• Revisiting Hunter’s Laptop

    April 14, 2022 // 11 Comments »

    You hear? The emails on Hunter Biden’s laptop are real. No less than the New York Times, the official MSM newspaper of the MSM, agrees. Actually, the FBI agreed first, as they’re in the middle of an ongoing criminal investigation into Hunter’s business and tax activities based on the contents of the laptop. Despite massive coverage of the emails in the non-MSM, it was only the FBI’s use of the laptop which finally forced the Times to admit to this year what it said was bull last year. Politico, based on a book by one of its own writers, now, too, admits the emails are real, not Russian disinformation.

    Now that we all agree the emails are real, and we can talk about them in polite company, what’s the big deal? Is this just another case of “buh buh her emails!!!”

    Well, yes, sort of. As the media went full-spectrum to hide, diminish, downplay, and muddle the story about Hillary Clinton’s emails, so did they do the same with Hunter’s. In Clinton’s case, knowledgeable people, experts in government classification, were forced to endure months of “news” speculating on whether the Secretary of State’s official correspondence might contain something classified, or about whether running one’s own unsecured email server for official business was some sort of legal violation, and then questions about whether deleting 30,000 pieces of potential evidence was “okay.” Despite failing to kill the story (Hillary’s shifting excuses gave it new life at each turn) the media softened its edges enough that when then-FBI Director James Comey disingenuously proclaimed Hillary innocent the public was ready to move on.

    In Hunter’s case the emails were buried, not merely diminished, as the MSM came to better understand its super powers. The hallmark was the interplay among the American intelligence services and the MSM, working for the Democratic Party. That interplay, awkward in 2016 with Comey at center stage, matured in 2020. As the NY Post and others broke the story that a laptop full of Hunter Biden’s files indicated a potential pay-for-play scenario involving then-candidate Joe Biden just ahead of the presidential election, almost in real time more than 50 former senior intelligence officials signed a letter claiming the emails “have all the classic earmarks of a Russian information operation.” With absolutely no evidence, the signers said their national security experience made them “deeply suspicious that the Russian government played a significant role in this case.” “If we are right,” they added, “this is Russia trying to influence how Americans vote in this election, and we believe strongly that Americans need to be aware of this.”

    The letter was evil brilliance in that it played off earlier prejudices, from 2016, that the Russians sought to manipulate American elections. In fact, most of the key signatories — James Clapper and John Brennan among them — had played key roles in misdirecting public opinion around the DNC server hack and later the whole of Russiagate. In the hands of the MSM the meme quickly morphed into “the laptop is fake,” a parallel to “but her emails!!!”

    Something new was introduced, however, the active blocking of information from a large number of Americans. With the letter as “proof” the laptop was disinformation, social media took the handoff. Twitter locked The New York Post‘s  account after the Post refused to obey Twitter’s orders to delete its own reporting. Twitter also blocked all references to the laptop story by all users, even banning links to the story in DMs. Facebook announced no discussion of the issue would be allowed pending a “fact check” which never came. MSM labeled the laptop fake, social media blocked the news, and pretty much the public fell in line and voted for Joe Biden without knowing squat about what he and his son Hunter had been up to.

     

    TAC readers were not included in this seething heap of ignorance. TAC, alongside the NY Post and many other non-MSM outlets, understood the emails were worthy of the public’s attention. In the case of TAC, we published a deep dive into the laptop’s contents online in December 2020, and a deeper dive in our print edition. NY Post readers got much of the same information even before the election. As the contents of the laptop become more widely known, it appears the intelligence community-media-Democratic Party was right to hide them before the presidential election: almost half of Americans believe Trump would have won a second term if the media had fully reported on the laptop’s revelations. Another poll showed enough people in battleground states would have changed their minds had they known about the emails to give Trump the electoral votes needed for reelection. If you’re keeping score, hiding the emails marks the second election controlled by the intelligence community-media-Democratic Party.

    Given that for better or worse Joe Biden was elected, and is very unlikely to run for a second term, do Hunter’s emails still matter in 2022? Yes. The laptop still has a lot to tell us.

    — The emails matter because their handling exposed (again) the way the intelligence community-media-Democratic Party manipulated your vote. You need to understand their techniques ahead of 2024.

    — The emails matter because they are just the tip of the iceberg. We already know Hunter did not report much of the income revealed by the emails, and recently paid one million dollars in back taxes with Federal fraud charges pending. There is more to come which may affect who you vote for in 2024.

    — The emails matter because they show Hunter did or was planning to kick in money to his father (“10 percent for the big guy,” read one email.) There was co-mingling of their finances, shared bank accounts, and covering each other’s bills, which need to be investigated. In one message, Hunter revealed he was locked out of a bank account because his father was using it. In a text, Hunter complained that he was required to give his father half of his money for some unspecified task.

    — The emails matter because they are primary evidence of possibly criminal actions by Hunter that bump into Joe’s official work first as Obama’s VP and now as president. Hunter Biden had extensive deals working in Ukraine and China that conflict-of-interest laws demand to be investigated. Hunter took large sums of money from businesses in Ukraine that were part of his father’s official portfolio as vice president, and took large sums of money from Chinese shell companies with ties to the Chinese oligarchy. Hunter performed no work in return for the money. In the case of China, he appeared to launder money, taking in six figures, skimming off a percentage, then handing the remainder over to a U.S. corporate entity of the Chinese organization. That got around Chinese government currency export regulations. Only an FBI investigation will show if Joe was involved in any of the same.

    — The emails matter because they were blackmail fodder, and the FBI must find out if Hunter was tapped by any foreign intelligence service when his father was VP. On the laptop was evidence of Hunter’s filthy life, actions simply screaming to a foreign intelligence service “Blackmail me!” Hunter’s laptop was chocked with video showing him smoking crack. Hunter spent money on escorts, some $21,000 on cam sites, big plays on all sorts of depravities.  There was correspondence referencing Hunter’s affair with his dead brother Beau’s widow.

    — The emails matter because if Supreme Court Justice Clarence Thomas’ wife’s politics may rise to the level of his impeachment, then Joe Biden’s son’s action may do so also.

    — The emails matter, if you keep score this way, because they show Hunter was doing what so many can only imagine they’ll one day have proof Jared, Don, Jr., Ivanka, and Eric did.

    — The emails matter because the President of the United States says they do not matter. Joe Biden’s defense is a sweeping: “My son did nothing wrong.” That makes Joe either too ignorant to hold high office, or an accomplice in a cover-up, both 25th Amendment territory. This is especially important because Joe ran on an anti-corruption platform following the Trump family escapades.

    — The emails matter because they are not a smoking gun, but a multi-pronged series of leads and pointers which deserve investigation to see if there is a smoking gun. To dismiss them because they are “incomplete” is to fail to understand the difference between evidence and conclusion. And that makes you look sorta dumb shouting about it on Late Night.

    Editor’s Note: Though the full text of the emails are not yet available in full online, you can read TAC’s summary, with specific examples, here.

