04/19/19

Preezy Candidates Gillibrand and Buttigieg, What?

By: Denise Simon | Founders Code

We already know about Bernie Sanders praising Fidel Castro and the communist takeover of Nicaragua. Yet, he still seems to appeal to the millennial class while enjoying their campaign contributions. This demonstrates the failure of the education system for decades. Okay, so how about Kirsten Gillibrand and Pete Buttigieg?

Sen. Kirsten Gillibrand: “If We Are Not Helping People, We ...

Gillibrand: 

BuzzFeed reported Tuesday that the New York senator will endorse a new report recommending steps to reduce the racial wealth divide, including policies such as a commission to study slavery reparations.

“A draft of the report, titled ‘Ten Solutions to Bridge the Racial Wealth Divide,’ will be jointly released this week by the Institute for Policy Studies, the Kirwan Institute for the Study of Race and Ethnicity, and the National Community Reinvestment Coalition,” they report. Gillibrand told BuzzFeed News that she was “proud” to support the document.

One of the organizations Gillibrand is “proud” to partner with, the Institute for Policy Studies (IPS), was infamous during the Cold War for its defense of Communist governments and for its kneejerk support of the Soviet line.

Emory Professor and preeminent historian of American Communism Harvey Klehr dedicated an entire chapter of his book “Far Left of Center” to the IPS, which he characterized as “an intellectual nerve center for the radical movement, providing sustenance and support for a variety of causes, ranging from nuclear and anti-intervention issues to support for Marxist insurgencies.”

“IPS fellows have consistently maintained that the Soviet threat is largely non-existent and a product of the military-industrial complex,” he wrote. Klehr detailed how IPS fellows’ partnered with Soviet-funded “peace” organizations, defended USSR and Vietnam from charges of human rights abuses, defended the Sandinistas and other Latin-American terrorists, and denied the existence of the Cambodian genocide, even as two million people died.

Former Communist spy and defector Ladislav Bittman likewise wrote in his seminal book “The KGB and Soviet Disinformation” that the Soviets were “particularly interested” in IPS, whose “nucleus” was composed of “researchers and scholars with Marxist perceptions that Soviet foreign and military policies pose no threat to Western democracies.” More here.

Swell, eh? Okay how about lil’ ole’ Pete Buttigieg?

Peter Buttigieg emerges as Democratic 'rock star ...

Well, he was groomed politically by his father, a Marxist. Yep…

Buttigieg:  

The father of Democratic presidential hopeful Pete Buttigieg was a Marxist professor who spoke fondly of the Communist Manifesto and dedicated a significant portion of his academic career to the work of Italian Communist Party founder Antonio Gramsci, an associate of Vladimir Lenin.

Joseph Buttigieg, who died in January at the age of 71, immigrated to the U.S. in the 1970s from Malta and in 1980 joined the University of Notre Dame faculty, where he taught modern European literature and literary theory. He supported an updated version of Marxism that jettisoned some of Marx and Engel’s more doctrinaire theories, though he was undoubtedly Marxist.

He was an adviser to Rethinking Marxism, an academic journal that published articles “that seek to discuss, elaborate, and/or extend Marxian theory,” and a member of the editorial collective of Boundary 2, a journal of postmodern theory, literature, and culture. He spoke at many Rethinking Marxism conferences and other gatherings of prominent Marxists.

In a 2000 paper for Rethinking Marxism critical of the approach of Human Rights Watch, Buttigieg, along with two other authors, refers to “the Marxist project to which we subscribe.”

In 1998, he wrote in an article for the Chronicle of Higher Education about an event in New York City celebrating the 150th anniversary of the Manifesto. He also participated in the event.

“If The Communist Manifesto was meant to liberate the proletariat, the Manifesto itself in recent years needed liberating from Marxism’s narrow post-Cold War orthodoxies and exclusive cadres. It has been freed,” he wrote. More here.

So, now you have a head start on 3 of the candidates for President. How about choosing to do a few others and see what you will find. Here is a tip, Kamala Harris’ father, Donald, a Professor Emeritus of Economics at Stanford straddles between socialism and Marxism himself.

04/19/19

Anyone Fretting over the Real Russian Hacking from the Mueller Report?

By: Denise Simon | Founders Code

Remember the timeline, it was the Comey FBI, the Brennan CIA, the Lynch Department of Justice and the Obama White House. So, Obama only expelled a pile of Russians and closed 3 dachas. Remember? When the dust settles just a little, President Trump has some work to do to clean up this hacking mess via Russia. Congress has some work to do also by defining some kind of hacking legislation.

