President-Elect Trump let’s his sons’ run the Trump Organization; still doubt that will clear their acts of impartiality; why because President-Elect Trump haven’t been transparent!

trump-family-2

This had to be an issue, as the Trump Organizations and businesses had to be obligated away from the Executive, the Commander-in-Chief as he ushers himself into the Presidency. The family seems to be picked to run his company, as they are already Executive Vice-President in the Cooperation, this being Eric Trump, Donald Trump Junior and Ivanka Trump. These have been behind their father, the President-Elect. This is important as the interest of Trump Organization should not be the sole purpose of the presidency, that should be as civil service and also guiding with good governance without having own personal gains by having the office. Therefore the nominees and the appointed government leaders in the Trump Organization has to go through not only sessions in the Senate before their appointments are getting accepted; as well as they have to give way to their business connection and positions in the boards in general.

That the international hotels and golf courses, the trademarked products in the portfolio of the Trump Organization that can implicate and create issues with both the foreign trade policies and also import regulations. The same can be seen in general with the regulation of banking, loans and all other fiscal regulation that can hurt the Trump Organization. Something Trump will already know before going to office, what he needs to create of legislation and what sort of economic stimulus or even economic framework that can absorb more profits on the business that are already owned by the Trump family.

Let’s take look at what a blind trust is and what sort of agreements that can happen when Trump gets into office in just days.

What is a Blind Trust?

Blind trusts are often used when a wealthy individual is elected to a political office where his investment holdings could potentially put him in a conflict of interest with a regulatory issue or other sensitive exercise of political power. In this context, there are some obvious issues with blind trusts in that the beneficiary setting up the blind trust is at least aware of the investment mix going in and cannot realistically forget that information when weighing future decisions. The trustors may also set the rules under which the investments are managed and, of course, pick trustees that they are confident will act in a certain way in potential situations. So again, the efficacy of the blind trust in truly eliminating conflict of interest is far from proven. That said, politicians with a large amount of wealth or in high office use blind trusts to show that at least the effort is being taken to establish impartiality” (Investopedia).

Director of Government Ethics Shaub on 11th January on Blind Trust:

“I think Politico called this a “half-blind” trust, but it’s not even halfway blind. The only thing this has in common with a blind trust is the label, “trust.” His sons are still running the businesses, and, of course, he knows what he owns. His own attorney said today that he can’t “un-know” that he owns Trump tower. The same is true of his other holdings. The idea of limiting direct communication about the business is wholly inadequate. That’s not how a blind trust works. There’s not supposed to be any information at all” (…) “Here too, his attorney said something important today. She said he’ll know about a deal if he reads it in the paper or sees in on TV. That wouldn’t happen with a blind trust. In addition, the notion that there won’t be new deals doesn’t solve the problem of all the existing deals and businesses. The enormous stack of documents on the stage when he spoke shows just how many deals and businesses there are” (…) “The President-elect’s attorney justified the decision not to use a blind trust by saying that you can’t put operating businesses in a blind trust. She’s right about that. That’s why the decision to set up this strange new kind of trust is so perplexing. The attorney also said she feared the public might question the legitimacy of the sale price if he divested his assets. I wish she had spoken with those of us in the government who do this for a living. We would have reassured her that Presidential nominees in every administration agree to sell illiquid assets all the time. Unlike the President, they have to run the gauntlet of a rigorous Senate confirmation process where the legitimacy of their divestiture plans can be closely scrutinized. These individuals get through the nomination process by carefully ensuring that the valuation of their companies is done according to accepted industry standards. There’s nothing unusual about that” (…) “Back when he was working for the Justice Department, the late Antonin Scalia also wrote an opinion declaring that a President should avoid engaging in conduct prohibited by the government’s ethics regulations, even if they don’t apply. Justice Scalia warned us that there would be consequences if a President ever failed to adhere to the same standards that apply to lower level officials. The sheer obviousness of Justice Scalia’s words becomes apparent if you just ask yourself one question: Should a President hold himself to a lower standard than his own appointees?”(Shaub, 2017).

His sons will run the Trump Organization:

“President-Elect Trump will relinquish management of his investment and business assets for the duration of his Presidency. To accomplish this, all of President-Elect Trump’s investment and business assets, commonly known as The Trump Organization—comprised of hundreds of entities—have been or will be conveyed to a Trust, which will be managed for the duration of his Presidency by his sons, Don and Eric, and a Trump executive, Allen Weisselberg. Collectively—and unanimously—Allen, Don, and Eric will have the authority to manage The Trump Organization and have full decision-making authority for the duration of the Presidency, without any involvement whatsoever by President-Elect Trump. To implement this transfer, President-Elect Trump will resign from all official positions he holds with The Trump Organization entities” (…) “the Trust Agreement prohibits The Trump Organization from entering into any new transaction or contract with a foreign country, agency, or instrumentality thereof, including a sovereign wealth fund, foreign government official, or member of a royal family, the United States government or any agency or instrumentality thereof, or any state or local government or any agency or instrumentality thereof, other than normal and customary arrangements already undertaken before the President-Elect’s election” (…) “President-Elect Trump is taking these extraordinary steps to ensure that the Office of the Presidency is isolated from The Trump Organization” (…) “the Constitution does not forbid fair-market-value transactions with foreign officials. To put to rest any concerns, however, the President-Elect is announcing he will donate all profits from foreign governments’ patronage of his hotels and similar businesses during his presidential term to the U.S. Treasury. Historically, when federal officers received a gift or emolument from a foreign state, they surrendered possession of it to the federal government, though they were permitted to retain amounts necessary to offset their business expenses. Although the Constitution does not require the PresidentElect to do the same for profits from his businesses’ fair-market-value transactions, he wants to eliminate any distractions by going beyond what the Constitution requires” (Morgan Lewis, 2017).

gop-2016-trump

That Trump Organization can be run by his family it is acceptable by looking at the trust, but the initial issues with the way it gets done and that he shall not be reported on the way of the trade or business, is hard to believe as the business and family is very connected, hence with the campaign where all of the older kids we’re taking part more or less. Therefore the Vice-Executives of the Trump Organization, his kids are now taking charge and taking his position in his company. That he owns and has controlled over decades. That needs to be clear that the family members cannot tell or say him company secrets as long as he is the Executive of the Republic. If they do than their doing illegal information and destabilizing the interests of the government, why is it so? That is so because the President is the head of the government and has to serve all the citizens, not just the ones that are working in his owned company. That is why the nominees for positions in the Trump Administration have to leave their boardrooms and their former businesses. This is done because they will not have other interests than serving the Republic, if not they should be back in the corporate office instead of being civil servants. If they serve Exxon or other businesses while they are serving as ministers or secretaries of departments, than they are opening up for corrupt and illegal trading from the top and stealing from the bottom. That is what we can worry about when we know how close the President is still connected with his businesses, without a clear line of procedure for how the transactions and creation of future business inside Trump Organization is not known.