     

    Related Articles:




    Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.

    Posted in 2020, Biden, Democracy

    Russiagate: The Smoking Gun, Part I

    March 30, 2022 // 6 Comments »

    We are looking for two smoking guns now in connection with Russiagate. Today’s Part I will show Hillary Clinton herself sat atop a large-scale conspiracy to use the tools of modern espionage to create and disseminate false information about Trump. Part II to follow will show the FBI was an active participant in that conspiracy.

    In summer 2016 Hillary Clinton’s private email server and her improper handling of classified information was the political story. Consensus was the election was Hillary’s to lose, that her opponents in general and especially the Trump clown show, could not stop her. Despite the MSM’s heroic attempts to downplay the importance of the emails, the issue lingered in the public mind, often aided by Hillary’s own contradictory statements. The emails nagged at the Clinton campaign — her unsecured server lay exposed during her SecState trips to Russia and China, and the deepest fear was that her internal communications might appear one day on Wikileaks, ending her career.

    Clinton fought back. The initial shot was fired on July 24, 2016 by campaign manager Robby Mook, who was the first to claim there was a quid pro quo between Trump and Russia. “It was very concerning last week that Donald Trump changed the Republican platform to become what some experts would regard as pro-Russian,” Mook said, referring to a false story from the GOP convention just a few days earlier. The New York Times sent up a warning flare to all MSM media the next day announcing Clinton was making the Trump-Russia allegation a “theme” of the campaign.  As if she knew just what was coming next, Hillary took that as her cue to claim the Russians were trying to destroy her campaign, a theme which soon morphed into the Russians were trying to help Trump. That soon became Trump and Putin were working in collusion to elect Trump as a Manchurian candidate.

    A prime driver behind all this was a mysterious “dossier.” The jewel in the crown was a “pee tape,” blackmail, kompromat, Moscow held to control Trump. Word was a former MI-6 intelligence officer named Christopher Steele compiled the dossier, giving the whole thing credibility. America media openly speculated on Trump’s imminent arrest for treason, with Twitter aflutter with phrases like tik-tok, walls closing in, and the like. The FBI’s James Comey and CIA’s John Brennan briefed the newly-elected Trump on the dossier simultaneously with the full contents spilling into the media. Talk shifted to impeachment, alongside claims Hillary might still deserve to be president.

    We know now the dossier was fiction. Steele’s raw information was provided by the Clinton campaign, with his chief source working for the Brookings Institute. Steele worked as a double-agent, feeding Clinton-paid for fake info to the FBI pretending he was an FBI informant with sources deep inside Mother Russia. The dossier was a product of the Clinton campaign.

    We also now know the Clinton campaign, via one of its lawyers, Michael Sussmann, gathered Internet DNS data on Trump and used that to create a fully fictional story about Trump using a secret server connected to the Alfa Bank to communicate with his Russian “handlers.” Sussmann also peddled a false story about Russian smartphones connecting into the Trump White House. We know Sussmann hid his relationship to Clinton from the FBI, pretending to be a “concerned citizen.” Sussmann is under indictment by Special Counsel John Durham, and in his own defense filing does not dispute the basic facts. He only claims his lying was immaterial.

    Both the dossier op and the DNS op were funded by Clinton campaign money laundered through its lawyers at Perkins Coie and then contractors Fusion GPS and Orbis. In both instances the false information created was peddled to the FBI (and CIA) by a Clinton-paid stooge pretending not to be affiliated with the campaign, Steele as an FBI informant and Sussmann as a “concerned citizen.” Both ops used a sophisticated information sub-op, feeding the media as if Steele and Sussmann were not the source and then having Steel and Sussmann step in to serve as anonymous confirmers, an inside loop. In both instances the FBI took the bait and opened unprecedented full-spectrum investigations into first Candidate Trump, and then President of the United States Trump.

    Four years after all that, on October 6, 2020, Director of National Intelligence John Ratcliffe declassified documents revealing then-CIA Director John Brennan briefed then-President Obama on or about July 28, 2016 on Hillary Clinton’s plan to tie Candidate Trump to Russia as a means of distracting the public from her use of a private email server.

    The highly-redacted document says “We’re getting additional insight into Russian activities from [REDACTED]. Cite alleged approved by Hillary Clinton on July 26 a proposal from one of her foreign policy advisers to vilify Donald Trump by stirring up a scandal claiming interference by the Russian security service.”

    Ratcliffe in 2020 also revealed in September 2016 the CIA forwarded to the FBI an investigative referral on Hillary Clinton approving “a plan concerning U.S. presidential candidate Donald Trump and Russian hackers hampering U.S. elections in order to distract the public from her email scandal.”

    The MSM at the time dismissed these two important disclosures as unverified disinformation. The problem with simply waving away these documents is the very high threshold for information to actually reach the president. Every day a near-infinate amount of information is collected by the CIA. A tiny percentage of that is culled for the standing Agency briefings the president receives. An even tinier subset is seen as important and credible enough to be personally briefed by the CIA Director face-to-face with the president.

    Rarely is there near-time “verification” with intelligence. There is however “confidence,” how sure the CIA is the information is true, and the Director would not waste his boss’ time with that of low or medium confidence (and neither would the Agency do the same in sending its referral on to the FBI.) Knowing what we know now about Clinton campaign funding of the ops and Clinton personnel involvement, Brennan’s confidence is better understood. And it is important to remember Brennan openly supported Hillary; he was not the guy to dish dirt on her. He was making sure his boss, Barack Obama, had a heads up if the whole thing was ever exposed.

    There is also the matter of Ratcliffe, who hand-selected the documents to declassify, lending them more credibility. Why play high stakes with information Radcliffe knew to be false?

    One last concern has been that the CIA source appears to be foreign, and therefore suspect. The CIA is legally prohibited from spying on Americans in America, particularly something as sensitive as a presidential campaign. Even if tipped off by an American, the CIA would need to go overseas and recreate the info with a foreign source. That the information was available through a foreign source also suggests strongly Moscow had eyes on inside the Hillary campaign. Perhaps through her email?

    Both ops ran on Clinton’s money and Clinton’s people. The smoking gun of Brennan’s notes ties it all to Hillary herself.

     

    Related Articles:




    Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.

    Posted in 2020, Biden, Democracy

    Hunter Biden’s Laptop Stole the Last Election

    March 23, 2022 // 3 Comments »

    With the November midterms coming, the media will soon pivot to who will be trying to steal the next election. Democrats are obsessed with the idea that when they lose elections it must be because of outside forces, usually some sort of Russian lifeform at work. But what we know now is that if anyone has been manipulating our once dear democracy, it has been the Democrats.

    The latest findings by the Durham investigation make it clear the 2016 Clinton campaign paid for and implemented a massive disinformation strategy to falsely link Trump to Russia, and then worked the intelligence services of the United States and the MSM to shove that narrative deep into the American psyche. When Trump won, Democrats immediately used that same strategy to try and drive him from office. That that too failed is not the point; the playbook was being worked out for manipulating an election within the boundaries of the American system. The Dems/Intel services/MSM proved to be fast learners; when it came to 2020, the basic plan did work, deep sixing the contents of Hunter Biden’s laptop to glide Joe into the White House.

