11:06 AM 10/26/2017 – The Recruitables: Why Trump’s Team Was Easy Prey for Putin – Politico

Share this article
  •  
  • 1
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
    1
    Share

Saved Stories – Trump Investigations

Saved Stories – Trump Investigations
Donald Trump: Stephen Colbert Imagines The Outcome Had Obama Given Press Conferences Like Trump
roger stone – Google News: Trump ally Roger Stone denies collusion with Russia – TRT World
Donald Trump: Seth Meyers Slams GOP For Being Engulfed In A Civil War Of Its Own Making
2016 elections and mental health – Google News: The Identity-Politics Death Grip – National Review
2016 elections anxiety – Google News: The Identity-Politics Death Grip – National Review
Trump and the Mob – Google News: Catherine Rampell: Donald Trump, our first millennial president – Chippewa Herald
Trump FBI file – Google News: FOX NEWS FIRST: Ex-FBI informant cleared to testify about Obama-era uranium Russia deal; Law broken in Clinton … – Fox News
trump authoritarianism – Google News: America’s military won’t save us from Trump’s fascism – Salon
1. Trump Circles: Elections from mikenova (16 sites): felix sater – Google News: The Recruitables: Why Trump’s Team Was Easy Prey for Putin – Politico
felix sater – Google News: The Recruitables: Why Trump’s Team Was Easy Prey for Putin – Politico
trump and intelligence community – Google News: Trump taps JFK files to distract from the file Mueller is building – The Olympian
Donald Trump – Google News: Donald Trump, Fats Domino, Houston Astros: Your Thursday Briefing – New York Times
Senate Committee Escalates Russia Probe, Digs Into Finances Of Nearly 40 Individuals And Businesses – BuzzFeed News
roger stone – Google News: Trips to Mexico City, plots to kill Castro: What the JFK records are likely to reveal – New York Daily News
calls for Comey’s resignation – Google News: Who Knew Trump Would Be a Weak President? – New Republic
trump and intelligence community – Google News: A Chance to Control Domestic Spying – New Republic
trump russian candidate – Google News: The Trump wing of the GOP is winning battles. But will it lose the war to keep the Senate in Republican hands? – Los Angeles Times
Russian Facebook ads made no difference in the election – Standard-Examiner
Trump Investigations Report: 6:51 AM 10/26/2017 Russia is pushing to control cyberspace. We should all be worried. The Washington Post
Lawfare – Hard National Security Choices: Getting Encryption onto the Front Burner
Trump’s and Putin’s connections with organized crime – Google News: Fights in Russia: Putin’s Acolytes Are Determined to Crush Navalny’s Opposition, One Activist at a Time – Newsweek
trump russian candidate – Google News: Orange County is turning blue. Can Dana Rohrabacher survive his chumminess with Trump? – Los Angeles Times
Trump Investigations Report: 7:04 AM 10/26/2017 Who is Bill Browder? by Seth Hettena
Russian Intelligence services – Google News: America Asleep at the Keyboard as Cyber Warfare Gets Real – Freepress Online

 

Saved Stories – Trump Investigations
Donald Trump: Stephen Colbert Imagines The Outcome Had Obama Given Press Conferences Like Trump

“Remember when Barack Obama would go on TV to brag about being able to read a name off a chart?”

 Donald Trump

roger stone – Google News: Trump ally Roger Stone denies collusion with Russia – TRT World
 

Trump ally Roger Stone denies collusion with Russia
TRT World
Republican political consultant Roger Stone, a longtime ally of President Donald Trump, flatly denied allegations of collusion between the president’s associates and Russia during the 2016 US election in a meeting with lawmakers on Tuesday. In a 47and more »

 roger stone – Google News

Donald Trump: Seth Meyers Slams GOP For Being Engulfed In A Civil War Of Its Own Making

The late-night host called out Republican senators for failing to take concrete actions to stop President Trump.