The President-Elect have not delivered his IRS Tax Returns, neither proven his real value or what he owns, if it is in Missouri or Mississippi, because for all we know he could own a lobster-shack in Louisiana. Even than he should open the door so he could explain why he hasn’t been through the process of showing his true colours and trade. The real honest profits and the expenditure of his companies, the facts of his royalties and the tax rate on his businesses as well. There are many open questions as to where he does business, what sort of people are he connected with abroad and what sort of agreements does the Trump Organization have and own outside of the United States. If he has a dungeon in St. Petersburg or has a palace in India, we don’t really know, but if he was accountable or transparent. Then we could know what sort of conflicts and interests the President-Elect have. This is the missing picture in a flawed Presidential-Elect who doesn’t’ trust anybody, but himself.

Why does I say that is because he cannot be transparent with his own and therefore why would he be that with the public coffers? Are the public coffers safe when we have no idea about how he used his own private funds? Will the public coffers be used to function and give contracts to businesses close to him or to cronyism in the new Trump Administration? Peace.

Reference:

Investopeida – ‘Blind Trust’ link: http://www.investopedia.com/terms/b/blindtrust.asp

Remarks of Walter M. Shaub, Jr., Director, U.S. Office of Government Ethics, as prepared for delivery at 4:00 p.m. on January 11, 2017, at the Brookings Institution (11.01.2017)

Morgan Lewis – ‘WHITE PAPER Conflicts of Interest and the President Background for President-Elect Trump’s January 11, 2017 Press Conference Prepared by Morgan, Lewis & Bockius LLP’ (11.01.2017)

We Need To Talk About That Donald Trump Press Conference (Youtube-Clip)

From Russia with Love: Leaked intelligence on Trump!

trump-quote-rt

There been a crazy American Presidential Election where the Republican candidate Donald J. Trump won with a massive margin on the Electoral College. Still, there has been Russian connection and Donald Trump has been an ally from the early moment of his campaign. Trump he said the most amazing thing about the Russian autocrat and plutocrat who doesn’t care much about democracy or freedoms for his citizen’s.

Like this: “I have no relationship with him other than he called me a genius. He said Donald trump is a genius and he is going to be the leader of the party and he’s going to be the leader of the world or something,” Trump said, embellishing Putin’s praise” (…) “I’m saying that I’d possibly have a good relationship. He’s been very nice to me,” Trump said. “If we can make a great deal for our country and get along with Russia that would be a tremendous thing. I would love to try it.” (…) “President Trump would be so much better for US-Russian relations. It can’t be worse,” Trump said” (Diamond, 2016).

So I was questioning and wondering why there we’re no leaks from the Republican Party as the DNC leaks was so massive, finally when the Election is over and soon the Swearing-in a bunch of confidential reports on the connection between Trump and Russia surface. This was late and wished we had seen this in August or even September last year so the public could see and listen to how Trump’s past and present connection to Russia is very questionable. These intelligence and reports proves motives and the possible acts of the President-Elect and others who has had questionable link with Russian authorities and central leadership in Kremlin.

Take a look!  

“Former top Russian intelligence officer claim FSB has compromised TRUMP through his activities in Moscow sufficiently to be able to blackmail him. According to several knowledgeable sources, his conduct in Moscow has included perverted sexual acts which have been arranged/monitored by the FSB”  (…) “According to Source D, where s/he had been present, TRUMP’s (perverted) conduct in Moscow included hiring the presidential suite of the Ritz Carlton Hotel, where he knew President and Mrs OBAMA (whom he hated) had stayed on one of their official trips to Russia, and defiling the bed where they had slept by employing a number of prostitutes to perform a ‘golden showers’ (urination) show in front of him. The hotel was known to be under FSB control with microphones and concealed cameras in all the main rooms to record anything they wanted to” (CIR 80, June 2016).

“TRUMP previous efforts had included exploring the real estate sector in St. Petersburg as well as Moscow but in the end TRUMP had had to settle for the use of extensive sexual services there from local prostitutes rather than business success” (CIR 95, 2016).

“According to SECHIN’s associate, the Rosneft President (CEO) had raised with PAGE the issues of future bilateral energy cooperation and prospects for an associated move to lift Ukraine-related western sanctions against Russia. PAGE had reacted positively to this demarche by SECHIN but had been generally non-committal in response” (CIR 094, 2016).

“PUTIN’s priority requirement has been for intelligence on the activities, business and otherwise, in the US leading Russian oligarchs and their families. TRUMP and his associates duly had obtained and supplied Kremlin with is information” (CIR 097, 2016).

“Kremlin engaging with several high profile US players, including STEIN, PAGE and (former DIA director Michael Flynn), and funding their recent visits to Moscow” (…) “IVANOV reported that although the Kremlin had underestimated the strength of US media and liberal reaction to the DNC hack and TRUMP’s links to Russia, a PUTIN was generally satisfied with the progress of the anti-CLINTON operation to date. He recently had a drink with PUTIN to mark this” (CIR 101, 2016).

“The local business/political elite figure reported that TRUMP had paid bribes there to further his interests but very discreetly and only through affiliated companies, making it very hard to prove. The local service industry source reported that TRUMP had participated in sex parties in the city too, but all direct witnesses to this recently had been “silenced” i.e. bribed or coerced to disappear” (…) “The two St. Petersburg figures cited believed an Azeri business figure, Azar AGALAROV (with offices in Baku and London) had been closely involved with TRUMP in Russia and would know most of the details of what the Republican presidential candidate has got up to there” (CIR 113, 2016).