    I can say with great conviction had the laptop been front paged it would have affected the election, perhaps seeing Trump reelected. How can I say that? Unlike almost everyone else in America, I read the contents of the laptop in 2020. Here is why you didn’t.

     

    On October 14, 2020, three weeks before the Trump-Biden election, the nation’s oldest newspaper, founded by Alexander Hamilton himself, The New York Post, published reports about the business dealings of Hunter Biden in Ukraine and China. Hunter took large sums of money from businesses in Ukraine that were part of his father’s official portfolio as vice president, and took large sums of money from Chinese shell companies with ties to the Chinese oligarchy. Hunter performed no work in return for the money. In the case of China, he appeared to launder money, taking in six figures, skimming off a percentage, then handing the remainder over to a US corporate entity of the Chinese organization. That got around Chinese government currency export regulations.

    The funds sent to Hunter were obscured in a number of ways. They passed through paper companies Hunter set up. They traversed numbered Cypriot bank accounts, came in the form of prepaid VISA cards, and as gifts including diamonds and Apple products. Some money was routed through Joe Biden’s brother’s law office, Hunter’s uncle. Hunter illegally did not report much of the income, and recently paid one million dollars in back taxes (fraud charges may be pending.)

    In return for all this money, Hunter introduced a Ukrainian energy businessman to his daddy, the VP, and promised other global characters similar access. He met with oligarchs in Beijing alongside his father’s official meetings, having flown to China aboard the same Air Force plane. In correspondence with his clients, Hunter regularly referenced his access to the “Big Man,” Papa Joe.

    Aside all this financial filth on the laptop was evidence of Hunter’s own filthy life, actions simply screaming to a foreign intelligence service “Blackmail me!” Hunter’s laptop was chocked with video showing him smoking crack. Hunter spent money on escorts, some $21,000 on cam sites, big plays on all sorts of depravities.  Correspondence referencing Hunter’s affair with his dead brother Beau’s widow for goodness sakes. The blackmail fodder is so clear Chinese intelligence would probably assign the case to an intern to run.

     

    But the public never saw any of this, thanks to the collaborative efforts of the American intelligence services and the MSM working, for the Democratic Party.

    Soon after the New York Post broke the laptop story, the disinformation campaign began with a Politico piece headlined “Hunter Biden story is Russian disinfo, dozens of former intel officials say.” Lacking proof, they wrote “our experience makes us deeply suspicious that the Russian government played a significant role in this case. [It] has all the classic earmarks of a Russian information operation.” And that was good enough for the MSM to take the handoff.

    The emails were a “hoax” said fact-check site NewsGuard, discredited by “many, many red flags” according to NPR. Twitter locked The New York Post‘s  account after the Post refused to obey Twitter’s orders to delete its own reporting. Twitter also blocked all references to the laptop story by all users, even banning links to the story in DMs. Facebook announced it would suppress discussion of the reporting pending a “fact check” which never came. Compare this Orwellian treatment of the laptop story with the way the same organizations handled the Russiagate dossier, slathering it across the media. The irony is any fact checking would have proved the laptop story true, and the dossier completely false. The ultimate irony is while you can read the full dossier online, the laptop emails are still not available to the general public.

    So how do we know now the laptop story was always true?  Hunter’s former business partner Tony Bobulinski confirmed his emails were legitimate months ago. Last week the New York Times agreed, reporting on an ongoing FBI criminal investigation into Hunter’s business and tax activities based in part on the contents of the laptop. The FBI’s use of the laptop finally forced the Times so send out its own reporters so it could claim this year what it said was bunk last year, that the emails “were authenticated by people familiar with them and with the investigation.” Politico now, too, admits the emails are real, not Russian disinformation, based on a book by one of its own writers. The President of the United States for his part claims to have known nothing about his own son’s and brother’s business dealing and name dropping, and is sticking, loosely, to the Russian disinformation version of things. Biden’s defense has always been sweeping: “My son did nothing wrong.” The most charitable reading of that is Joe Biden, one of the most powerful men in the world, is an idiot.

    Surveys suggest the information could have swung the election if voters had known about it. One showed enough people in battleground states would have changed their votes to give Trump the electoral votes needed for reelection. Russiagate. Alfa Bank. The laptop. All coordinated disinformation campaigns run by the Democrats involving the MSM and intelligence communities, all aimed at defeating Donald Trump. You see how it works now. Watch for the same pattern as we approach the midterms, and in 2024.

    Related Articles:




    Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.

    Posted in 2020, Biden, Democracy

    Was It All Just Pilot Error? IG Report Says No Political Bias Found in FBI Investigation of Clinton Email

    June 21, 2018 // 25 Comments »



    What everyone will agree on: Comey and the FBI interfered with the election. What everyone will not agree on: Everything else.

    It will be easy to miss the most important point amid the partisan bleating over what the Department of Justice Office of Inspector General report on the FBI’s Clinton email investigation really means. While each side will find the evidence they want to find that the FBI, with James Comey as Director, helped/hurt Hillary Clinton’s and/or maybe Donald Trump’s campaign, the real takeaway is this: the FBI influenced the election of a president.

    In January 2017 the Inspector General (IG) for the Department of Justice, Michael Horowitz (who previously worked on the 2012 study of the Obama-era gun operation Fast and Furious), opened his probe into the FBI’s Clinton email investigation, including statements by Comey made about that investigation at critical moments in the presidential campaign. Horowitz’s focus was always to be on how the FBI did its work, not to re-litigate the case against Clinton. Nor did the IG plan to look into anything Russiagate.

    In a damning passage, the 568 page report found it “extraordinary and insubordinate for Comey to conceal his intentions from his superiors… for the admitted purpose of preventing them from telling him not to make the statement, and to instruct his subordinates in the FBI to do the same… by departing so clearly and dramatically from FBI and department norms, the decisions negatively impacted the perception of the FBI and the department as fair administrators of justice.” Comey’s drafting of a press release announcing no prosecution for Clinton, written before the full investigation was even completed, is given a light touch though in the report, along the lines of roughly preparing for the conclusion based on early indications. We also learned Comey ironically used private email for government business.

    Attorney General Loretta Lynch herself is criticized for not being more sensitive to public perceptions when she agreed to meet privately with Bill Clinton aboard an airplane as the FBI investigation into Hillary unfolded. “Lynch’s failure to recognize the appearance problem… and to take action to cut the visit short was an error in judgment.” Her statements later about her decision not to recuse further “created public confusion and didn’t adequately address the situation.”

    The report also criticizes in depth FBI agents Peter Strzok and Lisa Page, who exchanged texts disparaging Trump, and then moved from the Clinton email to the Russiagate investigations. Those texts “brought discredit” to the FBI and sowed public doubt about the investigation, including one exchange that read “Lisa Page: “[Trump’s] not ever going to become president, right? Rights?! Peter Strzok: “No. No he’s not. We’ll stop it.” Another Strzok document stated “we know foreign actors obtained access” to some Clinton emails, including at least one secret message.”

