longing and regret on the once powerful American Republic and wonder how we screwed the whole thing up.”

The focus on shoring up election security, and the agreed-upon recommendations for how to do this, sets the report apart from the approach to the subject on Capitol Hill, where it has been a major issue of contention between Republicans and Democrats since Russian interference in the 2016 presidential election.

Beyond election security, the commissioners call for overarching government reform to address cyber vulnerabilities. Chief among these is calling on the White House to issue an updated national strategy to address cyber threats and to establish a national cybersecurity director position to coordinate efforts.

In terms of congressional action, commissioners recommend that Congress create cybersecurity committees in both the House and Senate, establish a Bureau of Cybersecurity Statistics, and establish an assistant secretary position at the State Department to lead international efforts around cybersecurity.

“While cyberspace has transformed the American economy and society, the government has not kept up,” commissioners wrote in calling for reforms.

The commission also zeroed in on “imposing costs” to adversaries who attempt to attack the U.S. online. In order to do so, it recommended that the Department of Defense conduct vulnerability assessments of its weapons systems, including nuclear control systems, and that it make cybersecurity preparedness a necessity.

The Cybersecurity and Infrastructure Security Agency, the Department of Homeland Security’s cyber agency, would be empowered as the “lead agency” at the federal level.

The report’s recommendations were debated on and pinpointed by a group of high-ranking commissioners who also included FBI Director Christopher Wray, Deputy Secretary of Defense David Norquist, Transportation Security Administration Administrator David Pekoske, Sen. Ben Sasse (R-Neb.), and Rep. James Langevin (D-R.I.).

Langevin said in a statement on Wednesday that the report is intended to shore up the nation’s cyber “resiliency for years to come.”

“Our charge in drafting this report was to prevent a cyber event of significant national consequence, and we know that the short- and long-term recommendations we crafted will better position us to realize the promise of the Internet, while avoiding its perils,” Langevin said. “The sooner our recommendations are implemented, the better positioned the country will be to prevent and respond to incidents that can disrupt the American way of life.”

The report’s recommendations may soon have real-world consequences on Capitol Hill.

Rep. John Katko (R-N.Y.), the ranking member on the House Homeland Security Committee’s cyber panel, told The Hill this week that there “definitely will be some legislation” stemming from the report’s recommendations, and that hearings would likely be held.

Katko noted that he had talked with Senate Homeland Security Committee Chairman Ron Johnson (R-Wis.) about the Senate also taking action around the report.

“This report screams of the need for bipartisan action on this, and I hope that we can leave the politics out of it, and I hope we can attack these problems quickly and effectively,” Katko said.

Rep. Cedric Richmond (D-La.), the cyber subcommittee’s chairman, opened a hearing on Wednesday by praising the report’s recommendations and saying he looked forward to working to “codifying” the ideas alongside House Homeland Security Committee Chairman Bennie Thompson (D-Miss.).

Industry groups also reacted positively to the report’s recommendations. Tom Gann, the chief public policy officer of cybersecurity firm McAfee, told The Hill in a statement that he agreed with most of the report’s findings and hoped that they are “acted upon with speed.”

Protect Our Power, a nonprofit with the goal of protecting the electric grid, also praised the report.

“These are compelling recommendations, echoing issues we have highlighted for several years now, and action is long overdue,” Jim Cunningham, executive director of the group, said in a statement. “Without a reliable supply of electricity before, during and following a disabling cyberattack, none of our critical infrastructure can function.”

While there may be legislative action soon – and praise from industry groups – both Gallagher and King emphasized in the report that their main aim was for it to open the eyes of Americans to the dangers posed by cyberattacks on critical systems.

“The status quo is inviting attacks on America every second of every day,” the co-chairmen wrote. “We all want that to stop. So please do us, and your fellow Americans, a favor. Read this report and then demand that your government and the private sector act with speed and agility to secure our cyber future.”