Tuesday, May 28, 2013

DC Scandals de jour - Benghazi - Gate , IRS - Gate and SPY - Gate ........ and the Present " non scandal " outrage which should be on everyone's radar - how did China hack basically everything to wanted and what the heck are we doing about it ?

Scandal Watch.....

Benghazi.....

http://thehill.com/homenews/house/302153-issa-subpoenas-state-dept-documents


Issa subpoenas State Dept. documents on Benghazi talking points


By Molly K. Hooper 05/28/13 01:23 PM ET


House Oversight Committee Chairman Darrell Issa (R-Calif.) has subpoenaed State Department documents related to the Benghazi talking points, according to a letter sent to Secretary of State John Kerry obtained by The Hill.

In the letter, Issa states that the department's release of 100 emails earlier this month was "incomplete." Issa demands that Kerry produce "relevant documents through subpoena. The enclosed subpoena covers documents and the communications related to talking points prepared for members of the House Permanent Select Committee on Intelligence and used by Ambassador Susan Rice during her September 16th, 2012, appearances on CBS, NBC, ABC, Fox, and CNN."
Issa said that the documents released on May 20 did not answer "critical" questions posed by the committee as it investigates what happened during the attack on the U.S. consulate in Benghazi, Libya, and the aftermath of that terror attack that killed former U.S. Ambassador to Libya Chris Stephens and three other Americans.
More than one week after the attack, Rice took to the airwaves to blame the attack on a protest over an anti-Islam video, denying that it had anything to do with terrorism, despite the CIA's belief that the attack was caused by terrorists.
Issa wants details of emails between key State Department officials, including then-Secretary of State Hillary Clinton's chief of staff, Cheryl Mills, Deputy Secretary of State William Burns, Deputy Assistant Secretary Philippe Reines and then-State Department spokeswoman Victoria Nuland, among others.
The subpoena compels the State Department to produce the documents by June 7.


IRS Gate....

http://dailycaller.com/2013/05/27/washington-launches-four-different-investigations-into-irs-scandal/


Washington launches four different investigations into IRS scandal


Capitol Hill aides spent their Memorial Day weekend scanning hundreds of pages of documents related to the IRS scandal in order to prepare their bosses for what will inevitably be a frantic month of June involving multiple simultaneous investigations into government wrongdoing. By the time lawmakers return to session next week, at least four different investigations will be underway.
As The Daily Caller has reported, at least five different IRS offices including Cincinnati, Ohio; Baltimore, Maryland; Chicago, Illinois and El Monte and Laguna Niguel, California improperly targeted conservative nonprofit groups for extra scrutiny between 2010 and 2012.
The IRS’ shenanigans, chronicled in a damning report by Treasury Inspector General J. Russell George, started when a “team of [IRS] specialists” came together in April 2010 to process the tax-exempt nonprofit status of conservative groups that might be “potential political operations” (page 13 of the IG report). The IRS added “additional specialists” to this effort in December 2011.
The IRS also launched audits of existing conservative nonprofit groups including the Virginia-based Leadership Institute, demanding to see training materials and personal information about the organization’s 2008 college interns.
So for those of you keeping score at home (this reporter is still waiting for Ken Starr to send in his bracket picks) The Daily Caller presents a list of some of our favorite investigations into potential IRS wrongdoing. Which one will come up with the “Alexander Butterfield” quote?
1. The House Ways and Means Committee – Oversight Subcommittee
As head of the House Ways and Means Oversight Subcommittee, Republican Louisiana Rep. Charles Boustany has conducted the toughest probe into the IRS scandal so far. Boustany managed to acquire “all communications containing the word ‘tea party,’ ‘patriot,’ or ‘conservative,’” from recently-resigned IRS acting director Steven T. Miller. He also got the names of everyone involved with the improper targeting.
Republican Ways and Means chairman Rep. Dave Camp of Michigan also raised awareness of the issue by reaching out to the public, asking Americans to write in with their own stories of IRS harassment.
“Your story is critical to moving the investigation forward,” according to a form created on the Ways and Means’ Committee’s website asking for users’ stories, which also includes a two-year timeline of the scandal beginning in August 2010.
Boustany was in prime position to jump on the IRS scandal. Back in September, long before the current scandal, his subcommittee grilled Steven T. Miller with concerns about the IRS’ implementation of Obamacare.
2. The House Oversight Committee
Respected Republican Oversight chairman Rep. Darrell Issa of California recently smacked down Republican South Carolina Sen. Lindsey Graham’s call for the appointment of a special prosecutor into the IRS scandal, declaring, “When I can’t do my job because I lack the authority or cooperation, I’ll seek additional remedies.”
Issa has been competitive about investigating the IRS scandal. He has said that he is working on the IRS scandal full-time, and he refuses to dismiss the possibility of Treasury Department or even White House involvement.

As the scandal works its way up from the Steven T. Millers of the world, watch for Issa to take the investigative lead.
3. Senate Finance Committee
Democratic Senate Finance Committee chairman Max Baucus is leading that committee’s investigation into the improper targeting. Baucus called the IRS’ conduct “intolerable” and “a clear breach of the public’s trust” and demanded a full investigation, and in so doing he has become the most visible leader of the investigation to the mainstream media.
Unfortunately, Baucus has substantial baggage. As The Daily Caller reported, Baucus sent a letter to then-IRS commissioner Donald Shulman in September 2010 urging the IRS to scrutinize the tax-exempt status of nonprofit conservative groups like Americans For Job Security.


4. The IRS 




New IRS commissioner Danny Werfel has pledged to conduct a full investigation into the IRS scandal “to make sure it doesn’t happen again.
Werfel, who was described as the Obama administration’s “point man” on sequestration prior to taking over the IRS job, is of no relation to former University of Florida quarterback Danny Wuerffel.



Spy Gate - Journalists....

http://www.zerohedge.com/news/2013-05-28/eric-holder-under-investigation-house-judiciary-committee-lying-under-oath

Eric Holder Under Investigation By House Judiciary Committee For Lying Under Oath

Tyler Durden's picture




With the euphoric market once again serving as a much needed distraction from far bigger geopolitical issues, many have forgotten the plethora of scandals the Obama administration has recently found itself engulfed in. This may change shortly, following news that the head of the US Department of Justice, Eric Holder himself, is now being investigated for lying under oath. Will he too receive an extended absence of leave (with pay) after pleading the fifth, or will the circle of lies slowly but surely start to unwind? Of course, in the New Normal it is probably not only expected, but given, that the chief legal enforcer is just a little more equal when it comes to the same justice he is tasked to enforce.
From The Hill:
The House Judiciary Committee is investigating whether Attorney General Eric Holder lied under oath during his May 15 testimony on the Justice Department’s (DOJ) surveillance of reporters, an aide close to the matter told The Hill.

The panel is looking at a statement Holder made during a back and forth with Rep. Hank Johnson (D-Ga.) about whether the DOJ could prosecute reporters under the Espionage Act of 1917.

“In regard to potential prosecution of the press for the disclosure of material - this is not something I’ve ever been involved in, heard of, or would think would be wise policy,” Holder said during the hearing.

However, NBC News reported last week that Holder personally approved a search warrant that labeled Fox News chief Washington correspondent James Rosen a co-conspirator in a national security leaks case.

The panel is investigating whether NBC’s report contradicts Holder’s claim that he had not looked into or been involved with a possible prosecution of the press in a leaks case.
Alternatively, for the ADHD-challenged, here is the above in animated gif format (courtesy ofDirector Blue)



REPORT: HOLDER WENT JUDGE SHOPPING TO OBTAIN FOX NEWS SUBPOENA

 1709
 10
 1717
 

Print ArticleSend a Tip

The New Yorker's Ryan Lizza, a bulldog on the DOJ/Fox News secret subpoena story, reports that the effort by the Justice Department to obtain the controversial court order was arduous, contentious and unsuccessful until finally a third judge acquiesced

The new documents show that two judges separately declared that the Justice Department was required to notify Rosen of the search warrant, even if the notification came after a delay. Otherwise: “The subscriber therefore will never know, by being provided a copy of the warrant, for example, that the government secured a warrant and searched the contents of her e-mail account,” Judge John M. Facciola wrote in an opinion rejecting the Obama Administration’s argument.
Machen appealed that decision, and in September, 2010, Royce C. Lamberth, the chief judge in the Federal District Court for the District of Columbia, granted Machen’s request to overturn the order of the two judges.
Lizza goes on to explain that Holder's Justice Department argued to the court that reporter James Rosen was a co-conspirator in a conspiracy to commit espionage and lists the detailed information they wished to explore: 
—“Records or information related to Stephen Kim’s or the Author’s knowledge of laws, regulations, rules and/or procedures prohibiting the unauthorized disclosure of national defense or classified information.”
—“Any classified document, image, record, or information, and any communications concerning such documents, images, records, or information.”
—“Any document, image, record, or information concerning the national defense, including but not limited to documents, maps, plans, diagrams, guides, manuals, and other Department of Defense, U.S. military, and/or weapons material, as well as sources and methods of intelligence gathering, and any communications concerning such documents, images, records, or information.”
—“Records or information related to the state of mind of any individuals seeking the disclosure or receipt of classified, intelligence and/or national defense information.”
The revelation that two courts denied the secret subpoena before Lamberth finally agreed will damage the narrative that there was nothing extraordinary or out-of-bounds about Holder's attempt to delve into the private communications of Rosen and his employer. 
Read the entire story here



WHERE IS THE  OUTRAGE REGARDING CHINA's SPIES EATING OUR LUNCH ? 

http://www.washingtonpost.com/world/national-security/confidential-report-lists-us-weapons-system-designs-compromised-by-chinese-cyberspies/2013/05/27/a42c3e1c-c2dd-11e2-8c3b-0b5e9247e8ca_story.html?hpid=z1

Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies

Designs for many of the nation’s most sensitive advanced weapons systems have been compromised by Chinese hackers, according to a report prepared for the Pentagon and to officials from government and the defense industry.
Among more than two dozen major weapons systems whose designs were breached were programs critical to U.S. missile defenses and combat aircraft and ships, according to a previously undisclosed section of a confidential report prepared for Pentagon leaders by the Defense Science Board.
Experts warn that the electronic intrusions gave China access to advanced technology that could accelerate the development of its weapons systems and weaken the U.S. military advantage in a future conflict.
The Defense Science Board, a senior advisory group made up of government and civilian experts, did not accuse the Chinese of stealing the designs. But senior military and industry officials with knowledge of the breaches said the vast majority were part of a widening Chinese campaign of espionage against U.S. defense contractors and government agencies.
The significance and extent of the targets help explain why the Obama administration has escalated its warnings to the Chinese government to stop what Washington sees as rampant cyber­theft.
In January, the advisory panel warned in the public version of its report that the Pentagon is unprepared to counter a full-scale cyber-conflict. The list of compromised weapons designs is contained in a confidential version, and it was provided to The Washington Post.
Some of the weapons form the backbone of the Pentagon’s regional missile defense for Asia, Europe and the Persian Gulf. The designs included those for the advanced Patriot missile system, known as PAC-3; an Army system for shooting down ballistic missiles, known as the Terminal High Altitude Area Defense, or THAAD; and the Navy’s Aegis ballistic-missile defense system.
Also identified in the report are vital combat aircraft and ships, including the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the Navy’s new Littoral Combat Ship, which is designed to patrol waters close to shore.
Also on the list is the most expensive weapons system ever built — the F-35 Joint Strike Fighter, which is on track to cost about $1.4 trillion. The 2007 hack of that project was reported previously.
China, which is pursuing a comprehensive long-term strategy to modernize its military, is investing in ways to overcome the U.S. military advantage — and cyber-espionage is seen as a key tool in that effort, the Pentagon noted this month in a report to Congress on China. For the first time, the Pentagon specifically named the Chinese government and military as the culprit behind intrusions into government and other computer systems.
As the threat from Chinese cyber-espionage has grown, the administration has become more public with its concerns. In a speech in March, Thomas Donilon, the national security adviser to President Obama, urged China to control its cyber-activity. In its public criticism, the administration has avoided identifying the specific targets of hacking.
But U.S. officials said several examples were raised privately with senior Chinese government representatives in a four-hour meeting a year ago. The officials, who spoke on the condition of anonymity to describe a closed meeting, said senior U.S. defense and diplomatic officials presented the Chinese with case studies detailing the evidence of major intrusions into U.S. companies, including defense contractors.
In addition, a recent classified National Intelligence Estimate on economic cyber-espionage concluded that China was by far the most active country in stealing intellectual property from U.S. companies.
The Chinese government insists that it does not conduct ­cyber-
espionage on U.S. agencies or companies, and government spokesmen often complain that Beijing is a victim of U.S. cyberattacks.
Obama is expected to raise the issue when he meets with Chinese President Xi Jinping next month in California.
A spokesman for the Pentagon declined to discuss the list from the science board’s report. But the spokesman, who was not authorized to speak on the record, said in an e-mail, “The Department of Defense has growing concerns about the global threat to economic and national security from persistent cyber-intrusions aimed at the theft of intellectual property, trade secrets and commercial data, which threatens the competitive edge of U.S. businesses like those in the Defense Industrial Base.”
The confidential list of compromised weapons system designs and technologies represents the clearest look at what the Chinese are suspected of targeting. When the list was read to independent defense experts, they said they were shocked by the extent of the cyber-espionage and the potential for compromising U.S. defenses.
“That’s staggering,” said Mark Stokes, executive director of the Project 2049 Institute, a think tank that focuses on Asia security issues. “These are all very critical weapons systems, critical to our national security. When I hear this in totality, it’s breathtaking.”
The experts said the cybertheft creates three major problems. First, access to advanced U.S. designs gives China an immediate operational edge that could be exploited in a conflict. Second, it accelerates China’s acquisition of advanced military technology and saves billions in development costs. And third, the U.S. designs can be used to benefit China’s own defense industry. There are long-standing suspicions that China’s theft of designs for the F-35 fighter allowed Beijing to develop its version much faster.
“You’ve seen significant improvements in Chinese military capabilities through their willingness to spend, their acquisitions of advanced Russian weapons, and from their cyber-espionage campaign,” said James A. Lewis, a cyber-policy expert at the Center for Strategic and International Studies. “Ten years ago, I used to call the PLA [People’s Liberation Army] the world’s largest open-air military museum. I can’t say that now.”
The public version of the science board report noted that such cyber-espionage and cyber-sabotage could impose “severe consequences for U.S. forces engaged in combat.” Those consequences could include severed communication links critical to the operation of U.S. forces. Data corruption could misdirect U.S. operations. Weapons could fail to operate as intended. Planes, satellites or drones could crash, the report said.
In other words, Stokes said, “if they have a better sense of a THAAD design or PAC-3 design, then that increases the potential of their ballistic missiles being able to penetrate our or our allies’ missile defenses.”
Winslow T. Wheeler, director of the Straus Military Reform Project at the Project on Government Oversight, made a similar point. “If they got into the combat systems, it enables them to understand it to be able to jam it or otherwise disable it,” he said. “If they’ve got into the basic algorithms for the missile and how they behave, somebody better get out a clean piece of paper and start to design all over again.”
The list did not describe the extent or timing of the penetrations. Nor did it say whether the theft occurred through the computer networks of the U.S. government, defense contractors or subcontractors.
Privately, U.S. officials say that senior Pentagon officials are frustrated by the scale of cybertheft from defense contractors, who routinely handle sensitive classified data. The officials said concerns have been expressed by Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, andAdm. James A. Winnefeld Jr., the vice chairman, as well as Gen. Keith Alexander, director of the National Security Agency.
“In many cases, they don’t know they’ve been hacked until the FBI comes knocking on their door,” said a senior military official who was not authorized to speak on the record. “This is billions of dollars of combat advantage for China. They’ve just saved themselves 25 years of research and development. It’s nuts.”
In an attempt to combat the problem, the Pentagon launched a pilot program two years ago to help the defense industry shore up its computer defenses, allowing the companies to use classified threat data from the National Security Agency to screen their networks for malware. The Chinese began to focus on subcontractors, and now the government is in the process of expanding the sharing of threat data to more defense contractors and other industries.
An effort to change defense contracting rules to require companies to secure their networks or risk losing Pentagon business stalled last year. But the 2013 Defense Authorization Act has a provision that requires defense contractors holding classified clearances to report intrusions into their networks and allow access to government investigators to analyze the breach.
The systems on the science board’s list are built by a variety of top defense contractors, including BoeingLockheed MartinRaytheon and Northrop Grumman. None of the companies would comment about whether their systems have been breached.
But Northrop Grumman spokes­man Randy Belote acknowledged the company “is experiencing greater numbers of attempts to penetrate its computer networks” and said the firm is “vigilant” about protecting its networks.
A Lockheed Martin official said the firm is “spending more time helping deal with attacks on the supply chain” of partners, subcontractors and suppliers than dealing with attacks directly against the company. “For now, our defenses are strong enough to counter the threat, and many attackers know that, so they go after suppliers. But of course they are always trying to develop new ways to attack.”
The Defense Science Board report also listed broad technologies that have been compromised, such as drone video systems, nanotechnology, tactical data links and electronic warfare systems — all areas where the Pentagon and Chinese military are investing heavily.
“Put all that together — the design compromises and the technology theft — and it’s pretty significant,” Stokes said.

http://rt.com/usa/us-chinese-report-defense-888/

Pentagon: The Chinese stole our newest weapons

Published time: May 28, 2013 15:31
Reuters / Carlos Barria
Reuters / Carlos Barria
The designs for more than two dozen major weapons systems used by the United States military have fallen into the hands of the Chinese, US Department of Defense officials say.
Blueprints for the Pentagon’s most advanced weaponry, including the Black Hawk helicopter and the brand new Littoral Combat Ship used by the Navy, have all been compromised, the Defense Science Board claims in a new confidential report.  
The Washington Post acknowledged late Monday that they have seen a copy of the report and confirmed that the Chinese now have the know-how to emulate some of the Pentagon’s most sophisticated programs.

This is billions of dollars of combat advantage for China,” a senior military official not authorized to speak on the record told Post reporters. “They’ve just saved themselves 25 years of research and development.

 “It’s nuts,” the source said of the report.  

The Defense Science Board, a civilian advisory committee within the Pentagon, fell short of accusing the Chinese of stealing the designs. However, the Post’s report comes on the heels of formal condemnation courtesy of the DoD issued only earlier this month.
In 2012, numerous computer systems around the world, including those owned by the US government, continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese government and military,” the Defense Department alleged in a previous report.  

Ellen Nakashima, the Post reporter who detailed the DSB analysis this week, wrote that the computer systems at the Pentagon may not have necessarily been breached. Instead, rather, she suggested that the defense contractors who built these weapons programs have likely been subjected to a security breach. US officials speaking on condition of anonymity, she reported, said that a closed door meeting last year ended with evidence being presented of major defense contractors suffering from intrusions. When reached for comment, the largest defense contractors — Boeing, Lockheed Martin, Raytheon and Northrop Grumman — all refused to weigh in.

Chinese hackers have previously been accused of waging cyberattacks on a number of US entities, including billion-dollar corporations and governmental departments. In 2007 it was reported that China accumulated the blueprints for the Pentagon’s F-35 fighter jets, the most expensive weapons program ever created, but the latest news from the DSB decries that much more has been compromised.

According to the Post, the plans for the advanced Patriot missile system, an Army anti-ballistic program and a number of aircraft have all ended up in the hands of the Chinese. The result could mean the People’s Republic is working towards recreating the hallmarks of America’s military might for their own offensive purposes, while also putting China in a position where even the most advanced weaponry in the world won’t be able to withstand complex defensive capabilities once those projects are reverse engineered.  

If they got into the combat systems, it enables them to understand it to be able to jam it or otherwise disable it,” Winslow T. Wheeler, director of the Straus Military Reform Project at the Project on Government Oversight, told the Post. “If they’ve got into the basic algorithms for the missile and how they behave, somebody better get out a clean piece of paper and start to design all over again.”

Mandiant, a US security firm located outside of Washington, reported earlier this year that the China has enlisted an elite squadron of cyber warrior to attack American computer systems and conduct espionage on behalf of the People’s Liberation Army. When the report was released in February, Mandiant said the PLA’s elusive Unit 61398 has successfully compromised the networks of more than 141 companies across 20 major industries, including Coca-Cola and a Canadian utility company. Those hacks reportedly subsided after Mandiant went public with their claims, but earlier this month the firm said those attacks have since been renewed.

They dialed it back for a little while, though other groups that also wear uniforms didn’t even bother to do that,” CEO Kevin Mandia told the New York Times recently. “I think you have to view this as the new normal.”

On their part, China has adamantly denied all claims that they’ve waged attacks on US networks. Following Mandiant’s initial report, a spokesperson for China’s foreign ministry said the claims were “irresponsible and unprofessional.”  

Hacking attacks are transnational and anonymous,” Hong Lei said. “Determining their origins are extremely difficult. We don't know how the evidence in this so-called report can be tenable.”




No comments:

Post a Comment