Biden limits to 16 entities Putin cannot hack

 

Biden needed time to prepare his teleprompter to read his comments about the meeting with Putin. He managed to stumble through it. Who on his team of prompter writers decided to include Biden talking about the limit on what Putin could cyber attack? 16 entities? How about the whole of the USA? Then of course he repeats again how he is “told who he can call on for questions.” The so called “I’m going to get in trouble” default position “if I don’t do what I am told” must be really appealing to the male dominated  societies of the world with his lack of  machismo. Can you imagine Putin saying something like that? It may be appealing to those who have empathy toward senility but it doesn’t play well in the world. It sure looked to me that he had an ear piece as well with certain camera levels. 

President Biden told reporters Wednesday he gave President Vladimir Putin a list of 16 critical infrastructure entities that are “off limits” to a Russian cyberattack.

Those entities include energy, water, health care, emergency, chemical, nuclear, communications, government, defense, food, commercial facilities, IT, transportation, dams, manufacturing and financial services.

“We’ll find out whether we have a cybersecurity arrangement that begins to bring some order,” Biden said. Putin, for his part, denied any involvement in a recent spate of cyberattacks that have hit major industries across the U.S. 

“I looked at him. I said, ‘How would you feel if ransomware took on the pipelines from your oil fields?’ He said, ‘It would matter.’ This is not about just our self-interest.” the president said. 

Biden refused to say if military action was on the table if Russia was found to be responsible for a ransomware attack. 

“In terms of the red line you laid down is military response an option for a ransomware attack?” a reporter asked. 

 

Biden mocked for his ’embarrassing’ admission

A high point – No, actually no police officer was killed on January 6.

Another funny

That’s the best of the swamp today.

‘Your Papers Please’ – Mass Tracking starting in 15 Countries

COVI-PASS will determine whether you can go to a restaurant, if you need a medical test, or are due for a talking-to by authorities in a post-COVID world. Consent is voluntary, but enforcement will be compulsory.

The old slippery slope. What possibly could go wrong? Bill Gates has his dream come true.

A British cybersecurity company, in partnership with several tech firms, is rolling out the COVI-PASS in 15 countries across the world; a “digital health passport” that will contain your COVID-19 test history and other “relevant health information.” According to the company website, the passport’s objective is “to safely return to work” and resume “social interactions” by providing authorities with “up-to-date and authenticated health information.”

15 countries, including Italy, Portugal, France, Panama, India, the US, Canada, Sweden, Spain, South Africa, Mexico, United Arab Emirates and The Netherlands, the company reports. From  Healthcare in Europe

Papers Please – Done in 2009

These objectives mirror those that Bill Gates has been promoting since the start of the COVID-19 lockdown. In an essay written by Gates in April, the software geek-cum-philanthropist lays out his support for the draconian measures taken in response to the virus and, like an old-timey mob boss, suggests the solutions to this deliberately imposed problem.

Ironically, Gates begins to make his case for the adoption of mass tracking and surveillance technology in the U.S. by saying that “For now, the United States can follow Germany’s example”; He then touts the advantages of the “voluntary adoption of digital tools” so we can “remember where [we] have been” and can “choose to share it with whoever comes to interview you about your contacts.”

More at  Zero Hedge

Other than that a very good day in the swamp.

Clinton was scrubbing emails since she was first lady. Meet Laura Callahan & Project X

 

FBI found Hillary Clinton’s emails in Obama White House, former top official says.

We learn this at the very same time she wants Trump impeachment efforts to continue.

A former top FBI official said a repository of Hillary Clinton’s emails was obtained by the Obama White House

As part of a court-ordered discovery related to Clinton’s unauthorized email server, Bill Priestap was asked by conservative watchdog group Judicial Watch to identify representatives of Clinton, her State Department staff, and government agencies from which “email repositories were obtained” by the FBI.

He divulged a nonexhaustive list, which included the Executive Office of the President.“This astonishing confirmation, made under oath by the FBI, shows that the Obama FBI had to go to President Obama’s White House office to find emails that Hillary Clinton tried to destroy or hide from the American people,” Judicial Watch President Tom Fitton said in a statement. “No wonder Hillary Clinton has thus far skated — Barack Obama is implicated in her email scheme.”

Obama himself said he learned of Clinton’s private email server “the same time everybody else learned it through news reports,” during an interview with CBS News in 2015.

Read more

 

Now that Hillary Clinton has chosen to rise publicly to the Trump impeachment howl with her reciting chapter and verse the prescribed litany of Trump’s “offenses” I couldn’t resist looking back at her earliest days of criminality. That being the use of one Laura Callahan that was a provable crime. Had she been stopped then, we would have spared ourselves a whole lot of pain.

When I first ran into and wrote a post back in 2011 concerning Ms Callahan, it made absolutely no sense why Ms Callahan was hired to the second top position in security. A person who had lied about her resume that indicated her educational achievement was no more than back dated diplomas from a diploma mill.

Not only that, but even when it was discovered, she kept moving up the swamp governmental ladder. Then the ah-ha moment. Now we know why. I will include the old post in its entirety. Obama hires a security risk for sensitive post 2011. Hint: Ex-Clinton staffer ‘lost’ thousands of White House e-mails, booted by DHS for faking credentials. (Laugh line here!)

Hillary Was Burying Emails Since She Was First Lady…

Via NY Post:

May 29, 2016

While the State Department’s own internal probe found former Secretary Hillary Clinton violated federal record keeping laws, it’s not the first time she and her top aides shielded her e-mail from public disclosure while serving in a government position.

As first lady, Hillary was embroiled in another scheme to bury sensitive WhiteHouse e-mails, known internally as “Project X.”

In 1999, as investigators looked into Whitewater, Travelgate, Filegate and other scandals involving the then-first lady, it was discovered that more than 1 million subpoenaed e-mails were mysteriously “lost” due to a “glitch” in a West Wing computer server.

The massive hole in White House archives covered a critical two-year period — 1996 to 1998 — when Republicans and special prosecutor Ken Starr were subpoenaing White House e-mails.

Despite separate congressional investigations and a federal lawsuit over ProjectX, high-level e-mails dealing with several scandals were never turned over. And the full scope of Bill and Hillary Clintons’ culpability in the parade of scandals was never known.

During the Project X email scandal, career White House staffers and contractors found that someone close to the first lady had basically turned off the White House’s automated email archiving system. They fingered White House “special assistant” Laura Crabtree Callahan, who was overseeing the computer contractors

To those well-versed in Clinton shenanigans, this all sounds distressingly familiar.

Keep reading…

Obama hires a security risk for sensitive post


Laura Crabtree Callahan testifying before the House Government Reform Committee in the Project X White House e-mail scandal investigation.

So who is minding the store? Anyone wonder why Laura was chosen? Anyone care? If she can get hired, anyone can apparently.

The administration in May quietly hired Laura Callahan for a sensitive post at the U.S. Cyber Command, a newly created agency set up to harden military networks as part of an effort to prevent a “cyberspace version of Pearl Harbor.”   I ask why do we need a new Department?

Ex-Clinton staffer ‘lost’ thousands of White House e-mails, booted by DHS for faking credentials

Former co-workers say they’re shocked that Callahan passed a security background check and landed another sensitive post inside the federal government.

“She’s a security risk,” said a government computer specialist. “I don’t know how she got clearance.”

“We’re fuming about it,” said another federal employee. “Knowing her, I don’t see how she could ever be 100-percent honest.”

An elite team of computer technicians assembled by the Obama administration to protect Pentagon networks from cyberattack shockingly includes a former Clinton official who “lost” thousands of archived emails under subpoena and who more recently left the Department of Homeland Security under an ethical cloud related to her qualifications, WND has learned.

Investigators found that Callahan paid a diploma mill thousands of dollars for her bachelors, masters and doctorate degrees in computer science. She back-dated the degrees, all obtained between 2000 and 2001, to appear as if she earned them in 1993, 1995 and 2000, respectively. She landed the job of deputy DHS chief information officer in 2003.

The Defense Department last week revealed it recently suffered a massive cyberattack, even as it announced a new strategy to actively combat online threats to national security.

Read more: Look who Obama’s hired for cybersecurity team World Net Daily

Just that vast Right Wing conspiracy don’t you know.

 

Thanks to WhatFingerNews for the coverage! A great site for all the news.

 

 

Feds want to take over election process, Obama donor owns foreign election software

Who could have guessed that the feds would want to takeover our election process? Of course the using of a computerized system of voting is ripe for the picking. And who to be better pickers than dear old Uncle Sam. I give you a view examples before the story of what the feds have in their minds. Add the name Scytl, whose servers happen to be in Spain. Here are a couple of oldie posts.

Microsoft’s Allen , Foreign Scytl election software, and Obama -what could go wrong?

Foreign company owns U.S. election software-UPDATE

“Obama donor’s company funds controversial election firm” reads the headline. We now are turning over our election software to a foreign company that happens to support Obama.The Drudge Report yesterday ran a feature titled “Foreign company buys U.S. election results reporting firm.” The article documented that SCYTL, based in Barcelona, acquired 100 percent of SOE Software, the leading software provider of election management solutions in the United States. Drudge reports that the  best part is that the election results are redirected not to a USA server, but to a server overseas.

UPDATE:Save American Foundation:

SCYTL, the global leader in secure electronic voting technologies, announced today the acquisition of 100% of SOE Software, the leading software provider of election management solutions in the United States.

Why is a software company based in Barcelona Spain(SCYTL)  now in charge of counting our votes in the upcoming General Election on November 6th.  Did the Federal Elections Commission approve of this ?  (FEC) Did the Congress of the United States approve of this ? April 9, 2014

But I digressed:

Even before the FBI identified new cyber attacks on two separate state election boards, the Department of Homeland Security began considering declaring the election a “critical infrastructure,” giving it the same control over security it has over Wall Street and and the electric power grid.

Johnson also said that the big issue at hand is that there isn’t a central election system since the states run elections. “There’s no one federal election system. There are some 9,000 jurisdictions involved in the election process,” Johnson said.

“We should carefully consider whether our election system, our election process, is critical infrastructure like the financial sector, like the power grid,” Homeland Security Secretary Jeh Johnson said.

“There’s a vital national interest in our election process, so I do think we need to consider whether it should be considered by my department and others critical infrastructure,” he said at media conference earlier this month hosted by the Christian Science Monitor.

Washington Examiner

Clinton was scrubbing emails since she was first lady. Project X. Meet Laura Callahan

When an old post written back in 2011 starts to get attention, I had to ask why. When I wrote it, it made absolutely no sense as to why Ms Callahan was hired to the second top position in security. A person who had lied about her resume that indicated her educational achievement was no more than back dated diplomas from a diploma mill. Not only that, but even when it was discovered, she kept moving up the government ladder. So follow me down the rabbit hole. Now we know why. I will include the old post in its entirety. Obama hires a security risk for sensitive post 2011. Hint: Ex-Clinton staffer ‘lost’ thousands of White House e-mails, booted by DHS for faking credentials. (Laugh line here!)

New headline:

Hillary Was Burying Emails Since She Was First Lady…

Via NY Post:

While the State Department’s own internal probe found former Secretary Hillary Clinton violated federal record keeping laws, it’s not the first time she and her top aides shielded her e-mail from public disclosure while serving in a governmentposition.

As first lady, Hillary was embroiled in another scheme to bury sensitive WhiteHouse e-mails, known internally as “Project X.”

In 1999, as investigators looked into Whitewater, Travelgate, Filegate and otherscandals involving the then-first lady, it was discovered that more than 1 million subpoenaed e-mails were mysteriously “lost” due to a “glitch” in a West Wing computer server.

The massive hole in White House archives covered a critical two-year period — 1996 to 1998 — when Republicans and special prosecutor Ken Starr were subpoenaing White House e-mails.

Despite separate congressional investigations and a federal lawsuit over ProjectX, high-level e-mails dealing with several scandals were never turned over. And the full scope of Bill and Hillary Clintons’ culpability in the parade of scandals was never known.

To those well-versed in Clinton shenanigans, this all sounds distressingly familiar.

Keep reading…

Obama hires a security risk for sensitive post


Laura Crabtree Callahan testifying before the House Government Reform Committee in the Project X White House e-mail scandal investigation.

So who is minding the store? Anyone wonder why Laura was chosen? Anyone care? If she can get hired, anyone can apparently.

The administration in May quietly hired Laura Callahan for a sensitive post at the U.S. Cyber Command, a newly created agency set up to harden military networks as part of an effort to prevent a “cyberspace version of Pearl Harbor.” Matrix in our Comment section asks “how many more can we sustain”  I ask why do we need a new Department? http://en.wikipedia.org/wiki/Laura_Callahan has her infamous background that reads like a B movie.

Ex-Clinton staffer ‘lost’ thousands of White House e-mails, booted by DHS for faking credentials

Former co-workers say they’re shocked that Callahan passed a security background check and landed another sensitive post inside the federal government.

“She’s a security risk,” said a government computer specialist. “I don’t know how she got clearance.”

“We’re fuming about it,” said another federal employee. “Knowing her, I don’t see how she could ever be 100-percent honest.”

An elite team of computer technicians assembled by the Obama administration to protect Pentagon networks from cyberattack shockingly includes a former Clinton official who “lost” thousands of archived emails under subpoena and who more recently left the Department of Homeland Security under an ethical cloud related to her qualifications, WND has learned.

Investigators found that Callahan paid a diploma mill thousands of dollars for her bachelors, masters and doctorate degrees in computer science. She back-dated the degrees, all obtained between 2000 and 2001, to appear as if she earned them in 1993, 1995 and 2000, respectively. She landed the job of deputy DHS chief information officer in 2003.

The Defense Department last week revealed it recently suffered a massive cyberattack, even as it announced a new strategy to actively combat online threats to national security.

Read more: Look who Obama’s hired for cybersecurity team World Net Daily

WikiLeaks: Website for those who wish to leak secrets..

Shortly after getting WikiLeaks off the ground, Assange flew to Kenya to attend the World Social Forum — a yearly symposium dedicated to the redistribution of wealth and the eradication of capitalism — where he delivered a presentation about his new website. (Tempting for me to do my Kenyan-Obama rant but will spare my regulars!) Newbies- its here! Obama Kenya thingy story

Hacking remained an obsession for Assange throughout his late teens; the excitement he derived from it was only amplified by his knowledge that federal authorities were doggedly trying to catch him and his fellow “Subversives.” This self-dramatization continues today, as Assange constantly moves from place to place, maintaining no real home, because he fears that international governmental agencies, particularly those in the U.S., may have targeted him for reprisal for the leaks he has orchestrated.

At his final sentencing, the judge went easy on him: “There is just no evidence that there was anything other than sort of intelligent inquisitiveness and the pleasure of being able to—what’s the expression—surf through these various computers.” Thus Assange escaped with the lightest of penalties — the payment of a small fine.

Much more here at Front Page Mag

Update: Hot Air reports  Wikikileaks under attack and down . They are carrying great updates.

Here is a repost of our June 15:

For all those left wingers who would like to do us in by giving out government secrets, here is your chance–Take a look. Considering all of the radicals in the Whitehouse– with thousands having clearance to secrets, I guess we know the outcome. Love of country be damned.

There are two distinct ethical problems at play here. One is old: it requires you to define the public good before you determine what kinds of information should be made public. As the Economist recently noted, this is complicated by the fact that the leaker and his audience may not agree on the logical import of the leaked information. There are unintended consequences to transparency given that people have different interpretative frameworks and values for processing such information. An ethics of publishing that is blindly absolutist simply begs for all sorts of painful, unintended consequences .

Government Contractor Monitors U.S. Internet Providers, Worked With Wikileaks Informant

Form August 2

No surprise here, we figured it. But we can only hope a little sunshine on this activity might capture some attention. The problem with all of this, is the intention. That is the danger of this road we are on. Benevolent intentions easily become malevolent, depending on motivation of the “minder,” similar to the process of North Korea.

A semi-secret government contractor that calls itself Project Vigilant surfaced at the Defcon security conference Sunday with a series of revelations: that it monitors the traffic of 12 regional Internet service providers, hands much of that information to federal agencies, and encouraged one of its “volunteers,” researcher Adrian Lamo, to inform the federal government about the alleged source of a controversial video of civilian deaths in Iraq leaked to whistle-blower site Wikileaks in April.

Chet Uber, the director of Fort Pierce, Fl.-based Project Vigilant, says that he personally asked Lamo to meet with federal authorities to out the source of a video published by Wikileaks showing a U.S. Apache helicopter killing several civilians and two journalists in a suburb of Baghdad, a clip that Wikileaks labeled “Collateral Murder.” Lamo, who Uber said worked as an “adversary characterization” analyst for Project Vigilant, had struck up an online friendship with Bradley Manning, a former U.S. Army intelligence analyst who currently faces criminal charges for releasing the classified video.

Read more here at Forbes

Website for those who wish to leak secrets: Wikileaks

For all those left wingers who would like to do us in by giving out government secrets, here is your chance–I caught the topic on one of the talk radio programs. Take a look. Considering all of the radicals in the Whitehouse– with thousands having clearance to secrets, I guess we know the outcome. Love of country be damned. 

http://wikileaks.org/

We don’t know yet whether whistle-blowing Web operation Wikileaks has hundreds of thousands of classified U.S. State Department documents provided by U.S. Army Specialist Bradley Manning or whether it will publish them. But in the meantime Wikileaks’ Julian Assange is providing ammunition to those who believe that the fragile new world of cybersecurity demands a more flexible approach to the rules of engagement.

There are two distinct ethical problems at play here. One is old: it requires you to define the public good before you determine what kinds of information should be made public. As the Economist recently noted, this is complicated by the fact that the leaker and his audience may not agree on the logical import of the leaked information. There are unintended consequences to transparency given that people have different interpretative frameworks and values for processing such information. An ethics of publishing that is blindly absolutist simply begs for all sorts of painful, unintended consequences . Read More: http://www.forbes.com/2010/06/15/cyberwar-security-media-wikileaks-opinions-columnists-trevor-butterworth.html?boxes=techchanneltopstories