Dobbs, Fitton – Corruption Permeates FBI, DOJ – No Case Solved Since Fast and Furious

Screen Shot 2017-10-17 at 3.39.49 PM

By Rick Wells

Lou Dobbs points out that Fusion GPS, the opposition research and creative writing company that Democrats hired to do compile dirt on President Trump and which created the discredited Trump Russia dossier is fighting back against Congressional subpoenas.

Dobbs describes the lawyers representing the Fusion scumbags sarcastically as “noble” in their arguments that, “The House Intelligence Committee is acting in bad faith,” and threatening to “plead the Fifth Amendment and refuse to testify.”

Dobbs also references thirty documents related to the Bill ClintonLoretta Lynch tarmac meeting that the FBI had previously claimed didn’t exist but that a similar suit for information from the DOJ revealed, through their correspondence with the FBI, actually did exist.

He asks if perhaps Judicial Watch was being lied to when the FBI told them the documents didn’t exist earlier this year, and discusses that point and others with Judicial Watch President Tom Fitton. Fitton says he doesn’t think the changing story at the FBI was an oversight or an honest mistake, saying, “I think we caught them, we caught them red-handed, and now they’ve had to fess up to the documents.”

Dobbs says, “This sort of tell you what the problem is. The American people have a government that is corrupt. The American people have a government, and it’s not necessarily because someone takes money, although I’m sure there’s lots of that, but is so politicized it’s politically corrupt and ideologically corrupt.”

Dobbs asks when will the documents be forthcoming and “will there be words actually still on the pages when you get them?” Fitton replies, “Well, that’s the big question. The government says they need up until November 30th to turn the documents over to us.”

An outraged Lou Dobbs jumps in, “Thirty pages, they can’t read thirty pages in less than a month and a half.” Fitton takes a turn at the sarcasm saying that the new FBI Director, the good old boy who has been a Mueller – Comey crony for decades, Christopher Wray, “might want to ask questions about what went on here.”

He says, “The idea they didn’t know they had documents just strains credulity. And this is why Wray and Jeff Sessions, to the degree he’s not recused, because he may be recused from this, I don’t know, Rod Rosenstein, whoever the responsible official is needs to take a look at this.”

“This is a fundamental question, “says Fitton, “of whether we can trust our nation’s law enforcement agency, the FBI and the Justice Department, not to break the law and not to be dishonest.  We’re in the middle of a court case here and they tell us they don’t have documents.”

He says, “You know, what are we supposed to do, go to the court every time saying the FBI is lying? We’ve got to rely on the FBI and the Justice Department to tell us the truth from time to time.”

Dobbs asks why the “people should have any other belief about the FBI now than that’s where investigations go to die?” He says, “I can’t think of a major scandal that has been resolved by the investigation of the FBI, can you Tom?”

He continues, “I’m talking about going back to Fast and Furious, you name it, they never reach a conclusion. Benghazi, they never reach a conclusion, there’s never a report, this is something rancid and wrong at Justice.”

Fitton adds the IRS scandals to the list of unresolved claims and says, “Especially when the Justice Department or the FBI are implicated in the scandals, you’re never going to get the truth or it’s going to be difficult to do so

He cites an example, saying, “Just last week we’re asking for the Comey memos, we sued for the Comey memos that he supposedly wrote. The Justice Department came in and said  we can’t have one of them, any of it, because it would interfere with Mueller’s investigation.”

He adds, “So now this Justice Department is working with Mueller to keep information that Comey leaked to the New York Times away from the American people, unbelievable.

Dobbs gets the last word, noting, “And the Republican Senate leadership and the Republican House leadership haven’t got the guts to say ‘enough’ and end it now.”

One case they solved was Edward Snowden – likely because they feared he had the goods on them.


Citizens include Donald Trump and Alex Jones

| – JUNE 7, 2017

WASHINGTON, D.C. – The decision of a federal court to take the case of former contractor Dennis Montgomery advances the story reported in March that the National Security Agency illegally conducted surveillance of potentially millions of citizens for years, with a database that suggests both Donald J. Trump and Alex Jones were under unauthorized government monitoring.