The Mueller Report’s conclusions about Russian operations are unambiguous: the GRU’s Unit 26165 did the hacking, and the Internet Research Agency managed the influence campaign. The Report also concluded that the GRU’s Unit 74455 retailed the results of the doxing through its subsidiaries DCLeaks and Guccifer 2.0, and through a sympathetic WikiLeaks.

What is Unit 26165, Russia's elite military hacking centre?
Boris Zilberman on Twitter: "DOJ indictment against the ...

At one point, the Russians used servers located in the U.S. to carry out the massive data exfiltration effort, the report confirms.

Much of the information was previously learned from the indictment of Viktor Borisovich Netyksho, the Russian officer in charge of Unit 26165. Netyksho is believed to be still at large in Russia.

The operatives working for the Russian intelligence directorate, the GRU, sent dozens of targeted spearphishing emails in just five days to the work and personal accounts of Clinton Campaign employees and volunteers, as a way to break into the campaign’s computer systems.

The GRU hackers also gained access to the email account of John Podesta, Clinton’s campaign chairman, of which its contents were later published.

Using credentials they stole along the way, the hackers broke into the networks of the Democratic Congressional Campaign Committee days later. By stealing the login details of a system administrator who had “unrestricted access” to the network, the hackers broke into 29 computers in the ensuing weeks, and more than 30 computers on the DNC.

The operatives, known collectively as “Fancy Bear,” comprised several units tasked with specific operations. Mueller formally blamed Unit 26165, a division of the GRU specializing in targeting government and political organizations, for taking on the “primary responsibility for hacking the DCCC and DNC, as well as email accounts of individuals affiliated with the Clinton Campaign,” said the Mueller report.

The hackers used Mimikatz, a hacking tool used once an intruder is already in a target network, to collect credentials, and two other kinds of malware: X-Agent for taking screenshots and logging keystrokes, and X-Tunnel used to exfiltrate massive amounts of data from the network to servers controlled by the GRU. Mueller’s report found that Unit 26165 used several “middle servers” to act as a buffer between the hacked networks and the GRU’s main operations. Those servers, Mueller said, were hosted in Arizona — likely as a way to obfuscate where the attackers were located but also to avoid suspicion or detection.

In all, some 70 gigabytes of data were exfiltrated from Clinton’s campaign servers and some 300 gigabytes of data were obtained from the DNC’s network.

Meanwhile, another GRU hacking unit, Unit 74455, which helped disseminate and publish hacked and stolen documents, pushed the stolen data out through two fictitious personas. DCLeaks was a website that hosted the hacked material, while Guccifer 2.0 was a hacker-like figure who had a social presence and would engage with reporters.

Under pressure from the U.S. government, the two GRU-backed personas were shut down by the social media companies. Later, tens of thousands of hacked files were funneled to and distributed by WikiLeaks .

Mueller’s report also found a cause-and-effect between Trump’s remarks in July 2016 and subsequent cyberattacks.

“I hope you’re able to find the 30,000 emails that are missing,” said then-candidate Trump at a press conference, referring to emails Clinton stored on a personal email server while she headed the State Department. Mueller’s report said “within approximately five hours” of those remarks, GRU officers began targeting for the first time Clinton’s personal office.

More than a dozen staffers were targeted by Unit 26165, including a senior aide. “It is unclear how the GRU was able to identify these email accounts, which were not public,” said Mueller.

Mueller said the Trump campaign made efforts to “find the deleted Clinton emails.” Trump is said to have privately asked would-be national security advisor Michael Flynn, since convicted following inquiries by the Special Counsel’s office, to reach out to associates to obtain the emails. One of those associates was Peter Smith, who died by suicide in May 2017, who claimed to be in contact with Russian hackers — claims which Mueller said were not true.

Does that implicate the Trump campaign in an illegal act? Likely not.

“Under applicable law, publication of these types of materials would not be criminal unless the publisher also participated in the underlying hacking conspiracy,” according to Elie Honig, a CNN legal analyst. “The special counsel’s report did not find that any person associated with the Trump campaign illegally participated in the dissemination of the materials.”

04/18/19

Title III vs. Cuba for Cuban Exiles, About Time

By: Denise Simon | Founders Code

There is a provision of the Cuban trade embargo that no U.S. president has ever used. President Trump has decided to be the first, according to White House officials. But it’s far from clear if it will do much to dislodge the island’s communist government.

It’s called Title III. It allows Americans – in this case mostly Cuban-Americans – to use U.S. federal courts to sue foreign companies that do business in Cuba on property taken from them by the Castro revolution.

