Opinion: The new U.S. Intelligence Report following ‘Grizzly Steppe’ as ICA Assessing report reveals little, but the conspiracy and motive is explained!

russian-hack

Today, The Intelligence Community Assessment Report of 6th January 2017 was released, which has been delivered and now is in the public. There we’re already one report out ‘Grizzly Steppe’ of 26th December 2016 that we’re released jointly together Federal Bureau of Investigation (FBI) and  National Cybersecurity & Communications Integration Center (NCCIC) where the key aspect we’re this:

“This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as GRIZZLY STEPPE” (…) “This activity by RIS is part of an ongoing campaign of cyber-enabled operations directed at the U.S. government and its citizens. These cyber operations have included spearphishing campaigns targeting government organizations, critical infrastructure entities, think tanks, universities, political organizations, and corporations leading to the theft of information. In foreign countries, RIS actors conducted damaging and/or disruptive cyber-attacks, including attacks on critical infrastructure networks. In some cases, RIS actors masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack. This JAR provides technical indicators related to many of these operations, recommended mitigations, suggested actions to take in response to the indicators provided, and information on how to report such incidents to the U.S. Government” (Grizzly Steppe, 2016).

With this in mind the newly made report which is 10 pages longer or little more than the Joint Report from FBI & NCCIC in December 2016. Therefore a new report made in January 2017 should have more indications than that one, as it is also given to the President-Elect.

“Moscow’s influence campaign followed a Russian messaging strategy that blends covert intelligence operations—such as cyber activity—with overt efforts by Russian Government agencies, state-funded media, third-party intermediaries, and paid social media users or “trolls.” Russia, like its Soviet predecessor, has a history of conducting covert influence campaigns focused on US presidential elections that have used intelligence officers and agents and press placements to disparage candidates perceived as hostile to the Kremlin” (ICA, P: 7,  2017)

“We assess with high confidence that Russian military intelligence (General Staff Main Intelligence Directorate or GRU) used the Guccifer 2.0 persona and DCLeaks.com to release US victim data obtained in cyber operations publicly and in exclusives to media outlets and relayed material to WikiLeaks” (ICA, P: 8-9, 2016).

“By their nature, Russian influence campaigns are multifaceted and designed to be deniable because they use a mix of agents of influence, cutouts, front organizations, and false-flag operations. Moscow demonstrated this during the Ukraine crisis in 2014, when Russia deployed forces and advisers to eastern Ukraine and denied it publicly” (…) “The General Staff Main Intelligence Directorate (GRU) probably began cyber operations aimed at the US election by March 2016. We assess that the GRU operations resulted in the compromise of the personal e-mail accounts of Democratic Party officials and political figures. By May, the GRU had exfiltrated large volumes of data from the DNC” (ICA, P: 12, 2017).

“We assess with high confidence that the GRU used the Guccifer 2.0 persona, DCLeaks.com, and WikiLeaks to release US victim data obtained in cyber operations publicly and in exclusives to media outlets” (ICA, P: 12-13, 2017).

“Putin’s public views of the disclosures suggest the Kremlin and the intelligence services will continue to consider using cyber-enabled disclosure operations because of their belief that these can accomplish Russian goals relatively easily without significant damage to Russian interests” (ICA, P: 15, 2017).

If the National Intelligence Organizations of United States together says it has been interference, than it more than one chief and one mind behind the investigations. As the reports are piled up with more assessments of the Presidential Election of 2016 and the end-game that we’re in favour of Putin. Since it ended in favour and to the Russia friendly President Candidate, the DNC and now the Security Organizations are blaming the Russian Intelligence Services (RIS) instead we’re now seeing a full blow-out of information and circulated reports made by serious authorities.