    Page and Strzok also discussed cutting back the number of investigators present for Clinton’s in-person interview in light of the fact she might soon be president, their new boss. Someone identified only as Agent One went on to refer to Clinton as “the President” and in a message told a friend “I’m with her.” The FBI also allowed Clinton’s lawyers to attend the interview, even though they were also considered witnesses to a potential set of crimes committed by Clinton.

    Page and Strzok were among five FBI officials the report found expressed hostility toward Trump before his election as president, and who have been referred to the FBI’s internal disciple system for possible action. The report otherwise makes only wishy-washy recommendations, things like “adopting a policy addressing the appropriateness of Department employees discussing the conduct of uncharged individuals in public statements.”

    Attorney General Jeff Sessions indicated he will review the report for possible prosecutions. The IG previously referred former FBI Deputy Director Andrew McCabe for possible prosecution after an earlier report found McCabe leaked to the press and later “lacked candor” when speaking to Comey and federal investigators. Sessions fired McCabe him in March 2018.

    But at the end of it all, the details really don’t matter, because the report found no political bias, no purposeful efforts or strategy to sway the election. In aviation disaster terms, it was all pilot error. An accident of sorts, as opposed to the pilot boarding drunk, but the plane crashed and killed 300 people anyway.

    The report is already being welcomed by Democrats — who feel Comey had shattered Clinton’s chances of winning the election by reopening the email probe just days before the election — and by Republicans, who feel Comey let Clinton off easy. Many are now celebrating it was only gross incompetence, unethical behavior, serial bad judgment, and insubordination that led the FBI to help determine the election. No Constitutional crisis. A lot of details in those 568 pages to yet fully parse, but at first glance there is not much worthy of prosecution (though IG Horowitz will testify in front of Congress on Monday and may reveal more information.) Each side will point to the IG’s conclusion of “no bias” to shut down calls for this or that in a tsunami of blaming each other. In that sense, the IG just poured a can of jet fuel onto the fires of the 2016 election and walked away to watch it burn.

    One concrete outcome, however, is to weaken a line of prosecution Special Counsel Robert Mueller may be pursuing. To say Comey acted incompetently during the election, albeit in ways that appear to have helped Trump, does not add to the argument he is otherwise competent, on Russia or any other topic. An FBI director willing to play in politics with an investigation is simply that, an FBI director who has abandoned the core principles of his job and can’t be trusted. Defend him because it was all good natured bad judgment doesn’t add anything healthy to the question of competency.

    Mueller has just seen a key witness degraded — any defense lawyer will characterize his testimony as tainted now — and a possible example of obstruction weakened. As justification for firing Comey, the White House initially pointed to an earlier Justice Department memo criticizing Comey for many of the same actions now highlighted by the IG (adding later concerns about the handling of Russiagate.) The report thus underscores one of the stated reasons for Comey’s dismissal. Firing someone for incompetence isn’t obstructing justice; it’s the boss’ job.

    It will be too easy, however, to miss the most important conclusion of the report: there is no longer a way to claim America’s internal intelligence agency, the FBI, did not play a role in the 2016 election. There is only to argue which side they favored and whether they meddled via clumsiness, as a coordinated action, or as a chaotic cluster of competing pro- and anti- Clinton/Trump factions inside the Bureau. And that’s the tally before anyone brings up the FBI’s use of a human informant inside the Trump campaign, the FBI’s use of both FISA warrants and pseudo-legal warrantless surveillance against key members of the Trump team, the FBI’s use of opposition research from the Steele Dossier, and so on.

    The only good news is the Deep State seems less competent than we originally feared. But even if one fully accepts the IG report’s conclusion all this — and there’s a lot — was not intentional, at a minimum it makes clear to those watching ahead of 2020 what tools are available and the impact they can have. While we continue to look for the bad guy abroad, we have already met the enemy and he is us.



    Related Articles:




    Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.

    Posted in 2020, Biden, Democracy

    Some Important Things That Really Do Matter About Hillary Clinton

    August 31, 2016 // 24 Comments »

    hillary


    Even if everyone does it, that does not make it right. That excuse did not work for you in 6th grade when you were caught smoking in the girl’s room and it should not be accepted from a presidential candidate or her supporters in the media.

    Many politicians do crappy things. That is not an excuse for you to also do them. See above.

    “Well, at least I wasn’t indicted” is not a very high standard for the presidency.

    “There is no proof of quid pro quo.” What do you mean by proof? A notarized statement “This guy gave us money, so let’s sell him weapons?” Reality doesn’t work that way so spare us the strawman argument. Phone calls are made. Conversations happen. Minions learn quickly what their boss wants. People at the Clintons’ level rarely leave paper trails behind and when they do, they delete them before the FBI arrives to pick up the server.

    If someone offers you millions of dollars for essentially no work (i.e., a speech) they are going to want something in return. If you want more money, you will need to give something to them.

    “All they wanted was a meeting with the secretary to offer their views.” Sure, maybe. But in Washington the currency is closeness to power. For a wealthy person, buying just material things loses its charm after a while. They buy access, they buy the appearance of power, they buy chances to take those photos of themselves with prominent world leaders all rich people have on their walls. You look like a sap, arm candy in return for cash. Quid pro quo can mean a meeting, a visa issued, an arms deal made.

    How do you feel when you find out your doctor prescribed you medication from a pharmaceutical company that paid him large speaking fees? Appearances do matter and it is likely that such money does not impact judgement.



    Follow the money. Always follow the money.


    If the secretary of state’s name is Clinton and the foundation receiving the money is named Clinton, they are part of the same thing.

    If you put classified material on an unclassified server, that is wrong. It exposes that material to America’s adversaries. Presidents should simply not do that. No one else in government has ever knowingly been allowed to do that.

    There is such a thing inside the U.S. government called retroactive classification. You may not like it, and you may have convinced sops in the media to pretend with you it does not exist, but it is real. I’ll Google it for you, here, and here. Retroactive classification was tested at the Supreme Court level; see DEPARTMENT OF HOMELAND SECURITY v. MACLEAN. Someone please call CNN and pass them those links.

    The Clinton Foundation as a charity has done some good deeds. But do not conflate those with its role as a money laundering tool. The two are very separate functions of the same organization. And you can have the first without the second. In fact, that’s how good charities work.

    Avoiding even the appearance of unethical behavior is important. Persons throughout the government watch what their senior leaders do as signals as to what they can get away with. Leadership matters, and that means staying clean and making sure everyone sees that you are clean. You lead by example, one way or the other.

    When global leaders come to wonder if you can be bought off for some “donations,” they will either lose respect for you, or want to buy you off themselves. They will not simply ignore it.

    Putin could really not give a sh*t which assclown is elected president. He’ll go on acting in his country’s best interests no matter who is in the White House, as he has done through multiple administrations already. Get over yourself.

