CIA Director Mike Pompeo: WikiLeaks Is A ‘Hostile Intelligence Service’

(THIS ARTICLE IS COURTESY OF CNN)

CIA director Mike Pompeo: WikiLeaks is a ‘hostile intelligence service’

Story highlights

  • Pompeo made a public appearance and blasted WikiLeaks
  • “It’s time to call out WikiLeaks for what it really is”
  • He also offered his take on threats from Iran and North Korea

Washington (CNN) CIA director Mike Pompeo gave a speech Thursday, railing against WikiLeaks as a “hostile intelligence service.”

His appearance at the Center for Strategic and International Studies, among his first forays into the public eye since being confirmed, came several months after WikiLeaks’ publishing stolen emails from Hillary Clinton’s campaign chairman John Podesta as well as the Democratic National Committee and just over a month since WikiLeaks published a trove of files it said were from the CIA. The CIA has neither confirmed nor denied their veracity.
In his Thursday speech, Pompeo accused WikiLeaks, its founder Julian Assange and Edward Snowden, a former contractor who leaked NSA documents to journalists, of disseminating classified information to “make a name for themselves.”
Pompeo has in the past called for Snowden to receive the death penalty.
He said people at the CIA found praise for WikiLeaks “both perplexing and deeply troubling.”
“As long as they make a splash, they care nothing about the lives they put at risk or the damage they cause to national security,” Pompeo said. “It’s time to call out WikiLeaks for what it really is: a non-state hostile intelligence service often abetted by state actors, like Russia.”
During the question and answer portion of the event, Pompeo said because Assange was not a US citizen and lived in the Ecuadorian embassy in London, he “has no First Amendment freedoms.”
Although WikiLeaks describes itself as a media organization exposing powerful governments and companies, Pompeo said he viewed this as false.
“These are not reporters doing good work,” Pompeo said. “These are people who are actively recruiting agents.”
Pompeo said past administrations had been “squeamish” about going after people who published secrets he considered harmful to the US.
During the campaign rally in October, Trump said he loved WikiLeaks and regularly touted their disclosures. For a time before taking office, Trump did not endorse a report from the US intelligence community accusing Russia of being behind the hacks and using WikiLeaks to disseminate them in order to hurt the Clinton campaign.
Russia has denied any wrongdoing, and Assange has said WikiLeaks’ source was not Russia.
WikiLeaks responded to Pompeo’s comments in part by referencing a now deleted tweet he sent during the campaign referencing WikiLeaks’ DNC trove.

Iran and North Korea

Until Trump tapped him to lead the CIA, Pompeo was a Republican member of Congress from Kansas. He was an outspoken critic of the Obama administration and the US nuclear agreement with Iran, officially known as the Joint Comprehensive Plan of Action or JCPOA.
As CIA director speaking at CSIS on Thursday, he was considerably less outspoken about his issues with the Iran deal, but did say Iranians were “on the march” and cited missile launches, their support of the Houthis in Yemen and military involvement in Iraq in the past two years.
“The list of Iranian transgressions has increased dramatically since the date that the JCPOA was signed,” Pompeo said.
Pompeo said he viewed working with both European and Middle Eastern allies as integral to countering Iran, but also said the US’ recent cruise missile strike on Syria likely sent a message of US strength to Iran.
“What I mean by that is, this was a decision-making process that was decisive, thoughtful and truly based on a factual understanding of the geopolitical importance of the things that are facing our nation today.”
He went on to say the Iranians “ought to take note of the fact that this administration” is willing to take different measures than past administrations.
Pompeo also spoke about nuclear proliferation in North Korea and the potential of another nuclear weapons test in the coming days.
“Multiple administrations have tried to deal with the threat of an intercontinental ballistic missile capable of putting a nuclear warhead into the United States, and we’re simply closer now than we have ever been at any time in North Korea’s history,” he said. “As the knowledge base increases and the capacity to deliver that increases and draws closer, it both reduces the option set to prevent it and makes more likely that you get a bad decision on a tough day from the leader of North Korea.”
Like Trump, Pompeo said China was of utmost importance to solving the issue.
Asked if there was hope China could turn back or end the North Korean nuclear weapons program, Pompeo said, “I’m counting on it.”

FBI Director James Comey Warned Wednesday That Americans Should Not Have Expectations Of “absolute privacy,

 

(CNN) FBI Director James Comey warned Wednesday that Americans should not have expectations of “absolute privacy,” adding that he planned to finish his term leading the FBI.