“Substance included offer to large stake in Rosneft in return of lifting sanctions on Russia. PAGE confirms this is TRUMP’s intention” (…) “PAGE has expressed interest and confirmed that were TRUMP elected US President, then sanctions on Russia would be lifted” (CIR 134, 2016).

“On payments, IVANOV’s associate said the operatives involved had been paid by both TRUMP’s team and the Kremlin, thought their orders and ultimate loyalty lay with IVANOV, as head of the PA and thus ultimately responsible for the operation, and his designated successor/s after he was dismissed by the president PUTIN in connection with the anti-CLINTON operation mid-august” (CIR 166, 2016).

donald-trump-blood-wherever-super-169

This here is having massive indications of conspiracy against the coming President, who has been a bit too much praising of the Russian President himself. As well, as he has not been able to cough up his IRS Tax Returns, that could show the business-cooperation and owned real-estate that the Trump Organization could have in St. Petersburg or Moscow. This is believable as Trump has tried to diversify and also spread his business around the world.

Though his proudness of sexual exploits are questionable, but he is also famous for acting as royalty because of his Stardom, therefore together with his many allegation of being indecent together with woman both in his companies and in his life. That is why his chauvinism has been disgraceful during the campaign as the outspoken critics have questioned his vicious ways to the other gender. Certainly he could be the person to do what is in the reports as he liked to watch the “merchandise” during the Miss Universe broadcast and preparation where he just entered the backstage and looked around like nothing while the models where preparing themselves. So that he has the capacity of other sexual and explicit acts wouldn’t be out of character. Though he will always claim differently…

Peace.

Reference:

Company Intelligence Report – 2016/080 – ‘US Presidential Election: Republican Candidate Donald Trump’s Activities in Russia and Compromising Relationship with the Kremlin’  (20.06.2016)

Company Intelligence Report – 2016/095 – ‘Russia/ US Presidential Election: Further Indication of Extensive Conspiracy between Trump’s Campaign Team and the Kremlin’

Company Intelligence Report – 2016/94 – ‘Russia: Secret Kremlin meeting attended by Trump advisor, Carter Page in Moscow (July 2016)

Company Intelligence Report 2016/097 – ‘Russia: US Presidential Election: Kremlin concern that political fallout from DNC E-Mail hacking affair spiralling out of control’ (30.07.2016)

Company Intelligence Report 2016/101 – ‘Russia/US Presidential Election: Senior Kremlin figure outlines evolving Russian tactics in Pro-Trump, Anti-Clinton Operation’ (10.08.2016)

Company Intelligence Report 2016/113 – ‘Russia/US Presidential Election: Republican Candidate Trump’s Prior Activities in St. Petersburg’ (14.09.2016)

Company Intelligence Report 2016/134 – ‘Russia/US Presidential Election: Further Details of Kremlin Liason with Trump Campaign’ (18.102.2016)

Company Intelligence Report 2016/166 – ‘US/Russia: Further details of secret dialogue between Trump Campaign team, KREMLIN and Associated hackers in Prague’ (13.12.2016)

Diamond, Jeremy – ‘Timeline: Donald Trump’s praise for Vladimir Putin’ (29.07.2016) link: http://edition.cnn.com/2016/07/28/politics/donald-trump-vladimir-putin-quotes/

Michael Moore: ‘100 Days of Resistance’ Starts With Inauguration | The Last Word | MSNBC (Youtube-Clip)

CFA Open letter: “Re: Investigation of OneWest Bank, FSB” (06.01.2017)

cfa-mnushin-06-01-2017-p1cfa-mnushin-06-01-2017-p2cfa-mnushin-06-01-2017-p3cfa-mnushin-06-01-2017-p4

Opinion: The new U.S. Intelligence Report following ‘Grizzly Steppe’ as ICA Assessing report reveals little, but the conspiracy and motive is explained!

russian-hack

Today, The Intelligence Community Assessment Report of 6th January 2017 was released, which has been delivered and now is in the public. There we’re already one report out ‘Grizzly Steppe’ of 26th December 2016 that we’re released jointly together Federal Bureau of Investigation (FBI) and  National Cybersecurity & Communications Integration Center (NCCIC) where the key aspect we’re this:

“This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as GRIZZLY STEPPE” (…) “This activity by RIS is part of an ongoing campaign of cyber-enabled operations directed at the U.S. government and its citizens. These cyber operations have included spearphishing campaigns targeting government organizations, critical infrastructure entities, think tanks, universities, political organizations, and corporations leading to the theft of information. In foreign countries, RIS actors conducted damaging and/or disruptive cyber-attacks, including attacks on critical infrastructure networks. In some cases, RIS actors masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack. This JAR provides technical indicators related to many of these operations, recommended mitigations, suggested actions to take in response to the indicators provided, and information on how to report such incidents to the U.S. Government” (Grizzly Steppe, 2016).

With this in mind the newly made report which is 10 pages longer or little more than the Joint Report from FBI & NCCIC in December 2016. Therefore a new report made in January 2017 should have more indications than that one, as it is also given to the President-Elect.

“Moscow’s influence campaign followed a Russian messaging strategy that blends covert intelligence operations—such as cyber activity—with overt efforts by Russian Government agencies, state-funded media, third-party intermediaries, and paid social media users or “trolls.” Russia, like its Soviet predecessor, has a history of conducting covert influence campaigns focused on US presidential elections that have used intelligence officers and agents and press placements to disparage candidates perceived as hostile to the Kremlin” (ICA, P: 7,  2017)

“We assess with high confidence that Russian military intelligence (General Staff Main Intelligence Directorate or GRU) used the Guccifer 2.0 persona and DCLeaks.com to release US victim data obtained in cyber operations publicly and in exclusives to media outlets and relayed material to WikiLeaks” (ICA, P: 8-9, 2016).

“By their nature, Russian influence campaigns are multifaceted and designed to be deniable because they use a mix of agents of influence, cutouts, front organizations, and false-flag operations. Moscow demonstrated this during the Ukraine crisis in 2014, when Russia deployed forces and advisers to eastern Ukraine and denied it publicly” (…) “The General Staff Main Intelligence Directorate (GRU) probably began cyber operations aimed at the US election by March 2016. We assess that the GRU operations resulted in the compromise of the personal e-mail accounts of Democratic Party officials and political figures. By May, the GRU had exfiltrated large volumes of data from the DNC” (ICA, P: 12, 2017).