    Hiding from the press and not holding press conferences seems like the behavior of a petulant six-year-old.

    It is not leadership nor is it presidential to be caught as a liar and a prevaricator on a regular basis. People do not trust you; not voters, not the Congresspeople you will need to work with, not other world leaders you will have to negotiate with.

    The lesser of two evils is still evil. Why do you want to knowingly vote for evil?




    Related Articles:




    Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.

    Posted in 2020, Biden, Democracy

    Did Russian Intelligence Hack the DNC Servers?

    July 26, 2016 // 42 Comments »

    russianbear

    Short answer: nobody knows, but the media is treating it as a fact based primarily on a single technical source employed by the Democratic National Committee. I read the source’s publically available explanation. Here’s what I found.

    A Quick Taste of Media Conclusions

    Despite a line in paragraph five saying “Proving the source of a cyberattack is notoriously difficult,” the New York Times offers the following statements.

    — “researchers have concluded that the national committee was breached by two Russian intelligence agencies;”

    — “Though a hacker claimed responsibility for giving the emails to WikiLeaks, the same agencies are the prime suspects;”

    — “Whether the thefts were ordered by Mr. Putin, or just carried out by apparatchiks who thought they might please him, is anyone’s guess.”

    — “It is unclear how WikiLeaks obtained the email trove. But the presumption is that the intelligence agencies turned it over, either directly or through an intermediary. Moreover, the timing of the release, between the end of the Republican convention and the beginning of the Democratic one, seems too well planned to be coincidental.”

    There’s more, but you get the picture. The article also quotes Clinton staffers citing unnamed experts and researchers.

    Who Are These Experts?

    The only experts cited work for a company hired by the Democratic National Committee to investigate the hack. There is no indication of any neutral third party investigation. The company, Crowdstrike, issued a publicly available report on what they found.

    The report title makes clear the company’s conclusion: Bears in the Midst: Intrusion into the Democratic National Committee.


    What Does the Report Say?

    The report has some technical explanations, but focuses on conclusions that seem to be at best presumptions, despite the media treating them as fact.

    — The key presumptive conclusion seems to be that the sophistication of the hacks points to a nation-state actor. “Their tradecraft is superb, operational security second to none and the extensive usage of ‘living-off-the-land’ techniques enables them to easily bypass many security solutions they encounter. In particular, we identified advanced methods consistent with nation-state level capabilities.”

    — The hackers, two separate entities Crowdstrike says worked independently, used techniques known to be used by Russians. Better yet, with no evidence at all presented, Crowdstrike concludes, “Both adversaries engage in extensive political and economic espionage for the benefit of the government of the Russian Federation and are believed to be closely linked to the Russian government’s powerful and highly capable intelligence services.” Also, for one of the alleged hackers, “Extensive targeting of defense ministries and other military victims has been observed, the profile of which closely mirrors the strategic interests of the Russian government.”

    — By the end of the report Crowdstrike is just plain out called the hackers “Russian espionage groups.”

    FYI: Fidelis, another cybersecurity company, was hired by Crowdstrike to review the findings. Fidelis worked exclusively and only with data provided by Crowdstrike (as did several other companies.) Fidelis They concluded the same two hackers, COZY BEAR and FANCY BEAR APT, committed the intrusion, but made no comments on whether those two were linked to the Russian government.


    Um, Valid Conclusions?

    Despite the citing with certainty of experts and researchers by the media and the Clinton campaign, the only such expert who has made any findings public has basically thrown out little more than a bunch of presumptions and unsubstantiated conclusions.

    Left undiscussed are:

    — the commonality of hackers using “false flags,” say where an Israeli hackers will purposely leave behind false clues to make it seem that a Hungarian did the work. As one commentator put it sarcastically “The malware was written in Russian? It was a Russian who attacked you.
    Chinese characters in the code? You’ve been hacked by the Peoples Liberation Army.”

    — the question of if the hackers were “Russians,” can anyone tie them to the Russian government? Joe Black Hat breaking into some system in Ireland may indeed be an American person, but it is quite a jump to claim he thus works for the American government.

    — there is also a significant question of motive. For Putin to be the bad guy here, we have to believe that Putin wants Trump in power, bad enough to risk near-war with the U.S. if caught in the hack, and bad enough to really p.o. Clinton who will be nominated this week anyway, and hoping of course that evidence of dirty tricks by the DNC released in July will be enough to defeat her in November. That’s a real s-t-r-e-t-c-h, Sparky.

    — other than those private persons who hack for their own entertainment or personal political beliefs, most work for money. They steal something and sell it. Information from the DNC system would find an easy buyer.

    — Who might be intersted in buying these emails? Along the range of actors who would benefit from exposing these emails, why would the Russians come out on top? Perhaps the Republicans? China? Pretty much any of the many enemies the Clintons have amassed over the years? Hell, even Bernie Sanders, whose complaints about the DNC were validated by the email release. The suspects based on motive alone make up a very long list.



    Learning More

    For some intelligent analysis suspicious that the DNC hack was a Russian intelligence job, try this.

    For some more technical information on one of the alleged DNC infiltrators, here you go.




    Related Articles:




    Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.

    Posted in 2020, Biden, Democracy

    Four Important Things the FBI Didn’t Say About Hillary Clinton’s Email

    July 6, 2016 // 24 Comments »

    hillaryskates


    My thoughts on the FBI’s decision not to indict Hillary Clinton over her mishandling of classified information are posted elsewhere today.

    Have a look at Reuters.com to see what I have to say!








    Related Articles:




    Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.

    Posted in 2020, Biden, Democracy

    State Department Says It Will Take 75 Years to Release All Requested Clinton Emails

    June 10, 2016 // 12 Comments »

    Mac Beaulieu



    The State Department this week, apparently with a straight face, defended its claim that releasing all the emails sought by the Republican National Committee (RNC) would take 75 years.

    “It’s not an outlandish estimation, believe it or not,” spokesman Mark Toner told reporters. “It’s an enormous amount of FOIA [Freedom of Information Act] requests,” he added. “Very broad and very complex.”

    The RNC has sued the State Department seeking all emails to or from Clinton’s former chief of staff, Cheryl Mills, senior adviser Jacob Sullivan and undersecretary for management Patrick Kennedy from 2009 to 2013. The State Department has claimed that the result would yield roughly 1.5 million pages of documents that it and other federal agencies would need to go through page by page.

    The Department claimed in a court filing last week trying to kill the RNC lawsuit that the emails are “complex” and include “classified documents and interagency communications that could have to be referred to other agencies for their review.”

    Because the State Department expected that it could process roughly 500 pages per month, processing all 450,000 pages would take 900 months, or 75 years.


    FUN POINTS:

    — If Clinton had not used her private server while in office, any FOIA requests for her documents would have been processed all along from 2009 forward, instead of being clumped into a huge pile just months before the election. If blocking FOIA was indeed her goal (it was), she did an excellent job.