 Donald Trump

2016 elections and mental health – Google News: The Identity-Politics Death Grip – National Review
 


National Review
The Identity-Politics Death Grip
National Review
Last June, despite being outspent by nearly $10 million, Republican Karen Handel won Georgia’s sixth congressional district in a special election to fill the vacancy left when Tom Price became secretary of Health and Human Services (a position from and more »

 2016 elections and mental health – Google News

2016 elections anxiety – Google News: The Identity-Politics Death Grip – National Review
 


National Review
The Identity-Politics Death Grip
National Review
The voting map of the 2016 election, with its vast expanse of Trump-supporting counties, suggests how pervasive this anxietyis. Once, the Democrats were the party of the middle class, attentive to how it might be lifted up or at least, kept from and more »

 2016 elections anxiety – Google News

Trump and the Mob – Google News: Catherine Rampell: Donald Trump, our first millennial president – Chippewa Herald
 


Chippewa Herald
Catherine Rampell: Donald Trump, our first millennial president
Chippewa Herald
During the presidential campaign Trump encouraged mob violence against critics, and pledged to open up our libel laws against journalists covering him. Since taking office, he has attempted to use government power to turn the entire country into his …and more »

 Trump and the Mob – Google News

Trump FBI file – Google News: FOX NEWS FIRST: Ex-FBI informant cleared to testify about Obama-era uranium Russia deal; Law broken in Clinton … – Fox News
 


Fox News
FOX NEWS FIRST: Ex-FBI informant cleared to testify about Obama-era uranium Russia deal; Law broken in Clinton …
Fox News
WHAT’S INSIDE JFK FILES? The classified files on the assassination of former President John F. Kennedy will be released today, President Trump announced on Twitter … The move to release the government documents on the 1963 assassination could …
DOJ gives FBI informant green light to testify on Russian uranium effortsCNNall 460 news articles »

 Trump FBI file – Google News

trump authoritarianism – Google News: America’s military won’t save us from Trump’s fascism – Salon
 


Salon
America’s military won’t save us from Trump’s fascism
Salon
According to a new survey from the Military Times, it appears that despite Donald Trump’s disdain for American democracy and his embrace of authoritarian and fascist principles, he enjoys a high amount of support among the country’s enlisted ranks:.

and more »

 trump authoritarianism – Google News

1. Trump Circles: Elections from mikenova (16 sites): Putin Trump – Google News: The Recruitables: Why Trump’s Team Was Easy Prey for Putin – Politico
 


Politico
The Recruitables: Why Trump’s Team Was Easy Prey for Putin
Politico
By now, it should be clear to anyone following the news that Russian intelligence made a formidable effort to approach theTrump campaign and assess the potential to manipulate its members. As a former officer of the CIA’s Directorate of Operations, I  

 Putin Trump – Google News

 1. Trump Circles: Elections from mikenova (16 sites)

1. Trump Circles: Elections from mikenova (16 sites): felix sater – Google News: The Recruitables: Why Trump’s Team Was Easy Prey for Putin – Politico
 


Politico
The Recruitables: Why Trump’s Team Was Easy Prey for Putin
Politico
He tries to create the impression of someone who is extremely well-connected and very busy, a source who had worked withSater told Ioffe. Sater made a few forays into Moscow business circles, but could never convert and was unable to win the trust  

 felix sater – Google News

 1. Trump Circles: Elections from mikenova (16 sites)

felix sater – Google News: The Recruitables: Why Trump’s Team Was Easy Prey for Putin – Politico
 


Politico
The Recruitables: Why Trump’s Team Was Easy Prey for Putin
Politico
He tries to create the impression of someone who is extremely well-connected and very busy, a source who had worked withSater told Ioffe. Sater made a few forays into Moscow business circles, but could never convert and was unable to win the trust  

 felix sater – Google News

trump and intelligence community – Google News: Trump taps JFK files to distract from the file Mueller is building – The Olympian
 

Trump taps JFK files to distract from the file Mueller is building
The Olympian
Releasing these files allows President Trump yet again to distract the nation from his inability to govern effectively. Further, it gives him another shot at undermining an American intelligence community he deeply distrusts by exposing CIA and FBI and more »

 trump and intelligence community – Google News

Donald Trump – Google News: Donald Trump, Fats Domino, Houston Astros: Your Thursday Briefing – New York Times
 