“We assess with high confidence that the GRU used the Guccifer 2.0 persona, DCLeaks.com, and WikiLeaks to release US victim data obtained in cyber operations publicly and in exclusives to media outlets” (ICA, P: 12-13, 2017).

“Putin’s public views of the disclosures suggest the Kremlin and the intelligence services will continue to consider using cyber-enabled disclosure operations because of their belief that these can accomplish Russian goals relatively easily without significant damage to Russian interests” (ICA, P: 15, 2017).

If the National Intelligence Organizations of United States together says it has been interference, than it more than one chief and one mind behind the investigations. As the reports are piled up with more assessments of the Presidential Election of 2016 and the end-game that we’re in favour of Putin. Since it ended in favour and to the Russia friendly President Candidate, the DNC and now the Security Organizations are blaming the Russian Intelligence Services (RIS) instead we’re now seeing a full blow-out of information and circulated reports made by serious authorities.

These ones doesn’t drop intelligence with ease, they dislike being open to the press and keeps things hidden in the shadow is their business, therefore even smallest drops proves that it isn’t longer conspiracy. Assange of WikiLeaks has claimed it we’re private persons and not Russian Agents giving the documents to WikiLeaks. The public dumping of loads upon loads of DNC e-mails has had to hurt the confidence in Democratic National Committee and the Democratic Party Presidential Nominee Hillary Clinton. Which the releases of E-Mails did with the uncovering of all kind of bad behaviour and the operations behind a Presidential Candidate in the midst of it. Something we have not really seen before and the ability to see how a Presidential Candidate really operates and how the operation has PACs to fuel monies to keep commercial, corporate media and all the other pieces of the puzzles are dancing after a Presidential Candidate in the United States. The best way to learn that is to read the mails and put it in order, to see to how they build organizations to get people elected. Therefore the DNC leak has given lots of knowledge that usually would have been in shadow and not on the sidewalk.

The acts have malicious, but also eye-opening, sure Podesta must hate WikiLeaks, as much as the others like WADA must hate FancyBears. There are others who has dropped intelligence that we’re mentioned, what was strange was that none of the connected to Anonymous or Anonymous who has operated in the United States.

What was weird that in the other one, there we’re clearly indicated operatives and nicknamed hackers mentioned in the December 2016 report, but none in the January 2017. Like they are hidden in the sphere and not known, because they could been more direct about the origin, as the other report isn’t clear about the origin, but the existence of some operatives who has hacked pages. The key of missing information is where the ones who is known is really from and why isn’t that revealed, as it would give more credibility to the report. Because when the direct actors isn’t actually portrayed, but assessed, therefore next time they could reveal more flesh on the bone. There are lose ends to between the bidding and the end-game.

There are motive and there are indicated acts of malice. But what is sure how the DNC documents went online could be more than what these reports are saying. They have not been showing the whole trip of the process of shadowing or even fishing documents of servers. What they have done is showing is the means of what it really took to hack it.

You have a motive, means for a conspiracy and possible outlets for the hacked information, you have some well-known hackers who might have hacked, but their origin is not revealed. Therefore the reports are in the flawed, they are eye-opening, but certain aspects are left in the dark, from the same dark the hackers came from and open the world to how the DNC did their work. Peace.

Reference:

Intelligence Community Assessment – ‘Assessing Russian Activities and Intentions in Recent US Elections’ – ICA 2017-01D | 6 January 2017

NCCIC & FBI ‘TLP White’ – ‘GRIZZLY STEPPE – Russian Malicious Cyber Activity’ (29.12.2016)

Leaked Memo: Show’s Mnuchin’s OneWest foreclosure practices, which was very questionable!

steven-mnuchin

The nominee for becoming Secretary of Treasury, the man who follows legislation and other close connected to business in the United States. Should be worrying how he has done his businesses in the past. The California courts and Attorney General tried in 2013 to create a case on the public filings of the OneWest bank and their Foreclosure practices, which got stifled by the possibility to hide liabilities through certain fixed laws that OneWest used.

OneWest did it to not get scrutiny and the Attorney General tried get them on the docket, but the working paper was the only one showing, together with what was collected from one County in the State of California. Steve Mnuchin knew about this very well, as he got the profits from the acts of malicious and defrauding citizens, using false pretence to buy properties and selling for subsidiaries.

This $2.4 billion figure should not be confused with the $2.3 billion that CIT Group received from the US Government under TARP in 2008. When CIT filed bankruptcy in 2009, the $2.3 billion became a free gift from taxpayers, never to be repaid. Total government subsidy between the two banks is almost $5 billion, yet both banks claim they are prepared to merge and become a Systemically Important Financial Institution if the proposed merger is approved by the Federal Reserve and the Office of the Comptroller of the Currency”(CRC, 2015).

“Since March 2009, OneWest has foreclosed on approximately 35,000 California homes and initiated foreclosures of approximately 45,000 more. In April 2011, OneWest agreed to the Office of Thrift Supervision’s (OTS) entry of a Consent Order. The Order included findings that OneWest recorded documents that were not properly notarized, initiated non-judicial foreclosures without proper authority, failed to devote sufficient resources to ensure proper administration and oversight of its foreclosures process, and failed to sufficiently oversee vendors” (DOJ, P: 4, 2013).

“Finally, in the review of the 300 OneWest loan files obtained from LPS, we found that 21 files evidenced unlawful conduct by OneWest. Those 21 files (7 percent of those reviewed) contained falsely dated instruments executed by OneWest, substitutions of trustee in which OneWest falsely stated that it was beneficiary under an applicable deed of trust when it was not, or both. This unlawful conduct occurred throughout the state, concentrated primarily in Southern California. The 21 files related to homes in the nine following counties: Los Angeles, Orange, Placer, Riverside, San Bernardino, San Diego, San Mateo, Santa Barbara and Ventura” (DOJ, P: 9, 2013).

“The Investigation has uncovered evidence of unlawful credit bidding, a type of misconduct that is not squarely addressed by either the National Mortgage Settlement or the Homeowner’s Bill of Rights. As detailed below, unlawful credit bidding occurs when a party other than the foreclosing beneficiary uses of the credit reflected by the deed of trust to take title to the home, when it is not legally entitled to do so. This means than other bidders at the auction (perhaps in some cases the borrowers and/or their families) are unfairly disadvantaged in the bidding process and that cities and counties throughout the state lost documentary transfer tax revenue” (DOJ, P: 11, 2013).

“OneWest undertook critical steps in the foreclosure process when it lacked the authority to do so. OneWest falsely asserted that its subsidiaries and the trustees for the mortgage-backed securities trusts had authority to conduct critical steps in the foreclosures process when they did not. This misconduct related to three common steps in the foreclosure process, each governed by statute: (1) credit bidding; (2) payment of or claim of exemption from documentary transfer tax; and (3) execution of SOTs” (DOJ, P: 18, 2013).

“To date, we have located five examples of such examples of such misconduct from public records, and we believe that many of the 86 examples of recorded substitutions of trustee (SOTs) executed in OneWest’s name bearing dates prior to date that OneWest began operations are likely to have been executed without authority (the entity purporting to sign them did not exist on the date the assignment purportedly took place). Similarly, in the review of 175 completed OneWest foreclosures in Alameda County, we found 10 unlawful substitutions of trustee” (DOJ, P: 20, 2013).

“In response, we will argue that: (1) it is undisputed that conflict preemption applies after July 2011; and (2) that complaint seeks to hold OneWest accountable for types of misconduct that were outside the scope of OTS’s claimed field preemtion because they involve criminal and civil code statutes which only incidentally affect the lending operations of federal savings associations” (DOJ, P: 23, 2013).

“We recommend that the Attorney General authorize use to file a civil enforcement against OneWest” (DOJ, P:26, 2013).

Complain files:

“OneWest also made false statements concerning its own status as beneficiary, as well as the beneficial status of others. These statements were made in a variety of contexts, including the context of the trustee’s sale bidding process and in the avoidance of transfer taxes” (County of Alameda, P: 4).

onewest-court-2012

This was only what we’re reported by two single reports earlier in the recent years, but there been questioning about the merger for OneWest with another Bank. Therefore the reality of their ways of foreclosure should have stopped and should have been looked into, as the malpractice for a quick profit. The profits of the OneWest bank we’re earned in a very disgraceful way:

“After foreclosing on almost 8,000 homes here in LA County, how can OneWest Bank say with a straight face that they’ve been a good community partner or that this merger is going to somehow help our communities?” Kinlaw said in a statement. “Foreclosing on families meant billions in profits for the billionaire owners of OneWest, but it came at the expense of families who were thrown out of their homes.” (…) “Stein said the coalition is composing a letter that will ask the Consumer Financial Protection Bureau , U.S. Department of Housing and Urban Development and the Department of Justice to conduct a fair housing and fair lending investigation into OneWest’s lending practices” (Smith, 2015).

So there wasn’t only the Attorney General of California who knew there was malpractice and unlawful activity from the OneWest on their practices on the foreclosing of their properties to secure more funds. As they bought into funds with loans and defunct debt that could give the bank property as collateral and resell the properties for more profits, especially if they fixed the contracts and back-dates so the home-owners could be sealed off or resold in subsidiary of the OneWest.

So with the knowledge of these actions, these vulture capitalists shouldn’t be running the Administration. The Administration should make sure these men and woman doesn’t get power. Because their loose, laisses-faire economic regime might loosen the regulations and will lead to more quick profits, but hurt the bottom-line, the public! Trump Administration will favour possible vultures and people who do anything to earn bucks, with no concern of the outcome for the average families and the working-class, the ones that initially got them in power. That the ironic part is the ones that exhausted and gave way for the Administration is the ones that will suffer for the economic programmes from the coming term of presidency.

Steve Mnuchin has only been in business to get wealth, by any means; his business savvy way of OneWest proves the way of use all ways to gain profits. OneWest proves that they didn’t care about how they earned their profits on foreclosures, even if they twisted documents and their ways of buying titles. As long as this is known the vulture of Mnuschin should be known and not be put away in some chamber. Instead it should be questioned if he is fit to be Secretary of Treasury and be a part of the Administration at all! Peace.

2009-03-19-indymac-federal-bank-became-onewest-bank-blank

Reference:

California Reinvestment Coalition (CRC) – ‘Fact Sheet: OneWest Bank Expected to Receive Over $2.4 billion from the FDIC’ (12.04.2015)

State of California Vs OneWest, FSB, Federal Saving Bank and DOES – Complaint for Civil Penalties, Permanent Injunction, and other equitable relief – County of Alameda

Department of Justice – MoU: ‘Executive Summery – Request for Authorization File Action against OneWest Bank, FSB OneWest Investigation (SF2012105513) – 18.01.2013

Smith, Kevin – ‘Coalition seeks investigation of OneWest foreclosures’ (09.05.2015) link: http://www.sgvtribune.com/business/20150609/coalition-seeks-investigation-of-onewest-foreclosures

Read the letter sent by more than 1,100 law professors opposing the nomination of Sen. Jeff Sessions (03.01.2017)

sessions-letter-03-01-2017

“A group of more than 1,100 law school professors from across the country are sending a letter to Congress Tuesday to urge the Senate to reject the nomination of Alabama Republican Senator Jeff Sessions for attorney general. This is the letter they sent”

The Joint Security Report shows how the hacking of Clinton campaign and Democratic Party happen, as the leaks hurts her campaign and interfered with US Presidential Election of 2016!

wikileaks-assange-promises-leaks-on-us-election-google

We all knew that the Democratic Party where under siege during the Election 2016. That can be known by the DC Leaks, WikiLeaks and Guccifer2.0. Then you have FancyBears who dropped knowledge on athletes who we’re allowed to use questionable substances while still being allowed to be competing in world cups and at the Olympics.

President Obama Executive Order of 29.12.2016:

“Section 1. (a) All property and interests in property that are in the United States, that hereafter come within the United States, or that are or hereafter come within the possession or control of any United States person of the following persons are blocked and may not be transferred, paid, exported, withdrawn, or otherwise dealt in: (i) the persons listed in the Annex to this order; (ii) any person determined by the Secretary of the Treasury, in consultation with the Attorney General and the Secretary of State, to be responsible for or complicit in, or to have engaged in, directly or indirectly, cyber-enabled activities originating from, or directed by persons located, in whole or in substantial part, outside the United States that are reasonably likely to result in, or have materially contributed to, a significant threat to the national security, foreign policy, or economic health or financial stability of the United States and that have the purpose or effect of: (A) harming, or otherwise significantly compromising the provision of services by, a computer or network of computers that support one or more entities in a critical infrastructure sector” (Obama, 2016).

We couldn’t know who all dropped knowledge and documents about Hillary Clinton and the Democratic National Party. Even if there we’re indications we couldn’t’ directly know who was behind the documents. That were on the pages that I have mentioned. Me myself has downloaded the hacked document and read through a bunch of e-mails released on WikiLeaks. It had to come from somewhere and somebody else had to hack or to do some whistleblowing this information. So that the public and me could collect and analyse the intelligence that the DNC themselves wanted to keep inside their own chambers.

We could now see how a major American party did their practices of fundraising and party works in general towards an election. Like we have never seen how a campaign manager has worked and travelled, how they have gotten fundraising for a bigger political foundation as the Clinton Foundation as now. That is because of the release of e-mails and documents on a scale we haven’t seen. Before those documents has landed in one pile at one journalist or one paper and they have released piece by piece or a cover story. The WikiLeaks drop of the DNC E-Mails of Podesta was not only interesting, but revealing how the internal works of the Democratic Party works.

Therefore the release of FBI, NCCIC and Department of Homeland Security documents shows how they did this and what technic they used to get into the DNC party or WADA to take out the documents that we’re released during the 2016. This shows the power in going into other people’s and organizations computers and computer systems to gain intelligence… That cannot be spared in the conversation as the knowledge of the DNC and other organization that has intelligence that the public could have interest of knowing.

Clinton Campaign TV

Let’s take a brief look at what the State Security Organizations said now in December and before that in October on the matter!

State Actors:

Most capable, active, and dangerous cyber adversaries

Advanced tradecraft and technical expertise

Indigenously developed exploitation tools

Well resourced

Social engineering (spear phishing), extensive research and target profiling, DDoSattacks” (U.S. Department of Homeland Security, P: 3, 2016).

“This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as GRIZZLY STEPPE” (…) “This activity by RIS is part of an ongoing campaign of cyber-enabled operations directed at the U.S. government and its citizens. These cyber operations have included spearphishing campaigns targeting government organizations, critical infrastructure entities, think tanks, universities, political organizations, and corporations leading to the theft of information. In foreign countries, RIS actors conducted damaging and/or disruptive cyber-attacks, including attacks on critical infrastructure networks. In some cases, RIS actors masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack. This JAR provides technical indicators related to many of these operations, recommended mitigations, suggested actions to take in response to the indicators provided, and information on how to report such incidents to the U.S. Government” (TLP White, P: 1, 2016).

Spearfishing a Political Party:

“Once APT28 and APT29 have access to victims, both groups exfiltrate and analyze information to gain intelligence value. These groups use this information to craft highly targeted spearphishing campaigns. These actors set up operational infrastructure to obfuscate their source infrastructure, host domains and malware for targeting organizations, establish command and control nodes, and harvest credentials and other valuable information from their targets. In summer 2015, an APT29 spearphishing campaign directed emails containing a malicious link to over 1,000 recipients, including multiple U.S. Government victims. APT29 used legitimate domains, to include domains associated with U.S. organizations and educational institutions, to host malware and send spearphishing emails. In the course of that campaign, APT29 successfully compromised a U.S. political party. At least one targeted individual activated links to malware hosted on operational infrastructure of opened attachments containing malware. APT29 delivered malware to the political party’s systems, established persistence, escalated privileges, enumerated active directory accounts, and exfiltrated email from several accounts through encrypted connections back through operational infrastructure” (TLP White, P: 2-3, 2016).

“Phishing and Spearphishing

  • Implement a Sender Policy Framework (SPF) record for your organization’s Domain Name System (DNS) zone file to minimize risks relating to the receipt of spoofed messages.
  • Educate users to be suspicious of unsolicited phone calls, social media interactions, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
  • Do not provide personal information or information about your organization, including its structure or networks, unless you are certain of a person’s authority to have the information.
  • Do not reveal personal or financial information in social media or email, and do not respond to solicitations for this information. This includes following links sent in email.
  • Pay attention to the URL of a website. Malicious websites may look identical to a legitimate site, but the URL often includes a variation in spelling or a different domain than the valid website (e.g., .com vs. .net).
  • If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Do not use contact information provided on a website connected to the request; instead, check previous statements for contact information. Information about known phishing attacks is also available online from groups such as the Anti-Phishing Working Group (http://www.antiphishing.org).
  • Take advantage of anti-phishing features offered by your email client and web browser.
  • Patch all systems for critical vulnerabilities, prioritizing timely patching of software that processes Internet data, such as web browsers, browser plugins, and document readers” (TLP White, P: 13, 2016).

cnn-election-hack

With this all in mind, we can see that the Russians allegedly interfered with one specific technic to gain intelligence from their American counterparts in this perspective the U.S. Democratic National Party. The DNC and their Presidential Candidate Hillary Clinton; so their effort to install and get a more Russian friendly candidate could be effective with release of certain details of her conducts and her history… that no other candidate has ever gotten more scrutiny as Clinton ever done.

We can surely remember the massive overload of e-mails, documents and also internal memo’s that could boggle political interested minds while Trump where harsh critic and also a right-wing migration biased uprising who couldn’t care less about his own moral defects, while addressing Clinton like the worst politician ever. That can be shown in history. These hacks and release of documents we’re surely important when considering how voters could be swayed away from voting the Democratic Party and their Candidate.

They did in the report site very many different hackers who even I know them and know about their works, without knowing their sources or methods of work. I only know of their pages where they drop the documentation and E-Mails, which showed internal facts I could only wish to see in the past. That I couldn’t have made articles and quick-journalism like pieces without! These hackers and these drops of intelligence we’re vital for me to know more about the DNC and Hillary Clinton. Trump told all his lies and deception in public. Clinton kept it cool, while the droppings of documents, memos and e-mails put it all online. She couldn’t hide the facts or the ways of her party since it was all out there!

I have never seen something similar and if it was done by the method told in the report, than the men or woman behind the hack is sophisticated and also smart. They knew how to get the users to lure their Intel and get it into their own servers. This by any means is a quick theft of sensitive information, which weakens the DNC and Clinton in the public eye. The Public Eye and public perception is vital to ever win an election. Peace.

Reference:

U.S. Department of Homeland Security – ‘Cyber Threats to the Homeland’ (October 2016)

NCCIC & FBI ‘TLP White’ – ‘GRIZZLY STEPPE – Russian Malicious Cyber Activity’ (29.12.2016)

Obama, Barrack – Executive Order – ‘TAKING ADDITIONAL STEPS TO ADDRESS THE NATIONAL EMERGENCY WITH RESPECT TO SIGNIFICANT MALICIOUS CYBER-ENABLED ACTIVITIES’ (29.12.2016)

Opinion: 2016, the year fake news became a thing!

iraq-wmd

“A wise man told me don’t argue with fools. Cause people from a distance can’t tell who is who.”

Jay-Z

Not that it is news that it’s has existed fake-news. Fake stories and dubious tales to change the outcome and change the demeanour of a nation to swing them to a cause, if it is war, to annex a state or change internal policies; this been done through propaganda, done through blasting tunes on the radio and spreading ill-will on the air. This is well-known methods to sway public opinion.

You begin with altering the truth, making something unbelievable believable, because of former pattern and also history of certain actors that is known. Just as the American Government under George W. Bush, with Dick Cheney and others used all kind of tricks and foul play to target the regime under Saddam Hussain in Iraq; this done with the lie of massive loads of Weapons of Mass Destruction (WMD), that we’re stockpiled and also imported from various sources even inside Niger and Chad. The Iraqi culprits couldn’t even find the nations on map if their lives depended on it. Still, the people behind spreading this news has walked proud-cock for decades and not asked for their favour to humanity. It isn’t just Tony Blair and George W. Bush who worked for an illegal war, also the men and woman who forced the news of ill-intent in Iraq; which wasn’t true.

“Duelfer portrays the United States as a lumbering superpower whose top policymakers, particularly in the White House and the Defense Department, lacked any basic understanding of Iraq’s history, motives and leaders. But he says Iraq also routinely misread American intentions and overestimated the capability of U.S. intelligence. He says that according to an Iraqi government account, Hussein once asked his top commanders if Iraq had any hidden weapons he didn’t know about” (…) “Duelfer describes numerous requests from senior Iraqi officials to start a dialogue with the United States to improve relations. “Each time I passed on such entreaties to Washington, there was never an answer,” he said. “If nothing else, they were missed opportunities for Washington to gain more knowledge.” (Lynch, 2009).

This is just proof of old history where the media together with government(s) are misleading the citizens to sway them for a war or conflict. As much as this can be countered with facts, the ones that swallow it with feelings will not change opinions with facts. Therefore with the current American election, certain stories has run and been eaten up, while not being true.

“The left has been hysterically pushing a new meme, “fake news.” While ostensibly neutral in practice it is subliminally weaponized as another lame vector — along with attacks on the electoral college and so forth — to undermine the legitimacy of the election of Donald Trump. Love Trump or hate him, he won” (…) “The real “fake news” scandal, of course, lies in the mass hallucination by the mainstream media that Hillary Clinton had a near lock on the general election. The overconfident reports of this reportedly led the Clinton campaign to make some unforced errors which just might (or might not) have cost her the election” (Benko, 2016).

Though other lies during the campaign we’re lizards inside Hillary Clinton’s body, that they had killed a dozen of people and we’re part of grand conspiracy, which apparently is bit funny in hindsight as the Trump Administration is more establishment than ever before, with more businessmen and close tightknit Wall-Street that Clinton was a hired puppet for. So the concern of these reports, the news that we’re created to cater the Trump supporters should be worrying as these conservative news and pages are spread like wildfire.

The third person effect involves more, however, than simply a psychological tendency to assume that others are more easily influenced than oneself; this hypothesis also suggests that people may take significant actions based on these perceptions. It is these actions that ultimately comprise the ‘effect’ brought about by third person perceptions. For this component of the third person hypothesis evidence is again indirect, but suggestive. Some evidence of third person effects is documented in studies of candidate viability. Bartels (1988), for example, suggests that media coverage emphasizing ‘horse race’ aspects of presidential primaries affects perceptions of various candidates’ chances of winning. The perceived viability of candidates in turn influences the attitudes and behaviors of primary voters in choosing among presidential hopefuls. In this case, as in the third person effect, the influence of mass media is brought about indirectly through impersonal impact on how people think others are thinking. The ultimate effect in this case is a vote choice, but other changes in attitudes or behaviors may also result from third person processes. For example, perceptions of viability also have been found to influence reporters’ allotment of news coverage to various candidates (see Goldenberg and Traugott, 1984)” (Muntz, 1989).

This isn’t just pizza-gate, or Bruno Mars dancing on Mars. This is the rational reality that gets naïve men and woman sucked into these stories. They have been spread on Facebook, Twitter and other places to tell our friends and family of the articles from credible sources. Some stories are click-bait to get more people to read on the newspapers and other sites. These are so common that the articles you read after is looking credible, but apparently your scepticism should be true, because when it looks to real and beautiful the deal is fake. The same is also with the well written and articulated stories, that doesn’t have bound with reality and doesn’t seem to be legit.

That people would question this page, I understand, as I am not in writing in my own name. Still, most of the time, I use sources and reports to clarify my own understanding and what sway my opinion. Still, people should scrutinize me too, as much as I pick up wrong sources myself. There are some out there that want to change public opinion and want to bring some people down and get other to rule, or get silence over the acts of evil that is occurring as we speak.

Coler a fake-news writer:

“At any given time, Coler says, he has between 20 and 25 writers. And it was one of them who wrote the story in the “Denver Guardian” that an FBI agent who leaked Clinton emails was killed. Coler says that over 10 days the site got 1.6 million views. He says stories like this work because they fit into existing right-wing conspiracy theories” (…)”The people wanted to hear this,” he says. “So all it took was to write that story. Everything about it was fictional: the town, the people, the sheriff, the FBI guy. And then … our social media guys kind of go out and do a little dropping it throughout Trump groups and Trump forums and boy it spread like wildfire.” (Sydell, 2016).

ht_fake_news_acai_nt_110420_wmain
It’s fake, but looks grand, right?

When you know that these stories hit a certain well-known perspective, a well-known agenda to be spread and to be fitted into believed atmosphere than you know that the Trump supporters would share it and believe it, even if Coler knew it all was just a lie. The lies that we’re to hurt the Clinton Presidential Campaign; this should worry and concern that major parts of the populations are following conspiracies over reality.

“But the incentives to create and distribute fake news are not only financial, and All-Star Macedonia Crying Eagle Number-One News and Views Very Good is not the only kind of fake-news website undermining the media infrastructure necessary for a functioning democracy. Trump’s nominee for national security adviser, a Jack D. Ripper type named Michael Flynn, has a particular fondness for publishing fake news to his Twitter account, as does Trump’s campaign manager, Kellyanne Conaway. Even nominally anti-Trump Republicans like Nebraska senator Ben Sasse have gotten into the fake-news business, entertaining ideas of “paid protesters” on the same day one of the most prolific fabricators of fake news admitted that the most widely shared account of paid protesters was wholly made up” (…) “This is, uhh, extremely weird, at best. Traditional news organizations, to state the obvious, are not built to survive an economy like that. You know who is, though? Politicians. The scary thing about “fake news” isn’t just that it’s financially incentivized by our new platform-gods, it’s that it’s socially and ideologically incentivized by them in ways that can’t be fixed without dismantling their entire operation. And, further, that the people best primed to benefit from “fake news” aren’t Macedonian teenagers hoping to buy guitars but leaders willing to untether themselves from truth in exchange for the powerful organizing capabilities of a passionate online audience” (Read, 2016).

We as citizens should let these fake news being spread on social media, neither on blogs nor on other platforms. The reality is that just like Ponzi-schemes, when it seems too real to be true, it most like is. The same can be said about Fake-News that is to cater one part of the population and to shelf the real ones. The time spent on fake-news should concern the media houses and newspapers as their legitimacy is under question, the main-stream media that has been under attack. It still is, and will be for a while as the people want the spread the fake ones.

The deception, this is the real danger, it is democratic that fake stories spread and that the population are involved in the reason for the existence. As long as facts doesn’t matter and the ignorance is growing of fact-checking is dying, this is a pre-existing state that will not die down, because as long as the clicks and spreading of these fake stories happens. They will continue to write them and spread them, as long as the Republican Establishment uses them and take them as real. The Main-Stream media will discuss it and put it into the spotlight.

We can do what we can and question our use of media houses and of what we find online. We should read with caution and question the sources. We should be critical too it and not take it for granted the articles, the news and that the reports has the time or the effort to look through the feed, the agencies input or even what the editor sees as important.

time-plagarism

Media bias:

“However, it must also be acknowledged that the myth surrounding the existence of perceptible media bias is not without some small modicum of truth. Advocates of the existence of said bias commonly cite a number of professional patterns and standards of conduct historically employed by journalists (though are not exclusive to “liberal” journalists) in an effort to manipulate the depiction and depth of information presented each day to the American public. Such techniques discussed included six main types or styles of biases, including; gatekeeping information (i.e. purposefully selecting ideologically reaffirming stories for syndication), employing partisan source selection, omission of (potentially contradictory) facts, manipulating the degree of attention and calculable time devoted to a given issue, and finally, openly displaying narrative, subjective contempt for objective facts” (Quackenbush, 2013).

With this in mind, the third person effect, also the media bias. Together with this we can see why the effects of distrust to the media, as it itself created. Fake News will continue to flourish as long as the public cater to it and are in disbelief of the corporate media as much as mass media trying to control the belief of the public. Something they have lost control with all the platforms, as they are not just following Fox News, CNBC or the other main-stay TV Station and Radio, reading the one newspaper, but following digital media that can come from whatever source. This shows the current state and the state of the media in our time, as the fake news can be easily spread and change the opinions of the third persons.

These all are factors and we should question our own use of media, how we perceive the news and how we question the facts… we cannot stop the propaganda, neither fake news, we just have to clear the way and show the opposite waves and counter with productive arguments that can show the reality to those that eats into the fake, the not real and not believable news. Peace.  

Reference:

Benko, Ralph – ‘’Clinton Beats Trump’ Is The Real ‘Fake News’ Scandal’ (12.12.2016) link: http://www.forbes.com/sites/ralphbenko/2016/12/12/clinton-beats-trump-is-the-real-fake-news-scandal/#69090a3529e6

Muntz, Diana C. – ‘THE INFLUENCE OF PERCEPTIONS OF MEDIA INFLUENCE: THIRD PERSON EFFECTS AND THE PUBLIC EXPRESSION OF OPINIONS*’ (1989)

Lynch, Colum – ‘Ex-CIA Investigator’s Book Describes Hunt for Weapons in Iraq, Saddam Hussein’s Final Days’ (31.01.2009) link: http://www.washingtonpost.com/wp-dyn/content/article/2009/01/30/AR2009013003430.html

Read, Max – ‘Donald Trump Isn’t Just Benefitting From ‘Fake News’ Websites — He Is One’ (18.11.2016) link: http://nymag.com/selectall/2016/11/trump-doesnt-just-benefit-from-fake-news-sites-he-is-one.html

Sydell, Laura – ‘We Tracked Down A Fake-News Creator In The Suburbs. Here’s What We Learned’ (23.11.2016) link: http://www.npr.org/sections/alltechconsidered/2016/11/23/503146770/npr-finds-the-head-of-a-covert-fake-news-operation-in-the-suburbs

Quackenbush, David – ‘Public Perceptions of Media Bias: A Meta-Analysis of American Media Outlets During the 2012 Presidential Election’ (2013).