    — Also, that bit about “classified documents and interagency communications that could have to be referred to other agencies for their review” is kinda noteworthy given that any emails to and from Clinton traveled via unclassified means. But whatever.

    — Lastly, it is sort of quaint that State’s estimated processing time seems based on the assumption that however many people are now working on the FOIA review will not increase despite increased demand and despite the delays being caused by Clinton’s own decision to not use official email.



    I gotta say, State is really betting the farm, the cow and the corn on this one, hoping Clinton is elected and that most of this will just fade away, or really be sucked down a 75 year long tunnel as the Republicans hold hearings until the end of time. Because a Republican administration would basically at this point gut the State Department and turn the main building into a Trump mini-mall.

    But wait, seriously, 75 years? How the hell can a spokesperson say those things without a room full of reporters throwing their pens at him?


    BONUS: But it’s just a fishing expedition, says every Hillary supporter. To which one must consider saying, f*ck you. The Freedom of Information Act requires the government to turn over records for whatever purpose. There is no part of the Act that allows anyone to judge the reason for the request, so just go away and shut up, because you’ll vote for her even if she skins a puppy alive on the Jimmy Fallon show. The rest of us still are in possession of our critical thinking skills for the time being.

    Graphic courtesy of friend of the blog Mac Beaulieu




    Related Articles:




    Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.

    Posted in 2020, Biden, Democracy

    Memo to the President Regarding the Hillary Clinton Email Server

    May 29, 2016 // 19 Comments »

    obama and clinton


    The following memo was written by a group of U.S. intelligence, diplomatic, and military veterans, calling on President Obama to expedite the FBI review of former Secretary of State Clinton’s alleged email security violations so the public can assess this issue in a timely fashion.

    Clinton’s judgement — never mind the significant question of legality — is an important criterion which Americans must consider in choosing their next president.

    Yeah, it is long, but sometimes important things are complex, and need to be explained clearly. That is especially true in the case of the Clinton Emails, where the media has failed in its job of explaining how classification works, and the significance of exposing classified material.

    I am a member of the group that drafted this memo, and proudly signed it before it was sent to the White House.

    MEMORANDUM FOR: The President

    FROM: Veteran Intelligence Professionals for Sanity

    SUBJECT: Those “Damn Emails” – “Really a Concern”


    Introduction

    Last Wednesday Robert Gates, CIA Director under President Bush-41 and Defense Secretary under President Bush-43, publicly commented that Secretary Hillary Clinton’s “whole email thing … is really a concern in terms of her judgment,” adding, “I don’t know what originally prompted her to think that was a good idea.”

    What originally prompted her does not matter. As your Secretary of State and your subordinate, she willfully violated laws designed to protect classified information from unauthorized disclosure. It may be somewhat difficult for those not as immersed in national security matters as we have been to appreciate the seriousness of the offense, including the harm done in compromising some of the most sensitive U.S. programs and activities. This is why we write.

    Pundits and others are playing down the harm. A charitable interpretation is that they have no way to gauge what it means to expose so much to so many. We do know, and our overriding concern is to protect the national security of our country from further harm. It would be a huge help toward this end, if you would order Attorney General Loretta Lynch to instruct the FBI to stop slow-walking the email investigation and release its findings promptly.

    If you choose, instead, to give precedence to politics over national security, the American people will be deprived of timely appreciation of the gravity of the harm done; national security officials who do follow the rules will be scandalized; FBI investigators will conclude that that their job is more political than professional; and the noxious impression will grow that powerful people cannot be held accountable when they break the law. Worse: if the results of the FBI investigation remain under lock and key, dangerous pressures are likely to be exerted on the most senior U.S. officials by those who have the key – as we explain below.

    We the undersigned Veteran Intelligence Professionals for Sanity (VIPS) have spent 400 years working with classified information – up to and including TOP SECRET, Codeword, and Special Access Programs (SAP). Given that experience, we believe that much of the commentary on the former Secretary of State Hillary Clinton email controversy has been misplaced, focusing on extraneous issues having little or nothing to do with the overriding imperative to protect classified information.

    As intelligence, military, and foreign service professionals, we are highly aware not only of that compelling need, but also of the accompanying necessity to hold accountable those whose actions compromise – whether for reasons of convenience or espionage – sensitive operations, programs and persons. In addition, we know that successful mutual cooperation with foreign intelligence services depends largely on what they see as our ability to keep secrets secret.

    Background

    Last August, Secretary Clinton handed over her private email server to the FBI, five months after she acknowledged she had used it for work-related emails as Secretary of State. She admitted to having deleted about 31,000 emails she described as personal. Media reports last fall, however, indicated that the FBI was able to recover the personal emails, and was reviewing them, as well as the 30,000 others she had described as work-related.

    In January, the Department of State announced that, of the 30,000 work-related emails, at least 1,340 contained classified material. The Department retroactively classified 22 of those TOP SECRET and prevented their release. Among the 22 were some that, according to media reports, included information on highly sensitive Special Access Programs (SAP).

    The White House has said it will do nothing to impede the FBI investigation and possible filing of charges against Clinton, if the facts should warrant that kind of action. Inasmuch as the outcome of the investigation is bound to have major political consequences, such White House assurances stretch credulity.

    By all indications, the FBI is slow-walking the investigation and mainstream media are soft-pedaling the issue. As things now stand, most Americans remain unaware of the import of this industrial-scale compromise of very sensitive national security information in Secretary Clinton’s emails.

    Our concern mounted in January when the Inspector General of the intelligence community wrote to the chairs of the congressional intelligence committees that he had received from one of the intelligence agencies two “sworn declarations” asserting that Secretary Clinton’s emails contained not only CONFIDENTIAL and SECRET information, but also information at the TOP SECRET/SAP level.

    In 2009, you signed an Executive Order regarding SAP (Special Access Programs), so we assume you were briefed on their extremely high sensitivity and the consequent need to sharply limit the number of people allowed to be “read-in” on them. The mishandling of SAP information can neutralize intelligence programs costing billions of dollars, wreck liaison relationships assiduously cultivated for decades, and get a lot of people killed.

    ‘It Wasn’t That Bad’

    All those directly or peripherally involved in the investigation of the Clinton email issue know very well that it could have a direct impact on who is likely to become the next President of the United States, and they will be making decisions with that reality in mind. They know that it is with you that “the buck stops,” and they are sensitive to signs of your preferences. Those were not difficult to discern in your commencement address at Howard University on May 7, in which you strongly advocated the same basic policy approaches as those espoused by one Democratic presidential candidate – Hillary Clinton.

    Your White House has also made excuses for deliberate security violations by Secretary Clinton that would have gotten senior officials like us fired and probably indicted. We look with suspicion at what we see as contrasting and totally inappropriate attempts by the administration and media to play down the importance of Secretary Clinton’s deliberate disregard of basic security instructions and procedures.

    It appears that the option chosen by the White House is using the declared need for “thoroughness” to soft-pedal and delay completion of the investigation for several more months, while the corporate media sleeps on. Four months have already gone by since the smoking-gun-type revelations in the intelligence community Inspector General’s letter to Congress, and it has been well over a year since Secretary Clinton first acknowledged using an insecure email server for official business.

    Another claim emanating from your White House is that Clinton was careless in managing her emails and has admitted as much, but that she has not damaged American national security. She has called it a “mistake,” but security officials of the National Security Agency explicitly forewarned her against violating basic laws and regulations designed to prevent the compromise of classified information.

    NSA, FBI Have Enough Evidence

    Surely, enough time has passed, and enough material has been reviewed, to permit a preliminary damage assessment. The NSA has the necessary information and should, by now, have shared that information with the FBI. Secretary Clinton’s server in her house in Chappaqua, New York, was not a secured device. Her email address incorporated her initials, “hdr” (apparently for her maiden name, Hillary Diane Rodham). It also included the “clinton” server identity, so it was easy for a hacker to spot.

    Anyone with the proper equipment, knowledge and motivation might have been able to obtain access. That is what hackers are able to do, with considerable success, against government servers that are far better protected than the private email server located in her New York State home.

    In fact, there have been reports that Secretary Clinton’s emails were, indeed, hacked successfully by foreigners. The Romanian hacker who goes by the name Guccifer claimed earlier this month that he had repeatedly hacked her email server. He described the server as “like an open orchid on the Internet” and that “it was easy … easy for me, for everybody.” Guccifer has been extradited from Romania and is now in jail in Alexandria, Virginia, where the FBI is said to be questioning him on the emails. There have also been credible claims that Russian intelligence and other foreign services were able to hack the Secretary’s server.

    Another argument being surfaced, in a transparent attempt to defend Secretary Clinton, has to do with intent. It is said that she did not intend to have classified information on her computer in New York and had no intention of handling secret material in a way that would be accessible to foreign intelligence or others lacking the proper security clearances and the need-to-know.

    But while intent might be relevant in terms of punishment, it does not change the fact that as a member of the Senate Armed Services Committee, then Senator Clinton had clearances for classified information for years before becoming Secretary of State. She knew the rules and yet as Secretary she handled classified information carelessly after a deliberate decision to circumvent normal procedures for its safeguarding, thus making it vulnerable to foreign intelligence, as well as to criminal hackers.

    Anyone who has ever handled classified material knows that there are a number of things that you do not do. You do not take it home with you, you do not copy it and share it with anyone who does not have a clearance and a need-to-know, you do not strip off the classification marks and treat it as unclassified, and you do not transfer it to another email account that is not protected by a government server.

    If you have a secured government computer operating off of a secure server that means that what is on the computer stays on the computer. This is not a matter of debate or subject to interpretation. It is how one safeguards classified information, even if one believes that the material should not be classified, which is another argument that has been made in Clinton’s defense. Whether or not the classification is unnecessary is not your decision to make.

    Apart from the guidelines for proper handling of classified information, outlined in Executive Order 13526 and 18 U.S.C Sec. 793(f) of the federal code, there is some evidence of a cover-up regarding what was compromised. This itself would be a violation of the 2009 Federal Records Act and the Freedom of Information Act.

    Numerous messages both in New York and in Washington have reportedly been erased or simply cannot be found. In addition, the law cited above explicitly makes it a felony to cut and paste classified information removing its classification designation. Retaining such information on a private email system is also a felony. In one of Secretary Clinton’s emails, she instructed her staff simply to remove a classification and send the information to her on her server.

    So the question is not whether Secretary Clinton broke the law. She did. If the laws are to be equally applied, she should face the same kind of consequences as others who have been found, often on the basis of much less convincing evidence, guilty of similar behavior.


    Some More Equal Than Others

    Secretary Clinton’ case invites comparison with what happened to former CIA case officer Jeffrey Sterling, now serving a three-and-a-half-year prison term for allegedly leaking information to New York Times journalist James Risen. Sterling first came to the media’s attention when in 2003 he blew the whistle on a botched CIA operation called Operation Merlin, telling the Senate Intelligence Committee staff that the operation had ended up revealing nuclear secrets to Iran. When in 2006 James Risen published a book that discussed, inter alia, this amateurish cowboy operation, the Department of Justice focused on Sterling as the suspected source.

    In court, the federal prosecutors relied almost entirely on Risen’s phone and email logs, which reportedly demonstrated that the two men had been in contact up until 2005. But the prosecutors did not provide the content of those communications even though the FBI was listening in on some of them. Risen has claimed that he had multiple sources on Operation Merlin, and Sterling has always denied being involved.

    Jeffrey Sterling was not permitted to testify in the trial on his own behalf because he would have had to discuss Operation Merlin, which was and is still classified. He could not mention any details about it even if they were already publicly known through the Risen book. No evidence was ever produced in court demonstrating that any classified information ever passed between the two men, but Sterling, an African American, was nevertheless convicted by an all-white jury in Virginia based on “suspicion” and the presumption that “it had to be him.”

    The contrast between the copious evidence – some of it self-admitted – of Secretary Clinton’s demonstrable infractions, on the one hand, and the very sketchy, circumstantial evidence used to convict and imprison Jeffrey Sterling, on the other, lend weight to the suspicion that there is one law for the rich and powerful in the United States and another for the rest of us.

    Failing to take steps against a politically powerful presidential candidate and letting her off unscathed for crimes of her own making, while an institutionally unprotected Jeffrey Sterling sits in prison would be a travesty of justice not dissimilar to the gentle wrist-slap given Gen. David Petraeus for giving his mistress extremely sensitive information and then lying to the FBI about it.

    Your order to then-Attorney General Eric Holder to let Gen. David Petraeus off easy created a noxious – and demoralizing – precedent in the national security community indicating that, whatever the pains taken at lower levels to prevent compromise of duly classified information, top officials are almost never held accountable for disregarding well-established rules. These are some of the reasons we are so concerned that this is precisely the direction in which you seem to be leaning on the Clinton email issue.

    In our view, the sole legitimate reason for disclosing classified information springs from the only “oath” we all took – “to support and defend the Constitution of the United States against all enemies foreign and domestic.” When, for example, Edward Snowden saw the U.S. government grossly violating our Fourth Amendment right to be “secure” against warrantless “searches and seizures,” he gave more weight to that oath (ethicists call it a supervening value) than to the promise he had made not to disclose information that could harm U.S. national security.


    Possibly Still Worse Ahead

    You might give some thought, Mr. President, to a potentially messy side of this. What is already known about NSA’s collect-it-all electronic practices over the past several years strongly suggests that NSA, and perhaps the FBI, already know chapter and verse. It is virtually certain they know what was in Secretary Clinton’s emails – including the ones she thought she had deleted. It is likely that they have also been able to determine which foreign intelligence agencies and other hackers were able to access the emails.

    One ignores this at one’s peril. Secretary Clinton’s security violations can have impact not only on whether she becomes your successor, but also on whether she would, in that case, be beholden to those who know what lies hidden from the rest of us – perhaps even from you.