New York Times
Donald Trump, Fats Domino, Houston Astros: Your Thursday Briefing
New York Times
Our chief White House correspondent, Peter Baker, reports: This past summer, the Trump administration debated lowering the annual cap on refugees admitted to the United States. Should it stay at 110,000, be cut to 50,000 or fall somewhere in between?and more »

 Donald Trump – Google News

Senate Committee Escalates Russia Probe, Digs Into Finances Of Nearly 40 Individuals And Businesses – BuzzFeed News
 


BuzzFeed News
Senate Committee Escalates Russia Probe, Digs Into Finances Of Nearly 40 Individuals And Businesses
BuzzFeed News
A congressional committee investigating Russia’s interference in the 2016 presidential election has stepped up its probe over the past month, requesting that an agency that combats financial crime turn over confidential banking information on nearly 40 …and more »

roger stone – Google News: Trips to Mexico City, plots to kill Castro: What the JFK records are likely to reveal – New York Daily News
 


New York Daily News
Trips to Mexico City, plots to kill Castro: What the JFK records are likely to reveal
New York Daily News
Roger Stone, the longtime political adviser, told the Washington Examiner this week he convinced Trump to release the documents. Stone, who isn’t known to be related to Oliver Stone, once authored a book alleging Lyndon Johnson had Kennedy killed so …
What JFK assassination documents tell us about 1960s MiamiTampabay.com
On JFK documents, Trump squeezed over disclosureABC News
The JFK Files: More Than 50 Years of Questions, ConspiraciesVoice of America
Washington Post –CNN –The Week Magazine –Twitter
all 148 news articles »

 roger stone – Google News

calls for Comey’s resignation – Google News: Who Knew Trump Would Be a Weak President? – New Republic
 


New Republic
Who Knew Trump Would Be a Weak President?
New Republic
At his rallies, presidential candidate Donald Trump excited his most avid supporters through displays of toughness: his callswhen a demonstrator acted up to get him out of here; his incantations of his reality show signature You’re fired; his and more »

 calls for Comey’s resignation – Google News

trump and intelligence community – Google News: A Chance to Control Domestic Spying – New Republic
 


VICE News
A Chance to Control Domestic Spying
New Republic
In his first year in office, Donald Trump has achieved the seemingly impossible: By variously criticizing Barack Obama’s surveillance practices and promising to ramp up his own, he has managed to galvanize a bipartisan movement in Congress to curb the 
Senators want to reform a surveillance law before Trump renews itVICE News
Bipartisan Coalition Introduces USA RIGHTS Act to Reform Secretive Warrantless Spy Program | Press Releases | U.S. …Senator Ron Wyden
Senate Intelligence Committee Draft 702 Reauthorization Bill – LawfareLawfareall 89 news articles »

 trump and intelligence community – Google News

trump russian candidate – Google News: The Trump wing of the GOP is winning battles. But will it lose the war to keep the Senate in Republican hands? – Los Angeles Times
 


Los Angeles Times
The Trump wing of the GOP is winning battles. But will it lose the war to keep the Senate in Republican hands?
Los Angeles Times
Sen. Jeff Flake’s surprise decision against seeking reelection marked a major victory for Stephen K. Bannon and his pirate band of Republicans. But the larger question Wednesday was whether the insurgency will cost the GOP its thin majority on Capitol 
The unfair criticism that Sen. Flake’s anti-Trumpism speech was too little, too lateWashington Post
Flake drops out of Senate race, torches Trump in speechThe Hill
The liberal-left divide reshaping American politicsThe Guardianall 4,085 news articles »

 trump russian candidate – Google News

Russian Facebook ads made no difference in the election – Standard-Examiner
 


OregonLive.com
Russian Facebook ads made no difference in the election
Standard-Examiner
The Trump campaign spent around $90 million on digital in 2016. Hillary Clinton employed a … If the Russians are going to decide our elections on social media, one assumes it will require at least a little originality. One suspicion has been that the 
Lowry: US democracy not for sale to RussiaBoston Herald
Rich Lowry: The Facebook farceOregonLive.comall 16 news articles »

