Debbie Wasserman Schultz talks like a criminal, walks like a criminal and is a CRIMINAL

Debbie Wasserman Schultz talks like a criminal, walks like a criminal and is a CRIMINAL.

This piece from the Observer is sickening. DWS should resign and save the Democratic Party further embarrassment.

In February 2017, Debbie Wasserman Schultz’s top IT staffer, Imran Awan, was reported as under criminal investigation for the theft of a wide range equipment and data. Awan and several other staffers are accused of accessing congressional computers without permission. Its still unclear what, if any, data was stolen and what the motives for the breach were. In a recent budget hearing with the U.S. Capitol Police, Debbie Wasserman Schultz pushed for the U.S. Capitol police chief to return equipment of hers that was confiscated by the police as part of the investigation after it was discovered hidden in a crevice of a House office building.

“So if a member says there is equipment that has been lost, and you find it, it would be returned to the member?” Wasserman Schultz asked, implying the equipment should have been returned to her regardless of the investigation because the owner of the equipment (her) is not the subject of the investigation. She added, “I don’t understand how that is possible. Members’ equipment is members’ equipment. My understanding is that the Capitol Police is not able to confiscate members’ equipment when the member is not under investigation. It is their equipment and it is supposed to be returned.”

The U.S. Capitol police chief responded, “I think there are extenuating circumstances in this case, and working through my counsel and the necessary personnel, if that in fact is the case, and with the permission of the investigation, then we’ll return the equipment. But until that happens we can’t return the equipment.”

Wasserman Schultz then threatened the chief. “I think you’re violating the rules when you conduct your business that way and you should expect that there will be consequences.” Its unclear what Wasserman Schultz believes those consequences should be, as her communications director refused to provide the Daily Caller with a comment on the exchange.

The Daily Caller reported on what equipment Wasserman Schultz was demanding to have returned: “A federal employee with knowledge of the situation and who requested anonymity told The Daily News Foundation’s Investigative Group that as House authorities closed in on Imran Awan and his brothers, a laptop used by Imran was hidden in an unused crevice of the Rayburn House Office Building. Wasserman Schultz’s office is in Longworth House Office Building, a separate structure. The laptop was later found by Capitol Police and seized because it was relevant to the criminal investigation, the source said.”

Posted in Debbie Wasserman Shultz, Uncategorized | Leave a comment

North Korea Gasoline Price Surge

North Korea Gasoline Price Surge

The small communist country gets a lot of its fuel (statistics are hard to come by in NK) from a Chinese supplied pipeline. So, the reasoning is, if Xi really wants to immediately hurt and/or influence North Korea, he can, and retail gasoline prices in the communist capital would be a sign this is happening. Here is a VOA report on this exact event.

Gasoline prices in North Korea have reportedly soared amid speculation China may limit oil supplies to the country in a bid to pressure Pyongyang over its nuclear ambitions. Citing a North Korean diplomat, Voice of America reports gasoline prices have spiked more than 85 percent recently.

The diplomat also said there are cases where gas stations limit purchases to ten or 20 liters per customer. Some North Korea watchers say the price surge comes as the regime is saving its gasoline stockpiles as China is reportedly reviewing its next step.

I think it’s a sign Xi is attempting to make good on his 100-day plan, regardless of the last missile launch. Here is a VOA report on that:

It has emerged that Chinese President Xi Jinping reportedly asked his U.S. counterpart Donald Trump at their summit last month to put off any specific action by the U.S. for a (100) hundred days so Beijing can strengthen its sanctions on North Korea. Citing numerous sources, Japan’s Asahi Shimbun reported Monday, that the two countries agreed to a 100-day plan on the security front similar to the one aimed at equalizing their trade imbalance.

The paper said Trump asked the Chinese leader to strengthen sanctions on Pyongyang, or Chinese firms that do business with the regime will be included on Washington’s sanctions list. To that, President Xi reportedly asked for a 100-day plan, where China will push hard on North Korea for a solution to its nuclear threats.

However, the paper added that with North Korea’s missile provocations over the past few weeks, it’s unclear whether the plan is still in place.

Exactly. If the missiles keep going off, I don’t care how high the cost of gasoline gets, Trump is not a patient man.

Posted in North Korea, Rex Tillerson, THAAD, Trump, Uncategorized | Leave a comment

What China is planning next for The South China Sea – and How the U.S. Should Respond

What China is planning next for The South China Sea – and How the U.S. Should Respond

I don’t get a lot of traffic on these China pieces, and I don’t know why, I’m fascinated by what is happening over there, this next tidbit is deeply troubling — since I believe it sets up some kind of future US/China confrontation.