On Tuesday, reported the federal district judge who has already ruled that some of the NSA’s data collection on American citizens violates the U.S. Constitution’s Fourth Amendment, agreeing to hear the case of Montgomery, a contract officer turned whistleblower who gave to the FBI 47 hard drives of highly classified documents. further reported on Tuesday that FBI agents interviewed Montgomery on video tape for several hours and collected the hard drives.

On May 4, 2017, also reported that the Obama administration, in President Obama’s final year in office, “significantly expanded efforts to search NSA intercepts for information about Americans, distributing thousands of intelligence reports across government with the redacted names of U.S. residents during the midst of a divisive 2016 presidential election.”

As reported in March, Montgomery first turned over files from the 47 hard drives in 2013, to Sheriff Arpaio in Maricopa Co., Ariz., who at that time was conducting a cold case posse investigation into the authenticity of the computer birth certificate Barack Obama made public on April 11, 2011.

Michael Zullo, formerly the commander and chief investigator of the Cold Case Posse (CCP), a special investigative group created in 2006 in the office of Joseph M. Arpaio, formerly the sheriff in Maricopa Co., an Arizona State Certified Law Enforcement Agency, headquartered in Phoenix, Ariz., provided the database to

The electronic surveillance database, provided to Zullo by Montgomery in 2013, was apparently created by the NSA as part of the NSA’s illegal and unconstitutional Project Dragnet electronic surveillance of U.S. citizens, first revealed by news reports published in 2005, as further documented by the revelations of whistleblower Edward Snowden in 2013.

Sheriff Arpaio and Chief Investigator Zullo confirmed to that there were in the Montgomery NSA database dozens of entries at various addresses, that included Trump Tower in New York City and Mar-a-Lago in Palm Beach, Florida.

These records suggest Donald Trump was apparently under NSA electronic surveillance from 2004, during President George W. Bush’s term of office, through 2009, the first year of President Obama’s presidency.

After additional search of the Montgomery files, Zullo also confirmed that Alex Jones had been under NSA surveillance during the same years.

At issue is whether former FBI James Comey lied to Congress when he testified under oath to the House Intelligence Committee on March 20, 2017, that after an exhaustive investigation, he could find no records to indicate the Obama administration had placed Donald Trump under NSA electronic surveillance.

While Montgomery’s credibility has been called into question, Zullo maintained to that the amount of information provided by Montgomery related to Operation Dragnet was extraordinarily voluminous and that Montgomery had shared information with investigators in 2013 that will be the subject of his forthcoming federal district court case.

Trump: Surveillance & unmasking under Obama administration is ‘big story’

Donald Trump says the “unmasking and surveillance” of people under the Obama administration is “the big story,” just one day after subpoenas were issued over the naming of Trump campaign officials in classified reports while Obama was still in office.


“The big story is the ‘unmasking and surveillance’ of people that took place during the Obama Administration,” US President Trump tweeted on Thursday.

Screen Shot 2017-06-01 at 3.24.13 PM

It comes just one day after the House Intelligence Committee issued three subpoenas which seek information about how and why the names of Trump associates were revealed and distributed within classified reports by Obama administration officials during the transition period after the election – a process known as “unmasking.”


The three subpoenas – issued to the CIA, FBI, and National Security Agency (NSA) – explicitly name three top Obama-era officials: Susan Rice, who served as White House national security advisor, former CIA Director John Brennan, and former UN ambassador Samantha Power.

The subpoenas ask the agencies to provide details of any requests made by the three individuals to “unmask” the names of Trump’s associates, congressional sources told Reuters on Wednesday.

The names of US citizens who are caught up in incidental surveillance are protected by law. Very few exceptions are made to unmask them, even within classified material.

Meanwhile, the “surveillance” referred to in Trump’s tweet likely refers to the president’s claims that Obama wiretapped Trump Tower during the 2016 presidential campaign, and the revelations by NSA contractor-turned-whistleblower Edward Snowden in 2013, which revealed the agency’s widespread surveillance techniques.

Four additional subpoenas were issued on Wednesday, relating to alleged Russian meddling in the presidential election. The requests were issued to former National Security Advisor Michael Flynn, Trump’s personal lawyer Michael Cohen, and the law firm Michael D. Cohen & Associates PC, according to Representatives Mike Conaway (R-Texas) and Adam Schiff (D-California).

WannaCry XXL? 2nd even bigger global cyber attack already underway

As the world reels from the WannaCry ransomware attack, it’s now emerged that a second, potentially larger attack, is already under way. It seems the widespread proliferation of military-grade cyberweapons has ushered in a new era of digital crime.


Cyber bandits have again deployed both the EternalBlue and DoublePulsar exploits developed and used by the NSA which were released by the ShadowBrokers hackers back in April.

“Initial statistics suggest that this attack may be larger in scale than WannaCry, affecting hundreds of thousands of PCs and servers worldwide: because this attack shuts down SMB networking to prevent further infections with other malware (including the WannaCry worm) via that same vulnerability, it may have in fact limited the spread of last week’s WannaCry infection,” wrote a security researcher who goes by the alias Kafeine at cybersecurity company Proofpoint.

This latest attack uses the two exploits to install the cryptocurrency miner Adylkuzz over corporate Local Area and wireless networks but, rather curiously, may actually have helped slow the spread of WannaCry.

READ MORE: Ransomware virus plagues 100k computers across 99 countries

However, in an apparent case of “picking your poison,” the Adylkuzz miner dramatically slows PC and server performance as it extracts cryptocurrency but it does not lock users out of their machines and data, as WannaCry did.

Screen Shot 2017-05-17 at 7.18.43 PM

Researchers at Proofpoint estimate that the Adylkuzz attack may have begun as early as April 24 but was subsequently overshadowed in the hysteria that followed the WannaCry ransomware attacks.

The attack is launched from multiple virtual private servers which scour the internet for vulnerabilities to install the Adylkuzz miner.

The malware infection occurs as follows:

The EternalBlue exploit opens the door for infection with DoublePulsar on a target machine. DoublePulsar then downloads and runs Adylkuzz on the computer.

Adylkuzz then stops any preexisting versions of itself on a target machine, while also blocking SMB network communications with other machines to prevent any further malware infections from disrupting its operations. It initially prevents cybersecurity professionals from identifying that there is a problem.

Once the door has been held open and detection risks have been minimized, Adylkuzz then downloads mining instructions, the cryptocurrency miner itself and a variety of cleanup tools to mask its activities.

Screen Shot 2017-05-17 at 7.19.53 PM

While the term cryptocurrency is typically associated with Bitcoin, Adylkuzz actually mines Monero, a similar but more heavily encrypted digital currency. Monero recently saw a significant uptick in usage after it was adopted in the AlphaBay market on the Dark Web.

Screen Shot 2017-05-17 at 7.20.49 PM

As with other cryptocurrencies, Monero expands in market cap through self-proliferation via digital mining. One monero is roughly equivalent to $27 at current exchange rates.

During its research, Proofpoint identified three addresses which had already generated $7,000, $14,000 and $22,000 respectively, before being shut down.

To cover their tracks, whoever is behind the attack regularly changes the online payment address to avoid attracting too much attention.

As in the case of the WannaCry attack, hackers have leveraged the NSA’s weaponized exploits of legacy Microsoft operating systems to infect hundreds of thousands of machines worldwide with malware. Since the Shadow Brokers’ leak of these NSA exploits there have been two high profile attacks with many more expected in the future.

CIA is world’s most dangerously incompetent spy agency – Assange

WikiLeaks founder Julian Assange has described the CIA as “dangerously incompetent,” in response to the US agency branding him a “friend of terrorists.” The war of words started after RT asked the CIA to comment on reports of its hacking exploits.


“Dictators and terrorists have no better friend in the world than Julian Assange, as theirs is the only privacy he protects,” CIA spokesperson Heather Fritz Horniak told RT in an email.


The scathing response came after RT asked the CIA to comment on the assessment of former agency analyst Ray McGovern. He suggested that the capability to falsify digital fingerprints, exposed by WikiLeaks as part of its ongoing Vault 7 disclosure, cast doubt on allegations against Russia in connection with the 2016 US presidential election.

READ MORE: #Vault7: How CIA steals hacking fingerprints from Russia & others to cover its tracks

“Could it be that the ‘Russian hack’ was really done by John Brennan of the CIA? If I were asked to bet on that, then I would bet that that was exactly the case,” McGovern told RT’s Going Underground program.

“What does that mean? It means that these trumped-up charges against Trump, pardon the pun, are baseless,” McGovern added.

Brennan’s successor as CIA director, Mike Pompeo, sparked concerns in April when he suggested that WikiLeaks, which he described as “a non-state hostile intelligence service,” could be prosecuted for the publication of confidential US documents. He also attacked Assange and his associates, branding them “demons.”

Critics said Pompeo was setting a dangerous precedent, which exposed any media outlet reporting on leaks or the accounts of whistleblowers. They also criticized his comment that Assange “has no First Amendment freedoms.”

READ MORE: WikiLeaks ‘hostile intel,’ Assange & his followers ‘demons’: CIA chief goes ballistic

When asked for comment, Assange reiterated his earlier criticism of the US intelligence agency.


“The CIA is the world’s most dangerously incompetent spy agency. It has armed terrorists, destroyed democracies and installed and maintained dictatorships the world over,” he said in an email. “There are good men and women at the CIA but if our publications are any guide they work for WikiLeaks.”

CIA spokesperson Horniak also lashed out at RT for questioning the allegations of Russia’s interference in the US election.

“The responsibility of the Russian intelligence services for the election-related hacking is an established fact, but it is not surprising that an identified propaganda outlet like RT would attempt to muddle those facts. No reputable news organization doubts Russian culpability,” Horniak claimed.

In response, RT’s editor-in-chief, Margarita Simonyan, said that such unquestioning obedience by the western mainstream media to the US establishment only leads to a decline in their popularity.

“The CIA & Co haven’t bothered to present a shred of evidence besides their own claims, and are now actually boasting about how happy the ever-loyal press is to unquestioningly go along with the story,” Simonyan said, adding, “This is exactly why people have stopped trusting the mainstream media and are seeking out alternative sources of news and analysis.”

So far, no definitive evidence of the alleged hacking has been made public. A declassified report by the US intelligence community didn’t state that such hacking took place, but rather said the agencies had “confidence” that it did.

The full episode of Going Underground featuring McGovern will be aired on Wednesday at 6pm Moscow time (15:00 GMT).


Screenshot 2017-04-24 18.12.54

By Ryan Gallagher

TO RESIDENTS OF MARYLAND, catching an occasional glimpse of a huge white blimp floating in the sky is not unusual. For more than a decade, the military has used the state as a proving ground for new airships destined for Afghanistan or Iraq. But less known is that the test flights have sometimes served a more secretive purpose involving National Security Agency surveillance.

Back in 2004, a division of the NSA called the National Tactical Integration Office fitted a 62-foot diameter airship called the Hover Hammer with an eavesdropping device, according to a classified document published Monday by The Intercept. The agency launched the three-engined airship at an airfield near Solomons Island, Maryland. And from there, the blimp was able to vacuum up “international shipping data emanating from the Long Island, New York area,” the document says. The spy equipment on the airship was called Digital Receiver Technology – a proprietary system manufactured by a Maryland-based company of the same name – which can intercept wireless communications, including cellphone calls.

With the exception of a few military websites that refer to the Hover Hammer as an “antenna mounting platform,” there is little information in the public domain about it. The classified NSA document describes the airship as a “helium-filled sphere inside another sphere, constructed of Spectra, the same material used to make bullet-proof vests. … It ‘hovers’ above small arms fire, has a negligible [infrared] signature, and radar can’t detect it.” The agency added in the document that it planned to conduct more tests with the Hover Hammer, and said it wanted to develop a larger version of blimp that would be capable of flying at altitudes of 68,000 feet for up to six months at a time. “More experiments, including the use of onboard imagery sensors, are being conducted,” it said.

The NSA declined to comment for this story.

In recent years, airships – or aerostats, as they are formally called – have been a source of major military investment. Between 2006 and 2015, the U.S. Army paid Raytheon some $1.8 billion to develop a massive missile-defense blimp called the JLENS, which is equipped with powerful radar that can scan in any direction 310 miles. (That’s almost the entire length of New York state.) In October 2015, the JLENS attracted national attention after one became untethered amid testing and drifted north from Maryland to Pennsylvania before it was brought back under control. In 2010, the Army commissioned another three airships – called Long Endurance Multi-Intelligence Vehicles – as part of a $517 million contract with Northrop Grumman. The company stated that the airships would “shape the future” of the military’s intelligence-gathering capabilities and provide a “persistent unblinking stare” from the sky.

Unsurprisingly, privacy groups have expressed concerns about the prospect of the blimps being used domestically to spy on Americans. However, military officials have often been quick to dismiss such fears. In August 2015, Lt. Shane Glass told Baltimore broadcaster WBAL that the JLENS blimps being tested in Maryland were not equipped with cameras or eavesdropping devices. “There are no cameras on the system, and we are not capable of tracking any individuals,” Glass stated. The same cannot be said, it seems, of the NSA’s Hover Hammer.



By Sam Biddle

The ShadowBrokers, an entity previously confirmed by The Intercept to have leaked authentic malware used by the NSA to attack computers around the world, today released another cache of what appears to be extremely potent (and previously unknown) software capable of breaking into systems running Windows. The software could give nearly anyone with sufficient technical knowledge the ability to wreak havoc on millions of Microsoft users.

The leak includes a litany of typically codenamed software “implants” with names like ODDJOB, ZIPPYBEER, and ESTEEMAUDIT, capable of breaking into — and in some cases seizing control of — computers running version of the Windows operating system earlier than the most recent Windows 10. The vulnerable Windows versions ran more than 65 percent of desktop computers surfing the web last month, according to estimates from the tracking firm Net Market Share.

The crown jewel of the implant collection appears to be a program named FUZZBUNCH, which essentially automates the deployment of NSA malware, and would allow a member of agency’s Tailored Access Operations group to more easily infect a target from their desk.

via Matthew Hickey

According to security researcher and hacker Matthew Hickey, co-founder of Hacker House, the significance of what’s now publicly available, including “zero day” attacks on previously undisclosed vulnerabilities, cannot be overstated: “I don’t think I have ever seen so much exploits and 0day [exploits] released at one time in my entire life,” he told The Intercept via Twitter DM, “and I have been involved in computer hacking and security for 20 years.” Affected computers will remain vulnerable until Microsoft releases patches for the zero-day vulnerabilities and, more crucially, until their owners then apply those patches.

“This is as big as it gets,” Hickey said. “Nation-state attack tools are now in the hands of anyone who cares to download them…it’s literally a cyberweapon for hacking into computers…people will be using these attacks for years to come.”

Hickey provided The Intercept with a video of FUZZBUNCH being used to compromise a virtual computer running Windows Server 2008an industry survey from 2016 cited this operating system as the most widely used of its kind.

Susan Hennessey, an editor at Lawfare and former NSA attorney, wrote on Twitter that the leak will cause “immense harm to both U.S. intel interests and public security simultaneously.”

A Microsoft spokesperson told The Intercept “We are reviewing the report and will take the necessary actions to protect our customers.” We asked Microsoft if the NSA at any point offered to provide information that would help protect Windows users from these attacks, given that the leak has been threatened since August 2016, to which they replied “our focus at this time is reviewing the current report.” The company later clarified that “At this time, other than reporters, no individual or organization has contacted us in relation to the materials released by Shadow Brokers.”

Update: April 14th, 2017, 7:20 p.m.

This post has been updated with an additional comment from Microsoft.