Trump Investigations Report: 6:51 AM 10/26/2017 Russia is pushing to control cyberspace. We should all be worried. The Washington Post

10.26.17 Russia-NATO Council To Discuss Ukraine, Afghanistan Report: Putin’s ‘Inner Circle’ Worth Nearly $24 Billion Reagan’s Son: Donald Trump Is A ‘Danger To The World’ And Must Be Removed | HuffPost Why Clinton Camp’s Funding of the Trump Dossier Matters – Bloomberg Julian Assange Says WikiLeaks Rejected Request From Trump-Linked Firm | HuffPost Donald Trump … Continue reading“6:51 AM 10/26/2017 – Russia is pushing to control cyberspace. We should all be worried. – The Washington Post” Trump Investigations Report
Lawfare – Hard National Security Choices: Getting Encryption onto the Front Burner

Im happy to be wrong, but I dont expect the Deputy Attorney Generals recent speech to spark productive engagement in the standoff over encryption. Federal, state and local authorities will keep highlighting their increasing inability to obtain critical data (in motion and at rest) by means of legal process and will try to demonstrate the critical public safety price they (meaning we) pay for warrant-proof platforms. Tech firms, for their part, will continue to focus on customer and shareholder value, which is both completely natural and consistent with widespread libertarian preferences in that sector. Recent calls for a congressional commissionusually a tactic for kicking a can down the roadappear to have receded. Apparently a decision has been made that this can will kick itself.In the meantime, the range of data and communications inaccessible to law enforcement and other regulators without the cooperation of customers and users will increase by leaps and bounds. We are fast moving from a world in which both the platform provider and the customer could access data to one where only the customer can. Its not just that Apple moved from an iPhone operating system that allowed the company to retrieve data from the device to one for which only the customer has the key, or that end-to-end encrypted messaging platforms like WhatsApp have become common. Its also the steady move to customer-controlled cloud encryption. Smartphone and user data that used to be backed up to cloudreducing, though not eliminating enforcers need to access the devicewill still be in cloud, but with access controlled by the consumer. The corporate data previously stored on company owned and controlled services, and thereafter moved to the cloud, will continue to reside these, but cloud providers will soon disable themselves from accessing it, even during computation.

We are thus moving to a world in which customers and users of all stripes become the exclusive gatekeepers of their own data and communications. For a range of customers and users, this state of affairs may not impede the many public safety and regulatory projects we rely on government to pursue. When presented with a warrant or other appropriate legal process, many firms and individuals will comply. Investigators, particularly in white collar investigations, frequently use subpoenae rather than search warrants, working through lawyers and firms and trusting that those on whom they serve process will comply. But when pursuing not just terrorism, violent crime, and child exploitation cases, but also many white collar ones, law enforcers justifiably lack this trust, and regularly fear the obstruction that ensues when a data request tips a target off, or some combination of partial compliance and deletion.

In an effort to avoid refighting the Crypto Wars, and recognizing the value of innovation and the problem with top-down mandates, Rosenstein, like former FBI Director James Comey, took pains not to demand any particular solution, looking only for some key management technique or other arrangement that the government could require the provider to draw on. Such access already exists when a providers business model requires a product to have itfor, say, key recovery (for devices), content scanning, or updatesand the Justice Department wants this to occur even absent that business model.

Perhaps because neither this White House nor Congress is ready to do anything, the DAG didnt quite call for legislation or regulation. Indeed, he quickly limited his proposal only to mass-market consumer devices and services that enable warrant-proof encryption by default and was pretty vague about how even those platforms would be addressed. He doubtless hopes that this move will spark some sort of voluntary compliance by industrythe specific consideration of public safety and other social costs.

If history is any guide, however, only actual legislative or regulatory proposals will spark constructive engagement. Signals from the Obama White House that the private sector took as meaning legislation was off the table helped ensure that nothing happened during the past administration. But one has only to look to the story of the Symphony messaging platform to see the effect of credible threats. When, soon after the prosecution of several banks for a foreign exchange bid-rigging conspiracy accomplished through chatroom conversations, a consortium of several large financial institutions started their own platform that touted end-to-end encryption and “guaranteed data deletion, New York States Department of Financial Services used its considerable regulatory power to intervene and demand that Symphony retain message data for seven years and that individual banks agreed to store decryption keys for the messages with independent custodians. They agreed, and Symphony flourishes, backed by a number of investors, including Google.