If I were running the NYT – this would make the A section. My source for this is a new white paper written by Admiral John Richardson, which outlines our need for a more robust Navy than the one planned, and aggressive behavior by Russia and China is the main reason he gives, anyway, here is the Admiral:

White Paper – “According to state media reports posted last week, Beijing is drafting a revision to the nation’s maritime “traffic safety” law. While in Chinese waters, according to the changes, any foreign submarine would be required to stay surfaced and display its national flag. It would also need to get approval before entering Chinese waters, and report to maritime management authorities.

China would reserve the right to bar or expel foreign ships deemed to threaten “traffic safety and order.” Ships entering Chinese waters without
approval could be fined more than $70,000.

One big problem: China claims nearly all of the contested South China Sea — with its strategic shipping lanes, rich fishing grounds, and oil and gas deposits — as its own territory, based on its nine-dash line.

That claim was shot down last July by an international tribunal ruling under the United Nations Convention on the Law of the Sea (UNCLOS).

But, as Richardson goes on to note later in the paper, and I have described in previous posts, China doesn’t recognize this ruling. Here is what we can do to improve the EFFECTIVENESS of our navy, while also lowering costs.

The idea that America would slide gently out of the cold war and not need aircraft carriers far into the future, is well, naïve.

The question about how to project American air power for the next 30 to 50 years is complicated by two realities, one realized and the other about to be.

The first reality is fiscal.

The Navy cannot afford to continue to project power though the traditional reliance/use of a A. large (plus 10 in number) nuclear powered carrier fleet, B. modernize the America class helicopter and amphibious assault carrier fleet, C. replace the Ohio class nuclear subs (completely unbudgeted at the moment, like a $100 billion black hole every physicist in the room is ignoring), and D. integrate the F-35 joint service fighters, all the while maintaining a E. credible base structure, F. and remaining 275-300 (more or less) surface ship fleet structure.

Assuming an average of $18B (CapEx) over the next 30 years, the new construction priorities list above will be shredded and the resulting service, so shriveled, the U.S. Navy mission statement itself will have to change. Admiral Richardson agrees with this, but has not proposed anything radical like this carrier plan to change the reality. I hope he does because the second unpleasant reality is the failing traditional aircraft carrier vulnerability and cost practicality trade off.

Just as Billy Mitchell predicted the eventual — but inevitable end of the battleship era — because of the mismatch between the expense, and delivery capability of air launched torpedoes’ and their intended targets, (Battleships) that same argument applies today to the modern aircraft carrier, and a combination of sea, air, and land based missile and torpedo systems.

When a $20/30 billion dollar weapons system (that cost includes escort ships) with 5,000+ souls on board is vulnerable to an ever-increasing array of sub $100 million missile weapons systems, the balance tips from projecting power to becoming a target.

Traditional Super Carriers (TSC) are impressive; long running, fast (35+ knots), can launch Vertical Take-Off and Landing (VTOL) and non -VTOL aircraft, and support an entire air wing; with fuel, and high armament capabilities, and high load and reload flexibility. On the down side they’re a huge target, (+100ton) need a flotilla of support ships, 5,000 souls to operate, and have a combination of high construction and maintenance costs.

Despite these drawbacks and vulnerabilities, it’s still necessary to maintain a fleet of them, but I would spread the financial load of construction, staffing and patrol load costs among the nations we can count on to help us with that and whose seas we are patrolling anyway with those same carriers.

THE AGREEMENT

I would sign a long-term (99 year) Naval Protection Agreement (NPA) with the country of Australia, that calls for (in addition to other stuff) the positioning of two new Ford class (2) Traditional Super Carriers on either side of that continent, and over 10 years, train and transfer operation, ownership and fiscal responsibility of those 2 platforms to Australian Naval personnel, along with all the air wing and support ship structure/capability.

This would simultaneously lower American Naval costs and strengthen our deterrent capability in the Pacific and Atlantic oceans on the two sides of Australia. Australia is uniquely suited to this first partnership, a stalwart alley for generations, a large island nation with huge oceans to protect and only 24 million people, — not enough to afford the development, construction and deployment of 2 super carriers — although they need them. Win-win.

Next,

I would sign an identical Naval Protection Agreement (NPA) with the island nation of Japan, using the Australian process and document as a model (pre-invite the Japanese to watch the negotiation/implementation process with the Australian Navy) to also position two new Ford class (2) TSC’s on either side of that island, and over 10 years, train and transfer operation, ownership and fiscal responsibility of those 2 platforms to Japanese Naval personnel, along with all the air wing and support ship capability.

This would simultaneously lower American Naval costs and strengthen our deterrent capability in the Pacific Ocean and China Sea. Japan is also uniquely suited to this second partnership, a stalwart alley for a generation now, Japan is a small island nation with a huge economy, right smack in the center of the South China Sea, the most important section of open water in the world today. Japan has huge interests and a sophisticated military and a lot of ocean to protect and can only proceed with the proper defense of their country through such an agreement with the U.S. since they are constitutionally prohibited from pursuing the deployment of such a weapon system under any other legal course.

They can afford the development, construction and deployment of 2 super carriers – and we should let them pay, plus part of the cost for one of the Australian carriers since that one will help cover their flank. Another Win-win.

Lastly,

I would sign such an NPA with the United Kingdom, to position one (1) TSC, built by the British (conventional not nuclear, 70,000 tons) on the Atlantic side of that island, and take the next carrier under construction in that family and use as one of the two either described above as going to Japan or Australia. This would simultaneously lower American Naval costs since this step would allow the total number of Ford class TSC built to be lowered by 2 and simultaneously strengthen our deterrent capability in the EU/Atlantic theater. The UK is obviously a stalwart ally, an island nation and has a strong naval tradition, 3 terrific reasons to make them country number 1, 2, or 3 to do this with.

Although the British deal will probably be the least advantageous to the U.S. financially it could work out the other way around since they have built one of these carriers, are committed to building the 2nd, and acknowledge, they can’t use both. That’s why I list the British proposal last, because this program is designed to get the Navy the money they need to build the Ohio class replacement subs, so I didn’t want to set a generous example first, and then have to do the same for the Aussies and the Japanese) it will dramatically change the balance of power in Europe.

With such a different long-term deployment plan, the U.S. could still build, staff, maintain and afford a smaller (in U.S. number) super carrier fleet, that combined with the others would still be a 7 or 8 Ford class TSC’s fleet in total, but with only 4 or 5 of those super carriers totally free for U.S. deployment priorities.

Since the British, Australian and Japanese carriers (5 of the 10) would be integrated into our overall defense umbrella, with joint command and deployment responsibilities, and entire ocean area coverage responsibilities — the resulting smaller U.S. carrier fleet would have more mission flexibility and considerably less ocean to cover.

I would scrape the America class (no well deck, I don’t understand that) Marine assault carriers at $3B apiece altogether (these ships have many problems, some of them structural, and are unfixable in my opinion) and buy instead 10 Mistral class French assault ships at $600 million per.

Modify them (The doorways will have to be enlarged) to carry the Osprey (and smaller numbers of aircraft per ship, but more ships) and your total punching power would be far greater. With 10 Mistral’s at $600-800 million a piece, you get a lot more punching power than with 2 America class ships at a total of $6 Billion, and if you buy now you also get the benefit of buying up all the fantastic product of this unique French production line.

Each Mistral ship we buy is one the Russians don’t get to buy. If the Austrians, Japanese and British like the Super Carrier Deal or the NPA as I call it, they’ll soon want to expand it to include some of these terrific little French assault carriers as well. Putting them in the deal we could buy 20 of these for less than half of what we planning to spend on just a few those America class ships.

We might even be able to get the French to sell us the one they’ve already built for the Russians; and stop the sale of the 2nd Mistral ship the Russians have also ordered. It would be best for the U.S., the French, and the rest of the world — if Putin never gets this Mistral ship(s) — or any from this production line.

These ideas together form a package, a TSC fleet (10) supported by the Australian, Japanese and British Navy — further supported by a large fleet (20) of Mistral class assault marine ships — our Naval war fighting capability would be greatly magnified for the foreseeable future at lower overall costs to the American tax payer.

I estimate you could do the package described above, including penalties and cost overruns, for $15 billion a year in CapEx, instead of the $18 billion I used as a compromise figure although I suspect if all the real sub numbers were in these budget estimates, none of these estimates are accurate, they are all low. All the more reason to pursue this plan, it will provide a financial cushion without sacrificing front line strike capability, in fact, multiplying it.

I also feel it’s politically and fiscally achievable to get such a set of Naval agreements with the Australian, Japanese and British governments; as well their militaries and also would expect public support (for sure) in Australia and UK, and probably even in Japan, it would depend upon how it was sold to them, and how threatened they feel by the Chinese at the time they’re asked. At a $1B each from this allies, net to the US Navy, for 25 years, ($75B) with 2 Ford class carriers subtracted from the total, this gets the Navy the 100B+ needed to make this capital budget work with the new subs in, although possibly reduced in number.

Of course, such agreements will pave the way for similar types of cooperative structures; trail blazed by the USN in other countries and maybe the other services.

Posted in Admiral Richardson, Carrier Plan, China, China fishing the ocean clean, China invades Taiwan, China vs U.S., Chinese Economy, Chinese Navy, Trump, Uncategorized, Xi | Leave a comment

The Coming Famine – Trump Responds

The Coming Famine – Trump Responds

I’ve been writing about the coming famine in Africa and my concern was two-fold, where will the aid come from?

And how will it get to the starving people without interference from local warlords and thieving governments? I worry about all this because I am aware a huge famine is coming, and I was also aware – aid commitments – were lacking badly.

The story below is very reassuring on both those counts.

Until I saw this, I had no idea Trump had his eye on this problem. Now, it’s clear he does, and frankly that makes me feel a lot better about the whole situation because he is the only man in the world that can do anything about both sides of the equation, aid itself AND delivery of the aid.

In other words, even if you have the food, you still need a good military to deliver it, because to do it any other way — is far too dangerous. Trump has both, and Trump has obviously been alerted by Nikki Haley — I love her — and now he’s doing the needed thing.

Everyday I watch Trump I am more and more impressed. The guy is smart, compassionate, and working like a beast.

VATICAN CITY (AFP) – US President Donald Trump told Pope Francis on Wednesday he was committing more than $300 million (270 million euros) to help prevent or tackle famine in Yemen and several countries in Africa.

Trump, meeting the pontiff for the first time, said he had “renewed” the US “commitment to fighting global famine”, with the United Nations warning that about 20 million people across Nigeria, Somalia, South Sudan and Yemen are at risk.

The UN has described the situation as the biggest humanitarian crisis in its history, but donor funding is falling far short. It appealed earlier this month for $4.4 billion, but said less than a third had been raised.

“As he (Trump) relayed at the Vatican, the United States is proud to announce more than $300 million in anti-famine spending” for the area, a White House statement said.

His announcement came just a day after the US State Department laid out plans to put “America first” and slash Washington’s budget for diplomacy and foreign aid by more than 30 percent.

The deepest cuts will hit foreign assistance programmes and contributions by the world’s largest economy to international organisations like the United Nations and its global peacekeeping budget.

Posted in Nikki Haley, Pope, Trump, Uncategorized | Leave a comment

The A-10 is impossible to kill, on the battlefield — and in the halls of Congress – Thank God!

A10flyingThe A-10 is impossible to kill, on the battlefield — and in the halls of Congress – Thank God!

From Defense News — The U.S. Air Force plans to keep the A-10 Warthog and U-2 spy plane flying, reversing course after years of arguing that the service needed to retire the Cold War-era aircraft to pay for newer planes and drones.

The Air Force has also decided to keep the F-15C fighter, a plane that generals had recently suggested was also on the chopping block. The decisions were announced in the Trump administration’s first military budget request sent to Congress on Tuesday. Lawmakers are likely to support the plan since they have routinely added funds to save the A-10 and U-2 from retirement time after time in recent years.

Posted in A10 Warthog, Uncategorized | Leave a comment

Who are the Shadow Brokers? Right now in the U.S., we have high value intelligence leaking out of the NSA, the CIA, the White House…

Who are the Shadow Brokers? Right now in the U.S., we have high value intelligence leaking out of the NSA, the CIA, the White House…

Each of these situations is a different person, or group of persons, and their motives probably stretch from political to financial.

I don’t know who they are anymore than the average man on the street does, but I ran across a great article SPECULATING about who it might be at one of those places – the NSA.

Without further ado, here it is, from Defense News, it’s an exciting read.

Who Are the Shadow Brokers?
By Bruce Schneier
May 23, 2017
In 2013, a mysterious group of hackers that calls itself the Shadow Brokers stole a few disks full of National Security Agency secrets. Since last summer, they’ve been dumping these secrets on the internet. They have publicly embarrassed the NSA and damaged its intelligence-gathering capabilities, while at the same time have put sophisticated cyberweapons in the hands of anyone who wants them. They have exposed major vulnerabilities in Cisco routers, Microsoft Windows, and Linux mail servers, forcing those companies and their customers to scramble. And they gave the authors of the WannaCry ransomware the exploit they needed to infect hundreds of thousands of computer worldwide this month.

After the WannaCry outbreak, the Shadow Brokers threatened to release more NSA secrets every month, giving cybercriminals and other governments worldwide even more exploits and hacking tools.

Who are these guys? And how did they steal this information? The short answer is: We don’t know. But we can make some educated guesses based on the material they’ve published.

The Shadow Brokers suddenly appeared last August, when they published a series of hacking tools and computer exploits—vulnerabilities in common software—from the NSA. The material was from autumn 2013, and seems to have been collected from an external NSA staging server, a machine that is owned, leased, or otherwise controlled by the U.S., but with no connection to the agency. NSA hackers find obscure corners of the internet to hide the tools they need as they go about their work, and it seems the Shadow Brokers successfully hacked one of those caches.

In total, the group has published four sets of NSA material: a set of exploits and hacking tools against routers, the devices that direct data throughout computer networks; a similar collection against mail servers; another collection against Microsoft Windows; and a working directory of an NSA analyst breaking into the SWIFT banking network. Looking at the time stamps on the files and other material, they all come from around 2013. The Windows attack tools, published last month, might be a year or so older, based on which versions of Windows the tools support.

The releases are so different that they’re almost certainly from multiple sources at the NSA. The SWIFT files seem to come from an internal NSA computer, albeit one connected to the internet. The Microsoft files seem different, too; they don’t have the same identifying information that the router and mail server files do. The Shadow Brokers have released all the material unredacted, without the care journalists took with the Snowden documents or even the care WikiLeaks has taken with the CIA secrets it’s publishing. They also posted anonymous messages in bad English but with American cultural references.

Given all of this, I don’t think the agent responsible is a whistleblower. While possible, it seems like a whistleblower wouldn’t sit on attack tools for three years before publishing. They would act more like Edward Snowden or Chelsea Manning, collecting for a time and then publishing immediately—and publishing documents that discuss what the U.S. is doing to whom. That’s not what we’re seeing here; it’s simply a bunch of exploit code, which doesn’t have the political or ethical implications that a whistleblower would want to highlight. The SWIFT documents are records of an NSA operation, and the other posted files demonstrate that the NSA is hoarding vulnerabilities for attack rather than helping fix them and improve all of our security.

I also don’t think that it’s random hackers who stumbled on these tools and are just trying to harm the NSA or the U.S. Again, the three-year wait makes no sense. These documents and tools are cyber-Kryptonite; anyone who is secretly hoarding them is in danger from half the intelligence agencies in the world. Additionally, the publication schedule doesn’t make sense for the leakers to be cybercriminals. Criminals would use the hacking tools for themselves, incorporating the exploits into worms and viruses, and generally profiting from the theft.

That leaves a nation state. Whoever got this information years before and is leaking it now has to be both capable of hacking the NSA and willing to publish it all. Countries like Israel and France are capable, but would never publish, because they wouldn’t want to incur the wrath of the U.S. Country like North Korea or Iran probably aren’t capable. (Additionally, North Korea is suspected of being behind WannaCry, which was written after the Shadow Brokers released that vulnerability to the public.) As I’ve written previously, the obvious list of countries who fit my two criteria is small: Russia, China, and—I’m out of ideas. And China is currently trying to make nice with the U.S.

It was generally believed last August, when the first documents were released and before it became politically controversial to say so, that the Russians were behind the leak, and that it was a warning message to President Barack Obama not to retaliate for the Democratic National Committee hacks. Edward Snowden guessed Russia, too. But the problem with the Russia theory is, why? These leaked tools are much more valuable if kept secret. Russia could use the knowledge to detect NSA hacking in its own country and to attack other countries. By publishing the tools, the Shadow Brokers are signaling that they don’t care if the U.S. knows the tools were stolen.

Sure, there’s a chance the attackers knew that the U.S. knew that the attackers knew—and round and round we go. But the “we don’t give a damn” nature of the releases points to an attacker who isn’t thinking strategically: a lone hacker or hacking group, which clashes with the nation-state theory.

Inside the NSA, they have a lot more information. Many of the files published include operational notes and identifying information. NSA researchers know exactly which servers were compromised, and through that know what other information the attackers would have access to. As with the Snowden documents, though, they only know what the attackers could have taken and not what they did take. But they did alert Microsoft about the Windows vulnerability the Shadow Brokers released months in advance. Did they have eavesdropping capability inside whoever stole the files, as they claimed to when the Russians attacked the State Department? We have no idea.

So, how did the Shadow Brokers do it? Did someone inside the NSA accidentally mount the wrong server on some external network? That’s possible, but seems very unlikely for the organization to make that kind of rookie mistake. Did someone hack the NSA itself? Could there be a mole inside the NSA?

If it is a mole, my guess is that the person was arrested before the Shadow Brokers released anything. No country would burn a mole working for it by publishing what that person delivered while he or she was still in danger. Intelligence agencies know that if they betray a source this severely, they’ll never get another one.

That points to two possibilities. The first is that the files came from Hal Martin. He’s the NSA contractor who was arrested in August for hoarding agency secrets in his house for two years. He can’t be the publisher, because the Shadow Brokers are in business even though he is in prison. But maybe the leaker got the documents from his stash, either because Martin gave the documents to them or because he himself was hacked. The dates line up, so it’s theoretically possible. There’s nothing in the public indictment against Martin that speaks to his selling secrets to a foreign power, but that’s just the sort of thing that would be left out. It’s not needed for a conviction.

If the source of the documents is Hal Martin, then we can speculate that a random hacker did in fact stumble on it—no need for nation-state cyberattack skills.

The other option is a mysterious second NSA leaker of cyberattack tools. Could this be the person who stole the NSA documents and passed them on to someone else? The only time I have ever heard about this was from a Washington Post story about Martin:

There was a second, previously undisclosed breach of cybertools, discovered in the summer of 2015, which was also carried out by a TAO employee [a worker in the Office of Tailored Access Operations], one official said. That individual also has been arrested, but his case has not been made public. The individual is not thought to have shared the material with another country, the official said.

Of course, “not thought to have” is not the same as not having done so.

It is interesting that there have been no public arrests of anyone in connection with these hacks. If the NSA knows where the files came from, it knows who had access to them—and it’s long since questioned everyone involved and should know if someone deliberately or accidentally lost control of them. I know that many people, both inside the government and out, think there is some sort of domestic involvement; things may be more complicated than I realize.

It’s also not over. Last week, the Shadow Brokers were back, with a rambling and taunting message announcing a “Data Dump of the Month” service. They’re offering to sell unreleased NSA attack tools—something they also tried last August—with the threat to publish them if no one pays. The group has made good on their previous boasts: In the coming months, we might see new exploits against web browsers, networking equipment, smartphones, and operating systems—Windows in particular. Even scarier, they’re threatening to release raw NSA intercepts: data from the SWIFT network and banks, and “compromised data from Russian, Chinese, Iranian, or North Korean nukes and missile programs.”

Whoever the Shadow Brokers are, however they stole these disks full of NSA secrets, and for whatever reason they’re releasing them, it’s going to be a long summer inside of Fort Meade—as it will be for the rest of us.

Bruce Schneier is a correspondent for The Atlantic. He writes about security and technology.

Posted in CIA, NSA, Shadow Brokers, Uncategorized | Leave a comment

High-level Democratic IT staffers flee country

Like Rats from a Sinking Ship – High-level Democratic IT staffers flee country for Pakistan Ahead of Investigation

Debbie Wasserman Schultz is the gift that keeps on giving to the Republican Party.

The story below is about a group of IT people she brought onto Capital Hill, that are now holed up in Pakistan, after fleeing the U.S., — after every Democratic Party computer they touched, a bunch of Congressional computers they touched — and many more apparently — got hacked, knacked and sacked, allegedly.

I hope the Republican Committee investigating this Russian thing gets to the bottom of all the non-Russian things that need attention as well. Read on:

From American Military News — BY JOSHUA RAYMOND-CASTRO · MAY 23, 2017

A Democratic aide who is the center of a major security breach investigation has fled the United States for Pakistan, where it is believed she has significant protection through family money and assets in the region, according to reports.

Hina Alvi and her husband Imran Awan, who also worked as an IT staffer in the U.S. House of Representatives, were brought under investigation in February after accusations that they had been stealing computer equipment and using it to commit large-scale security breaches.

However, Rep. Gregory Meeks (D-NY), for whom Hina Alvi worked as IT support staffer, did not believe that either she or her husband were guilty before they fled.

He told Politico in March that, “[a]s of right now, I don’t see a smoking gun. I have seen no evidence that they were doing anything that was nefarious.”

He also told reporters earlier that he believed in letting the justice system take its course. “I wanted to be sure individuals are not being singled out because of their nationalities or their religion. We want to make sure everybody is entitled to due process. They had provided great service for me. And there were certain times in which they had permission by me, if it was Hina or someone else, to access some of my data.”

But something shifted when the couple withdrew their children from local schools in Northern Virginia and listed their long-time homes for sale.

Brothers of Awan, who also worked as IT support staffers, have too fled to Pakistan, where sources say they are treated like VIPs, consorting with politicians and traveling by police motorcade, which raises many questions as to why fairly middle class IT workers would be receiving such treatment.

Their suspect behavior overseas only further enforces the notion that Alvi and her husband fled prosecution of criminal wrongdoing. To date, U.S. Capitol police have refused to release a statement on the status of the ongoing investigation.

Posted in Debbie Wasserman Shultz, Debbie Wasserman Shultz Disgraced, Democrats Disintegrate, Democrats in Denial, Donna Brazille, Uncategorized | Leave a comment

Leading Democrats Continue to Destroy the Party

Leading Democrats Continue to Destroy the Party

The new leader of the Dim party in California is the same man that told the audience to “Shut the F*ck Up” earlier this week. Big surprise, his election was controversial — and has brought out charges of ballot stuffing, and a lack of ID!, from other Dims.

You can’t make this stuff up.

If the national mainstream media was reporting on how dysfunctional — the Democratic Party really is at the top level – the caucus size would be even more of an emergency.

This is from Politico, so the truth had to be much worse.

SAN FRANCISCO — Supporters of the losing candidate in a bitterly disputed election to serve as chair of the California Democratic Party say they’ll begin a detailed audit of the votes on Tuesday.

The move comes after protests, allegations of ballot stuffing and bitter disputes after votes at a weekend party convention.

Longtime party operative Eric Bauman won the chairmanship of the California Democratic Party over the weekend — but his victory was marred by complaints of ballot-stuffing and floor protests. Backers of the Kimberly Ellis, a favorite of the “Berniecrat,” activist wing of the party — say efforts to scrutinize the votes will begin immediately.

The unprecedented effort to examine the documentation of the disputed state party’s election results was announced by outgoing California Democratic Party chair John Burton at the close of a raucous state Democratic convention this weekend.

Ellis, the former director of Emerge America, a women’s political organization, lost the election by a narrow margin of 62 votes out of 3,000 cast. Her loss immediately set off protests from hundreds of her backers, many of whom charged that there were irregularities that included allowing voters to cast proxy ballots without proper ID.

Some Democratic insiders are already worried the dispute has potential to do long-term damage, creating a rift in the state party as it heads into crucial 2018 elections, where as many as nine GOP House seats could be at stake in California.

Posted in Democrats Disintegrate, Democrats in Denial, Uncategorized | Leave a comment

This Story Explains the DNC Hack, the Wasserman-Shultz failures, Hillary’s failures — and possibly, just maybe — the murder of Seth Rich

This Story Explains the DNC Hack, the Wasserman-Shultz failures, Hillary’s failures — and possibly, just maybe — the murder of Seth Rich

If you are a loyal partisan Democrat, you do not want to read the copyrighted story below from The Daily Caller and Luke Rosiak, because it details, in a factual but horrifying way, how Debbie Wasserman-Shultz compromised the security of the United States in an Congressional Employee IT Fraud Scheme that allegedly involves — multiple cases of illegal activity up to and including blackmail — and may still be continuing today.

Read this and weep if you are a still a Democrat and are still hoping they will impeach Trump, I suspect, now that these links are finally surfacing — many top Democrats holding office today will be arrested this summer.

By LUKE ROSIAK Published on May 23, 2017
Congressional technology aides are baffled that data-theft allegations against four former House IT workers — who were banned from the congressional network — have largely been ignored, and they fear the integrity of sensitive high-level information.

Imran Awan and three relatives were colleagues until police banned them from computer networks at the House of Representatives after suspicion the brothers accessed congressional computers without permission.

Five Capitol Hill technology aides told The Daily Caller News Foundation’s Investigative Group that members of Congress have displayed an inexplicable and intense loyalty towards the suspects who police say victimized them. The baffled aides wonder if the suspects are blackmailing representatives based on the contents of their emails and files, to which they had full access.

“I don’t know what they have, but they have something on someone. It’s been months at this point” with no arrests, said Pat Sowers, who has managed IT for several House offices for 12 years. “Something is rotten in Denmark.”

A manager at a tech-services company that works with Democratic House offices said he approached congressional offices, offering their services at one-fourth the price of Awan and his Pakistani brothers, but the members declined. At the time, he couldn’t understand why his offers were rejected but now he suspects the Awans exerted some type of leverage over members.

“There’s no question about it: If I was accused of a tenth of what these guys are accused of, they’d take me out in handcuffs that same day, and I’d never work again,” he said.

The Awans’ ban sent 20 members searching for new IT workers, but another contractor claims he’s had difficulty convincing offices to let him fill the void, even when he seemed like a shoo-in. He says he has the sense some members wrongly believed that he blew the whistle on the Awans’ theft and they were angry at him for it.

Politico reported the Awan crew is “accused of stealing equipment from members’ offices without their knowledge and committing serious, potentially illegal, violations on the House IT network.”

A House IT employee who requested anonymity said tech workers who have taken over some of those offices found that computers in some — but not all — offices were “thin clients” that sent all data to an offsite server in violation of House policies. Additionally, staffers’ iPhones were all linked to a single non-government iTunes account.

Awan began working for Democratic Rep. Debbie Wasserman Schultz of Florida in 2005, and his wife, his brother’s wife, and two of his brothers all appeared on the payrolls of various House Democrats soon after, payroll records show. They have collected $4 million since 2010.

For years, it was widely known that Awan, and eventually his 20-year-old brother Jamal, did the bulk of the work for various offices, while no-show employees were listed on members’ staffs in order to collect additional $165,000 salaries, workers said. This circumvented a rule that prevents any one staffer from making more than members of Congress.

Members were fiercely protective of the business, despite objectively shoddy work and requests for computer help routinely ignored for weeks, all said. An IT specialist who took over an Awan office said they did not keep an inventory of what hardware was there, and the office was paying for phone lines it hadn’t used in years.

“The number of offices they had would definitely be suspicious. The loyalty [members] had [coupled with] customer service that wasn’t there,” Sowers said.

One Democratic IT staffer said Awan “would come in and only help the member — he’d tell me this — because staff come and go. There was one staffer whose computer was broken and said, ‘I’m not going to pay my invoices until you fix my computer,’ and Imran went to the member, and they fired [the staffer who complained] that day. Imran has that power.”

Sowers said, “I love the Hill but to see this clear lack of concern over what appears to be a major breach bothers me. Everyone has said for years they were breaking the rules, but it’s just been a matter of time.”

An employee of a third private company with House IT office contracts, who like most of the others requested anonymity, said the Awans had more offices than anyone, yet “there’s networkers meetings once a week and I never saw them ever come to them. We have an email group; I never saw them contribute or reply.”

The investigation goes far beyond the theft of millions of dollars. The employees could read all emails dozens of members of Congress sent and received, as well as access any files members and their staff stored. Court records show the brothers ran a side business that owed $100,000 to an Iranian fugitive who has been tied to Hezbollah, and their stepmother says they often send money to Pakistan.

“When you’re an admin for an office, yes, you have access to everything, you’re the one providing access for others,” the IT specialist said.

Wasserman Schultz, the victim of a disastrous hack while she was chairman of the Democratic National Committee, renamed Awan an “advisor” to circumvent the Capitol Police’s computer network ban on the brothers. Ohio Democratic Rep. Marcia Fudge’s office told Politico a month after the ban that she had not fired Imran either.

After Wasserman Schultz and Fudge, as well as New York Democratic Reps. Gregory Meeks and Yvette Clarke and the House Democratic Caucus office, retained the Awans, the incumbents or their staffs encouraged newly-elected members to place the family on their payrolls.

“You’d think in the caucus they’d know these guys were working for all of them and they couldn’t possibly support all of them. Someone must have been turning a blind eye,” the IT specialist said.

“You have the power to shut down the office, remove all their data and lock everyone out. It’s got to be a trusted adviser. How could you not see this? Maybe it’s not specifically blackmail, maybe it’s, you knew this was going on and let me do this” for years, the specialist continued.

Another Democratic IT contractor said members “are saying don’t say anything, this will all blow over if we all don’t say anything.” The Awans “had [members] in their pocket,” and “there are a lot of members who could go down over this.”

Posted in ABC, NBC and CBS need to lose their broadcast licenses, Barack Obama, Comey and McCabe to be arrested -- eventually, Debbie Wasserman Shultz, Debbie Wasserman Shultz Disgraced, Democrats Disintegrate, Democrats in Denial, Donna Brazille, Hillary Clinton, Hillary DNC rig election, Hillary-gate, Loretta Lynch Liar, Marilyn Mosby is a criminal, Montgomery County Democrats, MSNBC, Nancy Pelosi, Obama, Obama is a liar, Rahm Emanual, Rahm Emanuel, Seth Rich Murder, Stephanie Rawlings-Blake, Stephanopoulis, Susan Rice, Trump, Uncategorized, Valerie Jarrett | Leave a comment

Is Duterte Crazy? The Chinese don’t think so…

Is Duterte Crazy? The Chinese don’t think so…

Maybe, if you consider the extra-judicial killings – but politically with China right now — he’s acting crazy like a fox.

If you don’t know about him, the Philippines strongman, and President, has led a war on drugs — that has provably extended to extra-judicial killings.

Duterte even bragged on radio about riding around on his motorcycle, and bagging a few drug dealers himself. However, where it comes to China, his recklessness — combined with his predecessor’s caution — has left him in the cat’s bird’s seat.

Former President Benigno Aquino III took the issue of The South China Sea to The Hague’s Permanent Court of Arbitration, years ago. It wound its way slowly through the machinery as all these things do, and the final result was a huge legal victory for the Philippines.

It was not the final word however, in fact, according to the Chinese it isn’t even the beginning for a possible settlement of the South China Sea issue.

But that isn’t true. The ruling has giving Duterte and his poor country, something the Chinese covet more than money, respect.

They would love to just ignore the ruling – which was emphatically in the Philippines’ favor – and refuse to acknowledge the authority of the Permanent Court of Arbitration.

That will not work for China; however, for 3 reasons:

1. Particularly right now, Beijing likes to appear – to be on the right side of International Law

2. Duterte has already called their bluff and reported the Chinese have threatened war — if he insists on the legality of the ruling, making it look bad for Xi if he does attack some Philippine’s fishing and/or resource recovery ships — and lastly, the Chinese would like to make a deal with Duterte because they believe him so crazy, as to be beyond American influence.

This is a big tell by the way, Xi is not our friend over here in the good ole’ U.S. of A.

So Duterte, court ruling in pocket, is using it to exert powerful leverage over the Chinese negotiators meeting this month in Guiyang — something that must really irritate the ultra smooth and polished Xi, who must be wondering how this crazed motorcycle killer-local yokel got one up on him.

Posted in China, Rodrigo Duterte, Uncategorized | Leave a comment