    Intelligence professionals (in contrast to the occasional political functionary) take the compromise of classified information with utmost seriousness. More important: this is for us a quintessentially nonpartisan issue. It has to do, first and foremost, with the national security of the United States.

    We are all too familiar with what harm can come from blithe disregard of basic procedures designed to protect sensitive intelligence and other national security information. Yes, the lamentable unevenness in how such infractions are handled is also an important issue – but that is not our main focus in the present context.


    The Truth Will Out

    Not all workers at the NSA or the FBI are likely to keep their heads in the sand, as they watch very senior officials and politicians with their own agendas disregard laws to safeguard the nation’s security. We know what it is like to do the difficult, disciplined work of protecting information from being compromised by strictly abiding by what often seem to be cumbersome rules and regulations. We’ve been there; done that.

    If you encourage the Department of Justice and the FBI to continue slow-walking the investigation, there is a good chance the truth will come out anyway. As you are aware, the Justice Department, the FBI, and NSA have all yielded recent patriots who, in such circumstances, decided that whistleblowing – rather than silence – was the only way to honor the oath we all swore – to support and defend the Constitution.

    To sum up our concern regarding how all this plays out, if you order the Justice Department and FBI to pursue the investigation with “all deliberate speed,” so to speak, and Secretary Clinton becomes president, the juicy email secrets in the hidden hands of the NSA and FBI are likely to give those already powerful institutions a capacity for blackmail that would make J. Edgar Hoover’s mouth water. In addition, information hacked by foreign intelligence services or Guccifer-like hackers can also provide useful grist for leverage or blackmail.


    Taking Care the Laws Are Faithfully Executed

    We strongly urge you to order Attorney General Loretta Lynch to instruct FBI Director James Comey to wind up a preliminary investigation and tell the country now what they have learned. By now they – and U.S. intelligence agencies – have had enough time to do an early assessment of what classified data, programs and people have been compromised. Realistically speaking, a lengthier, comprehensive post-mortem-type evaluation – however interesting it might be, might never see the light of day under a new president.

    We believe the American people are entitled to prompt and full disclosure, and respectfully suggest that you ensure that enforcement of laws protecting our national security does not play stepchild to political considerations on this key issue.

    On April 10, you assured Chris Wallace, “I guarantee that there is no political influence in any investigation conducted by the Justice Department, or the FBI – not just in this [Clinton email] case, but in any case. Full stop. Period.”

    We urge you to abide by that promise, and let the chips fall where they may. Full stop. Period.


    For the Steering Group, Veteran Intelligence Professionals for Sanity (VIPS)

    William Binney, Technical Director, NSA; co-founder, SIGINT Automation Research Center (ret.)

    Thomas Drake, Senior Executive, NSA (former)

    Philip Giraldi, CIA, Operations Officer (ret.)

    Sen. Mike Gravel, Adjutant, top secret control officer, Communications Intelligence Service, special agent the Counter Intelligence Corps and United States Senator

    Matthew Hoh, former Capt., USMC, Iraq & Foreign Service Officer, Afghanistan (associate VIPS)

    Larry C. Johnson, CIA & State Department (ret.)

    Michael S. Kearns, Captain, USAF Intelligence Agency (ret.), ex-Master SERE Instructor

    John Kiriakou, Former CIA Counterterrorism Officer

    Ray McGovern, former US Army infantry/intelligence officer & CIA analyst (ret.)

    Elizabeth Murray, Deputy National Intelligence Officer for Middle East, CIA (ret.)

    Todd Pierce, MAJ, US Army Judge Advocate (ret.)

    Scott Ritter, former MAJ, USMC, former UN Weapon Inspector, Iraq

    Diane Roark, DOE, DOD, NSC, & professional staff, House Intelligence Committee (ret.)

    Robert David Steele, former CIA Operations Officer

    Peter Van Buren, U.S. Department of State, Foreign Service Officer (ret.) (associate VIPS)

    Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA, (ret.)

    Ann Wright, U.S. Army Reserve Colonel (ret) and former U.S. Diplomat




    Related Articles:




    Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.

    Posted in 2020, Biden, Democracy

    More Questions for Clinton

    October 20, 2015 // 5 Comments »

    questions



    As Trey Gowdy and his Committee prepares to interview Hillary on Thursday, here are the next of our continuing series of “Questions for Clinton.” (Some previous queries.)


    1) When Clinton’s private server was first made public in March, she stated there was no classified information on it. When emails released appeared to contain classified information (according to the Inspector General for the Intelligence Community), Hillary argued that the material was not classified at the time it was created, and that different agencies had different rules for classification. She did change her standard response to be “I did not send or receive anything marked classified.”

    However, a recent email included a memo from then-Secretary of State Colin Powell that appears to turn all of that into a lie.

    — The Powell document from 2002 is labeled SECRET/NOFORN (i.e., “NO FORreigNers” may see it.)

    — The document was labeled as classified when it was created.

    — The document was created by Hillary’s own agency, the State Department.

    Can Clinton please explain how this document does not contradict her previous statements about no marked classified?



    2) Clinton took office on January 21, 2009, but the first message she turned back over to the State Department was dated March 18, and the earliest-dated message she herself sent was on April 13, nearly three months into her time in office. Clinton stated the gap was because she continued using a previous account she’d used during her time as a senator for business at the beginning of her time as secretary. She claims she no longer has “access” to that account and thus those three months of email messages are simply gone.

    What account was she using? Why did she use that account instead of the private server or an official State account? Why are those account’s messages deemed inaccessible? Who controls that account and its server? Did anyone at State approve the use of that account? Did Clinton seek State Department approval to use that account?



    3) Clinton has stated, as recently as the CNN Democratic Debate, that she is committed to transparency. If we take Hillary at her word that she used some other email account between taking office in January 2009 and March 2009 when the first State Department emails show up in the tranche turned over to the State Department, where are those three months of emails? They are Federal records, and Clinton was obligated by law to preserve them.

    Where is that account? Nothing on the Internet is truly “inaccessible.” The FBI should subpoena the administrator of that account, if for no other reason than to make those messages available for the Archives and FOIA.



    4) On “Meet the Press” September 27, when asked about this discrepancy on when she began using the personal account, Clinton said “There was a transition period. You know, I wasn’t that focused on my email account, to be clear here.”

    What account did she use on Day One? When did she start using the personal server? It seems the easiest thing was to use the State Department account you were no doubt offered. It seems she did focus on email. Can she explain why she did not use the State Department account in this “transition?”


    5) Also on “Meet the Press” September 27, Clinton explained her use of a personal email account as “I did it for convenience.” In March she stated she used the account for the convenience of not having to carry multiple devices, yet almost immediately after that photos and video of her with multiple devices surfaced.

    Exactly what convenience was the personal account serving? Given that the State Department provided a fully functional email system on her desktop from Day One, with both a classified and unclassified account, plus portable devices such as a Blackberry already configured to those accounts, please state in detail what the added convenience of a private account was?




    Related Articles:




    Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.

    Posted in 2020, Biden, Democracy