Tag: Spy

Leftist Corruption Update: Hitlery’s Emails Contained Signal Intelligence From Spy Satellites

Hillary Clinton Emails Contained Signal Intelligence From Spy Satellites – Washington Times

.

.
The revelation that Hillary Rodham Clinton’s private emails contained sensitive information derived from spy satellites and signal intelligence undercuts her defense that she had no reason to believe she was dealing with classified information, security experts say.

“If she is so ignorant that she doesn’t recognize that this type of information in the email as being classified, it just calls into question her overall competence,” Larry Johnson, a former CIA analyst trained in the rules of handling government secrets, told The Washington Times.

As details emerge about the extent of Mrs. Clinton’s use of personal email to exclusively conduct business as secretary of state, her defense has shifted.

At first, she stated flatly that her private emails did not hold or transmit classified information. She later amended that defense to claim that none of the information she sent by private email was classified at the time she sent it.

Now, her defenders have evolved her story further, suggesting that she didn’t know information she was handling was classified because it wasn’t marked as such.

Pete Hoekstra, former chairman of the House Permanent Select Committee on Intelligence, wrote an op-ed published Wednesday in The New York Post calling the latest explanation from the Clinton camp a “sham.”

“The statement ignores how the process works. The reason government officials with security clearances are required to keep their correspondence on the appropriate government server is so the material can be vetted and classified prior to hitting ‘send’ to an uncleared recipient,” Mr. Hoekstra and former federal prosecutor Victoria Toensing wrote in the joint op-ed.

In an interview with The Times, Mr. Hoekstra said that repeating in an email classified information from a report or a secure briefing still violates regulations.

He recalled the extraordinary steps the intelligence community took when it gave him top-secret information. He received the data either in a secure room in a House office, at an off-site FBI facility or on his secure phone.

Asked whether it was possible that Mrs. Clinton dealt with top-secret material but did not know it, Mr. Hoekstra answered: “Sure, it’s always possible that you will have received information from the intelligence community that they consider top secret and you may not be aware of that. Unlikely, but possible.”

Last month, the inspectors general for the State Department and the intelligence community flatly contradicted Mrs. Clinton’s claim that her emails did not contain national secrets. They wrote in a public joint statement that the information among thousands of emails on her private server was definitely classified at the time.

“These emails were not retroactively classified by the State Department,” the inspectors general wrote. “Rather, these emails contained classified information when they were generated and, according to IC classification officials, that information remains classified today. This classified information should never have been transmitted via an unclassified personal system.”

This week, I. Charles McCullough III, the intelligence community’s inspector general, revealed that not only did a small sampling of Mrs. Clinton’s 30,000 emails turned over to State contain classified information, but two held data that were top-secret – the highest classification.

Mr. McCullough went further. The top-secret information was labeled “SI,” which is intelligence community parlance for “special intelligence.” Special intelligence is intercepted communications from foreign targets.

In addition, the intercept came from code word “talent keyhole,” (TK), which stands for the nation’s military satellites and their production of classified imagery and intercepted communications.

An intelligence spokeswoman said the TK compartmental function “protects information and activities related to space-based collection of imagery, signals, measurement and signature intelligence, certain products, processing and exploitation techniques, and the design, acquisition, and operation of reconnaissance satellites.”

“TOP SECRET/SI/TK” means her server held some of the nation’s most sensitive information. The information could have come from the National Security Agency and most certainly the National Geospatial-Intelligence Agency, experts said.

Mr. Johnson, the former CIA analyst, said revelations about the highly sensitive nature of information in certain emails call into question the entirety of Mrs. Clinton’s story about the private email server she operated out of her home in Chappaqua, New York.

“She’s admitting she lacks the knowledge and intelligence to recognize classified information. That’s her defense? That she’s stupid?” he said. “I think she knew it was classified and used it. They were passing information back and forth.”

The SI and TK designations mean that if Mrs. Clinton’s server was hacked, “there is the possibility of compromising multiple intelligence sources,” Mr. Johnson said.

Because Mrs. Clinton conducted all State Department business on one server at her home, it is assumed that her aides also passed classified information on unsecure systems. This is because a commercial system such as Mrs. Clinton’s cannot communicate with a secure government network set up to handle and protect secrets. Mrs. Clinton did not use a State.gov account, as is expected of all State Department employees.

Intelligence experts said Mrs. Clinton’s server, which she turned over under pressure to the Justice Department this week after having vowed never to part with it, was susceptible to hacks from adversaries such as China and Russia.

Mrs. Clinton handed over 30,000 printed emails in December after the special House committee investigating the deadly 2012 attack on a U.S. diplomatic post in Benghazi, Libya, pressed the State Department for her emails and discovered they were all on her own server.

Watchdog groups, including Judicial Watch, have filed lawsuits to obtain the emails under the Freedom of Information Act. Prodded by a federal judge, State Department foreign service officers and, more recently, outside intelligence officials, have been sifting through the material to delete government secrets.

The inspectors general estimate that hundreds of emails will be shown to contain classified information before the tedious process is complete.

.
————————————————————————————————————————–
.

Related video:

.

.

.

Clinton Crime Update: Private Emails Reveal Ex-Hillary Aide’s Secret Spy Network

Private Emails Reveal Ex-Clinton Aide’s Secret Spy Network, Which Included Activity In Libya – Weasel Zippers

.

.
Hillary was running her own clandestine operation in Libya.

Via ProPublica

Starting weeks before Islamic militants attacked the U.S. diplomatic outpost in Benghazi, Libya, longtime Clinton family confidante Sidney Blumenthal supplied intelligence to then Secretary of State Hillary Clinton gathered by a secret network that included a former CIA clandestine service officer, according to hacked emails from Blumenthal’s account.

The emails, which were posted on the internet in 2013, also show that Blumenthal and another close Clinton associate discussed contracting with a retired Army special operations commander to put operatives on the ground near the Libya-Tunisia border while Libya’s civil war raged in 2011.

Blumenthal’s emails to Clinton, which were directed to her private email account, include at least a dozen detailed reports on events on the deteriorating political and security climate in Libya as well as events in other nations. They came to light after a hacker broke into Blumenthal’s account and have taken on new significance in light of the disclosure that she conducted State Department and personal business exclusively over an email server that she controlled and kept secret from State Department officials and which only recently was discovered by congressional investigators.[…]

The dispatches from Blumenthal to Clinton’s private email address were posted online after Blumenthal’s account was hacked in 2013 by Romanian hacker Marcel-Lehel Lazar, who went by the name Guccifer. Lazar also broke into accounts belonging to George W. Bush’s sister, Colin Powell, and others. He’s now serving a seven-year sentence in his home country and was charged in a U.S. indictment last year.[…]

It’s unclear who tasked Blumenthal, known for his fierce loyalty to the Clintons, with preparing detailed intelligence briefs. It’s also not known who was paying him, or where the operation got its money. The memos were marked “confidential” and relied in many cases on “sensitive” sources in the Libyan opposition and Western intelligence and security services. Other reports focused on Egypt, Germany, and Turkey.

Keep reading

.

.

Congressman Jeff Miller: Veterans Benefits Administration Tried To Spy On Investigators (Audio)

Miller: Veterans Benefits Administration Tried To Spy On Investigators – Daily Caller

.

.
House Veterans Affairs Committee Chairman Jeff Miller told DC-based WMAL Radio on Tuesday about his congressional staffers recently being spied on when they looked into various VA complaints at a regional Veterans Benefits Administration office.

His staff was told on “three different occasions” to go to a specific room to do their work but one VA employee said it wasn’t necessary.

Miller, a Republican from Florida, recounted that the “VBA’s acting director took that employee outside” for several minutes and when they returned, his staff was directed again to the specific room on a different floor.

His staffers discovered the room’s sound and video system were prepared to observe their work while they reviewed case files.

“In that room, both of the mics were hot and the camera itself was activated,” the committee chairman told WMAL host Larry O’Connor.

Miller continued, “My staff said, ‘We’re not going to do it in this room,’ and they requested to be taken to another room.”

VBA relocated the committee staffers after they pushed back about the use of the room.

When Department of Veterans Affairs Undersecretary for Benefits Allison Hickey was confronted at Monday night’s congressional VA hearing about the spying incident, Miller said that “there was no attempt to deny that it had occurred.”

.

.

.

.

Obama’s NSA Disguised Itself As Google To Spy On Americans

NSA Disguised Itself As Google To Spy, Say Reports – Cnet

Here’s one of the latest tidbits on the NSA surveillance scandal (which seems to be generating nearly as many blog items as there are phone numbers in the spy agency’s data banks).

.

Earlier this week, Techdirt picked up on a passing mention in a Brazilian news story and a Slate article to point out that the US National Security Agency had apparently impersonated Google on at least one occasion to gather data on people. (Mother Jones subsequently pointed out Techdirt’s point-out.)

Brazilian site Fantastico obtained and published a document leaked by Edward Snowden, which diagrams how a “man in the middle attack” involving Google was apparently carried out.

A technique commonly used by hackers, a MITM attack involves using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service. Hackers could, for example, pose as a banking Web site and steal passwords.

The technique is particularly sly because the hackers then use the password to log in to the real banking site and then serve as a “man in the middle,” receiving requests from the banking customer, passing them on to the bank site, and then returning requested info to the customer – all the while collecting data for themselves, with neither the customer nor the bank realizing what’s happening. Such attacks can be used against e-mail providers too.

It’s not clear if the supposed attack in the Fantastico document was handled by the NSA or by its UK counterpart, the Government Communications Headquarters (GCHQ). The article by the Brazilian news agency says, “In this case, data is rerouted to the NSA central, and then relayed to its destination, without either end noticing.”

“There have been rumors of the NSA and others using those kinds of MITM attacks,” Mike Masnick writes on Techdirt, “but to have it confirmed that they’re doing them against the likes of Google… is a big deal – and something I would imagine does not make [Google] particularly happy.”

Google provided a short statement to Mother Jones reporter Josh Harkinson in response to his questions on the matter: “As for recent reports that the US government has found ways to circumvent our security systems, we have no evidence of any such thing ever occurring. We provide our user data to governments only in accordance with the law.” (The company is also trying to win the right to provide more transparency regarding government requests for data on Google users.)

CNET got a “no comment” from the NSA in response to our request for more information.

As TechDirt suggests, an MITM attack on the part of the NSA or GCHQ would hardly be a complete shock. The New York Times reported last week that the NSA has sidestepped common Net encryption methods in a number of ways, including hacking into the servers of private companies to steal encryption keys, collaborating with tech companies to build in back doors, and covertly introducing weaknesses into encryption standards.

It wouldn’t be much of a stretch to obtain a fake security certificate to foil the Secure Sockets Layer (SSL) cryptographic protocol that’s designed to verify the authenticity of Web sites and ensure secure Net communications.

Indeed, such attacks have been aimed at Google before, including in 2011, when a hacker broke into the systems of DigiNotar – a Dutch company that issued Web security certificates – and created more than 500 SSL certificates used to authenticate Web sites.

In any case, the purported NSA/GCHG impersonation of Google inspired a rather clever graphic by Mother Jones, one that might even impress the rather clever Doodlers at Google:

.

Click HERE For Rest Of Story

.

President Asshat Orders Federal Workers To Spy On One Another Or Be Charged As Criminals

Insider Threat: Obama Orders Fed Workers To Spy On One Another Or Be Charged As Criminals – Independent Journal Review

The more things “change” in politics, the more things stay the same. President Obama is installing measures to intimidate those who give the American people the “transparency” that was promised to them.

.

The White House is launching a government-wide initiative known as the “Insider Threat Program,” which is already being panned by experts as a threat to transparency and accountable government.We’re talking everything from the postal service (yes, it’s tracking Americans, too) to what President Obama might call the “Peace Corpse.”

.

.
The video above is from the Russia Today program “The Resident“; and it always wigs me out agreeing with RT, since it is funded by the Kremlin. Regardless, the host really nails several key points in appropriately sarcastic fashion. The left-wing outlets Democracy Now! and Young Turks also commented on the Insider Threats Program.

For those who prefer not to watch Kremlin-funded news (and trust me,the Russians know a little bit about domestic surveillance), McClatchy reports:

In an initiative aimed at rooting out future leakers and other security violators, President Barack Obama has ordered federal employees to report suspicious actions of their colleagues based on behavioral profiling techniques that are not scientifically proven to work, according to experts and government documents.

The techniques are a key pillar of the Insider Threat Program, an unprecedented government-wide crackdown under which millions of federal bureaucrats and contractors must watch out for “high-risk persons or behaviors” among co-workers. Those who fail to report them could face penalties, including criminal charges.

President Obama has prosecuted more people under the Espionage Act than all other presidents combined. Add recent Project PRISM leaker Edward Snowden to the list; although he wasn’t the first NSA whistleblower – there are at least three others, who generally support Snowden.

PRISM is more than is being reported by the mainstream media. It is not specifically directed at foreign threats, and it is much more than a periodical gathering of cellphone “metadata” (which is bad enough). The NSA monitors all sorts of data on an ongoing daily basis, and it even gushed it can do whatever it wants without public oversight or a warrant. Americans need to know about it.

Click HERE For Rest Of Story

.