Conservative Cuban exiles insist President Trump’s activation of Title III (part of the 1996 Helms-Burton Act that tightened the U.S. trade embargo against Cuba) will have a chilling effect on foreign investment in Cuba – particularly for European and Canadian companies. That, they insist, will undermine the island’s economically failing regime.

Continue reading
04/18/19

N. Korea Test Fires Tactical Weapon

By: Denise Simon | Founders Code

(Reuters) – Satellite images from last week show movement at North Korea’s main nuclear site that could be associated with the reprocessing of radioactive material into bomb fuel, a U.S. think tank said on Tuesday. The U.S. State Department declined to comment on intelligence matters, but a source familiar with U.S. government assessments said that while U.S. experts thought the movements could possibly be related to reprocessing, they were doubtful it was significant nuclear activity.

***

SEOUL, April 18 (Yonhap) — North Korean leader Kim Jong-un has supervised a test-firing of a new tactical guided weapon, calling its development an “event of very weighty significance” in beefing up its military power, state media reported Thursday.

The Korean Central News Agency said the test happened Wednesday but did not specify what the newly developed weapon was. It was the first time since November the North’s leader has overseen a weapons testing.

Continue reading
04/15/19

Hackers Breach FBI Websites

By: Denise Simon | Founders Code

Hacked material included names, addresses, job descriptions, and the email addresses of at least 3 FBI owned websites. Apparently, the hackers have been working this mission since 2014.

FBI data leaked

See complete details here.

A hacker group has breached several FBI-affiliated websites and uploaded their contents to the web, including dozens of files containing the personal information of thousands of federal agents and law enforcement officers, TechCrunch has learned.

The hackers breached three sites associated with the FBI National Academy Association, a coalition of different chapters across the U.S. promoting federal and law enforcement leadership and training located at the FBI training academy in Quantico, VA. The hackers exploited flaws on at least three of the organization’s chapter websites — which we’re not naming — and downloaded the contents of each web server.

The hackers then put the data up for download on their own website, which we’re also not naming nor linking to given the sensitivity of the data.

The spreadsheets contained about 4,000 unique records after duplicates were removed, including member names, a mix of personal and government email addresses, job titles, phone numbers and their postal addresses. The FBINAA could not be reached for comment outside of business hours. If we hear back, we’ll update.

TechCrunch spoke to one of the hackers, who didn’t identify his or her name, through an encrypted chat late Friday.

“We hacked more than 1,000 sites,” said the hacker. “Now we are structuring all the data, and soon they will be sold. I think something else will publish from the list of hacked government sites.” We asked if the hacker was worried that the files they put up for download would put federal agents and law enforcement at risk. “Probably, yes,” the hacker said.

The hacker claimed to have “over a million data” [sic] on employees across several U.S. federal agencies and public service organizations.

It’s not uncommon for data to be stolen and sold in hacker forums and in marketplaces on the dark web, but the hackers said they would offer the data for free to show that they had something “interesting.”

Unprompted, the hacker sent a link to another FBINAA chapter website they claimed to have hacked. When we opened the page in a Tor browser session, the website had been defaced — prominently displaying a screenshot of the encrypted chat moments earlier.

The hacker — one of more than ten, they said — used public exploits, indicating that many of the websites they hit weren’t up-to-date and had outdated plugins.

In the encrypted chat, the hacker also provided evidence of other breached websites, including a subdomain belonging to manufacturing giant Foxconn. One of the links provided did not need a username or a password but revealed the back-end to a Lotus-based webmail system containing thousands of employee records, including email addresses and phone numbers.

Their end goal: “Experience and money,” the hacker said.

04/15/19

Former Head of Venezuela’s Military Intelligence Arrested in Spain

By: Denise Simon | Founders Code

Spain seems to always be a ‘go-to’ destination for criminals. Anyone remember the Clintons’ old buddy Marc Rich, he fled to Marbella, Spain. International gangsters love Spain too, including the Russian mafia. As a sidebar, ever really wonder about that unique friendship of the Obama’s with King Juan Carlos Varela or the many Obama vacations there including just last year? Anyway… conflating perhaps…

***

The US Justice Department, which originally unsealed the charges in 2014, has requested Hugo Carvajal’s extradition.

Noticiero Digital

Mr. Carvajal was a close ally of the country’s late socialist leader Hugo Chavez, but in February denounced his successor President Nicolás Maduro.

Known as El Pollo (The Chicken), Mr. Carvajal was a leading figure in Venezuelan politics for decades.

Continue reading
04/12/19

You Afraid of Cryptocurrency?

By: Denise Simon | Founders Code

It is a new term for alternative tangibles or intangibles of value but they have been around for centuries. Perhaps we are just fearing the unknown or rogue/fraudulent activities in instruments of value and the volatility of that value. Okay, that part is a good thing for sure. But give competition what it deserves, a chance.