As my colleague Steve Bellovin regularly reminds me, crypto is hard, and any efforts to engineer access in the public interest might well add cybersecurity risks beyond those facedand rarely eliminatedby firms trying to engineer systems for their own purposes. Yet I would expect firms to build and deliver only those products their engineers tell them can be made securely and within the context of their own processes. And I question why we should normalize the risks firms take as they roll out products to serve their customers while problematizing those they would face if they were required to take social costs into account. Proofs of concepts for addressing the engineering challenges are beginning to circulate, and need to be carefully considered, even if they are not perceived as singular or complete solutions to these complex challenges.

The systems design challenges are even greater because of the international dimensions of any voluntary or compelled regime of exceptional access. Regulating devices sold around the world alone would be hard enough, as we need to consider the competitive disadvantage a U.S. mandate would place on firms. But at least obtaining data from a device with lawful process can be limited to the jurisdiction with control of that device. This is why, although the deputy attorney general lumped access to stored data on devices with access to in-flight encrypted real-time communications and messaging, progress (legislative or otherwise) may require dealing with the two on separate tracks. For no such restrictive principle can easily organize which jurisdiction has access to data in motion or data in a delocalized cloud.

Yet the international dimensions of the challenge are actually a reason for engagement, not forbearance. Consider the current state of play: Chinas encryption policy has been inexorably movingtoward mandated government access. To be sure, we dont look to China to set normative standards for balancing privacy and cybersecurity with public safety and other asserted public interests. But tech firms have been increasingly ready to accommodate Chinas sovereign demands, and there is no reason to expect that forbearance by the U.S. will be matched by forbearance by the Chinese Government, which has not been looking to the U.S. for guidance on cyberpolicy. And its not just China that is demanding full access to the data use and traffic of its citizens. Nor just Russia. In the United Kingdom, the Investigatory Powers Act allows the government to serve technical capability notices to obtain plaintext. Proposals for exceptional access legislation seem to be moving forward in Canada, Australia and New Zealand. Germany and France have asked for EU legislation. To be sure, the impact of this legislative wave cant yet be discerned, and the extent to which firms will actually be forced to engineer a solution to allow them access customer data, regardless of their current architecture, remains unclear. But trend is there, and one or more of these nations are surely an incident or two away from that.

Its a mistake to paint increasing governmental regulatory demands as simply the product of the security state. In liberal democracies, they are efforts to protect liberal values. Just as jurisdictions impose data protection rules on data flows to advance the autonomy of citizens, so will they seek access to data as means of denying impunity to individuals and entities that seek to exercise illegitimate power. Each countryliberal or illiberalwill have its own demands. Its hard to imagine what the result of these possibly conflicting demands will be. And customer and shareholder pressure from one country may force a vendor to change its operations in another. But the problem cannot be wished away.

Nor can the problem be fairly denied by pointing to some golden age of surveillancemetadata, IoT and GPS data and the likethat the government can use instead of content. The deputy attorney general did a nice job highlighting how content matters, both to exclude and include people from suspicion. Perhaps if non-content data comes to dominate the available evidence, juries will still regularly convict. But thats hardly a future to embrace.

Then there are those who think governmental hacking can substitute for a regime of authorized access. Its certainly true that on both the intelligence and the criminal investigation sides, the government will indeed work to identify and exploit vulnerabilities. But these methods cannot always be counted on. And those who would make them the primary recourse for federal, state and local authorities seeking to investigate criminal activity need to consider the implications of that approach.

A private market for hacking already exists. Do we want it to swell with the demands of federal, state and local authorities? Do we want a world in which an engineer (working for a company or open source) creates vulnerabilities that he can turn around and sell? We already face the risk of government hacking tools escaping. How much greater is the risk when the market expands? Moreover, if forced to rely on vulnerability exploitation, law enforcement cannot be expected to tolerate the disclosure of each tooldeveloped or boughtwhenever they bring a prosecution using its fruits. Authorities would justifiably push for a law-enforcement-sensitive version of CIPA, leaving defense lawyers to complain about their inability to fully litigate chain of custody and evidence integrity issues.

Larger issues of the governments relationships with others loom. We need more threat information sharing between government and industry, not less. But a world in which intelligence and criminal agencies need regularly to rely on vulnerability exploitation only increases the cost of sharing. Even now, one can question calls to move the Vulnerabilities Equities Process out of the White Housewhich can internalize all government intereststo Homeland Security, whose cybersecurity mission aligns it more closely to companies. Forcing law enforcers of all stripes to rely on hackingnot just to access data from the less popular platforms but from the ones that Americans most commonly usewould surely galvanize intelligence and law enforcement agencies even more against the move.

Then there is the governments relationship with its citizens. Even those troubled by the range of investigatory powers provided to law enforcement should prefer that the powers are clearly enumerated and understood so that we have full transparency on how those powers are exercised. We should not backtrack on the long road from black bag jobs and informal data sharing to Title III surveillance warrants and other formalized investigative processes. Citizens need to know the rules and, to the greatest extent possible, be able to determine compliance with them. A world in which hacking and its accompanying opacity becomes the rule, not the exception, for obtaining encrypted data takes a large step away from that goal, at a time when we can least afford further erosion of trust in government processes at all levels.

Any legislative proposals relating to encryption made in wake of a terrorist attack or other heinous crime will surely be condemned as product of moral panic. But in the US, at least, moral panics are often simply the way long-overdue policies get enacted. We only overreact or underreact, and rarely get it right. Lets try before the panic.

 Lawfare – Hard National Security Choices

Trump’s and Putin’s connections with organized crime – Google News: Fights in Russia: Putin’s Acolytes Are Determined to Crush Navalny’s Opposition, One Activist at a Time – Newsweek
 


Newsweek
Fights in Russia: Putin’s Acolytes Are Determined to Crush Navalny’s Opposition, One Activist at a Time
Newsweek
Skripnichenko’s death is part of a surge in politically motivated violence ahead of next March’s presidential elections, in which President Vladimir Putin is expected to seek a new six-year term. Tensions have … Riot police detain demonstrators and more »

 Trump’s and Putin’s connections with organized crime – Google News

trump russian candidate – Google News: Orange County is turning blue. Can Dana Rohrabacher survive his chumminess with Trump? – Los Angeles Times
 


Los Angeles Times
Orange County is turning blue. Can Dana Rohrabacher survive his chumminess with Trump?
Los Angeles Times
Candidate Trump rejected the sunny, libertarian-inflected conservatism of Ronald Reagan and steered the Republican Party toward a vulgar, anti-immigrant, anti-free-market populism. The approach helped get him into the White House. … A longtime 

 trump russian candidate – Google News

Trump Investigations Report: 7:04 AM 10/26/2017 Who is Bill Browder? by Seth Hettena

Who is Bill Browder? (Updated) Thursday October 26th, 2017 at 6:58 AM TrumP Россия 1 Share Bill Browder This much is clear: Vladimir Putin hates Bill Browder. Browder was once the largest foreign investor in Russia and, it needs to be said, a great admirer of the Russian president. Today, he is perhaps the Putins regimes fiercest critic, and … Continue reading“7:04 AM 10/26/2017 – Who is Bill Browder? – by Seth Hettena” Trump Investigations Report
Russian Intelligence services – Google News: America Asleep at the Keyboard as Cyber Warfare Gets Real – Freepress Online
 


Freepress Online
America Asleep at the Keyboard as Cyber Warfare Gets Real
Freepress Online
In 2015, shortly after Fancy Bear was unleashed and started roaming around the DNC network, the hack was detected by the allied intelligence service monitoring Russian cyberespionage. They alerted U.S. intelligence, and the intel made its way to the and more »

 Russian Intelligence services – Google News


Share this article
  •  
  • 1
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
    1
    Share
  •  
    1
    Share
  • 1
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •