Doing Advance Work

News that doesn't receive the necessary attention.

Tuesday, February 20, 2018

Every US baby is born in bondage to the parasitic Endless War Industry currently enraged it's had to wait so long for US taxpayer funded nuclear war with Russia. Utter slime Chertoff among "advisors" at their wits' end itching for Russia war, now reduced to trying to find fake news on twitter via so-called Alliance for Securing Democracy-Adam Carter, Disobedient Media....(Hey Chertoff-How would you make a living if you weren't a blood drenched parasite?)

1/29/18, "Meet The Cabal That Are Framing Domestic American Activism As “Russian Influence” and “Fake News”," Adam Carter, Disobedient Media

"At the beginning of 2017, an initiative was launched by a non-partisan think-tank called the German Marshall Fund US (GMFUS) under the name “The Alliance For Securing Democracy” (ASD). 

During the Summer, ASD started working on a project they called the “Hamilton 68 Dashboard, an effort that was presented to the public as a means of monitoring Russian disinformation efforts on Twitter, apparently boosted by research covering a three year period. 

Over recent months, the press has reported on what the dashboard identifies as Twitter activity from those ASD have classified as Russian or, at least, involved in Russian influence operations. 

Although some in the mainstream press have divulged the association between ASD and GMFUS, hardly anyone has disclosed the affiliations between those running ASD and special interests, or similar connections with the advisory board of GMFUS....

The Alliance For Securing Democracy Advisors




Michael Chertoff

U.S. Secretary of Homeland Security from 2005 to 2009
Chertoff Group co-founder (risk-management and security consulting)
Senior of counsel at the Washington, DC law firm Covington and Burling
Chairman of BAE Systems 2012-2015.
Co-Author of the PATRIOT Act.
Endorsed Hillary Clinton.


 

Michael McFaul

Apecial asst to president and senior director for Russian and Eurasian Affairs at the National Security Council at the White House from 2009 to 2012, then U.S. ambassador to the Russian Federation from 2012–14. Senior fellow at Freeman Spogli Institute for Int. Studies. Peter and Helen Bing senior fellow at the Hoover Institution. NBC analyst, WAPO columnist.

 

Bill Kristol

Weekly standard editor, Facebook fake-news arbiter
Served on the board of the Project for the New American Century (1997–2005) and the Foreign Policy Initiative (2009–17)
Chief of staff to Vice President Dan Quayle (GWB administration)
Endorsed Hillary Clinton





Michael Morrell

Former acting CIA director 2011, 2012-13 and as deputy director and director for Intelligence.
Beacon Global Strategies
as a senior counselor since November 2013
Played a central role in the United States’ fight against terrorism and was one of the leaders involved in the location and capture of Osama Bin Laden
Wrote an op-ed in the NYT endorsing Hillary Clinton
Proposed giving weapons to Ukraine in response to alleged hacking of US election.


 

David Kramer
 
Former senior director Human Rights and Democracy, McCain Institute for International Leadership
Freedom House – former president. Served 8 years in U.S. Department of State under GWB. Advisory council for GWB Presidential Center’s Human Freedom Project.
On board of directors at Halifax International Security Forum. Worked at CSIS in 90s.
Was reportedly directed to meet with Steele in London by McCain
Was a senior fellow at the Project for a New American Century
International Advisory Council at the Center for European Policy Analysis
In addition, Kramer is a member of the Ukraine Today media organization’s International Supervisory Council.
In 2016 Kramer argued that the Minsk II peace agreement should be scrapped and western sanctions on Russia maintained.
Has spoken out against Obama and Clinton in the past.





Toomas Ilves
 
Elected president of the Republic of Estonia in 2006 and in 2011
Worked on ICT for the UN
Former Vice president of European Parliament Foreign Affairs Committee
Former Foreign affairs minister and ambassador of the Republic of Estonia to US and Canada
Is World Economic Forum co-chair. Fellow at the Hoover Institution




James Stavridis

US Navy (ret.) commander of European Command and as Supreme Allied Commander, Europe from 2009 to 2013.
Chairman of US Naval Institute Board of Directors.
U.S. Southern Command in Miami 2006–09 and Enterprise Carrier Strike Group, in Arabian Gulf for Op. Iraqi Freedom and Op Enduring Freedom from 2002–04.
Former NATO Commander


 

Mike Rogers

Former Congressman, officer in the Army, and FBI special agent. Former chair of U.S. House Intelligence Committee as leader on cybersecurity and national security policy, oversaw the intelligence agencies’ $70 billion budget. CNN national security commentator, hosts and produces CNN’s “Declassified.” Chief Security Adviser to ATandT, on board of IronNet Cybersecurity and MITRE Corporation, advises Next Century Corp. and Trident Capital. Distinguished Fellow and Trustee at Center for the Study of the Presidency and Congress, Senior Fellow at Belfer Center, Harvard.
Permanent Select Committee on Intelligence, Committee on Energy and Commerce. Introduced CISPA.

 

Nicole Wong
Former U.S. chief tech officer for Obama. Previously Google’s vice president and deputy general counsel, and Twitter’s legal director for products. Chairs board of Friends of Global Voices. On boards of WITNESS, the Mozilla Foundation,  advisor to the School of Information at the University of California, Berkeley,  Harvard Business School Digital Initiative, the DNC Cybersecurity advisory board, Refactor Capital, and Albright Stonebridge Group.
Associate at Perkins Coie LLP in 1997 and was named a partner in 2000. Wong represented media clients including the Los Angeles Times, The Walt Disney Company, Microsoft, and Amazon.com before joining Google.

 
 

Kori Schake

Former White House National Security Council, Department of Defense for the Office of the Secretary and Joint Chiefs of Staff, State Department for the Policy Planning Staff. In 2008, Kori was senior policy advisor on the McCain–Palin campaign. Research fellow at the Hoover Institution. Co-authored “Warriors and Citizens: American Views of Our Military” with Jim Mattis. Teaches at Stanford, contributing editor covering national security and international affairs at The Atlantic, columnist for Foreign Policy magazine, contributor to War on the Rocks.
Contributed to conceptualizing and budgeting for continued transformation of defense practices, the most significant realignment of U.S. military forces and bases around the world since 1950, creating NATO’s Allied Command Transformation and the NATO Response Force, and recruiting and retaining coalition partners for operations in Afghanistan and Iraq.


 

Julianne Smith

Deputy national security advisor to Joe Biden (2012 to 2013), acting national security advisor to Biden in 2013, principal director for European and NATO policy in the Office of the Secretary of Defense in the Pentagon.
Senior fellow and director of the Transatlantic Security Program at the Center for a New American Security.
Contributor to Foreign Policy.


 

Jake Sullivan

Obama admin national security advisor to Joe Biden, director of Policy Planning at the U.S. Department of State, deputy chief of staff to Secretary of State Hillary Clinton. He was the senior policy advisor on Secretary Clinton’s 2016 presidential campaign. He is now a senior fellow at the Carnegie Endowment for International Peace and Martin R. Flug visiting lecturer in law at Yale Law School.
– Was spoken of as a front-runner for the position of U.S. National Security Advisor under a Hillary Clinton administration prior to her electoral defeat. 
............ 
There are quite a few Democratic party figures, people that worked in the state department, people that endorsed Clinton, Foreign Policy publication contributors, people that have worked on the National Security Committee and those with ties to the US intelligence community and NATO.

I can’t speak for others, but personally, when it comes to considering all the affiliations, associations, influences and endorsements – I struggle to see how such a collective can be expected to carry out the role of an impartial arbiter on the topic of disinformation.

While they remain opaque on what they’ve classify as “Russian influence” and “disinformation”, there’s little reason to assume the results of their efforts will inherently be credible.

Twitter contradicting their assertions obviously does their credibility no favors either."

For more information about ASD’s advisors/staff, check out Glenn Greenwald’s Intercept article on the topic."






.........

................

Florida school shooter's former guardian kicked him out of her Florida trailer after a dispute over his gun collection. Shooter's 17 year old brother was committed by guardian the day after the massacre. Now guardian seeks control of shooter's inheritance from his deceased mother-NY Post

2/20/18, "Woman who cared for Florida shooter wants control of his inheritance," NY  Post, by Laurie Mizrahi and Max Jaeger, Parkland, Florida

"The woman left in charge of the accused Florida school shooter and his brother after their mom died last year filed court papers the day after the massacre seeking to be put in charge of the dead woman’s will — then had the alleged shooter’s brother involuntarily committed, a source close to the family revealed to The Post.

Shooter Nikolas Cruz, 19, and brother Zachary Cruz, 17, were put in the care of Roxanne Deschamps after their mom, Lynda Cruz, died from pneumonia on Nov. 1, but Deschamps kicked Nikolas out of her Lantana, Fla., trailer after a standoff over Cruz’s gun collection.

She even took $2,900 from the teen before giving him the boot, a source close to Deschamps told The Post.

Police say Nikolas admitted that he shot up his former high school Feb. 14, killing 17 and injuring 15 in the worst school shooting since the 2012 Sandy Hook massacre.

The following day, Deschamps filed a petition to administer Lynda’s estate, court records obtained by The Post show.

If the petition is granted, she would be responsible for settling Lynda’s debts and doling out the kids’ inheritance. Lynda did not leave a will, and the petition filed does not indicate what her estate is worth, records show.

A family who took Nikolas in said he stood to inherit $800,000 on his 22nd birthday following his mom’s death.

Cruz told them he believed Deschamps was trying to steal his inheritance.

If Deschamps’ petition is granted, she could charge the estate a fee for settling it for the kids, though that fee would be subject to a judge’s review, according to Florida probate lawyer Robert Wolf, who is not involved in the case.

Deschamps filed the petition on the grounds she is “caring for a 50 percent minor beneficiary” — Zachary — according to court papers.

But the source said Deschamps was the one who had Zachary involuntarily committed on Friday. The state cannot hold minors for observation more than 12 hours unless there is a medical reason. It is unclear if he has been released.

Deschamps had six months from Lynda’s Nov. 1 death to file the petition, and her attorney Audra Simovitz called the decision to file the day after the slaughter “appropriate.”

Deschamps has declined to comment.

Cruz could still get his share if convicted, though “anything that boy inherits — he’s gonna be sued and it’s gonna be taken away,” Wolf said."



....................


Total Russian trolls spent on key swing states: Pennsylvania $300, Michigan $823, Wisconsin $1979, per Senate Intelligence Committee. Per Facebook, over half the money was spent AFTER the election-Mark Simone, Byron York














Per Senate Intelligence Committee, total Russian trolls spent "rigging" key states:

Wisconsin: $1979
Michigan: $823
Pennsylvania: $300

From Mark Simone Twitter, 2/19/18

Additional source:

"Looking at key states, the total spent on ads targeting the super-important state of Pennsylvania was just $300, according to Senate Intelligence Committee chairman Richard Burr. Ad spending in another key state, Michigan, was $823. In Wisconsin, it was $1,979....

"Facebook said that of ad "impressions"...just 44 percent came before the election, while 56 percent came after the election, and thus did not affect its outcome. And about 25 percent of the ads were never seen by anyone, Facebook added."...

2/20/18, "A Non-Alarmist Reading of the Mueller Russia Indictment," Byron York, uexpress.com 





........
........................

Judge Emmet G. Sullivan orders Herr Mueller to turn over all evidence favorable to defendant Michael Flynn including information Mueller deems not to be material-PJ Media, 2/19/18

2/19/18, "Judge Orders Mueller to Provide Flynn’s Attorneys With 'Any Exculpatory Evidence'," PJ Media, Debra Heine 

"A federal judge has issued an updated standing order in the case of U.S. v. Flynn, suggesting that Special Counsel Robert Mueller's team may have withheld exculpatory evidence in prosecuting former national security adviser Michael Flynn.

Judge Emmet G. Sullivan, United States district judge for the District of Columbia, on Friday issued what is called the “Brady rule," which requires the prosecution to turn over "any exculpatory evidence" to the defendant in a criminal case, meaning Mueller must provide Flynn with all information that is favorable to his defense.




Flynn’s attorneys should begin receiving the required disclosures from the special counsel’s office any time now, and there is reason to believe there will be bombshells.

Prosecutors working for Mueller charged Flynn with lying to FBI agents on November 30, 2017. He pleaded guilty to one count of making false statements to the FBI before federal judge Rudolph Contreras the next day.  Contreras was recused from the case less than a week later -- likely because he served on the special court that allowed the FBI to surveil the Trump campaign based on a FISA application that relied heavily on the unverified anti-Trump dossier.

Flynn's alleged crime occurred on Jan. 24, 2017, when two FBI agents went to the White House to question him about telephone conversations he'd had with Russian Ambassador Sergey Kislyak during the transition in late December 2016.

Subsequently, according to the Washington Examiner, "Comey told lawmakers that the FBI agents who interviewed Flynn did not believe that Flynn had lied to them, or that any inaccuracies in his answers were intentional."

This is why Flynn's guilty plea remains one of D.C.'s greatest mysteries. The FBI reportedly did not think Flynn had even done anything wrong in the phone calls to the Russian ambassador -- so what was there to lie about?

But as Powell pointed out in The Daily Caller, "people who are innocent enter guilty pleas every day.

"They simply can no longer withstand the unimaginable stress of a criminal investigation. They and their families suffer sheer exhaustion in every form — financial, physical, mental, and emotional. Add in a little prosecutorial duress — like the threat of indicting your son — and, presto, there’s a guilty plea." 

Sullivan's initial standing order issued on December 12, 2017, directed “the government to produce to defendant in a timely manner – including during plea negotiations – any evidence in its possession that is favorable to defendant and material either to defendant’s guilt or punishment.” The standing order also directed the government to submit information to the court "which is favorable to the defendant but which the government believes not to be material.”

The updated version added one sentence specifying that the evidence the government must produce “includes producing, during plea negotiations, any exculpatory evidence in the government’s possession.”

According to Margot Cleveland, a lawyer who writes for The Federalist, the revised version is significant because "it indicates that if the government did not provide Flynn material evidence during plea negotiations, Flynn has grounds to withdraw his plea."

Sidney Powell writes that Sullivan "is the perfect judge to decide General Flynn’s motion."...

Given Sullivan's history of holding abusive prosecutors in check, Mueller’s vaunted "legal pitbull" Andrew Weissmann may have reason to be concerned.

Weissmann has a history of prosecutorial misconduct dating back to 1997, when he was officially reprimanded by a judge in the Eastern District of New York for withholding evidence, as Sara Carter recently reported.

Weissmann and another Enron Task Force member also reportedly terrorized an Arthur Andersen partner into pleading guilty unnecessarily.
Weissmann and Caldwell made Duncan testify at length against Arthur Andersen when they  destroyed the company and 85,000 jobs only to be  reversed by a unanimous Supreme Court three years later. Turns out, the “crime” they “convinced” Mr. Duncan to plead guilty to was not a crime at all. The court allowed Duncan to  withdraw his plea. And, that was not the only Weissmann-induced plea to be withdrawn either. Just ask  Christopher Calger.
As Powell points out, former FBI director James Comey admitted to the Senate Intelligence Committee last May that he leaked a memo detailing his conversation with President Trump deliberately to “trigger” Robert Mueller’s investigation. Since Flynn's guilty plea, we've learned that that memo was classified.

Meanwhile, DOJ Inspector General Michael Horowitz is expected to release his highly anticipated report on the FBI and DOJ's investigation into Hillary Clinton's email server within the next six weeks. Horowitz is credited with discovering the Strzok-Page emails revealing the agents working on an "insurance policy" with Deputy Director Andrew McCabe.

  



...............

Monday, February 19, 2018

Voting machines in US 50 states aren't connected to the internet, per Vermont Sec. of State Jim Condos-NPR, All Things Considered, 2/19/18

State voting machines are not connected to the internet. Therefore, no "election hacking," "attempted election hacking," "attempts to infiltrate," or "infiltration" of 2016 voting machines could possibly have taken place. If ISIS, Russia, or anyone else wants to "hack" an internet connected US entity in 2018 they can do so with top-secret NSA computer code US has used to break into foreign government networks. Since August 2016, NSA hacking software has been available on the internet. No surprise, since an NSA employee removed secret data for 16 years and no one noticed. 

2/19/18, "States Seek To Prevent Election Hacking," wnyc.org, All Things Considered, produced by NPR and WNYC 

"NPR's Ari Shapiro speaks with Vermont Secretary of State and President-elect of the National Association of Secretaries of State Jim Condos, about state's efforts to protect elections from hacking. Feb 19, 2018" 

NPR host: "America's intelligence agencies are urging officials from Washington to state capitols to get ready. They expect Russia to try to hack this year's midterms, just as it [allegedly] tried to infiltrate the 2016 elections."... 

NPR host: "But when it comes to actual attempts to "hack into" voting machines, tell me about the steps Vermont is taking to prevent that from happening." 

Jim Condos, Vt. Sec. of State: "First I want to be very, very clear. The vast majority of the states use similar but different machines. And none of those machines are connected to the internet."

Mr. Condos notes that 100% security is not possible on any computer.

==========

Comment: Everyone agrees no computer is 100% safe. Simple solution: Election data such as voter roles, registration, etc., should be handled as they were before computers existed. This will save taxpayers billions. The parasitic "cyber security industry" (eg, CrowdStrike) will have to get along without US taxpayer handouts.
...........
 

Added: US "hacking" tools, not those of ISIS or Russia, are most likely to be used against US targets in 2018. Since being placed on the internet in August 2016, stolen NSA hacking tools have already been used against US entities. Officials say an NSA insider most likely removed the data. The NSA and US government, not Russia, are proved to be the greatest danger to Americans. "NSA can't keep its most valuable data from being stolen, or as it appears in this case, being used against us."... 8/21/2016, Reuters...."United States intelligence agencies have rushed to create digital weapons that they cannot keep safe from adversaries or disable once they fall into the wrong hands." 6/28/17, NY Times

In August 2016, a group called Shadow Brokers announced it was auctioning off highly classified National Security Agency hacking tools. Since then, NSA's finest cyber weapons have been used to attack US entities: 

6/28/2017, "Hacks [using NSA weapons] Raise Fear Over N.S.A.’s Hold on Cyberweapons," NY Times,

"A series of escalating attacks using N.S.A. cyberweapons have hit hospitals, a nuclear site and American businesses. Now there is growing concern that United States intelligence agencies have rushed to create digital weapons that they cannot keep safe from adversaries or disable once they fall into the wrong hands.... 

Though the identities of the Shadow Brokers remain a mystery, former intelligence officials say there is no question from where the weapons came: a unit deep within the agency that was until recently called “Tailored Access Operations.”...

For the American spy agency, which has invested billions of [taxpayer] dollars developing an arsenal of weapons that have been used against the Iranian nuclear program, North Korea’s missile launches and Islamic State militants, what is unfolding across the world amounts to a digital nightmare. It was as if the Air Force lost some of its most sophisticated missiles and discovered an adversary was launching them against American allies — yet refused to respond, or even to acknowledge that the missiles were built for American use. 

Officials fret that the potential damage from the Shadow Brokers leaks could go much further, and the agency’s own weaponry could be used to destroy critical infrastructure in allied nations or in the United States....

In the past two months [2017], attackers have retrofitted the agency’s more recent weapons to steal credentials from American companies. Cybercriminals have used them to pilfer digital currency....

The [Tuesday, June 2017] attacks inflicted enormous collateral damage, taking down some 2,000 global targets in more than 65 countries, including Merck, the American drug giant, Maersk, the Danish shipping company, and Rosneft, the Russian state owned energy giant. The attack so crippled operations at a subsidiary of Federal Express that trading had to be briefly halted for FedEx stock....

Armed with the N.S.A.’s own tools, the limits are gone.

“We now have actors, like North Korea and segments of the Islamic State, who have access to N.S.A. tools who don’t care about economic and other ties between nation states,” said Jon Wellinghoff, the former chairman of the Federal Energy Regulatory Commission."... 

....................

Added: "Even the arrest of whoever is responsible for the leaks may not end them."

11/12/2017, "Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core," NY Times, Scott Shane, Nicole Perlroth, David E. Sanger 

"A serial leak of the agency’s cyberweapons has damaged morale, slowed intelligence operations and resulted in hacking attacks on businesses and civilians worldwide....

Current and former agency officials say the Shadow Brokers disclosures, which began in August 2016, have been catastrophic for the N.S.A., calling into question its ability to protect potent cyberweapons and its very value to national security. The agency regarded as the world’s leader in breaking into adversaries’ computer networks failed to protect its own.... 

The Snowden trauma led to the investment of millions of dollars in new technology and tougher rules to counter what the government calls the insider threat. But N.S.A. employees say that with thousands of employees pouring in and out of the gates, and the ability to store a library’s worth of data in a device that can fit on a key ring, it is impossible to prevent people from walking out with secrets....

Mr. Williams said it may be years before the “full fallout” of the Shadow Brokers breach is understood. Even the arrest of whoever is responsible for the leaks may not end them, he said — because the sophisticated perpetrators may have built a “dead man’s switch” to release all remaining files automatically upon their arrest.

“We’re obviously dealing with people who have operational security knowledge,” he said. “They have the whole law enforcement system and intelligence system after them. And they haven't been caught.""...


"If that’s the case, it's one more reason to question the usefulness of an agency that secretly collects private information on millions of Americans but can't keep its most valuable data from being stolen, or as it appears in this case, being used against us."... (8/21/2016, Reuters) 

(NY Times): "Long known mainly as an eavesdropping agency, the  




as an especially productive way to spy on foreign targets. The intelligence collection is often automated, with malware implants — computer code designed to find material of interest — left sitting on the targeted system for months or even years, sending files back to the N.S.A.

The same implant can be used for many purposes: to steal documents, tap into email, subtly change data or become the launching pad for an attack. T.A.O.’s most public success was an operation against Iran called Olympic Games, in which implants in the network of the Natanz nuclear plant caused centrifuges enriching uranium to self-destruct. The T.A.O. was also critical to attacks on the Islamic State and North Korea. 

It was this arsenal that the Shadow Brokers got hold of, and then began to release."...
..................

Additional Reuters source on NSA theft:

8/21/2016, "Commentary: Evidence points to another Snowden at the NSA," Reuters, James Bamford, commentary
.........................

Added: First public awareness of massive NSA code breach was August 2016 with Shadow Brokers announcement (though the theft may have occurred months before). Theft includes NSA code that enables malware to stay on systems for years undetected. 


8/16/2016, "Shadow Brokers’ Leak Raises Alarming Question: Was the N.S.A. Hacked?" NY Times, David E. Sanger 

Print ed. August 17, 2016, Page A1 of New York ed. with the headline: Top-Secret Code Released by Hackers Points to Breach at N.S.A.

"The release on websites this week of what appears to be top-secret computer code that the National Security Agency has used to break into the networks of foreign governments and other espionage targets has caused deep concern inside American intelligence agencies, raising the question of whether America’s own elite operatives have been hacked and their methods revealed. 

Most outside experts who examined the posts, by a group calling itself the Shadow Brokers, said they contained what appeared to be genuine samples of the code--though somewhat outdated--used in the production of the N.S.A.’s custom-built malware.

Most of the code was designed to break through network firewalls and get inside the computer systems of competitors like Russia, China and Iran. That, in turn, allows the N.S.A. to place “implants” in the system, which can lurk unseen for years and be used to monitor network traffic or enable a debilitating computer attack. 

According to these experts, the coding resembled a series of “products” developed inside the N.S.A.’s highly classified Tailored Access Operations unit, some of which were described in general terms in documents stolen three years ago by Edward J. Snowden, the former N.S.A. contractor now living in Russia.


But the code does not appear to have come from Mr. Snowden’s archive, which was mostly composed of PowerPoint files and other documents that described N.S.A. programs. The documents released by Mr. Snowden and his associates contained no actual source code used to break into the networks of foreign powers. 

Whoever obtained the source code apparently broke into either the top-secret, highly compartmentalized computer servers of the N.S.A. or other servers around the world that the agency would have used to store the files. The code that was published on Monday dates to mid-2013, when, after Mr. Snowden’s disclosures, the agency shuttered many of its existing servers and moved code to new ones as a security measure.... 

Around the same time, WikiLeaks declared that it had a full set of the files — it did not say how it had obtained them — and would release them all in the future. The “Shadow Brokers” had said they would auction them off to the highest bidder.... 

The N.S.A. would say nothing on Tuesday about whether the coding released was real or where it came from. Its public affairs office did not respond to inquiries....

There are other theories, including one that some unknown group was trying to impersonate hackers working for Russian or other intelligence agencies. Impersonation is relatively easy on the internet, and it could take considerable time to determine who is behind the release of the code.

The Shadow Brokers first emerged online on Saturday, creating accounts on sites like Twitter and Tumblr and announcing plans for an auction. The group said that “we give you some Equation Group files free” and that it would auction the best ones. The Equation Group is a code name that Kaspersky Labs, a Russian cybersecurity firm, has given to the N.S.A.

While still widely considered the most talented group of state-sponsored hackers in the world, the N.S.A. is still recovering from Mr. Snowden’s disclosures; it has spent hundreds of millions of dollars reconfiguring and locking down its systems. 

Mr. Snowden revealed plans, code names and some operations, including against targets like China. The Shadow Brokers disclosures are much more detailed, the actual code and instructions for breaking into foreign systems as of three summers ago. 

“From an operational standpoint, this is not a catastrophic leak,” Nicholas Weaver, a researcher at the International Computer Science Institute in Berkeley, Calif., wrote on the Lawfare blog on Tuesday.

But he added that “the big picture is a far scarier one.” In the weeks after Mr. Snowden fled Hawaii, landing in Hong Kong before ultimately going to Russia, it appears that someone obtained that source code. That, he suggested, would be an even bigger security breach for the N.S.A. than Mr. Snowden’s departure with his trove of files.

However, the fact that the code is dated from 2013 suggests that the hackers’ access was cut off around then, perhaps because the agency imposed new security measures."...
.....................

Added: NSA employee, Harold T. Martin III, removed classified NSA material, took it home for 16 years, and no one noticed. His home was finally raided on August 27, 2016. He's not believed to be connected to Shadow Brokers: 

5/16/2017, "Malware Case Is Major Blow for the N.S.A.," NY Times, Scott Shane

Martin
"He has long held a high-level clearance and for a time worked with the N.S.A.’s premier hacking unit, called Tailored Access Operations, which breaks into the computer networks of foreign countries and which developed the hacking tools later obtained by the Shadow Brokers. According to one person briefed on the investigation, Mr. Martin was able to obtain some of the hacking tools by accessing a digital library of such material at the N.S.A.... 

Mr. Martin, an enigmatic loner who according to acquaintances frequently expressed his excitement about his role in the growing realm of cyberwarfare, has insisted that he got in the habit of taking material home so he could improve his skills and be better at his job, according to these officials. He has explained how he took the classified material but denied having knowingly passed it to anyone else.... 

The material the F.B.I. found in his possession added up to “many terabytes” of information, according to court papers, which would make it by far the largest unauthorized leak of classified material from the classified sector. That volume dwarfs the hundreds of thousands of N.S.A. documents taken by Edward J. Snowden in 2013 and exceeds even the more voluminous Panama Papers, leaked records of offshore companies obtained by a German newspaper in 2015, which totaled 2.6 terabytes. One terabyte of data is equal to the contents of about one million books.
 