These ones doesn’t drop intelligence with ease, they dislike being open to the press and keeps things hidden in the shadow is their business, therefore even smallest drops proves that it isn’t longer conspiracy. Assange of WikiLeaks has claimed it we’re private persons and not Russian Agents giving the documents to WikiLeaks. The public dumping of loads upon loads of DNC e-mails has had to hurt the confidence in Democratic National Committee and the Democratic Party Presidential Nominee Hillary Clinton. Which the releases of E-Mails did with the uncovering of all kind of bad behaviour and the operations behind a Presidential Candidate in the midst of it. Something we have not really seen before and the ability to see how a Presidential Candidate really operates and how the operation has PACs to fuel monies to keep commercial, corporate media and all the other pieces of the puzzles are dancing after a Presidential Candidate in the United States. The best way to learn that is to read the mails and put it in order, to see to how they build organizations to get people elected. Therefore the DNC leak has given lots of knowledge that usually would have been in shadow and not on the sidewalk.

The acts have malicious, but also eye-opening, sure Podesta must hate WikiLeaks, as much as the others like WADA must hate FancyBears. There are others who has dropped intelligence that we’re mentioned, what was strange was that none of the connected to Anonymous or Anonymous who has operated in the United States.

What was weird that in the other one, there we’re clearly indicated operatives and nicknamed hackers mentioned in the December 2016 report, but none in the January 2017. Like they are hidden in the sphere and not known, because they could been more direct about the origin, as the other report isn’t clear about the origin, but the existence of some operatives who has hacked pages. The key of missing information is where the ones who is known is really from and why isn’t that revealed, as it would give more credibility to the report. Because when the direct actors isn’t actually portrayed, but assessed, therefore next time they could reveal more flesh on the bone. There are lose ends to between the bidding and the end-game.

There are motive and there are indicated acts of malice. But what is sure how the DNC documents went online could be more than what these reports are saying. They have not been showing the whole trip of the process of shadowing or even fishing documents of servers. What they have done is showing is the means of what it really took to hack it.

You have a motive, means for a conspiracy and possible outlets for the hacked information, you have some well-known hackers who might have hacked, but their origin is not revealed. Therefore the reports are in the flawed, they are eye-opening, but certain aspects are left in the dark, from the same dark the hackers came from and open the world to how the DNC did their work. Peace.

Reference:

Intelligence Community Assessment – ‘Assessing Russian Activities and Intentions in Recent US Elections’ – ICA 2017-01D | 6 January 2017

NCCIC & FBI ‘TLP White’ – ‘GRIZZLY STEPPE – Russian Malicious Cyber Activity’ (29.12.2016)

Joint Statement on the Passage of Humanitarian Assistance through Sudan to South Sudan (06.01.2017)

WFP South Sudan 2016

The MoU will be extended for another six months, from 1 January to 30 June 2017.

KHARTOUM, Sudan, January 6, 2017 – The Joint Technical Committee (JTC) on Passage of Humanitarian Assistance from Sudan to South Sudan – comprised of representatives of the Governments of South Sudan, Sudan and the United Nations World Food Programme (WFP) – is pleased to announce the extension of the Memorandum of Understanding (MoU) that will allow for the continued movement of food assistance through Sudan to South Sudan.

The MoU will be extended for another six months, from 1 January to 30 June 2017.  The JTC is confident that an extension of the MoU will further contribute to ongoing efforts to prevent hunger among the food-insecure and conflict-affected people in South Sudan, particularly those living in the border state of Upper Nile.

First signed in 2014, the MoU has enabled WFP Sudan to deliver 54,420 metric tons of emergency and nutrition assistance to over 200,000 South Sudanese in Upper Nile state. From January to November 2016, WFP transported 28,626 metric tons of emergency food assistance using 26 convoys through the Sudan corridor.

With this six-month extension, WFP will be able to deliver food to more than 50,000 South Sudanese in food-insecure areas of South Sudan. A portion of the food will be purchased locally in Sudan, supporting Sudanese farmers.

The JTC also commends the close coordination and collaboration between the governments of Sudan and South Sudan at all levels. This has enabled the JTC to set up mechanisms that minimized delays and reduce the time needed to obtain customs clearance.

Leaked Memo: Show’s Mnuchin’s OneWest foreclosure practices, which was very questionable!

steven-mnuchin

The nominee for becoming Secretary of Treasury, the man who follows legislation and other close connected to business in the United States. Should be worrying how he has done his businesses in the past. The California courts and Attorney General tried in 2013 to create a case on the public filings of the OneWest bank and their Foreclosure practices, which got stifled by the possibility to hide liabilities through certain fixed laws that OneWest used.

OneWest did it to not get scrutiny and the Attorney General tried get them on the docket, but the working paper was the only one showing, together with what was collected from one County in the State of California. Steve Mnuchin knew about this very well, as he got the profits from the acts of malicious and defrauding citizens, using false pretence to buy properties and selling for subsidiaries.

This $2.4 billion figure should not be confused with the $2.3 billion that CIT Group received from the US Government under TARP in 2008. When CIT filed bankruptcy in 2009, the $2.3 billion became a free gift from taxpayers, never to be repaid. Total government subsidy between the two banks is almost $5 billion, yet both banks claim they are prepared to merge and become a Systemically Important Financial Institution if the proposed merger is approved by the Federal Reserve and the Office of the Comptroller of the Currency”(CRC, 2015).

“Since March 2009, OneWest has foreclosed on approximately 35,000 California homes and initiated foreclosures of approximately 45,000 more. In April 2011, OneWest agreed to the Office of Thrift Supervision’s (OTS) entry of a Consent Order. The Order included findings that OneWest recorded documents that were not properly notarized, initiated non-judicial foreclosures without proper authority, failed to devote sufficient resources to ensure proper administration and oversight of its foreclosures process, and failed to sufficiently oversee vendors” (DOJ, P: 4, 2013).

“Finally, in the review of the 300 OneWest loan files obtained from LPS, we found that 21 files evidenced unlawful conduct by OneWest. Those 21 files (7 percent of those reviewed) contained falsely dated instruments executed by OneWest, substitutions of trustee in which OneWest falsely stated that it was beneficiary under an applicable deed of trust when it was not, or both. This unlawful conduct occurred throughout the state, concentrated primarily in Southern California. The 21 files related to homes in the nine following counties: Los Angeles, Orange, Placer, Riverside, San Bernardino, San Diego, San Mateo, Santa Barbara and Ventura” (DOJ, P: 9, 2013).

“The Investigation has uncovered evidence of unlawful credit bidding, a type of misconduct that is not squarely addressed by either the National Mortgage Settlement or the Homeowner’s Bill of Rights. As detailed below, unlawful credit bidding occurs when a party other than the foreclosing beneficiary uses of the credit reflected by the deed of trust to take title to the home, when it is not legally entitled to do so. This means than other bidders at the auction (perhaps in some cases the borrowers and/or their families) are unfairly disadvantaged in the bidding process and that cities and counties throughout the state lost documentary transfer tax revenue” (DOJ, P: 11, 2013).

“OneWest undertook critical steps in the foreclosure process when it lacked the authority to do so. OneWest falsely asserted that its subsidiaries and the trustees for the mortgage-backed securities trusts had authority to conduct critical steps in the foreclosures process when they did not. This misconduct related to three common steps in the foreclosure process, each governed by statute: (1) credit bidding; (2) payment of or claim of exemption from documentary transfer tax; and (3) execution of SOTs” (DOJ, P: 18, 2013).

“To date, we have located five examples of such examples of such misconduct from public records, and we believe that many of the 86 examples of recorded substitutions of trustee (SOTs) executed in OneWest’s name bearing dates prior to date that OneWest began operations are likely to have been executed without authority (the entity purporting to sign them did not exist on the date the assignment purportedly took place). Similarly, in the review of 175 completed OneWest foreclosures in Alameda County, we found 10 unlawful substitutions of trustee” (DOJ, P: 20, 2013).

“In response, we will argue that: (1) it is undisputed that conflict preemption applies after July 2011; and (2) that complaint seeks to hold OneWest accountable for types of misconduct that were outside the scope of OTS’s claimed field preemtion because they involve criminal and civil code statutes which only incidentally affect the lending operations of federal savings associations” (DOJ, P: 23, 2013).

“We recommend that the Attorney General authorize use to file a civil enforcement against OneWest” (DOJ, P:26, 2013).

Complain files:

“OneWest also made false statements concerning its own status as beneficiary, as well as the beneficial status of others. These statements were made in a variety of contexts, including the context of the trustee’s sale bidding process and in the avoidance of transfer taxes” (County of Alameda, P: 4).

onewest-court-2012

This was only what we’re reported by two single reports earlier in the recent years, but there been questioning about the merger for OneWest with another Bank. Therefore the reality of their ways of foreclosure should have stopped and should have been looked into, as the malpractice for a quick profit. The profits of the OneWest bank we’re earned in a very disgraceful way:

“After foreclosing on almost 8,000 homes here in LA County, how can OneWest Bank say with a straight face that they’ve been a good community partner or that this merger is going to somehow help our communities?” Kinlaw said in a statement. “Foreclosing on families meant billions in profits for the billionaire owners of OneWest, but it came at the expense of families who were thrown out of their homes.” (…) “Stein said the coalition is composing a letter that will ask the Consumer Financial Protection Bureau , U.S. Department of Housing and Urban Development and the Department of Justice to conduct a fair housing and fair lending investigation into OneWest’s lending practices” (Smith, 2015).

So there wasn’t only the Attorney General of California who knew there was malpractice and unlawful activity from the OneWest on their practices on the foreclosing of their properties to secure more funds. As they bought into funds with loans and defunct debt that could give the bank property as collateral and resell the properties for more profits, especially if they fixed the contracts and back-dates so the home-owners could be sealed off or resold in subsidiary of the OneWest.

So with the knowledge of these actions, these vulture capitalists shouldn’t be running the Administration. The Administration should make sure these men and woman doesn’t get power. Because their loose, laisses-faire economic regime might loosen the regulations and will lead to more quick profits, but hurt the bottom-line, the public! Trump Administration will favour possible vultures and people who do anything to earn bucks, with no concern of the outcome for the average families and the working-class, the ones that initially got them in power. That the ironic part is the ones that exhausted and gave way for the Administration is the ones that will suffer for the economic programmes from the coming term of presidency.

Steve Mnuchin has only been in business to get wealth, by any means; his business savvy way of OneWest proves the way of use all ways to gain profits. OneWest proves that they didn’t care about how they earned their profits on foreclosures, even if they twisted documents and their ways of buying titles. As long as this is known the vulture of Mnuschin should be known and not be put away in some chamber. Instead it should be questioned if he is fit to be Secretary of Treasury and be a part of the Administration at all! Peace.

2009-03-19-indymac-federal-bank-became-onewest-bank-blank

Reference:

California Reinvestment Coalition (CRC) – ‘Fact Sheet: OneWest Bank Expected to Receive Over $2.4 billion from the FDIC’ (12.04.2015)

State of California Vs OneWest, FSB, Federal Saving Bank and DOES – Complaint for Civil Penalties, Permanent Injunction, and other equitable relief – County of Alameda

Department of Justice – MoU: ‘Executive Summery – Request for Authorization File Action against OneWest Bank, FSB OneWest Investigation (SF2012105513) – 18.01.2013

Smith, Kevin – ‘Coalition seeks investigation of OneWest foreclosures’ (09.05.2015) link: http://www.sgvtribune.com/business/20150609/coalition-seeks-investigation-of-onewest-foreclosures

UNSOM: Somalia’s electoral process most discussed topic in public places (04.01.2017)

somali-election

MOGADISHU, SOMALIA – Somalia’s landmark electoral process has dominated discussions in public places across the Horn of Africa country over the past few months, as Somalis examine the democratic progress the country has made after years of civil war.

Scores of political analysts gather daily to debate and share views about the ongoing process, which will culminate in presidential elections later this month. Conversations are animated and go on for hours, with breaks only for meals or refreshments.

At a popular hotel in Mogadishu recently, newly elected member of the House of the People, Sadik Warfa, of Puntland state, expressed his thoughts on the electoral process to a group of colleagues.

Warfa described the delegates system, adopted by the National Leadership Forum to guide the electoral process, as an illustration of the country’s evolution towards representative governance.

“We have passed the era when elders picked MPs. I see it as a step in the right direction for the Somali people,” Warfa said.

The MP voiced his optimism about the post election period and looks forward to debate in parliament.

“When the House of the People holds its first sitting, the priority will be to hold the government accountable. It should have oversight responsibility to represent the views of the Somali people, ” Warfa told a keen audience, gathered around his table.

At another table, Liban Abdi Ali, a political analyst and former journalist, delved deeper into the issue of local media coverage of the electoral process.

“In my view, they (media) were focusing on conflict, like a candidate’s clan, which group he belongs to and such issues; although they are supposed to focus on each candidate’s experience, knowledge, achievements and political agenda,” Liban said.

He expressed disappointment at the media’s inability to organize political debates prior to the elections.

At the far end of the restaurant, author and political analyst Abukar Sheikh Ahmed questions the decision to push back universal suffrage until 2020, saying there was no public voting or campaign.

“Most of the candidates knew their target (delegates) and they were campaigning in parliament and within their clans,” Abukar argues.

Somalia’s electoral process, which is currently in its final stages, has seen voting taking place in five federal states and Mogadishu. At the conclusion of the electoral exercise, two hundred and seventy five members of the House of the People will have been elected from South West, Puntland, Galmudug, Hirshabelle, Jubbaland and Somaliland states; and Banaadir region.

A further 54 members of the Upper House will also have been elected.

Read the letter sent by more than 1,100 law professors opposing the nomination of Sen. Jeff Sessions (03.01.2017)

sessions-letter-03-01-2017

“A group of more than 1,100 law school professors from across the country are sending a letter to Congress Tuesday to urge the Senate to reject the nomination of Alabama Republican Senator Jeff Sessions for attorney general. This is the letter they sent”

U.S. History: Franklin Roosevelt’s Statement on Signing the Social Security Act (14.08.1935)

san-diego-union-newspaper-0815-1935-roosevelt-social-security-act

Today a hope of many years’ standing is in large part fulfilled. The civilization of the past hundred years, with its startling industrial changes, has tended more and more to make life insecure. Young people have come to wonder what would be their lot when they came to old age. The man with a job has wondered how long the job would last.

This social security measure gives at least some protection to thirty millions of our citizens who will reap direct benefits through unemployment compensation, through old-age pensions and through increased services for the protection of children and the prevention of ill health.

We can never insure one hundred percent of the population against one hundred percent of the hazards and vicissitudes of life, but we have tried to frame a law which will give some measure of protection to the average citizen and to his family against the loss of a job and against poverty-ridden old age.

This law, too, represents a cornerstone in a structure which is being built but is by no means complete. It is a structure intended to lessen the force of possible future depressions. It will act as a protection to future Administrations against the necessity of going deeply into debt to furnish relief to the needy. The law will flatten out the peaks and valleys of deflation and of inflation. It is, in short, a law that will take care of human needs and at the same time provide for the United States an economic structure of vastly greater soundness.

I congratulate all of you ladies and gentlemen, all of you in the Congress, in the executive departments and all of you who come from private life, and I thank you for your splendid efforts in behalf of this sound, needed and patriotic legislation.

If the Senate and the House of Representatives in this long and arduous session had done nothing more than pass this Bill, the session would be regarded as historic for all time.

Rediscovery #: 08445 Job A1 10-126 Fed Reg
Rediscovery #: 08445
Job A1 10-126 Fed Reg
Rediscovery #: 08445 Job A1 10-126 Fed Reg
Rediscovery #: 08445
Job A1 10-126 Fed Reg

The Joint Security Report shows how the hacking of Clinton campaign and Democratic Party happen, as the leaks hurts her campaign and interfered with US Presidential Election of 2016!

wikileaks-assange-promises-leaks-on-us-election-google

We all knew that the Democratic Party where under siege during the Election 2016. That can be known by the DC Leaks, WikiLeaks and Guccifer2.0. Then you have FancyBears who dropped knowledge on athletes who we’re allowed to use questionable substances while still being allowed to be competing in world cups and at the Olympics.

President Obama Executive Order of 29.12.2016:

“Section 1. (a) All property and interests in property that are in the United States, that hereafter come within the United States, or that are or hereafter come within the possession or control of any United States person of the following persons are blocked and may not be transferred, paid, exported, withdrawn, or otherwise dealt in: (i) the persons listed in the Annex to this order; (ii) any person determined by the Secretary of the Treasury, in consultation with the Attorney General and the Secretary of State, to be responsible for or complicit in, or to have engaged in, directly or indirectly, cyber-enabled activities originating from, or directed by persons located, in whole or in substantial part, outside the United States that are reasonably likely to result in, or have materially contributed to, a significant threat to the national security, foreign policy, or economic health or financial stability of the United States and that have the purpose or effect of: (A) harming, or otherwise significantly compromising the provision of services by, a computer or network of computers that support one or more entities in a critical infrastructure sector” (Obama, 2016).

We couldn’t know who all dropped knowledge and documents about Hillary Clinton and the Democratic National Party. Even if there we’re indications we couldn’t’ directly know who was behind the documents. That were on the pages that I have mentioned. Me myself has downloaded the hacked document and read through a bunch of e-mails released on WikiLeaks. It had to come from somewhere and somebody else had to hack or to do some whistleblowing this information. So that the public and me could collect and analyse the intelligence that the DNC themselves wanted to keep inside their own chambers.

We could now see how a major American party did their practices of fundraising and party works in general towards an election. Like we have never seen how a campaign manager has worked and travelled, how they have gotten fundraising for a bigger political foundation as the Clinton Foundation as now. That is because of the release of e-mails and documents on a scale we haven’t seen. Before those documents has landed in one pile at one journalist or one paper and they have released piece by piece or a cover story. The WikiLeaks drop of the DNC E-Mails of Podesta was not only interesting, but revealing how the internal works of the Democratic Party works.

Therefore the release of FBI, NCCIC and Department of Homeland Security documents shows how they did this and what technic they used to get into the DNC party or WADA to take out the documents that we’re released during the 2016. This shows the power in going into other people’s and organizations computers and computer systems to gain intelligence… That cannot be spared in the conversation as the knowledge of the DNC and other organization that has intelligence that the public could have interest of knowing.

Clinton Campaign TV

Let’s take a brief look at what the State Security Organizations said now in December and before that in October on the matter!

State Actors:

Most capable, active, and dangerous cyber adversaries

Advanced tradecraft and technical expertise

Indigenously developed exploitation tools

Well resourced

Social engineering (spear phishing), extensive research and target profiling, DDoSattacks” (U.S. Department of Homeland Security, P: 3, 2016).

“This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as GRIZZLY STEPPE” (…) “This activity by RIS is part of an ongoing campaign of cyber-enabled operations directed at the U.S. government and its citizens. These cyber operations have included spearphishing campaigns targeting government organizations, critical infrastructure entities, think tanks, universities, political organizations, and corporations leading to the theft of information. In foreign countries, RIS actors conducted damaging and/or disruptive cyber-attacks, including attacks on critical infrastructure networks. In some cases, RIS actors masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack. This JAR provides technical indicators related to many of these operations, recommended mitigations, suggested actions to take in response to the indicators provided, and information on how to report such incidents to the U.S. Government” (TLP White, P: 1, 2016).

Spearfishing a Political Party:

“Once APT28 and APT29 have access to victims, both groups exfiltrate and analyze information to gain intelligence value. These groups use this information to craft highly targeted spearphishing campaigns. These actors set up operational infrastructure to obfuscate their source infrastructure, host domains and malware for targeting organizations, establish command and control nodes, and harvest credentials and other valuable information from their targets. In summer 2015, an APT29 spearphishing campaign directed emails containing a malicious link to over 1,000 recipients, including multiple U.S. Government victims. APT29 used legitimate domains, to include domains associated with U.S. organizations and educational institutions, to host malware and send spearphishing emails. In the course of that campaign, APT29 successfully compromised a U.S. political party. At least one targeted individual activated links to malware hosted on operational infrastructure of opened attachments containing malware. APT29 delivered malware to the political party’s systems, established persistence, escalated privileges, enumerated active directory accounts, and exfiltrated email from several accounts through encrypted connections back through operational infrastructure” (TLP White, P: 2-3, 2016).

“Phishing and Spearphishing

  • Implement a Sender Policy Framework (SPF) record for your organization’s Domain Name System (DNS) zone file to minimize risks relating to the receipt of spoofed messages.
  • Educate users to be suspicious of unsolicited phone calls, social media interactions, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
  • Do not provide personal information or information about your organization, including its structure or networks, unless you are certain of a person’s authority to have the information.
  • Do not reveal personal or financial information in social media or email, and do not respond to solicitations for this information. This includes following links sent in email.
  • Pay attention to the URL of a website. Malicious websites may look identical to a legitimate site, but the URL often includes a variation in spelling or a different domain than the valid website (e.g., .com vs. .net).
  • If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Do not use contact information provided on a website connected to the request; instead, check previous statements for contact information. Information about known phishing attacks is also available online from groups such as the Anti-Phishing Working Group (http://www.antiphishing.org).
  • Take advantage of anti-phishing features offered by your email client and web browser.
  • Patch all systems for critical vulnerabilities, prioritizing timely patching of software that processes Internet data, such as web browsers, browser plugins, and document readers” (TLP White, P: 13, 2016).

cnn-election-hack

With this all in mind, we can see that the Russians allegedly interfered with one specific technic to gain intelligence from their American counterparts in this perspective the U.S. Democratic National Party. The DNC and their Presidential Candidate Hillary Clinton; so their effort to install and get a more Russian friendly candidate could be effective with release of certain details of her conducts and her history… that no other candidate has ever gotten more scrutiny as Clinton ever done.

We can surely remember the massive overload of e-mails, documents and also internal memo’s that could boggle political interested minds while Trump where harsh critic and also a right-wing migration biased uprising who couldn’t care less about his own moral defects, while addressing Clinton like the worst politician ever. That can be shown in history. These hacks and release of documents we’re surely important when considering how voters could be swayed away from voting the Democratic Party and their Candidate.

They did in the report site very many different hackers who even I know them and know about their works, without knowing their sources or methods of work. I only know of their pages where they drop the documentation and E-Mails, which showed internal facts I could only wish to see in the past. That I couldn’t have made articles and quick-journalism like pieces without! These hackers and these drops of intelligence we’re vital for me to know more about the DNC and Hillary Clinton. Trump told all his lies and deception in public. Clinton kept it cool, while the droppings of documents, memos and e-mails put it all online. She couldn’t hide the facts or the ways of her party since it was all out there!

I have never seen something similar and if it was done by the method told in the report, than the men or woman behind the hack is sophisticated and also smart. They knew how to get the users to lure their Intel and get it into their own servers. This by any means is a quick theft of sensitive information, which weakens the DNC and Clinton in the public eye. The Public Eye and public perception is vital to ever win an election. Peace.

Reference:

U.S. Department of Homeland Security – ‘Cyber Threats to the Homeland’ (October 2016)

NCCIC & FBI ‘TLP White’ – ‘GRIZZLY STEPPE – Russian Malicious Cyber Activity’ (29.12.2016)

Obama, Barrack – Executive Order – ‘TAKING ADDITIONAL STEPS TO ADDRESS THE NATIONAL EMERGENCY WITH RESPECT TO SIGNIFICANT MALICIOUS CYBER-ENABLED ACTIVITIES’ (29.12.2016)

Statement attributable to the Spokesman for the Secretary-General on Somalia (29.12.2016)

somali-election-2

NEW YORK, United States of America, December 29, 2016 –  The Secretary-General welcomes the inauguration of the new Federal Parliament of Somalia on 27 December 2016 and warmly congratulates the people of Somalia on this historic achievement in their quest for universal suffrage by 2020.

The Secretary-General urges the new Parliament to now maintain the momentum by moving swiftly to complete the electoral process, with the election of the Speakers of both houses and the Federal President. The Parliament should tackle urgent legislative priorities, including establishing a permanent Constitution of Somalia, in the larger interest of the people of Somalia.

The Secretary-General calls on the authorities to fill all remaining vacant seats in the Parliament expeditiously, while fulfilling their obligation to ensure that the seats reserved for women are filled by women. He emphasizes that any irregularity, abuse, or malpractice reported by the federal and state electoral bodies should be fully addressed to preserve the credibility of the process.

The Secretary-General commends the hard work of the Somali security forces and the AU Mission in Somalia (AMISOM) in providing a secure environment for the 2016 electoral process in Mogadishu and in the regional capitals. The successful inauguration of the Parliament marks further progress in ensuring political stability and security in Somalia.

Somalia: International Community Gravely Concerned Over Decisions Of National Leadership Forum On Electoral Process (27.12.2016)

somali-election-2

The United Nations, African Union, European Union, Inter-Governmental Authority on Development, Belgium, Italy, the Netherlands, Sweden, the United Kingdom and the United States are gravely concerned over a number of decisions announced by the National Leadership Forum (NLF) in its communiqué dated 24 December 2016.

Today’s inauguration of the Federal Parliament represents a step forward in the electoral process. However, international partners wish to see the electoral process go forward with the existing 54 seats in the Upper House as stipulated under Somalia’s Provisional Constitution. Any further expansion of the Upper House should only be contemplated after the presidential vote has been held in the new federal parliament and implemented through a proper constitutional process.

International partners acknowledge the NLF’s communiqué of 26 December 2016 that designates five seats in the House of the People for undergoing a fresh round of voting. But this fails to address a number of other egregious cases of abuse of the electoral process, including seats reserved for women candidates only that were ultimately taken by male candidates.

The NLF’s decision to revoke all disqualifications of candidates made by the country’s electoral bodies for allegedly committing abuses and malpractices represents a blanket amnesty for some of the most blatant irregularities witnessed during this electoral process. It also contravenes the Federal Government’s solemn commitment to respect the rule of law.

If these candidates are allowed to take their seats in Somalia’s tenth parliament, it will bring into question the NLF’s expressed commitment to the principles of accountability and credibility that underpin the entire process. It will also undermine the electoral code of conduct signed by all parliamentary candidates in the spirit of leveling the playing field and ensuring the delivery of a credible process.

International partners strongly believe that elections must be re-run for seats where the voting outcomes were clearly distorted by violence, corruption, intimidation, the unauthorized substitution of electoral college delegates and a failure to set aside one of every three seats for exclusively female candidates. 

International partners call on the federal parliament to issue as soon as possible a timeline for the completion of the process in order to elect the Speakers and Deputy Speakers of the new federal parliament and the Federal President. This timeline should be strictly enforced to avoid yet another postponement in an electoral process that was supposed to have finished earlier this year. There is a particular need to conclude the process swiftly in light of the UN Security Council’s upcoming meeting on Somalia that is scheduled for 19 January 2017.

International partners believe that the integrity of the 2016 electoral process hangs in the balance. More delays and a failure to hold accountable those parties who have committed serious abuses and malpractices will compromise the international community’s ability and willingness to engage with Somalia’s next federal government.

Somalia: Joint Press Statement issued by 6 strong presidential candidates against the constitutional coup by NLF (27.12.2016)

somalia-27-12-2016-p1somalia-27-12-2016-p2