‘Foreign hackers’ accessed Arizona, Illinois election databases – FBI

A secret FBI memo urged states to beef up the security of their voter databases, blaming unspecified “foreign hackers” for two intrusions earlier this summer. The revelation is prompting renewed calls for the federal protection of voting systems.
*

On August 18, the FBI’s Cyber Division sent out a warning bulletin, titled“Targeting Activity Against State Board of Election Systems,” confirming that the bureau had been investigating breaches of two state election systems, one of which resulted in “exfiltration” of voter registration data. The bulletin was labeled “NEED TO KNOW recipients,” but Yahoo news obtained a copy and reported on it Monday.

Though the FBI memo did not name the two states affected, “sources familiar with the document” told Yahoo News investigative reporter Michael Isikoff that the warning related to breaches of voter registration databases in Arizona and Illinois.

On June 30, The Arizona Republic reported that the FBI had shut down a portion of the state’s voter registration website after finding malicious software on it. The mid-July breach in Illinois appears to have been more serious, with hackers downloading personal data of up to 200,000 voters, according to Ken Menzel, the general counsel for the state’s Board of Elections.

The bulletin lists eight IP addresses from which the attacks supposedly originated and notes that one address was involved in both hacks.

“The FBI is requesting that states contact their Board of Elections and determine if any similar activity to their logs, both inbound and outbound, has been detected,” the bulletin reads, according to Yahoo.“Attempts should not be made to touch or ping the IP addresses directly.”

Yahoo showed the FBI bulletin to Richard Barger, executive at the Virginia-based cybersecurity firm ThreatConnect and one of the frequently cited sources blaming the hack of the Democratic National Committee on Russia. One of the IP addresses “has surfaced before in Russian criminal underground hacker forums,” Barger said.

“This is a big deal,” he added. “This certainly should be concerning to the common American voter.”

The FBI is emphatically not pointing any fingers at this point in time, however. The bulletin advises the states to “implement the principle of least privilege for database accounts” and ensure that “any given user should have access to only the bare minimum set of resources required to perform business tasks.”

Most US states use voting machines that scan paper ballots – which can be consulted in case of a discrepancy. Both Arizona and Illinois fall into this category. On the other hand, New Jersey, Delaware, South Carolina, Georgia and Louisiana were using only Direct-recording Electronic voting machines (DRE) without paper backup as of October 2015. Parts of Texas, Florida, Kentucky, Tennessee, Indiana, Virginia and Pennsylvania also use DREs without any paper ballots. If these machines were altered, there would be no way to verify the actual voting results.

After Wikileaks published the DNC emails in July, the Democrats’ leadership pointed the finger at Russia and accused Moscow of  with US elections on behalf of the Republican nominee Donald Trump.

In the wake of the scandal, a group of homeland security experts at the Aspen Institute called for the federal government to treat voting processes and results as critical infrastructure. Among the signatories were prominent Hillary Clinton supporters such as ex-CIA director Michael Morell, former New York police Commissioner William Bratton, and former Homeland Security Secretary Michael Chertoff.

Hacker demonstrates how voting machines can be compromised

Capture

Concerns are growing over the possibility of a rigged presidential election. Experts believe a cyberattack this year could be a reality, especially following last month’s hack of Democratic National Committee emails.

The ranking member of the Senate Homeland Security Committee sent a letter Monday to the Department of Homeland Security, saying in part: “Election security is critical, and a cyberattack by foreign actors on our elections systems could compromise the integrity of our voting process.”

Roughly 70 percent of states in the U.S. use some form of electronic voting. Hackers told CBS News that problems with electronic voting machines have been around for years. The machines and the software are old and antiquated. But now with millions heading to the polls in three months, security experts are sounding the alarm, reports CBS News correspondent Mireya Villarreal.

For weeks, Republican presidential nominee Donald Trump has told his supporters the outcome of the 2016 election could be out of his control.

“I’m afraid the election is going to be rigged, I have got to be honest,” Trump said to Ohio voters last week.

But for the hackers at Symantec Security Response, Election Day results could be manipulated by an affordable device you can find online.

“I can insert it, and then it resets the card, and now I’m able to vote again,” said Brian Varner, a principle researcher at Symantec, demonstrating the device.

The voter doesn’t even need to leave the booth to hack the machine.

“For $15 and in-depth knowledge of the card, you could hack the vote,” Varner said.

Symantec Security Response director Kevin Haley said elections can also be hacked by breaking into the machines after the votes are collected.

“The results go from that machine into a piece of electronics that takes it to the central counting place,” Haley said. “That data is not encrypted and that’s vulnerable for manipulation.”

“How big of a hacking potential problem is this?” Villarreal asked him.

“Well, there’s a huge potential,” Haley responded. “There are so many places in the voting process once it goes electronic that’s vulnerable.”

According to a report from the Brennan Center for Justice, one reason these voting systems are so vulnerable is their age.

“We found that more than 40 states are using voting machines there that are at least 10 years” old, Brennan Center for Justice researcher Christopher Famighetti said.

Denise Merrill, president of the National Association of Secretaries of State, said the lack of funding keeps most precincts from updating their systems. But all machines have to meet specific government standards.

“The idea of a national hack of some sort is almost ridiculous because there is no national system,” Merrill said.

In fact, the more than 9,000 voting districts across the country all have different ways of running their elections — down to the type of machine they use. But Merrill said there are checks in place to prevent fraud.

“Our voting systems are heavily regulated. They’re tested both before and after. There are paper trails everywhere…by in large, I would say the American election system works very well,” Merrill said.

CBS News learned that only 60 percent of states routinely conduct audits post-election by checking paper trails. But not all states even have paper records, like in some parts of swing states Virginia and Pennsylvania, which experts say could be devastating.

The Election Assistance Commission told CBS News that it ensures all voting systems are vigorously tested against security standards and that systems certified by the EAC are not connected to the Internet.

Muslim Brotherhood Scion Huma Abedin managed Clinton email address used for classified emails

Screen Shot 2016-08-11 at 10.45.11 AM

How is this not criminal? How is this not mishandling classified information — a crime?

is it any wonder Hillary had the Orlando jihad mass murderer at her rally yesterday?

Screen Shot 2016-08-11 at 10.47.03 AM

Screen Shot 2016-08-11 at 10.47.47 AM

Screen Shot 2016-08-11 at 10.48.26 AM

—Daughter of Saleha Mahmood Abedin, a pro-Sharia sociologist with ties to numerous Islamist organizations including the Muslim Brotherhood
—Longtime assistant to Hillary Clinton
—-Wife of former congressman Anthony Weiner
—Longtime former employee of the Institute of Muslim Minority Affairs, which shares the Muslim Brotherhood’s goal of establishing Islamic supremacy and Sharia Law worldwide

Discover the Networks:

Huma Abedin was born in 1976 in Kalamazoo, Michigan. Her father, Syed Abedin (1928-1993), was an Indian-born scholar who in the early 1970s had been affiliated with the Muslim Students Association at Western Michigan University.

Huma’s mother, Saleha Mahmood Abedin, is a sociologist known for her strong advocacy of Sharia Law. A member of the Muslim Sisterhood (i.e., the Muslim Brotherhood‘s division for women), Saleha is also a board member of the International Islamic Council for Dawa and Relief. This pro-Hamas entity is part of the Union of Good, which the U.S. government has formally designated as an international terrorist organization led by the Muslim Brotherhood luminary Yusuf al-Qaradawi.

When Huma was two, the Abedin family relocated from Michigan to Jeddah, Saudi Arabia. This move took place when Abdullah Omar Naseef, a major Muslim Brotherhood figure who served as vice president of Abdulaziz University (AU), recruited his former AU colleague, Syed Abedin, to work for the Institute of Muslim Minority Affairs (IMMA), a Saudi-based Islamic think tank that Naseef was preparing to launch. A number of years later, Naseef would develop close ties to Osama bin Laden and the terrorist group al Qaeda. Naseef also spent time (beginning in the early 1980s) as secretary-general of the Muslim World League, which, as journalist Andrew C. McCarthy points out, “has long been the Muslim Brotherhood’s principal vehicle for the international propagation of Islamic supremacist ideology.” IMMA’s close ties to the Muslim World League are further evidenced by the fact that IMMA’s in-house publication, the Journal of Muslim Minority Affairs (JMMA), has long listed its official address as 46 Goodge Street in London — precisely the same address as that of the Muslim World League’s London office.

It is vital to note that IMMA’s “Muslim Minority Affairs” agenda was, and remains to this day, a calculated foreign policy of the Saudi Ministry of Religious Affairs, designed, as Andrew C. McCarthy explains, “to grow an unassimilated, aggressive population of Islamic supremacists who will gradually but dramatically alter the character of the West.” For details about this agenda, click here.

At age 18, Huma Abedin returned to the U.S. to attend George Washington University. In 1996 she began working as an intern in the Bill Clinton White House, where she was assigned to then-First Lady Hillary Rodham Clinton. Abedin was eventually hired as an aide to Mrs. Clinton and has worked for her ever since, through Clinton’s successful Senate runs (in 2000 and 2006) and her failed presidential bid in 2008.

From 1997 until sometime before early 1999, Abedin, while still interning at the White House, was an executive board member of George Washington University‘s (GWU) Muslim Students Association (MSA), heading the organization’s “Social Committee.”

It is noteworthy that in 2001-02, soon after Abedin left that executive board, the chaplain and “spritual guide” of GWU’s MSA was Anwar al-Awlaki, the al Qaeda operative who ministered to some of the men who were among the 9/11 hijackers. Another chaplain at GWU’s MSA (from at least October 1999 through April 2002) was Mohamed Omeish, who headed the International Islamic Relief Organization, which has been tied to the funding of al Qaeda. Omeish’s brother, Esam, headed the Muslim American Society, the Muslim Brotherhood’s quasi-official branch in the United States. Both Omeish brothers were closely associated with Abdurahman Alamoudi, who would later be convicted and incarcerated on terrorism charges.

From 1996-2008, Abedin was employed by the Institute of Muslim Minority Affairs (IMMA) as the assistant editor of its aforementioned publication, the Journal of Muslim Minority Affairs (JMMA). At least the first seven of those years overlapped with the al Qaeda-affiliated Abdullah Omar Naseef’s active presence at IMMA. Abedin’s last six years at the Institute (2002-2008) were spent as a JMMA editorial board member; for one of those years, 2003, Naseef and Abedin served together on that board.

Throughout her years with IMMA, Abedin remained a close aide to Hillary Clinton. During Mrs. Clinton’s 2008 presidential primary campaign, a New York Observer profile of Abedin described her as “a trusted advisor to Mrs. Clinton, especially on issues pertaining to the Middle East, according to a number of Clinton associates.” “At meetings on the region,” continued the profile, “… Ms. Abedin’s perspective is always sought out.”

When Mrs. Clinton was appointed as President Barack Obama‘s Secretary of State in 2009, Abedin became her deputy chief of staff. At approximately that same point in time, Abedin’s name was removed from the Journal of Muslim Minority Affairs masthead.

Apart from their working relationship, Abedin and Mrs. Clinton have also developed a close personal bond over their years together, as reflected in Clinton’s 2010 assertion that: “I have one daughter. But if I had a second daughter, it would [be] Huma.” In 2011, Secretary Clinton paid a friendly visit to Abedin’s mother, Saleha, in Saudi Arabia. On that occasion, Mrs. Clinton publicly described her aide’s position as “very important and sensitive.”

On July 10, 2010, Huma Abedin, a practicing Muslim, married then-congressman Anthony Weiner in a ceremony officiated by former president Bill Clinton. A number of analysts have noted that it is extremely rare for Islamic women—particularly those whose families have ties to the Muslim Brotherhood—to marry non-Muslims like Weiner, who is Jewish. Indeed, Dr. Anwar Shoeb, the highest-ranking faculty authority at the prestigious College of Sharia and Islamic Studies in Kuwait, formally declared that Abedin’s marriage to Weiner was “null and void” under the dictates of Sharia Law, which explicitly forbids matrimony between a Muslim woman and an “infidel”; in fact, Shoeb classified the Abedin-Weiner union as a form of “adultery.”

Abedin went on maternity leave after giving birth to a baby boy in early December 2011. When she returned to work in June 2012, the State Department granted her an arrangement that allowed her to do earn outside income as a private consultant, even as she remained a top advisor in the Department. This arrangement was made possible when Mrs. Clinton personally signed off on documents—dated March 23, 2012—that changed Abedin’s title from “deputy chief off staff” to “special government employee.” Abedin’s outside clients included the U.S. State Department, Hillary Clinton, the Clinton Foundation, and Teneo (a New York-based global advisory firm co-founded by Doug Band, a former counselor for Bill Clinton).

Abedin did not disclose on her financial report either the special employment arrangement or the $135,000 she earned from it, in violation of a law mandating that public officials reveal significant sources of income. In fact, her title change did not become public knowledge until May 2013. Good-government groups warned of the potential conflict-of-interest inherent in an arangement where a government employee maintains private clients.

Documents obtained by Judicial Watch in a Freedom Of Information Act (FOIA) lawsuit showed that both before and after Mrs. Clinton signed off on the special employment deal for Abedin in March 2012, Abedin repeatedly—for months on end—dodged State Department requests that she disclose financial and employment information about her husband, Anthony Weiner, who had left Congress amid personal scandal in June 2011. For details about Abedin’s repeated failures to comply with those requests,click here.

In June 2012, five Republican lawmakers (most prominently, Michele Bachmann) sent letters to the inspectors general at the Departments of Homeland Security, Justice, and State, asking that they investigate whether the Muslim Brotherhood was gaining undue influence over U.S. government officials. One letter, noting that Huma Abedin’s position with Hillary Clinton “affords her routine access to the secretary [of state] and to policymaking,” expressed concern over the fact that Abedin “has three family members—her late father, mother and her brother—connected to Muslim Brotherhood operatives and/or organizations.” Some other prominent Republicans such as John McCain and John Boehner disavowed the concerns articulated in the letters.

On February 1, 2013—Hillary Clinton’s final day as Secretary of State—Abedin resigned her post as Mrs. Clinton’s deputy chief of staff. Yet she would continue to serve as a close aide to Clinton.

On March 1, 2013, Abedin was tapped to run Clinton’s post-State Department transition team, comprised of a six-person “transition office” located in Washington.

In early March 2015, it was reported that throughout her entire four-year tenure as Secretary of State (SOS), Hillary Clinton had never acquired or used a government email account, and instead had transmitted — in violation of government regulations — all of her official government correspondences via a personal email account that was housed on a private server. In addition, Abedin and Mrs. Clinton’s chief of staff, Cheryl Mills, also had email addresses on the secret server while employed at the State Department.

After Hillary Clinton announced in the spring of 2015 that she was running for president (2016), Abedin was named vice chair of the Clinton campaign.

Huma Abedin’s brother, Hassan Abedin, has ties to the Muslim Brotherhood and is currently an associate editor with the JMMA. Hassan was once a fellow at the Oxford Center for Islamic Studies, at a time when the Center’s board included such Brotherhood-affiliated figures as Yusuf al-Qaradawi and Abdullah Omar Naseef.

Huma’s sister, Heba Abedin (formerly known as “Heba A. Khaled”), is an assistant editor with JMMA, where she served alongside Huma prior to the latter’s departure.

– See more at: http://pamelageller.com/2016/08/muslim-brotherhood-scion-huma-abedin-managed-clinton-email-address-used-for-classified-emails.html/#sthash.r1jFNGjo.dpuf

 

Almost 50% of ISIS attacks on West successful in 2016 – US govt report

A US Homeland Security report says that Islamic State has been linked to about 100 plots against the West over the last two years. Alarmingly, the terrorist group is getting more effective, with 44 percent of the plots in 2016 successful.

*

The data compiled in the report showed that 41 of the 100 or so plots masterminded by Islamic State (IS, formerly ISIS/ISIL) took place on US soil. France was the only other country in double figures, with the terrorists undertaking 20 plots since 2014.

Both the first (in February, 2014) and 100th attack plots (on July 14, 2016) targeted the same location – the resort city of Nice in the south of France. The first one failed, but the 100th was notoriously successful.

*

“There are now more Sunni violent extremist groups, members, and safe havens than at any time in history… ISIL, including its eight established and several more emerging branches, has become the preeminent global terrorist threat…ISIL’s leaders are determined seek to strike the US homeland—beyond inspiring homegrown violent extremist attacks,” Director of National Intelligence James Clapper said in testimony before the Senate Armed Services Committee in February.

The attacks are also becoming deadlier. In 2015, a total of 720 people were injured or killed. However, this figure has already been surpassed this year, with 875 casualties so far. This also points to the fact that attacks by IS are becoming better planned.

The report shows that just under a third of attacks last year carried out by IS were successful. However, in 2016, this figure has risen to almost one in two, with 44 percent of the terror group’s assaults successful.

“There are now more Sunni violent extremist groups, members, and safe havens than at any time in history… ISIL, including its eight established and several more emerging branches, has become the preeminent global terrorist threat…ISIL’s leaders are determined seek to strike the US homeland—beyond inspiring homegrown violent extremist attacks,” Director of National Intelligence James Clapper said in testimony before the Senate Armed Services Committee in February.

The attacks are also becoming deadlier. In 2015, a total of 720 people were injured or killed. However, this figure has already been surpassed this year, with 875 casualties so far. This also points to the fact that attacks by IS are becoming better planned.

The report shows that just under a third of attacks last year carried out by IS were successful. However, in 2016, this figure has risen to almost one in two, with 44 percent of the terror group’s assaults successful.

CICIA Director John Brennan said in a testimony before the Senate Select Committee on Intelligence in June.

The Department of Homeland Security noted how successful IS has been in managing to recruit people by “crowd-sourcing” its terrorism agenda. The report states that the majority of the plots have been masterminded by individuals who were inspired by IS, rather than those who were actually members of the group.

“This year during Ramadan, ISIS urged supporters around the world to conduct attacks in their homelands, and followers appear to have responded, such as the gunman in the Orlando attack. In a separate instance, a man in France killed a police chief and his wife in their home, citing ISIS’s call for operations during the holy month,” the report stated.

Catching the terrorists is also proving to be difficult as they are using “end-to-end encrypted messaging applications and encryption software” to ensure that their communications are masked.

FBI Director James Comey has already mentioned that his agency is facing a growing number of terrorism cases in which communications devices belonging to suspects cannot be accessed.

VIRGINIA POLICE TRAIN FOR CIVIL UNREST, RACE RIOTS

http://up.anv.bz/latest/anvload.html?key=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

Screen Shot 2016-07-29 at 11.18.30 AM

Drills in response to recent violence across the country

Paul Joseph Watson – JULY 29, 2016

Citing rising “political and racial tensions” as well as recent violence across the country, Virginia police are training how to deal with civil unrest.

Video footage of the exercise shows officers in riot gear pushing back unruly demonstrators.

*
HPD corporal Wayne Westfall also cited the SpringFest disturbance of 2010, during which a block party turned into a riot, as another reason for the training.

“It happens all the time in our day and age. An ounce of preparation. It’s good to be prepared,” said officer Geoffrey Bechtel.

*
Cops in Virginia are by no means the only law enforcement outfit gearing up for potential domestic disorder. As we reported back in April, the Department of Homeland Security oversaw drills during which Texas police practiced conducting mass arrests.
Since the start of the year, police departments across the country have been buying riot gear in expectation of more Ferguson-style civil unrest sweeping the country.
Top insurer Lloyds also released a report that warned of a “pandemic” of global civil unrest that could go viral, while panicked elitists have been busy preparing for doomsday scenarios by purchasing luxury underground survival bunkers to protect them from the “general public.”

Screen Shot 2016-07-29 at 11.18.52 AM
Silicon Valley insiders are also buying large amounts of land so they can build secret compounds to seclude themselves away.

*
Millionaires have also been fleeing from major cities like Chicago due to concerns over racial tensions and rising crime rates, while the wealthy are also installing panic rooms in their big city apartments for the same reason.