F.B.I. agents on the case, advised by N.S.A. technical experts, do not believe Mr. Martin is fully cooperating, the officials say. He has spoken mainly through his lawyers, James Wyda and Deborah Boardman of the federal public defender’s office in Baltimore....

In interviews, officials described how the Martin case has deeply shaken the secret world of intelligence, from the N.S.A.’s sprawling campus at Fort Meade, Md., to the [Obama] White House. They expressed astonishment that Mr. Martin managed to take home such a vast collection of classified material over at least 16 years, undetected by security officers at his workplaces, including the N.S.A., the Office of the Director of National Intelligence and Pentagon offices. And they are deeply concerned that some of the mountain of material may, by whatever route, have reached hackers or hostile intelligence services.

Investigators discovered the hacking tools, consisting of computer code and instructions on how to use it, in the thousands of pages and dozens of computers and data storage devices that the F.B.I. seized during an Aug. 27 [2016] raid on Mr. Martin’s modest house in suburban Glen Burnie, Md. More secret material was found in a shed in his yard and in his car, officials said.

The search came after the Shadow Brokers leak set off a panicked hunt at the N.S.A. Mr. Martin attracted the F.B.I.’s attention by posting something on the internet that was brought to the attention of the N.S.A. Whatever it was — officials are not saying exactly what — it finally set off an alarm.

The release of the N.S.A.’s hacking tools, even though they dated to 2013, is extraordinarily damaging, said Dave Aitel, a former agency employee who now runs Immunity Inc., an information security company.

“The damage from this release is huge, both to our ability to protect ourselves on the internet and our ability to provide intelligence to policy makers and the military,” Mr. Aitel said. 

The N.S.A.’s hacking into other countries’ networks can be for defensive purposes: By identifying rivals’ own hacking methods, the agency can recognize and defend against them, he said. And other countries, with some of the N.S.A.’s tools now in hand, can study past hacks and identify the attacker as the N.S.A., learn how to block similar intrusions, or even decide to retaliate, Mr. Aitel said.

Mr. Martin, 51, a Navy veteran who was completing a Ph.D. in information systems at the University of Maryland, Baltimore County, has worked for several of the contracting companies that help staff the nation's security establishment. After stints at the Computer Sciences Corporation and Tenacity Solutions, where he was assigned to the Office of the Director of National Intelligence, he joined Booz Allen Hamilton in 2009. He worked on that firm’s N.S.A. contract until 2015, when he was moved to a different Pentagon contract in the area of offensive cyberwarfare."...image from NY Times






...........

Florida school killer had key to gun safe his guardian didn't know about. "After Wednesday's shootings, he realized Mr. Cruz had an extra key"-Wall St. Journal

2/19/18, "Family Who Housed Florida School Shooter Describes the Days Before the Attack," Wall St. Journal, Zolan Kanno-Youngs 

"The days before Nikolas Cruz allegedly opened fire in a high school in Parkland, Fla., were normal, said James Snead, the man who was housing the 19-year-old....

Mr. Cruz had lived with the Snead family for only a few months. Mr. Snead and his wife had invited Mr. Cruz, a friend of their son, to move in after his mother died in November.

Mr. Snead, a gun owner, said he required Mr. Cruz to follow house rules. He told Mr. Cruz that he would need his own gun safe for his firearms in order to live with the Sneads. Mr. Cruz owned “five or six guns,as well as pellet guns, and they were all bought legally, Mr. Snead said.

“He followed [the rules] to the T,” Mr. Snead said. Mr. Snead had what he thought was the only key to the safe, he said. After Wednesday’s shootings, he realized Mr. Cruz had an extra key.

He definitely had a key to the gun safe I didn’t know about, Mr. Snead said.

A Broward County sheriff spokeswoman said the investigation is ongoing and declined to comment further. The public defender’s office, which is representing Mr. Cruz, didn’t respond to a request for comment.

Mr. Cruz faces 17 charges of premeditated murder for the attack on Marjory Stoneman Douglas High School. Since the killings, neighbors and classmates have described disturbing behavior by Mr. Cruz, including an obsession with weapons. 

The Federal Bureau of Investigation has said it didn’t follow up on a January tip about Mr. Cruz’s behavior. A former neighbor said she called the police two years ago after Mr. Cruz posted on social media that he wanted to shoot up a school."...



...............

 https://www.wsj.com/articles/family-who-housed-florida-school-shooter-describes-the-days-before-the-attack-1519015615




.................

Violent mobs assembled in wait to attack defenseless Trump ralliers 'promoted discord in the US and undermined confidence in democracy:' San Jose, Calif. police witnessed Trump supporters "running for their lives," attacked by violent mobs as they tried to walk to their cars after Trump rally, 6/2/2016. Victims were "punched, kicked, spit on and even robbed" of personal belongings. "It became inherently dangerous for anyone wearing a T-shirt or hat in support of Trump." Police didn't intervene "for fear for their own safety"-San Jose Mercury News, 6/8/2016

June 8, 2016, "Trump supporters were 'running for their lives' after San Jose rally, police report says," San Jose Mercury News, Mark Gomez

6/2/2016, Running for his life amid parking garage ambush, photo Merc. News

"Two undercover police officers at a Donald Trump rally last week said they saw Trump supporters “get punched, kicked and pushed” and “running for their lives,” according to a police report.

The plainclothes officers said they did not intervene for fear their own safety would be jeopardized as the estimated 400 protesters developed a “mob mentality.”

The officers’ observations were included in the arrest report of Antonio Moses Fernandez, 19, of San Jose, who is accused of throwing a metal barrier into a police skirmish line following the Trump rally June 2 outside the San Jose Convention Center. Fernandez made his first court appearance Tuesday and was charged with felony assault on a peace officer with a deadly weapon and misdemeanor resisting, delaying or obstructing an officer, according to court documents....

“When there’s an assault on a police officer, we don’t have any tolerance for that,” prosecutor Chris Boscia said.

So far Fernandez is the only person to be criminally charged stemming from the violence that erupted outside Trump’s rally last week. Three other people were also arrested the day of the rally, including Ahmed Abdirahman, 19, of Santa Clara, and Robert Trillo, 18, both on suspicion of felony assault with a deadly weapon, and Michael Kitaigorodsky, 19, of San Jose, on suspicion of refusal to disperse.

Three juveniles were also arrested, police said Wednesday. A 16-year-old and a 17-year-old, both of San Jose, were arrested for felony assault with a deadly weapon. A 16-year-old Milpitas resident was arrested for misdemeanor battery. Their names were not released because they are minors. The attacks were seen in television reports....

One of the undercover officers wrote that he was “monitoring protesters from within the crowd” and estimated there were 250 protesters gathered behind barricades at 6 p.m., about one hour before Trump’s scheduled arrival. That number grew as the evening wore on.

As the crowd grew, the officer noted that “it became inherently dangerous for anyone wearing a T-shirt or hat in support of Trump. I observed Trump supporters being spit on, objects being thrown at them, punched, kicked and even robbed of their personal belongings. 


In these instances, I observed victims running for their lives. 

A second undercover officer reported seeingseveral individuals wearing Trump articles of clothing get punched, kicked and pushed. Due to the crowd size and volatility, officers (both uniform and plain clothes) were unable to help most victims.”

Just after 8 p.m. police issued an order for the crown to disperse. At 9:10 p.m. the undercover officers witnessed Fernandez throw a metal barricade into officers dressed in full riot gear. One officer was injured after being hit by the barricade, according to the report.

The undercover officers say they witnessed Fernandez pick up a second barrier and then put it down. One witnessed Fernandez remove his shirt and use it to cover his face. One of the undercover officers eventually tackled Fernandez and held him down until uniformed officers arrived to make the arrest. During a police interview, Fernandez denied throwing the barrier into the police line. 

In the face of critics who charge police did little to protect Trump supporters, Police Chief Eddie Garcia has defended his officers’ handling of the protest. Garcia insisted that it was more important for police to hold their “skirmish line” formations than to stop individual attacks.

“We are not an ‘occupying force’ and cannot reflect the chaotic tactics of the protesters,” Garcia told reporters. Unless a victim’s life was in peril or the violence was “spiraling out of control,” he said,  


officers held back to avoid inciting more violence and having the crowd turn on officers. 

He also said the 250 police weren’t enough to control about 400 protesters.

Following the rally several videos appeared on various social media sites and captured some of the attacks. A police task force is reviewing video evidence of the assaults and other possible crimes from the protest. Monday the police department announced more arrests were “imminent,” but so far no additional arrests have been announced.
San Jose police are asking anyone with information about physical assaults at the Trump rally or videos of the violence to contact their Assaults Unit at 408-277-4161 or leave a tip with Silicon Valley Crime Stoppers at 408-947-STOP (7867) or svcrimestoppers.org." image from Mercury News



.....................

Followers

Blog Archive

About Me

My photo
I'm the daughter of an Eagle Scout (fan of the Brooklyn Dodgers and Mets) and a Beauty Queen.