What is cryptocurrency?

John Berlau did an exceptional job with this summary and after having an extended chat with Mr. Berlau, there is more to come on the topic. Meanwhile, enjoy his synopsis. Your comments are invited.

Cryptocurrency and the SEC’s Limitless Power Grab

Why Speculative Consumer Goods Are Not “Securities”

Many questions are being asked about cryptocurrency. Is it a major innovation that will improve standards of living in ways we cannot yet imagine? Or is it a trendy phenomenon that will result in a speculative bubble of volatile assets? The answer to these questions may be: both of the above. New technologies have often produced bubbles that result in large disruptive busts. But after the bubble has burst and the dust has settled, the benefits of the innovation survive and lead to new, unforeseen benefits.

Continue reading
04/12/19

Is China an Adversary of the United States?

By: Denise Simon | Founders Code

Yes, and frankly, we should completely reconsider any trade agreements in total with China. The whole launch of a harmonious relationship between the United States and China established by President Nixon in 1972 is not today’s condition. China is hostile to not only the United States but to any country frankly for the sake of money, China needs it by any and all means possible.

Exclusive: Secret NSA Map Shows China Cyber Attacks on U.S ...

China is using ‘debt traps’ effectively to financially punk foreign governments to gain power, influence, and assets.

  • China is working to influence media outlets beyond its borders in an effort to impose its ideology and deter criticism of its actions, a press freedom group said. In a report released Monday, Reporters Without Borders detailed what it said was China’s impact on a global decline in press freedom and analyzed President Xi Jinping’s strategy to control information outside his own country. The group found that Beijing was using advertising buys, paid-trips for journalists and an expanding global propaganda network to impose its “ideologically correct” terminology and to obscure darker chapters of the country’s history.
  • Huawei has been a theft and spy operation for decades. A major concern and consequence is a renewed U.S. campaign to pressure and persuade America’s allies to keep Huawei technology and equipment out of the next generation of wireless networks, known as 5G. The stakes in this campaign are much bigger than U.S. market share or the effectiveness of Iran sanctions. If Huawei’s chips and routers find their way into this new network, everything from digital privacy to intellectual property could be at risk.
  • Chinese employees stole corporate secrets from Dutch semiconductor equipment maker ASML, resulting in hundreds of millions of dollars in losses, Dutch financial newspaper Financieele Dagblad (FD) reported on Thursday. The paper said, citing its own investigation, technology had been stolen by high-level Chinese employees in the research and development department of ASML’s U.S. subsidiary and ultimately leaked to a company linked to the Chinese government.
  • That Chinese worker employed by that farm in Iowa is likely a spy, performing agricultural/intellectual property theft.
  • China has and continues to infect the American education system. It is called the Confucius Institute. It ranges from Kindergarten to graduate school. China has already spent $200 million USD on this effort. So, the Senate held a hearing. Legislation? Still waiting.
  • U.S. government contractors hired by China to be a hacker, perform espionage or to steal technology. Examples are herehere and here.
Continue reading
04/11/19

Genesis of U.S. Immigration Crisis

By: Denise Simon | Founders Code

Well, we can for sure say that the Democrats side with the Communists, Marxists and Revolutionaries.

Hat tip to Glenn Beck and my buddy Ami Horowitz for the great foot work and investigations to determine where this illegal insurgency is really coming from. Beck pulled out his chalkboard again and his presentation is a good one.

So, while these Democrats are not students of history and while others have very short memories, there is a long history pertaining to all of this immigration crisis. You see, a few years ago, I read a book titled From the Shadows, written by former CIA Director Robert Gates. Gates was also the Secretary of Defense as part of his long government service resume. He wrote that book in 1996. A particular page stayed in my memory and I did a search in my Book Nook today to find it.

Continue reading
04/10/19

Trolls and Anti-Vaccinations Operations

By: Denise Simon | Founders Code

Remember the panic Americans went through because of the annual exercises called Jade Helm? It was an Obama operation where his military was practicing to impose martial law across the country so Obama would remain a forever president. Then Alex Jones bought into that notion and the message spread for months. It was a Russian troll operation, a very successful one. The Russians have made a fine art form of disinformation such that even government officials and media cannot make the distinctions.

Then of course there was/is the whole election interference operations not only in the United States but, Britain, Ukraine, France and even Mexico.

Among other disinformation campaigns is the whole vaccination thing. Well, the anti-vaccination thing set in and Americans have in countless cases refused to get their children vaccinated as any of them would or could cause autism.

Image result for measles vaccinations
Continue reading