“There is no such thing as absolute privacy in America; there is no place outside of judicial reach,” Comey said at a Boston College conference on cybersecurity. He made the remark as he discussed the rise of encryption since 2013 disclosures by former National Security Agency contractor Edward Snowden revealed sensitive US spy practices.
“Even our communications with our spouses, with our clergy members, with our attorneys are not absolutely private in America,” Comey added. “In appropriate circumstances, a judge can compel any one of us to testify in court about those very private communications.”
But, he also said Americans “have a reasonable expectation of privacy in our homes, in our cars, in our devices.
“It is a vital part of being an American. The government cannot invade our privacy without good reason, reviewable in court,” Comey continued.
In the last four months of 2016, the FBI lawfully gained access to 2,800 devices recovered in criminal, terrorism and counterintelligence investigations and the FBI was unable to open 43% of those devices, Comey said.
Americans’ desire for privacy and security should never be viewed as incompatible, he said.
“We all value privacy. We all value security. We should never have to sacrifice one for the other,” Comey said. “Our founders struck a bargain that is at the center of this amazing country of ours and has been for over two centuries.”
FBI director at center of many controversies
Comey’s leadership of the FBI has been marked by controversy in the wake of the bureau’s handling of the investigation into Hillary Clinton’s email controversy and President Donald Trump’s baseless accusations that President Barack Obama ordered the wiretapping of phones at Trump Tower.
He did not address the wiretapping claim nor WikiLeaks’ recent claim that it obtained internal CIA documents.
Comey did, however, say he plans to finish out his 10-year term.
“You’re stuck with me for about another 6 1/2 years, and so I’d love to be invited back again,” he said.

Privacy: Is There No Longer Is Such A Thing On Planet Earth?

 

(THIS ARTICLE IS COURTESY OF THE SAUDI NEWS AGENCY ASHARQ AL-AWSAT)

 

Opinion

Living with Our Privacy Violated

The rule has never changed: Every phenomenon or positive change has a tax to be paid, whether we like it or not.This rule also applies to the enormous technological progress we are witnessing and its unlimited positive outcomes on our lives, businesses and communities. Here, the tax users pay is represented by forbidden acts and taboos becoming accepted and incorporated into our lives.

People might not sense this gradual transformation but they eventually accept it in return for using technology. Speaking of attempts to maintain some privacy has become impossible – privacy has been violated with a knockdown.

A group of scientists from Harvard University has developed a mosquito-sized robot that can steal samples of your DNA without you feeling it. Professor of Computer Science Margo Seltzer said that the privacy we used to know before no more exists, adding that current techniques such as credit cards, internet networks, highway radars, cameras in streets, social media and emails can all leave a digital print of us by which we can be followed.

In 2013, more than five billion data records were lost or stolen, according to the Breach Level Index (BLI). This reveals that perhaps only those distant from the world of internet were not subject to violation of privacy– and they did not avoid it for fear or cautiousness but because they weren’t capable of affording such technology – yet, they are certainly on their way there.

Half the world’s population is constantly connected to the Internet while the other half is on its way. According to Gartner, Inc. there will be 25 billion smartphones by 2020. At that time, no one will be safe regardless if he uses a smartphone or not. Saudi Arabia, for example, has a population of 30 million people, having 24 million internet users and 48 million subscribers of mobile telecommunication services.

Violations taking place every second with data and information divulged have become manifest for anyone connected to the internet. And it is impossible to stop or block them.

Take what has been published by founder of WikiLeaks Julian Assange in 2013 as an example – he published a huge archive of correspondences for former US Secretary of State Henry Kissinger since 1973 till 1976. These correspondences were classified as top secret and totaled 1.7 million, five-fold what has been previously published in WikiLeaks.

Another example is former Central Intelligence Agency (CIA) Edward Snowden, currently residing in Russia, who has unveiled that the National Security Agency (NSA) in the US and the Government Communications Headquarters (GCHQ) in Britain have jointly developed a technology that permits access to many global internet activity, call logs, individuals’ emails and a huge content of other digital telecommunications.

Misuse of personal data is a growing challenge all over the world. Requests were made to governments to take charge of protecting the future of citizens’ privacy and their social prosperity. However, it seems that none is capable of that, with governments themselves failing to protect their own classified data. So, how would a normal individual be able to do that?!

Till now there are no realistic solutions that show optimism in ending the violation of our privacy. Given that we have agreed to be connected to the Internet and to use smartphones, we should admit that our privacy has been violated irreversibly, even if we try to convince ourselves otherwise.

Salman Al-dossary

Salman Al-dossary

Salman Aldosary is the former editor-in-chief of Asharq Al-Awsat newspaper.

More Posts

Wikileaks: The CIA Is Using Popular TVs, Smartphones And Cars To Spy On Their Owners

(THIS ARTICLE IS COURTESY OF THE WASHINGTON POST)

Wikileaks: The CIA is using popular TVs, smartphones and cars to spy on their owners

March 7 2017

Wikileaks posts alleged trove of CIA hacking tools

Embed Share

 
Anti-secrecy group Wikileaks on Tuesday said it had obtained a top-secret trove of hacking tools used by the CIA to break into phones, communication apps and other electronic devices, and published confidential documents on those programs. (Reuters)

The latest revelations about U.S. government’s powerful hacking tools potentially takes surveillance right into the homes and hip pockets of billions of users worldwide, showing how a remarkable variety of every day devices can be turned to spy on their owners.

Televisions, smartphones and Internet-connected vehicles are all vulnerable to CIA hacking, according to the Wikileaks documents released Tuesday. The capabilities described include recording the sounds, images and the private text messages of users, even when they use encrypted apps to communicate. The CIA also studied whether it could infect vehicle control systems used by modern cars and trucks, which Wikileaks said could allow “nearly undetectable assassinations.”

In the case of a tool called “Weeping Angel” for attacking Samsung SmartTVs, Wikileaks wrote, “After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on, In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.”

The documents, which The Washington Post could not independently verify and the CIA has declined to confirm, list supposed tools for cracking into such widely popular devices as Apple’s iPhone or the Android smartphones whose operating system is made by Google, but there are marked differences from the 2013 revelations by the National Security Agency’s former contractor Edward Snowden.

His documents largely described mass surveillance of Internet-based communications systems, more often than the individual devices that appear to have been the focus of the CIA. By targeting devices, the CIA could gain access to even well-encrypted communications, on such popular apps as Signal and WhatsApp, without having to crack the encryption itself. The Wikileaks reports appear to acknowledge that difference by saying the CIA “bypassed” as opposed to defeated encryption technologies.

Resignation and frustration rippled through Silicon Valley on Tuesday as technologists grappled with revelations of yet another government attempt to exploit their systems.

“The argument that there is some terrorist using a Samsung TV somewhere – as a reason to not disclose that vulnerability to the company, when it puts thousands of Americans at risk — I fundamentally disagree with it, “ said Alex Rice, chief technology officer for Hacker One, a startup that enlists hackers to report security gaps to companies and organizations in exchange for cash.

Privacy experts say the CIA may have been forced into focusing on vulnerable devices because the Internet overall has become more secure through more widespread deployment of encryption. In this new world, devices have become the most vulnerable link.

“The idea that the CIA and NSA can hack into devices is kind of old news,” said Johns Hopkins cryptography expert Matthew Green. “Anyone who thought they couldn’t was living in a fantasy world.”

Snowden’s revelations and the backlash made strong encryption a major, well-funded cause for both privacy advocates and, perhaps more importantly, technology companies that had the engineering expertise and budgets to protect data as it flowed across the world.

Google, Microsoft, Facebook, Yahoo and many other companies announced major new initiatives, in part to protect their brands against accusations by some users that they had made it too easy for the NSA to collect information from their systems. Many Web sites, meanwhile, began encrypting their data flows to users to prevent snooping. Encryption tools such as Tor were strengthened.

Encrypting apps for private messaging, such as Signal, Telegram and WhatsApp exploded in popularity, especially among users around the world who were fearful of government intrusion. In the days following the U.S. presidential election, Signal was among the most downloaded in Apple’s app store and downloads grew by more than 300 percent.

Open Whispers Systems, which developed Signal, released a statement: “The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption.” WhatsApp declined to comment, and Telegram did not respond to requests for comment. Google declined to comment, while Samsung and Apple did not immediately respond to requests for comment.

U.S. government authorities complained loudly that the new wave of encryption was undermining their ability to investigate serious crimes, such as terrorism and child pornography. The FBI sued Apple in hopes of forcing it to unlock an iPhone used by the San Bernadino killers before announcing it had other ways to crack the device amid heavy public criticism.

Against that backdrop, many privacy advocates argued that devices — often called “endpoints” for their place on chains of communications that can criss-cross continents — were the best available target left in a world with widespread online encryption. The Wikileaks documents suggests that the CIA may have reached the same conclusion.

“It would certainly be consistent with the hypothesis that we’ve made real progress in the encryption we’ve been introducing,” said Peter Eckersley, technology projects director for the Electronic Frontier Foundation, a San Francisco-based civil liberties group. “It’s impossible to be 100 percent certain, but reading the tea leaves, it’s plausible.”

The Wikileaks revelations also will serve as a reminder that, for whatever the political backlash to revelations about digital spying, it is not going away and probably will continue to grow. The focus on hacking into individual devices — rather than the messages traveling between them — is likely to increase pressure on companies to make those devices safer because, as experts have long said, they are the most vulnerable target in a long chain of digital interactions.

That could be especially important for U.S. tech companies, such as Google, Apple and Facebook, that have worked to rebuild their reputations as stewards of their users’ privacy in recent years.

Cybersecurity experts, meanwhile, reacted with alarm to the news of the Wikileaks release.

“This is explosive,” said Jake Williams, founder of Rendition Infosec, a cybersecurity firm. The material highlights specific antivirus products that can be defeated, going further than a release of NSA hacking tools last year, he said.

The CIA hackers, according to WikiLeaks, even “discussed what the NSA’s …hackers did wrong and how the CIA’s malware makers could avoid similar exposure.”

Hackers who worked at NSA’s Tailored Access Operations unit said the CIA’s library of tools looked comparable. The description of the implants, which are software that enable a hacker to remotely control a compromised device, and other attack tools appear to be “very, very complex” and “at least on par with the NSA,” said one former TAO hacker who spoke on condition his name not be used.

The WikiLeaks release revealed that they have sophisticated “stealth” capabilities that enable hackers not only to infiltrate systems, but evade detection, as well as abilities to “escalate privileges” or move inside a system as if they owned it.

“The only thing that separates NSA from commodity malware in the first place is their ability to remain hidden,” the former TAO hacker said. “So when you talk about the stealth components, it’s huge that you’re seeing a tangible example here of them using and researching stealth.”

Computer security experts noted that the release includes no actual tools or exploits, “so we don’t know if WikiLeaks did not get them or is just not choosing to publish them,” Nicholas Weaver, a computer security researcher at the University of California at Berkeley. “However we should assume that whoever stole this data has access to the exploits and tools.”

He noted that the dates in the files suggest the tools were taken in February or March 2016 and that there are at least two documents marked Top Secret, “which suggests that somebody in early 2016 managed to compromise a Top Secret CIA development system and is willing to say that they did.”

One internal CIA document listed a set of Apple iPhone “exploits” — or tools that can be used to compromise the device by taking advantage of software flaws. Some of the tools are based on “zero-days,” which are software vulnerabilities that have not been shared with the manufacturer. So “some of these descriptions will allow Apple to fix the vulnerabilities,” Weaver said. “But at the same time, they’re out in the public and whoever stole this data could use them against U.S. interests.”

President Obama: Just Like Hillary: Just Another Lying Politician!!!

(THIS ARTICLE IS COURTESY OF THE WASHINGTON POST)

At least President Obama is honest. Or so goes the common perception. He tried, maybe he made mistakes, the other side was mean to him, but through it all, he didn’t lie.

That view got smithereened this week. It was always hard to believe the president’s repeated claim that he didn’t know his own secretary of state was using an off-the-books e-mail server to avoid public scrutiny, in the process virtually guaranteeing that she would commit multiple felonies by taking classified information into the open.

Now we know Obama was lying. His own aides said so, in e-mails uncovered by WikiLeaks and made public this week.

In March 2015, Obama made the ridiculous claim that he had learned about Clinton’s e-mail server “the same time everybody else learned it, through news reports.” In fact, not only did he know she was using a private e-mail address for state business, but he had corresponded with her via that address.

“We need to clean this up — he has e-mails from her — they do not say state.gov,” Cheryl Mills, a top aide, wrote to John Podesta, another senior adviser, on March 7, 2015.

Obama spokesman Josh Earnest did indeed try to “clean this up,” two days later, by changing the subject.

“The point that the president was making is not that he didn’t know Secretary Clinton’s e-mail address — he did — but he was not aware of the details of how that e-mail address and server had been set up, or how Secretary Clinton and her team were planning to comply with the Federal Records Act,” Earnest said.

[Obama is] just another lying politician.

Try that technique on your wife sometime when she finds out you were at a blonde’s house when you said you were going to church. “I didn’t mean to say I was at Holy Name — I wasn’t — but I just want to clarify that I was not aware of what year the church was built.”

Despite the sacred sheen of Obama idealism that the media have been struggling to keep polished all these years, our president is an ordinary politician who lies for the same reason other pols do. He thinks whatever means he uses are justified by the ends — his awesome mission to make America a better place.

In promoting ObamaCare, Obama repeatedly and shamelessly lied to the American people: “If you like the plan you have, you can keep it. If you like the doctor you have, you can keep your doctor, too,” he said on June 6, 2009, in one of dozens of similar remarks. Obama knew this was untrue at the time; it was built into the plan that millions would lose the health plans they had.

There is a distinction between lies and political BS.

Modal Trigger

BS can involve starry-eyed thinking that won’t survive acquaintance with reality. Obama might have actually believed himself when he promised “the most transparent administration in history.” Today it’s obvious that instead, Obama’s White House has been “one of the most secretive,” as Washington Post media columnist Margaret Sullivan put it.

It wasn’t mere B.S. when Obama lied about Benghazi: “We revealed to the American people exactly what we understood at the time,” he said on Feb. 2, 2014, though his administration knew the night of the Sept. 11, 2012 attacks that they were planned, terrorist acts. On Sept. 16, 2012, UN Ambassador Susan Rice, working from White House-approved talking points, repeatedly blamed the Benghazi attacks on a nonexistent protest over an inflammatory video.

 Our president is an ordinary politician who lies for the same reason other pols do

Obama lied about the Fast and Furious operation that allowed some 2,500 firearms to be bought by Mexican drug cartels. One such gun was used to murder US Border Patrol agent Brian Terry: “The Fast and Furious program was a field-initiated program begun under the previous administration,” Obama said on Sept. 20, 2012. In fact, the program was launched by Obama’s Bureau of Alcohol, Tobacco and Firearms in October 2009.

Obama lied about immigration: “My position hasn’t changed,” he said on Nov. 20, 2014, as he announced unilateral executive action to normalize the status of illegal immigrants, a move he had repeatedly and correctly said he lacked the authority to make.

Obama lied about the IRS’s targeting of conservatives, even contradicting his own statements that the harassment was “inexcusable” and made him “angry” on May 15, 2013. Less than a year later, when the heat was off, he said there was “not even a smidgen of corruption” and the IRS’s vendetta against right-leaning groups was totally excusable as a bureaucratic snafu.

You get the idea; Google “Politifact Obama false” for lots more along the same lines.

Once upon a time, when we were all bedazzled by his freshness, Obama set about saying whatever it took to get elected. Remember when he promised health-care negotiations would be broadcast on C-SPAN, when he said his deeply held religious beliefs meant he couldn’t support gay marriage, when he said he would not raise any kind of taxes on families earning less than $250,000?

Faith in him proved enduring. Some of his fanboys insist to this day that Obama is a transcendent figure, a “lightworker.”

Nonsense. He’s just another lying politician.

Bill And Hillary, Mr. And Mrs. Skanky Who Will Lie To Anyone, For A Dollar!

(THIS ARTICLE IS COURTESY OF THE WASHINGTON TIMES)

Illustration on Podesta email revelations about Hillary Clinton by Alexander Hunter/The Washington Times
Illustration on Podesta email revelations about Hillary Clinton by Alexander Hunter/The Washington Times 

ANALYSIS/OPINION:

Hillary Clinton can’t bring change to Washington, D.C., and her closest advisers know it.

“She [Clinton] makes decisions based on polls, not principles and is beholden to the special interests in Washington,” a Democratic field-tested survey in the 2008 presidential race said. “If she is elected we will have the same kind of polarized politics that we have had for the past 15 years.”

The sentiment in the memo, which was released in a batch of John Podesta’s emails hacked by WikiLeaks, was the inspiration of one of Barack Obama’s most famous lines that primary season.

“She’ll say anything and change nothing. It’s time to turn the page,” Mr. Obama’s attack-ad said.

Mr. Podesta, who went on to become a counselor to Mr. Obama’s White House, along with Neera Tanden, who served as Mr. Obama’s domestic policy director after he won the nomination that year, still appear to believe this.

After Mrs. Clinton’s email server story broke in March 2015, Mr. Podesta and Ms. Tanden immediately knew who to place the blame on — Mrs. Clinton and her incredibly secretive posse of closest advisers.

“Speaking of transparency, our friends Kendall, Cheryl and Phillipe sure weren’t forthcoming on the facts here,” Mr. Podesta wrote in a March 2015 email, referring to Mrs. Clinton’s personal lawyer David Kendall and former State Department staffers and Clinton confidants Cheryl Mills and Philippe Reines on her email server set-up.

“Why didn’t they get this stuff out like 18 months ago? So crazy,” Ms. Tanden replied. Then answering her own question, wrote: “I guess I know the answer. They wanted to get away with it.”

Ms. Tanden is the president of the Center for American Progress (CAP), a progressive think-tank that Mr. Podesta helped found and lead before he stepped down in 2011. Ms. Tanden represents the progressive wing of the party and has a close relationship with Mr. Podesta, as they’re both veterans of the Obama and Clinton worlds.

It’s in Ms. Tanden’s emails where the most devastating character blows hit Mrs. Clinton.

“Her [Clinton‘s] instincts are terrible,” Ms. Tanden writes in one exchange. In another, complaining to Mr. Podesta about why Mrs. Clinton said at a rally she was a moderate Democrat rather than a progressive, she wrote: ‘[Clinton] doesn’t seem to know what planet we are all living in at the moment.’”

Indeed.

The only change Mrs. Clinton is promising in her campaign is to move more to the left. In the process of winning the Democratic nomination she adopted many of Vermont Sen. Bernard Sanders’ more progressive positions, like the $15 minimum-wage, her stance against the Trans-Pacific Partnership, and subsidizing the cost of college education.

Yet, in the leaked emails, some of Mrs. Clinton’s closest aides demonstrate contempt for the more left-wing of the party, calling them “puritanical,” “radical,” “dumb,” and “freaks” who need to “get a life.”

She praises Wall Street and bankers in her paid speeches to them, and has collected more than $1 billion from special interests in this election cycle alone.

Doesn’t sound like Mrs. Clinton is too keen on changing after all.

In terms of cleaning up Washington corruption, well, Ms. Tanden admitted that was “dicey territory” for Mrs. Clinton to even comment on.

“This is a jump ball,” Ms. Tanden said, when asked if Mrs. Clinton should make a public statement on political corruption and government reform. “She may be so tainted she’s really vulnerable — if so, maybe a message of I’ve seen how this sausage is made, it needs to stop, I’m going to stop it will actually work. So maybe it requires harder charging.”

Even Colin Powell, who said he was going to vote for Mrs. Clinton this week (not a surprise given he didn’t support previous Republican nominees John McCain or Mitt Romney), thinks she’s anything but a change agent.

“A 70-year person with a long track record, unbridled ambition, greedy, not transformational, with a husband still d—king bimbos at home (according to the NYPD),” wrote Mr. Powell, describing Mrs. Clinton, and a July 26, 2014 email to Democratic donor Jeffrey Leeds.

“Everything HRC touches she kind of screws up with hubris,” Mr. Powell added, according to his emails obtained by the Website DC Leaks.

“Unbridled ambition.” “Tainted.” “Instincts terrible.” “Doesn’t seem to know what planet we are all living in.” “Not transformational.”

With friends like these, who needs enemies? In private, they understand Mrs. Clinton is the very embodiment of the status quo. In public, however, they’re trying to sell the American public a different bag of goods.

Good luck.

Kelly Riddell is a columnist for The Washington Times.

Bill And Hillary Clinton, President And Secretary Of For-Profit Scammers Of Non-Profit’s

(THIS ARTICLE IS COURTESY OF TIME) (How else could the Clinton’s go from a net worth of under 1 million dollars when Bill left office to over 300 million dollars by the time Hillary did 4 years as Secretary of State? I’m just saying…)(TRS)

A 2011 memo made public Wednesday by Wikileaks revealed new details of how former President Bill Clinton made tens of millions of dollars for himself and his wife, then Secretary of State Hillary Clinton, through an opaque, ethically messy amalgam of philanthropic, business and personal activities.

The memo was written by Bill Clinton’s longtime aide, Doug Band, and is among tens of thousands of emails apparently stolen from Hillary Clinton’s campaign chief, John Podesta, in what U.S. officials believe is part of a massive Russian-backed attempt to disrupt the U.S. election.

The Band memo came in response to an investigation undertaken by a law firm, Simpson Thatcher, into the activities of the Clinton Foundation at the behest of its board. The board was concerned that some of the activities undertaken by Band and others on behalf of the President could threaten the Foundation’s IRS status as a charity, according to Band’s memo. Chelsea Clinton had also reported concerns to Podesta and other Clinton adviser’s that Band and his recently launched consulting firm, Teneo, were using her father’s name without his knowledge to contact British lawmakers for clients, including Dow Chemical.

Clinton Defends Emails At Reporters Conference
Democratic nominee Hillary Clinton spoke at a convention of black and Hispanic journalists in Washington Friday, answering several questions afterward.
Share

In the 12-page memo, Band describes how he and several colleagues spent much of the years after Bill Clinton’s presidency working to fund the Clinton Foundation, which has raised nearly $2 billion from individuals, corporations and governments for charities focusing on climate change, economic development, health, women and girls issues and other causes. Band claims in the memo that from 2006 to 2011, he and a colleague, Justin Cooper, raised $46 million for the Foundation through the Clinton Global Initiative, an annual networking conference that is one of the Foundation’s big sources of income.

But the Foundation work was just a part of what Bill Clinton did during his wife’s time as a Senator and Secretary of State, and it wasn’t always clear where the former president’s non-profit activities ended and his for-profit ones began. Five months before he wrote the memo, Band joined forces with a recently retired State Department envoy, Declan Kelly, to form Teneo, which Band said provided merchant and investment banking services, corporate restructuring, public relations and communications services and strategic advising services to 20 clients, including Coca-Cola, Dow Chemical, UBS, Barclays and BHP Billiton, among others. Over that period, Band says in the memo, Teneo raised $8 million for the Clinton Foundation.

And Band was also organizing personal income directly for Clinton. Under the heading, “For-Profit Activity of President Clinton (i.e. Bill Clinton, Inc.),” Band wrote, “We have dedicated our selves to helping the President secure and engage in for-profit activities—including speeches, books, and advisory service engagements… In support of the President’s for-profit activity, we also have solicited and obtained, as appropriate, in-kind services for the President and his family—for personal travel, hospitality, vacation and the like. Neither Justin nor I are separately compensated for these activities (e.g., we do not receive a fee for, or percentage of, the more than $50 million in for-profit activity we have personally helped to secure for President Clinton to date or the $66 million in future contracts, should he choose to continue with those engagements).”

Band mentions four such “arrangements” without naming them. Bill Clinton was paid nearly $18 million to be “honorary chancellor” of a for-profit college, Laureate International Universities, according to reports and the family’s tax returns. A Dubai-based firm, GEMS Education, paid Bill Clinton more than $560,000 in 2015, according to the tax returns. Band also lists a variety of speaking fees, previously disclosed by the Clinton’s, including hundreds of thousands of dollars each from UBS, Ericsson, BHP and Barclays. In 2011 alone, according to the Clinton’s tax returns, Bill Clinton earned $13,454,000 in speaking fees.

No evidence has been found to support allegations of a quid pro quo of official acts by Hillary Clinton as senator or Secretary of State in exchange for the money received by the Clinton’s or the Clinton Foundation. However the messiness and opacity of the relationship between Clinton’s personal, business and philanthropic undertakings detailed in the memo raises new questions about Bill Clinton’s activity. In the email to which Band’s draft memo was attached, Band tells Podesta he has removed the “lasry section all together.” Marc Lasry is a hedge fund manager and Clinton donor who funded an unsuccessful investment vehicle launched by Chelsea Clinton’s husband Marc Mezvinsky.

Other questions arise in the penultimate paragraph of the memo, entitled “Other Matters.” Without providing details, Band writes that since the end of Bill Clinton’s presidency he and Cooper had served as the primary contact and point of management for President Clinton’s activities, including political, business and Foundation matters, speeches, books, and family/personal needs, including “securing in-kind private airplane travel, in-kind vacation stays, and supporting family business and personal needs.”

Calls and emails to Band, Teneo and the Clinton Foundation were not immediately returned. The Hillary Clinton campaign declined to confirm that the memo, or other emails released by Wikileaks, are in fact un-doctored documents stolen from Podesta’s personal email account. However a campaign spokesperson, Glen Caplin, tweeted on Wednesday that Wikileaks was advancing a “clear political agenda” by “dribbling out” Podesta’s emails. “If Podesta dump was about high-minded transparency @wikileaks would release all at once,” Carlin tweeted.

Podesta has said he is cooperating with the FBI in an investigation of the hack. The Clinton Foundation has said it will stop accepting foreign and corporate donations if Hillary Clinton is elected president.

Follow me on Twitter

Social

Follow Truth Troubles: Why people hate the truths' of the real world on WordPress.com
oldpoet56

oldpoet56

truthtroubles.wordpress.com/ Just an average man who tries to do his best at being the kind of person the Bible tells us we are all suppose to be. Not perfect, never have been, don't expect anyone else to be perfect either. Always try to be very easy going type of a person if allowed to be.

View Full Profile →

Anda Bertanya Ateis Menjawab

Memperkenalkan keberadaan ateis di indonesia secara bersahabat

unrecognised virtuose

Run by a naive utopianist, Theodora R. Zygarde.

Cerca Trova

Dekonstruksi dan Oposisi

Chinese Commercial Correspondence

Chinese, language, learn, speak, write, textbook, contract, beginner, advanced, intermediate, commercial, marketing, correspondence, characters, radicals, decomposition, business, numbers, numerals, contract

Me,my weird thoughts and I

A place where I can doodle my thoughts and other random stuff that interest me at the time.

The Picture Patch

photography, nature, life, people, thoughts, passions

Graffiti Lux and Murals

Luxuriating in Ephemeral Art

Toni Roberts' Photojournal of Self-Transformation

one woman's journey to wholeness...

Joy of Life

“Enjoy life. This is not a dress rehearsal.”

Ardiantoyugo

Night Riding Without Seeing

Mohamad Al Karbi

محمد القربي

Murmurs from the Earth...

Whispers from the Sky

inkyfire

ink of love in fire - design is my desire

Mistakes & Adventures

What I've always wanted

praythroughhistory

Heal the past. Free the present. Bless the future.

Así, como un 8 tumbado

Abriendo el alma

Luna de papel :: Talleres Literarios en Valencia

El blog de Aurora Luna. Talleres de escritura creativa en Valencia. Club de lectura. Cursos de novela, poesía, cuento y narrativa breve. Recursos para escritores y herramientas para aprender a escribir en el taller literario. Reflexiones sobre creatividad y literatura. Master class, profesores, clases presenciales y seminarios de creación literaria adscritos a "LIBRO, VUELA LIBRE". Comunidad de escritores y lectores en Valencia. Dinámicas en curso y ejercicios de escritura creativa. Palabras, concursos, vuelos y encuentros literarios.

How to blue

Un blog acerca mi vida personal sientete libre de juzgar.

{The Sea Calls Us Home}

Welcome. This is a gathering of thoughts. Real and honest thoughts, and I hope you enjoy them.

Damon Ashworth Psychology

Musings about psychology, therapy and research

Food Food

Food Processing, Food and health, Food Engineering, Food Chemistry, Food Facts

زرقاء اليمامة ¡

من وحي الواقع أكتب، لا خيال! فلتحفظوه باسم قلمي! بكل الحب ♥

julius22193

keep going

Cook the Beans

inspired by ingredients, smells and Travels, vegan & vegetarian

IHRA

The best in WWII aviation history

whatyouthoughtiwentaway.wordpress.com/

“I hope we once again have reminded people that man is not free unless government is limited. There’s a clear cause and effect here that is as neat and predictable as a law of physics: as government expands, liberty contracts.”~ Ronald Reagan.

iksperimentalist

a collision of science and comedy

Inspire Tips

Inspire people to unleash hidden potential and overcome life challenge.

Espirational: A 10 Minute Vacation for the Soul

Espirational: A 10 minute vacation for the soul.

sulfite-free cooking

gluten-free, dairy-free, additive-free recipes for better health

OCULI & AURIS - ©®CWG

AUGE UND OHR - RUNDHERUM UND QUER GEFLÜSTERT - SEHEN HÖREN SCHREIBEN SPRECHEN TEILEN LERNEN LEBEN -

Aphadolie

News Worldwide

historywithatwist

Celebrating unusual history

Un gato mas en la ciudad

To bit or not to bit

Dare boldly

A blog by Louise Gallagher

keris journal

A dandilion.... can either mean one hundred weeds or one hundred wishes!

Ancient Beauty

Beautiful Me

Words and Notion

my words your notion

ASSHOLES WATCHING MOVIES

How many assholes does it take to review a movie?

SurveyStud,Inc

SurveyStud: https://appsto.re/us/Ddj18.i

Dynaries Photography

Focus on what makes you happy

UNDONE

Words, Visions, Sounds....... The Deepest of Me

adwinannerin

This WordPress.com site is the bee's knees

One Blessed Fool's Way to Happiness

Imagination. Freedom. Faith.

%d bloggers like this: