<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Dangerous Magazine &#187; New Issue</title>
	<atom:link href="http://dangerousmagazine.com/category/new/feed/" rel="self" type="application/rss+xml" />
	<link>http://dangerousmagazine.com</link>
	<description>For Those Who Live On The Edge</description>
	<lastBuildDate>Wed, 01 Feb 2023 19:49:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>The Hack Part Seven</title>
		<link>http://dangerousmagazine.com/2018/10/11/hack-part-seven/</link>
		<comments>http://dangerousmagazine.com/2018/10/11/hack-part-seven/#comments</comments>
		<pubDate>Thu, 11 Oct 2018 20:25:27 +0000</pubDate>
		<dc:creator><![CDATA[Lisa]]></dc:creator>
				<category><![CDATA[New Issue]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2572</guid>
		<description><![CDATA[<p>&#160; It would be hard to imagine a less likely candidate that Donald Trump for President of the United States.  To many Trump was a relic of the 80’s, an aging, uneven dilettante, a serial womanizer, a repeat bankrupt, a narcissistic Manhattan B lister, a media bull shitter and obnoxious loudmouth. To others he was a successful real estate tycoon a deft business genius turned flamboyant reality TV star. To those who loved his TV series The Apprentice he was an American icon, a...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/10/11/hack-part-seven/">The Hack Part Seven</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>It would be hard to imagine a less likely candidate that Donald Trump for President of the United States.  To many Trump was a relic of the 80’s, an aging, uneven dilettante, a serial womanizer, a repeat bankrupt, a narcissistic Manhattan B lister, a media bull shitter and obnoxious loudmouth.</p>
<p>To others he was a successful real estate tycoon a deft business genius turned flamboyant reality TV star. To those who loved his TV series <em><a href="http://fortune.com/2016/09/08/donald-trump-the-apprentice-burnett/">The Apprentice</a></em> he was an American icon, a golden haired symbol of hard won success and outspoken support of America and Americans. To law enforcement Trump had lawyered up and papered over misdeeds that ranged from mob connections, affairs, money laundering, and to the media elites who worked for the broadsheets. He used mob savvy lawyers like Roy Cohn and later a softer, equally crooked version called Michael Cohen to do his dirty deniable clean-up work. Trump was a long time Manhattan publicity whore, a man who even <a href="https://www.washingtonpost.com/politics/donald-trump-alter-ego-barron/2016/05/12/02ac99ec-16fe-11e6-aa55-670cabef46e0_story.html">posed</a> as &#8220;John Barron&#8221; or &#8220;John Miller&#8221; as his own PR person to compliment himself and now possibly suffering from some geriatric ailment that prevented him from forming a compete sentence.  There was no way a tainted throw-back like Trump would ever win an election, let alone pay for one. Unless you were running against Hillary Clinton.</p>
<p>Initially, the conservative right backed an outsider, a plain speaker, a tough talking patriot who would focus his efforts on restoring the esteem of the much maligned middle aged white conservative male and someone who didn’t care what the elite media or the entitled left thought. That man was Ted Cruz.</p>
<p>When Ted Cruz lost steam after losing in the Indiana primary on May 3, 2016 to Donald Trump, the extreme right and the center right gravitated to the reality show star. The man with <em>wasta </em>and a rapidly growing following was now Trump. Trump, with a little help and a lot of money, could be the perfect wrecking ball to swing in the sclerotic insider world of DC and smash down the  politically correct left. This appeal was also bolstered by a general sense of dread that the elderly Hillary Clinton, much abused wife of Bill Clinton, former Senator who moved to New York and frequent flier mile secretary of state had been carefully placed into political positions to assuage her naked hungry for power. The Democrats had elected a man from mixed parentage, why not the first woman?</p>
<p>Despite what the left considered an ideal candidate, Clinton appeared to just patiently await her coronation. She did not connect with voters. Aloof, entitled and not in touch. It was not an ideal election and the poor choices sparked fierce debate. A knock down slugfest creating a perfect place for someone to light a fire. Something the world of social media was happy to do.</p>
<p>Trump had no money to win and Clinton was drowning in it. Elections run on advertising and image. Raising funds requires making bargains with the devil and using every tactic available. What was needed was something that would push the ball over the line. Cinton had weak points. Trust, arrogance, inability to tell the truth, a dodgy family foundation, deleted emails…there must be something in those deleted emails….if they could be found. Clinton’s camp found finding fault with Trump laughably easy All they had to do was Google the thousands of outrageous statements, deplorable acts and thousands of silly statements.</p>
<p>Surprisingly, this mudslinging only emboldened Trump. His followers didn’t trust the media. He would simply tweet if he had something to say and the media would go nuts chasing Trump&#8217;s insulting tweets until he tweeted again.All of this perfectly in line with Steve Bannon&#8217;s <a href="https://www.newyorker.com/news/john-cassidy/steve-bannons-war-on-the-press">desire to destroy the cozy old school relationship</a> between government and the media. Bannon&#8217;s history as a investor in Hollywood, turned propaganda film maker turned blogger made him an outsider and Trump inflamed the old school media with his lack of respect.</p>
<p>Tweeting vs Sunday print editorials is perfect OODA loop stuff. The O.O.D.A. Loop, which stands for Observe, Orient, Decide and Act was Col John Boyd&#8217;s way of explaining to fighter pilots in the 50’s how combatants go through the process of reacting to stimulus Boyd’s idea was that if you move faster than your opponent you will always maintain the initiative. Even if what you are doing does not make sense. It is more important to confuse and wrong foot the enemy until you strike. So Donald Trump and his strategic advisor Steve Bannon worked the short game while a group of supporters worked the long game. If Clinton wanted coverage on Sunday news shows and magazine profiles, Bannon was happy to roll ini the viral mud of social media. It was all about controversy the electricity that drives popular discussion and top of mind awareness.  He needed fuel to stoke this fire just as he had built up Brietbart on bashing Clinton and Obama.</p>
<p>The press still has not regained their balance. Demanding, facts, in depth interviews, real concepts Bannon and Trump just fired off more tweets more Facebook ads and laughed all the way to the bank. Trump&#8217;s media maven Brad Pasquale <a href="https://www.washingtonpost.com/news/politics/wp/2018/03/22/all-the-ways-trumps-campaign-was-aided-by-facebook-ranked-by-importance/?utm_term=.ab95cbaf5096">spent 80% of their ad</a> budget on Facebook and created another perfect way to alienate the main stream media. A business that relied heavily on campaign ads to swell their coffers.  It also created a petri dish for Russian trolls and fake news as the monetization of clicks drove thousands of enterprising people to <a href="https://www.washingtonpost.com/news/the-intersect/wp/2016/11/18/this-is-how-the-internets-fake-news-writers-make-money/?utm_term=.99d7fa34baa6">capitalize</a> on Trump&#8217;s stickiness and viral qualities. The election was so viral that Romanian kids could create hyperbolic political ads and fake news sites and then use monetization sites like Adsense to make up to $10,000 a day. <a href="https://www.washingtonpost.com/news/the-intersect/wp/2016/11/03/the-only-true-winners-of-this-election-are-trolls/?utm_term=.958a116fb0ff">Trolls</a> not pundits rose to the top of the food chain.</p>
<p>+ + +</p>
<p>Controversy needs dirt. There were plenty of willing miners that searched for dirt that would be used to feed the trolls.</p>
<p>The Clinton Dirt posse were a strange cabal of characters straight out central casting. They range from Chicago investment banker Peter W. Smith, then an aging and now dead scandal monger, Iowa activist Sam Clovis an obese radio host, Charles C. Johnson  a short pudgy red headed ginger muckracker, former folk singer and Reagan era speechwriter Dana Rohrabacher, ex-Blackwater neo-mercenary Erik Prince, Knight of Malta and former Inspector General Joseph Schmitz, Rohrbacher employee and Prince supporter Paul Behrends, Victoria Toensing (muckraking media savvy lawyer for Clovis and Prince)  and even Prince’s best buddy and role model Olly North of Iran Contra fame popped up in media reports. Other than Johnson and Prince (who also worked together against Weiner) It was the 80’s all over again. And this election suddenly seemed to be all about dirt and dirty tricks.</p>
<p>This group of aging political super villains (to the Democrats at least) appeared to act in concert or in support of candidate Trump’s National Security Team under General Mike Flynn. Flynn was not a politician, he was a war fighter, so the people he picked seemed heavy on enthusiasm and short on diplomacy. The extreme took front and center, with neocons. alt-rights and just plain scary featured prominently. An Iran Contra level of paranoia, slippery dealing and skullduggery took hold. Conversations, speeches and <a href="https://foreignpolicy.com/2017/08/10/heres-the-memo-that-blew-up-the-nsc/">memos</a> with terms like “deep state”, “fake news”, “political warfare”, “information campaigns” and “islamofascism” peppered conversations. There was an enemy out there, but the comingling of enemies that included Antifa, Muslim Brotherhood, Clinton supporters, Marxists, ISIS and the media made for a heady brew.</p>
<p>When Trump assembled his “brightest minds” <a href="https://www.nytimes.com/2016/03/23/us/politics/donald-trump-foreign-policy-advisers.html">foreign policy team</a> the media had to hit Google to figure out who they were. It didn’t help that the reality show candidate said he formed his world view by watching television on the weekends.  His starting line-up was Joseph E. Schmitz, Gen. Keith Kellogg, Carter Page, George Papadopoulos and Walid Phares and would be chaired by Jeff Sessions.  Jeff Sessions had to recuse himself from the later investigation into Russian interference because he actually met with Russians as did most if not all of the rest except for pro-Israel, Lebanese-born Christian <a href="https://www.washingtonpost.com/news/worldviews/wp/2016/03/22/the-dark-controversial-past-of-trumps-counterterrorism-adviser/?utm_term=.6c9be26552e7">Walid Phares</a> who was a virulent critic of Islam and Kellogg who had briefly run the Iraq CPA and had worked for <a href="https://www.thenation.com/article/one-of-trumps-top-military-advisers-played-a-key-role-in-the-disastrous-iraq-occupation/">intelligence contractors</a> after becoming an expert on network centric warfare</p>
<p>Almost immediately various elements of the Russian government began reaching out to this crew to offer “Clinton Dirt”. It is important to remember that at a certain point the right assumed that Clinton had deleted both embarrassing and sensitive emails and assumed that many of these were Classified or above.  The most high profile “Clinton Dirt” was the June 2016 meeting between Trump campaign staff and Russians. But the search began much earlier.</p>
<p>Some of the team <a href="https://www.politico.com/story/2017/12/06/trump-europe-russia-travel-281134">surreptitiously travel</a>led to Europe to make contact. The spring summer and fall of 2016 were full of multiple random meetings with multiple random Russians and Trump proxies. That intensity of randomness about one topic and within that short window would make the whole affair not random at all. This was in addition to the formal contacts the Trump team had with the Russian ambassador in the U.S.</p>
<p>Trump was no stranger to Russia or Russians in his business dealings. His checkered business past swung from grandiose to bankrupt to cash flush. His decision to shift from building and owning to licensing meant he had to be a brand. The idea of a TV show that featured him as wealthy and successful self-made man was perfect. In 2004 <em>The Apprentice</em> was born, produced by TV’s most successful reality show producer, former nanny and Venice T-shirt hawker Mark Burnett. It also meant the classic TV watching demographic began to meet the man from Queens as a tough, no nonsense purveyor of the poor man’s view of American Dream. Trump insists he made over 200 million dollars over the 14 seasons he was on the show and was able to successfully license his name on properties from hotels to golf courses. More importantly Trumphad managed to gild his tarnished brand with thin 12 carat TV reality star gold. .</p>
<p>Trump had plenty of Russian customers, friends and was working on a hotel in Moscow  (among other locations) before his run for office but he would constantly downplay his business and personal interests in Russia to the media during the campaign. Did Russia really figure into Trump&#8217;s thinking during the election?</p>
<p>The one area where Russia was important in the campaign was the general sense was that Trump wanted to move Russia away from Iran in their war against extremists in Syria and move our support towards Israel and the Gulf dictators in the UAE and Saudi Arabia. Trump was going to not only embrace Assad but work with Russia to push back Iran. The reverse of what Obama tried to do in overthrowing Assad using covert &#8220;moderate&#8221; rebels trained by the CIA. Trump&#8217;s idea of working with the Russians was dangerous, it had elements of Stalin working with Roosevelt in World War Two against a common enemy only to watch most of Eastern Europe vanish into the Soviet empire. President Obama, seeing decades of endless warfare had moved away from the anti Iran/pro Israel Neocon vision of a new Order in the Middle East.</p>
<p>The other incentive to include Russia was <a href="https://www.reuters.com/article/us-usa-trump-flynn-nuclear-exclusive/exclusive-mideast-nuclear-plan-backers-bragged-of-support-of-top-trump-aide-flynn-idUSKBN1DV5Z6">a multi-billion-dollar plan</a> from <a href="http://acustrategicpartners.com/">ACU Strategic Partners</a> to bring nuclear power to the Gulf States with Russian nuclear reactors. A project Flynn had helped push before joining the Trump machine. A plan that would haver required lifting sanctions from the Russian state owned nuclear energy company <a href="https://intpolicydigest.org/2018/07/19/rosatom-as-a-tactic-in-russia-s-foreign-policy/">Rosatom</a> and <a href="https://www.reuters.com/article/us-russia-vtb-sanctions/russias-vtb-bank-head-kostin-shrugs-off-u-s-sanctions-risk-idUSKBN1FB13N">VTB bank</a>.  Instead of waiting for after the election to not interfere with the current President’s policies, Trump’s people jumped right into the middle of foreign policy discussions on multiple and confusing fronts. Searching both for damaging information against opponent Clinton and discussions on their foreign policy plans to drop sanctions and partner with Russia.</p>
<p>George Papadopoulos was approached by Maltese professor Joseph Mifsud. Excited he contacted Sam Clovis about his March 24, 2016 meeting with “Putin’s niece” Sam Clovis’ lawyer is Victoria Toensing, Erik Prince’s lawyer. By August of 2016, Clovis was encouraging Papadopoulos to set up a meeting. <a href="https://www.washingtonpost.com/politics/whos-who-in-the-george-papadopoulos-court-documents/2017/10/30/e131158c-bdb3-11e7-97d9-bdab5a0ab381_story.html?utm_term=.583cce9f9337">Manafort disagreed</a>, insisting that a low level person should travel to Russia to meet and discuss dropping sanctions.</p>
<p>The clown circus continued. Russians appeared to pop up from every nook and cranny offering Clinton Dirt but delivering nothing. When samples were found, they were forgeries. There was even attempts to counter the idea that the Russians were hacking. In August of 2016, that Florida political operative <a href="https://www.wsj.com/articles/how-alleged-russian-hacker-teamed-up-with-florida-gop-operative-1495724787">Aarons Nevins</a><a href="http://www.sun-sentinel.com/news/politics/fl-reg-russia-hacker-guccifer-connection-20170525-story.html">also reached out to Guccifer</a>, as did Roger Stone. Stone first <a href="https://www.breitbart.com/2016-presidential-race/2016/08/05/dear-hillary-dnc-hack-solved-so-now-stop-blaming-russia/">tried to say that</a> Guccifer 2.0 was not a Russian hacker.</p>
<p>In the summer of 2016, <a href="https://www.newsweek.com/donald-trump-joseph-e-schmitz-foreign-policy-pentagon-dod-germany-wrong-doing-439239">Joseph Schmitz</a> was the former Inspector General for the DoD, turned <a href="http://www.americanfreedomlawcenter.org/about/advisory-board/joseph-e-schmitz/">Blackwater</a>meltdown-era lawyer had been accused of slow rolling investigations against George W. Bush officials, pitching <a href="https://www.wsj.com/articles/private-group-sought-to-arm-syrian-rebels-1400464766">wonky arms deals</a>to rebels in Syria. He <a href="https://www.cnn.com/2018/04/06/politics/joseph-schmitz-trump-adviser-clinton-emails/index.html">approached the FBI</a>and other government agencies to verify an offer to hand over the missing Clinton emails from the Dark Web. The offer came via an American contractor he code named “Patriot”. Schmitz took the material to at least two federal agencies and two congressional committees he realized he had been duped.</p>
<p>Carter Page went to Hungary towards the end of the summer and later told the House Intelligence Committee he “did a lot of sightseeing and went to a jazz club. Not much to report.” He did note that “there might have been a Russian in there” Page would later plead guilty to lying to the FBI. The FBI had been granted a FISA surveillance warrant in October of 2016.</p>
<p>Why would so many Trump campaign members be lying about meeting with Russians?</p>
<p>Donald Trump Jr, <a href="http://www.cnn.com/interactive/2017/07/politics/donald-trump-jr-full-emails/">got an email</a> from Rob Goldstone on June 3 2016 saying that “The Crown prosecutor of Russia met with his father Aras this morning and in their meeting offered to provide the Trump campaign with some official documents and information that would incriminate Hillary and her dealings with Russia and would be very useful to your father.”</p>
<p>Trump Jr. would later fly to Paris the day before election day to give a $50,000 speech at a think tank. He lunched with  At the Hotel Ritz Paris with Syrian Peace activist Randa Kassis a women who <a href="https://www.theguardian.com/us-news/2016/nov/23/donald-trump-jr-syria-russia-meeting-randa-kassis">supports Russian intervention</a> in the war, and her French husband, Fabien Baussart. A man with Russian ties who is said to have <a href="https://www.politico.com/story/2017/12/06/trump-europe-russia-travel-281134">nominated</a>Russian President Vladimir Putin for the Nobel Peace Prize. She <a href="https://www.theguardian.com/us-news/2016/nov/23/donald-trump-jr-syria-russia-meeting-randa-kassis">summarized</a> her October meeting on Facebook: “I succeeded to pass [to] Trump, through the talks with his son the idea of how we can cooperate together to reach the agreement between Russia and the United States on Syria”</p>
<p>In addition to the globetrotting there were a host of supporters and insiders who made suspicious trips. Suspicious only because the Trump team kept insisting these meetings weren’t happening. In November of 2017.  Russian Ambassador Sergey Kislyak would say that it would take him 20 minutes to list all the Trump people he met with or spoken to on the phone. His <a href="https://www.cnbc.com/2017/11/16/kislyak-wont-name-trump-officials-hes-met-because-list-is-so-long.html">recollection</a> did include lengthy meetings with Jeff Sessions and with Mike Flynn on sanctions.</p>
<p>What had turned into an attempt to shape or perhaps reverse Obama&#8217;s foreign policy in the Middle East found Trump being played by Russian intelligence. To the media, during the campaign, all of this is just churn, no smoking gun, just multiple examples of Trump’s campaign people acting out John Le Carre novels but getting nothing in return, only finding more and more tentacles reaching out from Moscow hoping to get sanctions lifted to free up Putin’s money.</p>
<p>As October 2016 and the election loomed it was clear there was no Clinton Dirt to be had, and Hillary had as she said wiped her servers clean, “like with a cloth”.  With Clinton climbing in the polls, Trump needed that October Surprise, even if there wasn’t any dirt on Clinton.</p>
<p>Perhaps some enterprising supporter could invent some?</p>
<p>+++</p>
<p><a href="https://www.newsweek.com/right-wing-web-168906">Peter W. Smith</a> (who died at 81 in May of 2017) bankrolled muckrakers going back giving $25,000 to <a href="https://www.newsweek.com/right-wing-web-168906">support</a> the State Troopers who ratted out Bill Clinton and hired then Breitbart reporter Chuck Johnson to find Hillary Clintons missing emails. According to Johnson, he had first met in 2013 when they worked on opposition research on President Obama. It’s not quite clear why a second term President would be of much interest. But Johnson worked with Andrew Auernheimer aka “the Weev”, a convicted hacker living in the Ukraine to help him out. Smith had put 50,000 of his own money and a donor had provided 100,000 in additional funds.</p>
<p>Just after July 22, 2016 When WikiLeaks began publishing the DNC emails, Smith <a href="https://www.lawfareblog.com/time-i-got-recruited-collude-russians">contacted</a> Matt Tait a senior cybersecurity fellow at the Robert S. Strauss Center for International Security and Law at the University of Texas at Austin. Tait was covering Clinton’s email woes and as an expert on hacking,</p>
<p>Smith assumed that <a href="https://www.lawfareblog.com/realnews-trump-et-laffaire-russe-resource-page#1.%20Russia%20Hacks%20and%20DC%20Leaks,%20WikiLeaks%20and%20Guccifer%202.0%20Data%20Dumps">Tait could help him with to the “Clinton Dirt”.</a> Smith conveyed the impression that he was a Trump campaign insider and told Tait that someone from the “Deep Web” had offered his team erased emails and could Tait verify that they were real? Tait had little interest in Smith and wrote up a blog pieceto memorialize the conversation.</p>
<p>On <a href="https://www.vox.com/policy-and-politics/2018/7/13/17569264/mueller-indictment-trump-russia-email-hack">July 27, Donald Trump</a> tweets, “I hope you’re able to find the 30,000 emails that are missing. I think you will probably be rewarded mightily by our press.”  The July 13, 2018  DoJ <a href="https://int.nyt.com/data/documenthelper/80-netyksho-et-al-indictment/ba0521c1eef869deecbe/optimized/full.pdf?action=click&amp;module=Intentional&amp;pgtype=Article">indictment</a>insist that on the same day, Russian hackers then tried to gain entry into Hillary Clinton’s personal servers. The 20,000 DNC emails released on July 22, 2016 by Wikipedia three days before the Democratic National Convention. Despite the <a href="https://twitter.com/wikileaks/status/756501723305414656?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E756501723305414656&amp;ref_url=https%3A%2F%2Fabcnews.go.com%2FUS%2Fpapadopoulos-documents-offer-insight-dnc-email-hacking-timeline%2Fstory%3Fi">cartoon</a>of an angry Clinton in front of a computer with bombs and money (remember she primarily used a Blackberry) this was still not the “Clinton Dirt” Trump was seeking.</p>
<p>Later on, Tait remembers is being sent an invitation to join Trump associated opposition effort dated September 7, 2016 and labeled, “A Demonstrative Pedagogical Summary to be Developed and Released Prior to November 8, 2016”. KLS Research. the company authoring the report was owned by Smith and registered in Delaware. For nitpickers, a pedagogical summary is not actual evidence but facilitates the presentation of evidence. The assumption was that Clinton had done something illegal but complicated and that crowdsourcing hackers and data would put together a convincing case before the election. The goal was to hire hackers to find anyone or someone who had Clinton Dirt on the dark web.</p>
<p>Again, there was no actual evidence the <a href="https://www.wsj.com/articles/gop-activist-who-sought-clinton-emails-cited-trump-campaign-officials-1498872923">purpose</a> of the document was to recruit hackers to find and analyze the Clinton Dirt. Tait remarked at the need of the dirty tricksters to create a corporation designed to avoid campaign reporting linked to his recollection that Flynn had asked for go between to receive Clinton emails from the Russians. Tait was also upset that his name had been included and he had no interest in participating. Tait was intrigued enough to start poking holes in the theory of Russians being the source of the DNC hack.</p>
<p>What did happen was an <a href="https://theforensicator.wordpress.com/guccifer-2s-west-coast-fingerprint/">ever expanding analysis</a> of the Guccifer 2.0 documents by the digirati that concluded that Guccifer 2.0 spoke very bad Romanian, had artificially put time codes in documents and tripped up when he made a change to a Word .doc on West Coast time under the name “Ernesto Che’. And that there was no clear evidence of Russian or Western authorship.  The slipup <a href="https://twitter.com/pwnallthethings/status/744101214774767617">Tait had spotted</a> was someone on the West Coast of the U.S. had added an invisible space in Word’s “Track Changes” features to “brand” the document. A peculiar idiosyncrasy that none other than Matt <a href="https://twitter.com/pwnallthethings/status/744101214774767617">Tait first noticed</a>.</p>
<p>On January 16 2017 the late Smith wrote an interesting blog before his <a href="https://web.archive.org/web/20170629213647/http:/peterwsmith.com/">death and laid you the whole hacking affair</a> blaming Obama’s spin doctors on bringing in Russia as the culprit.</p>
<ol>
<li><em>(Clinton&#8217;s email) <a href="https://web.archive.org/web/20170629213647/http:/arstechnica.com/information-technology/2016/09/fbi-clintons-first-e-mail-server-was-a-power-mac-tower/">operated on a virtually unprotected server</a>. Its contents were openly available to nation-states and to individuals. WikiLeaks said it was in possession of the 33,000 or so missing Clinton emails and has sat on them for nine months without releasing them.</em></li>
<li><em>Guccifer (Marcel Lehel Lazar), <a href="https://web.archive.org/web/20170629213647/http:/www.foxnews.com/politics/2016/05/04/romanian-hacker-guccifer-breached-clinton-server-it-was-easy.html">an individual self-trained in cybersecurity</a>, successfully hacked into 100 private email accounts of prominent U.S. and world government officials with ease. His unchallenged legal testimony indicated no Russian involvement.</em></li>
<li><em>John Podesta, chairman of the Clinton campaign, had his <a href="https://web.archive.org/web/20170629213647/http:/www.cnn.com/2016/10/28/politics/phishing-email-hack-john-podesta-hillary-clinton-wikileaks/">commercial email account hacked</a>when he fell for a bogus password-change request. His emails were released through WikiLeaks, with no evidence of Russian involvement.</em></li>
<li><em>While Guccifer 2.0 is an individual who claims to have modeled his work after the original Guccifer, his <a href="https://web.archive.org/web/20170629213647/http:/www.csoonline.com/article/3084594/security/dnc-hacker-slams-crowdstrike-publishes-opposition-memo-on-donald-trump.html">DNC server leaks</a>resulted in the resignation of the discredited head of the DNC. The material was readily available from the DNC site, which had protection deficiencies which were unattended to for 18 months. WikiLeaks said that the copies delivered to them came from a leak from a disgruntled DNC staffer, not a hack.</em></li>
<li><em><a href="https://web.archive.org/web/20170629213647/http:/www.thesmokinggun.com/documents/investigation/tracking-russian-hackers-638295">DCLeaks</a> appears to involve individuals in the Washington, D.C. area who are interested in disseminating political information. Included in these emails were those belonging to the author, which were on a weakly-protected state GOP server. It is difficult to see that such mundane content would be of interest to Russia.</em></li>
</ol>
<p><em>- Peter W. Smith</em></p>
<p>To make matters more obvious a bizarre PR campaign was mounted in Washington D.C. to show a fictional/documentary film to convince the media and lawmakers <a href="https://www.theatlantic.com/politics/archive/2017/07/bill-browders-testimony-to-the-senate-judiciary-committee/534864/">Bill Browder does the best job of laying this out</a> in his testimony to the Senate Judiciary Committee :</p>
<p><em>&#8220;Rinat Akhmetshin, a former Soviet intelligence officer naturalised as an American citizen, was hired to lead the Magnitsky repeal effort. Mr. Akhmetshin has been involved in a number of similar campaigns where he’s been accused of various unethical and potentially illegal actions like computer hacking.</em></p>
<p><em>Veselnitskaya also instructed U.S. law firm Baker Hostetler and their Washington, D.C.-based partner Marc Cymrot to lobby members of Congress to support an amendment taking Sergei Magnitsky’s name off the Global Magnitsky Act. Mr. Cymrot was in contact with Paul Behrends, a congressional staffer on the House Foreign Affairs Committee at the time, as part of the anti-Magnitsky lobbying campaign.</em></p>
<p><em>Veselnitskaya, through Baker Hostetler, hired Glenn Simpson of the firm Fusion GPS to conduct a smear campaign against me and Sergei Magnitsky in advance of congressional hearings on the Global Magnitsky Act. He contacted a number of major newspapers and other publications to spread false information that Sergei Magnitsky was not murdered, was not a whistle-blower, and was instead a criminal. They also spread false information that my presentations to lawmakers around the world were untrue.</em></p>
<p><em>As part of Veselnitskaya’s lobbying, a former Wall Street Journal reporter, Chris Cooper of the Potomac Group, was hired to organize the Washington, D.C.-based premiere of a fake documentary about Sergei Magnitsky and myself. This was one the best examples of Putin’s propaganda.</em></p>
<p><em>They hired Howard Schweitzer of Cozzen O’Connor Public Strategies and former Congressman Ronald Dellums to lobby members of Congress on Capitol Hill to repeal the Magnitsky Act and to remove Sergei’s name from the Global Magnitsky bill.</em></p>
<p><em>On June 13, 2016, they funded a major event at the Newseum to show their fake documentary, inviting representatives of Congress and the State Department to attend.</em></p>
<p><em>While they were conducting these operations in Washington, D.C., at no time did they indicate that they were acting on behalf of Russian government interests, nor did they file disclosures under the Foreign Agent Registration Act.&#8221;</em></p>
<p>Browder makes the case that the sanctions imposed by the Obama administration were deeply hiring Putin and his inner circle but why the oblique approach? And why didn&#8217;t they just do something on the Clinton Dirt they had been so eagerly offering&#8230;but never producing?</p>
<p><a href="https://www.rferl.org/a/rinat-akmetshin-russia-gun-for-hire-washington-lobbying-magnitsky-browder/27863265.html">Rinat Akmetshin,</a> and this <a href="https://abcnews.go.com/Politics/russia-bistro-bis-calif-congressman-dined-accused-russian/story?id=56839486">unusual cast of characters</a> including Paul Behrends, Erik Prince, Natalia Veselnitskaya  would appear at <a href="http://www.latimes.com/nation/politics/trailguide/la-na-trailguide-updates-rep-dana-rohrabacher-throws-liberty-1484956921-htmlstory.html">Dana Rohrabacher&#8217;s L</a>iberty Ball at the Library of Congress. The 680 photos of the participants have been since taken down but snagged by a number of people on <a href="https://twitter.com/MsMariaT/status/954857659106131968">social media</a></p>
<p>&nbsp;</p>
<div id="attachment_2526" style="width: 1210px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/07/DUBV9-kVwAAiy8q.jpg"><img class="size-full wp-image-2526" src="http://dangerousmagazine.com/wp-content/uploads/2018/07/DUBV9-kVwAAiy8q.jpg" alt="Rinat Akhmetshin &amp;  and Natalya Veselnitskaya at Dana Rohrabacher's Liberty Ball at the Library of Congress, Friday, January 20th, 2017" width="1200" height="675" /></a><p class="wp-caption-text">Rinat Akhmetshin &amp; and Natalya Veselnitskaya at Dana Rohrabacher&#8217;s Liberty Ball at the Library of Congress, Friday, January 20th, 2017</p></div>
<p>Next Part Three</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/10/11/hack-part-seven/">The Hack Part Seven</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2018/10/11/hack-part-seven/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Hack &#8211; Part Two: The Hunt for Clinton Dirt</title>
		<link>http://dangerousmagazine.com/2018/07/29/2407/</link>
		<comments>http://dangerousmagazine.com/2018/07/29/2407/#comments</comments>
		<pubDate>Mon, 30 Jul 2018 02:15:13 +0000</pubDate>
		<dc:creator><![CDATA[Lisa]]></dc:creator>
				<category><![CDATA[New Issue]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2407</guid>
		<description><![CDATA[<p>by Robert Young Pelton “The campaign had no contact with Russian officials,” “It never happened, there was no communication between the campaign and any foreign entity during the campaign.” Trump spokesperson Hope Hicks November  11, 2016 &#8220;One who deceives will always find those who allow themselves to be deceived.&#8221; – Niccolo Machiavelli Read Part One As we learned in Part One, the hacking of emails, devices and computers are just one tool in the psyops toolbox. But it is what the hacker...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/07/29/2407/">The Hack &#8211; Part Two: The Hunt for Clinton Dirt</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>by Robert Young Pelton</p>
<div id="attachment_2436" style="width: 1804px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/07/Screen-Shot-2018-08-01-at-6.48.23-AM.png"><img class="size-full wp-image-2436" src="http://dangerousmagazine.com/wp-content/uploads/2018/07/Screen-Shot-2018-08-01-at-6.48.23-AM.png" alt="© 2018 Sarah Sole, all rights reserved. https://sarahsole.art/" width="1794" height="1148" /></a><p class="wp-caption-text">© 2018 Sarah Sole, all rights reserved. https://sarahsole.art/</p></div>
<p style="text-align: center"><em>“The campaign had no contact with Russian officials,”</em></p>
<p style="text-align: center"><em>“It never happened, there was no communication between the campaign and any foreign entity during the campaign.”</em></p>
<p style="text-align: center">Trump <a href="https://investigaterussia.org/media/2018-02-28/hicks-nov-2016-statement-under-scrutiny">spokesperson</a> Hope Hicks November  11, 2016</p>
<p style="text-align: center"><em>&#8220;One who deceives will always find those who allow themselves to be deceived.&#8221;</em></p>
<p style="text-align: center">– Niccolo Machiavelli</p>
<p>Read <a href="http://dangerousmagazine.com/2018/07/19/hack-part-one/">Part One</a></p>
<p>As we learned in <a href="http://http://dangerousmagazine.com/2018/07/19/hack-part-one/">Part One</a>, the hacking of emails, devices and computers are just one tool in the psyops toolbox. But it is what the hacker does with what they find that is important.  Even if nothing is found during the hack, the public cyber shaming of the victim for being incompetent on how they handle their communications can be a powerful psyops weapon as in the case of Hillary Clinton. An elderly woman who insisted on using Blackberry phones and telling her younger aide Huma Abedin&#8221;to print this out&#8221;. Huma used to also backup her Blackberry on her husband&#8217;s, laptop at home. Clinton as Secretary of State was expected to use government email to provide a historical record and a certain level of security. It would be discovered after she left office that she never used a .gov email address and had carefully wiped out her personal after her lawyers printed out the emails she felt were relevant. From this came the concept that Clinton had destroyed sensitive or incriminating emails. The unproven absence of something can be equally damaging as finding something during a hack.</p>
<p>So we begin our journey to find the fabled &#8220;Clinton Dirt&#8221; something that may have never really existed during the campaign but somehow allowed foreign powers, carpet baggers, hustlers and hangers-on to undermine the integrity of an election, and thereby casting doubt on the legitimacy of the democratically elected President. The search for Clinton Dirt was so powerful, so seductive that it created numerous provable links to Russian proxies and entities, none of whom actually had Clinton Dirt. Why would Russians promise they had Clinton Dirt and never deliver?  Was this a clever trap? The perfect way to ensnare a Presidential Candidate whose followers seemed obsessed with the idea that Hillary Clinton was a crook? Was this the perfect way to seduce Trump to prove that he was a crook and linked to Russian influence?</p>
<p>Is Donald Trump a Russian lackey? His staff’s constant denials set against the actual proof of clandestine, low key meetings and a list of compromised associates might appear to contradict his denials. There is no direct link of direct benefit to Trump but there is a stunning amount of circumstantial evidence that links dozens of Russia citizens to both Trump&#8217;s business and political campaign. Almost as if it was carefully planned that way knowing full well that there would be efforts to draw direct lines between Putin and Trump.</p>
<p>The allegation of Russian collusion would not be directly connected if Trump had not specifically asked the Russians to find Hillary&#8217;s missing emails. On <a href="https://www.pbs.org/newshour/politics/trump-asked-russia-to-find-clintons-emails-on-or-around-the-same-day-russians-targeted-her-accounts">July 27, 2016</a> Trump looked at the camera at a press conference and said&#8221; <em>Russia</em>, if you&#8217;re listening, I hope you&#8217;re able to <em>find</em> the 30000 emails that are <em>missing</em>, I think you will probably be rewarded mightily <em>by our press&#8221;. </em>Not Trump. The media.</p>
<p>Phishing emails from numerous Russian sources began to bombard the Clinton personal servers. So despite joking that the media would be all over any hidden emails from Clinton,  is that the proof that Trump conspired to hack Clinton?</p>
<p>It would be too simple to believe that is how the hack began. In reality the Internet Research Agency aka &#8220;the troll factor) was <a href="https://www.wired.com/story/inside-the-mueller-indictment-a-russian-novel-of-intrigue/">founded</a> in the summer of 2013 in Putin&#8217;s home town of St. Petersburg, They had already begun supporting Trump in 2015 by essentially backing anyone who ran against Clinton. Trump became the de facto candidate of choice.</p>
<p>Was Hillary Clinton hiding something in her deleted emails she “wiped clean, like with a cloth” as <a href="https://townhall.com/tipsheet/mattvespa/2015/08/18/hillary-presser-did-i-wipe-server-like-with-a-cloth-or-something-n2040633">she said</a> on August 2015? Probably. But there is no evidence that Clinton even really seriously used email for anything important. Most of the emails that were labeled as sensitive to classified were simply passing through along with the tedious back and forth of travel and meeting needs. Essentially if Clinton was involved in dirty deals or underhanded activities, she was smart enough not to create an email record.</p>
<p>Her response captured her sense of tone deafness after it was revealed her IT people had used a professional program called <a href="https://www.bleachbit.org/">BleachBit</a> to wipe out any useful data on her New Jersey-based server before handing it over to law enforcement. If you are towards the right you will believe that Hillary Clinton is hiding something terrible, or rather was hiding something and had to delete her emails.</p>
<p>Or are both narratives wrong?</p>
<p>Was the bizarre number of people linked to Russia offering Trump Clinton Dirt, but never delivering it,  a very clever way to entrap him into looking like he was working with the Russians? Could it be that Clinton or Obama was catfishing Trump with proxies offering Clinton Dirt that didn&#8217;t exist?</p>
<p>Fusion GPS, the manager and producer of the Steele Dossier <a href="http://www.foxnews.com/politics/2017/11/07/fusion-gps-official-met-with-russian-operative-before-and-after-trump-jr-sit-down.html">had another client in addition to the Democrats</a>. Prevezon Holdings, or rather through BakerHostetler, the law firm that represented Denis Katsyv in his fight to get sanctions lifted. According to records, Fusion GPS was paid $523,651 between March and October 2016 to find damaging information against Bill Browder, the main instigator of the Magnitsky Act and sanctions.</p>
<p>Katsyv had also hired Russian lawyer and FSB informant Natalia Veselnitskaya to represent his company in the U.S. plea bargains. Incredibly, Glenn Simpson, the owner of FusionGPS met with Veselnitskaya just hours before and right after the Russians met at Trump Tower. This puts an entirely different spin on the reason for the Trump meeting when it becomes apparent of  Fusion GPS role in not only providing Trump Dirt to Russia and what appears to be quarterbacking the meeting with Trump&#8217;s people. Remember the two spies were being squired around DC by Paul Behrends to promote lifting of sanctions, but offered to provide Clinton Dirt to Trump Jr.</p>
<p>The June 9, 2016 meeting at Trump Tower was odd. It was set up by Rob Goldstone. Goldstone worked for the Russian oligarch, Aras Agalarov, and his wannabe pop singer son, Emin.  Both had been part of getting Trump to stage the 2013 Miss Universe pageant in Moscow. In a fascinating do-loop Veselnitskaya had shared Fusion GPS Steele Dossier with Yuri Chaika, the prosecutor general of Russia which Goldstone offered to Trump Jr after Paul Behrends who worked for Dana Rohrabacher had pimped Veselnitskaya all over D.C. in incredibly clumsy attempt to smear Magnitsky and lift sanctions. There was a loop here.</p>
<p>Rob Goldstone <a href="https://www.telegraph.co.uk/news/2017/07/11/transcript-donald-trump-jrs-email-chain-meeting-russian-lawyer/">sent an email</a> to Donald Jr. promising that <em>&#8220;The Crown prosecutor of Russia met with his father Aras (Agalarov, real estate magnate) this morning and in their meeting offered to provide the Trump campaign with some official documents and information that would incriminate Hillary and her dealings with Russia and be very useful to your father.&#8221;</em> this was the intro to Veselnitskaya. Who didn&#8217;t have anything on Clinton and quickly turned the conversation to sanctions. Even odder was the Trump cover story that Veselnitskaya was there to discuss the lifting of the banning of Russian child adoptions by Putin in retaliation for the sanctions. Perception? Trump was colluding with Russians to affect the elections. Reality? A waste of time, but a very public waste of time that would be be pointed to as proof of collusion.</p>
<p>Goldstone would later shrug it off and tell the <em>Independent</em>, “If I’m guilty of anything, and I hate the word guilty, it’s hyping the message and going the extra mile for my clients. Using hot-button language to puff up the information I had been given,”</p>
<p>A perfect example of tertiary effects of psyops in which Trump&#8217;s enemies may have set a trap, knowing his desperate need for &#8220;Clinton Dirt&#8221;. The Trump camp would actually find themselves saddled with the appearance of potential criminality and Russian collusion. So did Fusion GPS, the same company that created and shopped the &#8220;Trump in bed with Russians&#8221; Steele Dossier, also make money setting up Trump to look like he was in bed with the Russians?</p>
<p>If it is proven that neither Trump or Clinton were hacked and that neither had a ulterior motive in hiding anything would it really matter anymore? Each side was fed a narrative that was comfortable to them. Both sides burdened with a narrative that has yet to be based on actual proof.</p>
<p>Such is the power of hacking the human brain.</p>
<p>+ + +</p>
<p>Not knowing,  or not having evidence, is a powerful weapon to use against a target in a psyops campaign. Just like lying, or not telling something,  to the FBI is a powerful tool in flipping witnesses.  Why was Hillary Clinton allowed to choose which emails to hand over and why was she allowed to delete these emails she felt were irrelevant? Why were her associates devices seized and searched for classified information?</p>
<p>Worse, why wasn&#8217;t Clinton and her lawyers treated the same way by the FBI as Trump and his lawyer Michael Cohen? These are legitimate questions that support Trump supporters views that there is a “deep state” friendly to Obama era appointees and staff. A very Soviet idea but one that has support in the way that now fired Trump opponent <a href="https://www.ctvnews.ca/world/fbi-fires-peter-strzok-in-wake-of-anti-trump-text-messages-1.4050697">Peter Strozk</a> firewalled any expansion of the search beyond Clinton&#8217;s server.</p>
<p>Although forensics and aggressive FOIA’s are still piecing together what happened, the Clinton records aka emails while Secretary of State are being demanded in <a href="https://www.cbsnews.com/news/emails-show-nsa-rejected-hillary-clinton-request-for-secure-smartphone/">38 different lawsuits</a>.  It is not surprising that the missing emails became the single most inflammatory part of the 2016 election cycle and as we will show, cost Clinton the election.</p>
<p>In the run up to the 2016 election, those around Trump were virulently anti-Clinton and wanted those emails. Trump himself consistently accused his opponent of hiding something, being a criminal and going as far as creating the &#8220;lock her up&#8221; chant. Donald Trump and his camp hoped that something was those missing emails that would disgrace Clinton and be part of what could be used or an “October Surprise”. A term used to describe a piece of surprising news or shocking discovery about a political candidate that is dropped just before voters decide on which party will run the country.</p>
<p>The most famous example of an October Surprise is the 1980 release of the Iranian-held hostages as soon as Ronald Reagan took office. A despicable act of cruel deceit engineered by campaign manager and spook William Casey according to author Gary Sick who investigated a plot to ensure that President Carter would look powerless and not be elected.  Casey had been in the OSS in World War Two and run the European intelligence network. After Reagan was elected he headed the CIA and was responsible for a robust approach against Soviet influence around the world. Carter’s perceived inability to release the hostages crushed his reelection hopes.</p>
<p>This Reagan-era dirty trick was not forgotten by a group of Reagan-era Trump supporters who include Iran Contra figure Oliver North, close friend Erik Prince former boss and Reagan speechwriter Dana Rohrabacher and others. Trump seemed to gather Reaganites around him even though he had a history of being a <a href="https://www.washingtonpost.com/news/the-fix/wp/2015/07/09/ths-many-ways-in-which-donald-trump-was-once-a-liberals-liberal/?utm_term=.77bd4fd939ab">liberal’s liberal</a> and a libertine. Family values, religion, conservative values did not seem to square with the oft married, oft gossiped 80’s era social icon from Queens. But for this election he was right, perhaps right of right. Alt Right.</p>
<p>+ + +</p>
<p>Libertarians have always yearned to hack the Republican party. Terrified to to stray too far right, Trump offered the chance to enter uncharted water. Anarchistic almost.<a href="https://www.franciscanmedia.org/steve-mceveety-catholic-producer-in-hollywood/"> Steve McEveety,</a> a deeply religious film producer that had worked for Mel Gibson at Icon and with Erik Prince on an anti-Iran film called the <em>Stoning of Soraya M</em>. McEveety introduced Bannon to Prince in late June of 2012.  After the death of Andrew Breitbart and a cash infusion from the Mercers, Bannon wanted to move fast and break things. He gathered around him lightening rods for controversy. Prince who had interned with Rohrabacher and Behrends was an ideal shit magnet.  Bannon was fascinated by my article on Benghazi. Prince and Bannon became fast co-conspirators against Hillary Clinton.</p>
<p>Erik Prince although too young to be a Reaganite, but was a Reagan-era groupie. He had gathered around himself many cast off conservatives ranging from his lawyer Victoria Toensing, Olly North, Paul Behrends, Dana Rorhabacher and many others. His father Edgar Prince had built and funded conservative organizations like Focus on the Family and supported Bush Sr and Reagan. He had a retro appeal to conservatives and even the mention of his company name Blackwater would trigger endless arguments among right and left wingers.</p>
<p>Prince also had a burning hatred for Secretary of State Hillary Clinton who he publicly blames for <a href="https://www.vanityfair.com/news/2010/01/blackwater-201001">singlehandedly disassembled and destroying Prince’s Blackwater business</a> legacy. A business built on working for the State Department providing armed guards, aircraft and vehicles in Iraq under Bush Jr, and then destroyed when President Obama and what would have been his new boss, Secretary of State Hillary Clinton came into power</p>
<p>Prince tends to minimize the bloody murders by his employees in Nissour Square as the reason for his company’s demise. Clinton not only took away Prince’s billion-dollar source of income but had 7 federal agencies on his tail until Prince was forced to sell all his contracting businesses and move to Abu Dhabi in 2010. So with the idea that a Republican would return to office, Prince and the Reaganite gaggle literally appeared at Trump’s doorstep waiting down at the bar until summoned up the elevator.</p>
<p>Once the Mercer family and Trump <a href="https://www.nytimes.com/2016/08/18/us/politics/donald-trump-stephen-bannon-paul-manafort.html">installed Breitbart firebrand and Benghazi basher Steve Banno</a>n in August of 2016, big and little donor money began to flow. Reagan political dinosaur Paul Manafort and Trump&#8217;s tower tenant had been r<a href="https://abcnews.go.com/Politics/timeline-paul-manaforts-role-trump-campaign/story?id=50808957">unning Trump&#8217;s campaign</a> for free since March 29, but although he had hitched the Republican money wagon to Trump&#8217;s campaign, it was quickly discovered he had other agendas. On July 24, 2016, ABC News&#8217; <a id="ramplink_George Stephanopoulos_" href="http://abcnews.go.com/topics/news/reporters/george-stephanopoulos.htm" target="_blank">George Stephanopoulos</a> asked Manafort &#8220;Are there any ties between Mr. Trump, you or your campaign and Putin and his regime?&#8221; on ABC&#8217;s &#8220;This Week” Manafort replied&#8221;No, there are not, It&#8217;s absurd and there&#8217;s no basis to it.&#8221;</p>
<p>Manafort held out as long as he could but when it was clear that Trump was cutting him loose, he flipped.</p>
<p>Paul Manafort would be slammed to the curb hard by Robert Mueller. First put on trial for laundering millions of dollars from his political work in Ukraine with any reference to Trump and the campaign omitted. Manafort went down hard. He was acting a second trial and threw in the towel. All part of the surgical dissection of connective tissue by Mueller.</p>
<p>The Mueller prosecution may deftly sidestep Clinton Dirt, Russians and Trump and go directly to the heart of the matter. Money laundering. According to his business partner, Prince is said to have been paid $13 million a month by the UAE for his arms length Reflex Response contract in cash. Paid in newly minted, 100 dollar bills banded and sequential. Paul Manafort is accused of moving millions from his work in the Ukraine, and Michael Cohen is going to go on trial for hustling millions for access to Trump. All of them hoped Trump would give them top cover. None received it.</p>
<p>As former Trump advisor and insider Steve Bannon is quoted to have said,<a href="http://www.chicagotribune.com/news/opinion/commentary/ct-trump-money-laundering-kushner-20180105-story.html"> &#8220;this is all about money laundering&#8221;</a>.</p>
<p>In Michael Wolf&#8217;s book <a href="https://www.amazon.com/Fire-Fury-Inside-Trump-White/dp/1250158060/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1534349001&amp;sr=1-1&amp;keywords=michael+wolf+trump"><em>Fire and Fury,</em></a>  Bannon is said to have said about , &#8220;Their (Mueller&#8217;s) path to fucking Trump goes right through Paul Manafort, Don Jr. and Jared Kushner. &#8220;It goes through Deutsche Bank and all the Kushner stuff,&#8221;</p>
<p>It&#8217;s not clear why Trump chose Reagan-era archival villians and political operatives like Roger Stone and his former partner Paul Manafort formerly partners in <a href="http://content.time.com/time/subscriber/article/0,33009,960803-1,00.html">Black, Manafort, Stone &amp; Kelly</a> were dusted off and put to work getting Trump elected. Stone had always considered Trump an ideal candidate for President and boasted about his skill at crafting falsehoods and dirty tricks. Manafort had just spent a few years working Pro-Russian Ukrainian politics. Everyone seemed old, in exile and burnt, everyone brought baggage. Trump didn’t seem to care.</p>
<p>They bragged of their lobbying work for dictators and warlords under President Reagan and they kept busy. Manafort’s work in the Ukraine kept him busy and well heeled, something he had done for a variety of dark horses. He is famous for turning Maoist warlords like Angola’s Joseph Savimbi into U.S. backed freedom fighters is not easy, but in a world where image is everything it didn’t much to fool the media. Roger Stone kept insisting that Trump could be President, <a href="http://www.slate.com/articles/news_and_politics/politics/2016/08/jacob_weisberg_s_classic_new_republic_profile_of_trump_adviser_roger_stone.html">some thought</a> that endorsement would actually hurt Trump’s chances.. After four months putting together a political machine, Manafort was ultimately fired as was Stone after a number of “two-martini tweets” as Stone calls them.</p>
<p>Eventually when the media began to research his inner circle’s missteps, Trump would methodically throw each of them down the media well, hoping their baggage would drown them.</p>
<p>+ + +</p>
<p>Next Part Three</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/07/29/2407/">The Hack &#8211; Part Two: The Hunt for Clinton Dirt</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2018/07/29/2407/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Hack &#8211; Part Three: Deception and Deceit</title>
		<link>http://dangerousmagazine.com/2018/07/19/hack-part-tworobert_young_pelton/</link>
		<comments>http://dangerousmagazine.com/2018/07/19/hack-part-tworobert_young_pelton/#comments</comments>
		<pubDate>Thu, 19 Jul 2018 17:33:10 +0000</pubDate>
		<dc:creator><![CDATA[Lisa]]></dc:creator>
				<category><![CDATA[New Issue]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2361</guid>
		<description><![CDATA[<p>“All warfare is based on deception. Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.” – Sun Tzu, The Art of War Read Part One and Part Two of The Hack By Robert Young Pelton &#160; &#160; Who Hacked Who? In Part One of The Hack we learned that after...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/07/19/hack-part-tworobert_young_pelton/">The Hack &#8211; Part Three: Deception and Deceit</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="text-align: center"><em>“All warfare is based on deception. </em><em>Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.”</em></p>
<p style="text-align: center">– Sun Tzu, The Art of War <span id="quote_book_link_10534"></span></p>
<p>Read <a href="http:/http://dangerousmagazine.com/2018/07/29/2407/">Part One</a> and <a href="http://dangerousmagazine.com/2018/07/29/2407/">Part Two</a> of <strong>The Hack</strong> By Robert Young Pelton</p>
<p>&nbsp;</p>
<div id="attachment_2594" style="width: 1010px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2020/10/1000w_q95.jpg"><img class="size-full wp-image-2594" src="http://dangerousmagazine.com/wp-content/uploads/2020/10/1000w_q95.jpg" alt="Secretary of State Mrs. Hillary R. Clinton poses for a group photo with U.S. Marines stationed on Marine Corps Air Station (MCAS) Miramar, Calif., Aug 30, 2012 Photo: Cpl. Jamean R. Berry" width="1000" height="667" /></a><p class="wp-caption-text">Secretary of State Clinton returning from <a href="https://history.state.gov/departmenthistory/travels/secretary/clinton-hillary-rodham">Asia</a> stops to pose for photos on a refueling stop at Miramar California,  Aug 30, 2012 Photo: Cpl. Jamean R. Berry</p></div>
<p>&nbsp;</p>
<p><strong>Who Hacked Who?</strong></p>
<p><i>In </i><a style="font-style: italic" href="http://dangerousmagazine.com/2018/07/19/hack-part-one/">Part One</a><i> of The Hack we learned that after a Romanian cab driver reset Sydney Blumenthal&#8217;s email password and published screen shots on </i><a style="font-style: italic" href="http://www.thesmokinggun.com/documents/sidney-blumenthal-email-hack-687341">The Smoking Gun</a><i> on March 15, 2013. We also know that Hillary Clinton did not use a .gov address for her work as Secretary of State, she barely even used a computer, instead relying on her non secure Blackberry and assistant Huma Abedin to organize her life.  In 2014 when her 62,320 emails were subpoenaed Clinton&#8217;s lawyers handed over printed out copies of emails and over a professionally erased server with the explanation that Clinton was choosing &#8220;not to keep&#8221; 31,830 personal and unrelated emails. And we learned that all her electric communications during her first three weeks of her job as Secretary of State vanished when her staff switched to new, more secure server. </i></p>
<p><i>All this was discovered during and after the Benghazi hearings and triggered a hunt for the missing emails. Weaponized for the 2016 elections by the Trump campaign staff and camp followers. </i></p>
<p><i>In </i><a style="font-style: italic" href="http://dangerousmagazine.com/2018/07/29/2407/">Part Two</a><i> we went inside the search for &#8220;Clinton Dirt&#8221;. A quest by inner members and hanger-ons of the Trump campaign for the deleted emails that also seemed to attract the interest of Russians hired hackers, eager to drop sanctions and provide &#8220;dirt&#8221; on Hillary Clinton.  Those Russians seen the hunger for these missing emails slipped their tentacles fully inside and around the Trump campaign but never provided any of the missing Clinton emails. Based on the original Guccifer&#8217;s hack of Blumenthal&#8217;s AOL account, it was clear that Clinton emails existed in many other email accounts.  </i></p>
<p><i>So why was the nation shocked when on  April 18, 2016 the Democratic National Committee was hacked by a person who called themselves Guccifer 2.0.?</i></p>
<p>At first the DNC did not know how to respond to the hack. When the CEO of the Democratic National Committee Amy Dacey was told by their IT people that something odd was happening with their servers, Michael Sussman, a DNC lawyer <a href="https://www.buzzfeednews.com/article/jasonleopold/he-solved-the-dnc-hack-now-hes-telling-his-story-for-the">called the President of a company</a> called CrowdStrike. <a href="https://www.slideshare.net/CrowdStrike/bear-hunting-history-and-attribution-of-russian-intelligence-operations">Crowdstrike</a> is a cyber security company owned by Moscow-born CTO<span class="apple-converted-space"> </span><a href="http://www.esquire.com/news-politics/a49902/the-russian-emigre-leading-the-fight-to-protect-america/">Dmitri Alperovitch</a> and former<span class="apple-converted-space"> </span><a href="https://techcrunch.com/2012/02/23/former-mcafee-cto-debuts-stealthy-security-technology-startup-crowdstrike-with-26m-in-funding/">McAfee</a> anti-virus vet George Kurtz.  The investigation was led by former Marine Cyber Red Teamer Marine Robert Johnston.</p>
<p>An organization with the high profile, donor data and sensitive communications during a national election and felony level crimes being committed would normally call the FBI, but the FBI was still investigating Clinton’s use or misuse of a private server and financial irregularities in her charitable foundation&#8230;and it was an election. Worse, If the FBI froze the DNC system as evidence or if the media were to link the amateur way the Clinton handled her sensitive State Department work and threw in the childlike way the DNC was hacked, the election might be over for Clinton. For the FBI to announce an investigation and to conduct one that had sever political consequences was highly unusual.</p>
<p>The forensics of the DNC hack, as outlined in <a href="https://www.slideshare.net/ThreatConnect/guccifer-20-the-dnc-hack-and-fancy-bears-oh-my">reports</a> and a <a href="https://www.wired.com/story/dnc-lawsuit-reveals-key-details-2016-hack/">lawsuit</a> filed by the DNC, quickly showed that there appeared to be two different Russian hacking groups involved and that the recent hack was only the latest attempt.</p>
<blockquote><p>The more appropriate question would have been, had the Democrat&#8217;s data ever <em>not</em> been comprised?</p></blockquote>
<p>The DNC servers and backup servers had been <a href="https://www.buzzfeednews.com/article/jasonleopold/he-solved-the-dnc-hack-now-hes-telling-his-story-for-the">compromised</a> a full year earlier on July 27, 2015 and then again in the more well known attack on April 18, 2016 by &#8220;Fancy Bear&#8221;, a common software and hacking team used to compromise email systems.</p>
<p>The DNC <a href="https://www.washingtonpost.com/politics/democratic-party-files-lawsuit-alleging-russia-the-trump-campaign-and-wikileaks-conspired-to-disrupt-the-2016-campaign/2018/04/20/befe8364-4418-11e8-8569-26fda6b404c7_story.html?noredirect=on">would later sue the Russians, WikiLeaks and everyone they thought were linked to their hack</a>, insisting that &#8220;Russia mounted a brazen attack on American Democracy&#8221;. The DNC would complain in their suit that they were forced to &#8220;decommission more than 140 servers, remove and reinstall all software, including the operating systems, for more than 180 computers, and rebuild at least 11 servers.”</p>
<p>And that was the good news.</p>
<p>The bad news was that in addition to the two (actually three) hacks, every single email in the DNC system had been downloaded to another unknown storage device. And it wasn’t even news to the DNC IT department. In September of 2015 the FBI told the IT department that they had been hacked. And that wasn&#8217;t the worst news&#8230;the entire State Dept during Clinton&#8217;s time had been under attack and even the White House had been hacked as far back as 2014, Our government only discovered this after the Dutch AIVD intel division tipped off the NSA while watching the hack attempts&#8230;in real time.  The more appropriate question would have been, had the Democrat&#8217;s data ever <em>not</em> been comprised?</p>
<p>Fast forward to 2016 and no one should have been surprised that Clinton&#8217;s devices and communications were under attack.  Based on what the FBI had told the DNC and what Crowdstrike later discovered that a foreign government was aggressively trying to gather data about an election and perhaps find compromising information that could be used a d against them. This was linked by the media to the assumption that Trump somehow began this process of illegal hacking when famous dirty trickster Paul Manafort joined his campaign.</p>
<p>Clinton had caught Putin&#8217;s attention long before her run for President.</p>
<p>In reality the DNC and Clinton had been outed by the media for terrible security protocol and they decided to spin the hack. The DNC worked out a deal with the <i>Washington Post </i>which ran an <a href="https://www.washingtonpost.com/world/national-security/russian-government-hackers-penetrated-dnc-stole-opposition-research-on-trump/2016/06/14/cf006cb4-316e-11e6-8ff7-7b6c1998b7a0_story.html?utm_term=.b359af98fb4f">exclusive piece</a> on June 14, 2016. The headline screamed “Russian government hackers penetrated DNC, stole opposition research on Trump”.  The article made it seem like the hacker was after &#8220;Trump Dirt&#8221; and downplayed the previous disastrous data and customer data breaches. The problem was, there was no Trump Dirt hidden in the DNC servers just a massive dull &#8220;oppo&#8221; piece constructed from of published articles that an intern could easily assemble using Google or search engine LexisNexis. It wasn&#8217;t a big secret that Trump had a lifetime questionable misdeeds and associates. The only real unanswered question that insiders had was who owned Trump?</p>
<p>“It’s the job of every foreign intelligence service to collect intelligence against their adversaries”, said Shawn Henry president of CrowdStrike and assuring donors that no personal data was stolen. Which appeared to later be a fib since the among many docs that hacker Guccifer 2.0 posted on his blog <a href="http://gawker.com/contrary-to-dnc-claim-hacked-data-contains-a-ton-of-pe-1782132678">were detailed spreadsheets</a> with donor information. The WaPo article parrots the claim. “The DNC said that no financial, donor or personal information appears to have been accessed or taken suggesting that the breach was traditional espionage not the work of criminal hackers.” Again not true. Every part of the DNC email system including back up servers had been compromised, ever since Clinton <a href="https://www.nytimes.com/2015/04/13/us/politics/hillary-clinton-2016-presidential-campaign.html">announced her run for the office</a> of President on April 12<sup>th </sup>of 2015.</p>
<p>Before that there numerous clear indications that the Clintons were also targets of many hacking attempts and attacks. And Hillary Clinton as a private citizen angling for a high profile job in Obama administration had made it very easy for anyone who knew where she lived to find her email addresses, URLs and server location in her home.</p>
<p>+ + +</p>
<p>Was Hillary Clinton a tech guru who knew how to hide her comms and data, or was she naive about technology? We know that the Clinton&#8217;s transition to private life was focused on access and making money. There is plenty of evidence to show that their approach to security or tech was minimal and amateur.</p>
<p>The Clinton&#8217;s had two, very easy to find homes, a 5,152 sq ft brick mansion in <a href="https://www.zillow.com/homedetails/3067-Whitehaven-St-NW-Washington-DC-20008/68084274_zpid/">Whitehaven</a> and a 1889 built,  $1.7milion  5,232 square foot cut de sac home in <a href="https://www.zillow.com/homedetails/15-Old-House-Ln-Chappaqua-NY-10514/33065659_zpid/">Chappaqua</a>, NY. Each had an iMacs in each home office. The once <a href="https://www.apple.com/newsroom/2003/11/18Apple-Introduces-New-Dual-Processor-1-8-GHz-Power-Mac-G5/">sleek aluminum Apple G5</a> tower was introduced in 2003 and was discontinued in August of 2006. The legacy URL for the Clintons was wjcoffice.com would forward emails to husband&#8217;s &#8220;presidentclinton.com&#8221; account but Hillary didn&#8217;t use that URL for obvious, ironic reasons.  As Senator from New York, she used the Blackberry account; <a href="mailto:hr15@mycingular.blackberry.net" target="_blank">hr15@mycingular.blackberry.net</a>  which didn&#8217;t store emails on her home server, just her actual Blackberry handset.  Her other emails and texts were backed up on her server</p>
<p>It is coincidental but on December 23, 2009,  Clinton assistant and keeper of the Clinton IT network,  <a href="https://www.bloomberg.com/research/stocks/private/person.asp?personId=222852653&amp;privcapId=40152409">Justin Cooper</a> sen<a href="https://wikileaks.org/clinton-emails/emailid/30487">t an article by email </a>to Clinton staff warning them of two massive meltdowns of  Blackberry service caused by software glitches. It was of course read on everyone&#8217;s Blackberry. <a href="https://wikileaks.org/clinton-emails/emailid/33647">Hillary also asks Cooper on where her messages went</a>:</p>
<p><span class="inlinemeta">Original Message </span></p>
<p><em><span class="inlinemeta">From: H </span></em></p>
<p><em><span class="inlinemeta">To: Justin Cooper Sent: Tue Sep 29 07:16:33 2009 </span></em></p>
<p><em><span class="inlinemeta">Subject: Lost messages </span></em></p>
<p><em><span class="inlinemeta">I&#8217;ve lost all messages from 11/9 back to 2008. Anyway to recover since I had drafts saved?</span></em></p>
<p><em>Tuesday,September 29, 2009 7:28 AM </em></p>
<p><em>on behalf of Justin Cooper </em></p>
<p><em>B6 </em></p>
<p><em>Re: Lost messages </em></p>
<p><em>Yes. They are all backed up on the server the easaiest and quickest way is to log on to the webmail server and click on the drafts folder or the inbox. If you have not used the webmail happy to walk you through that or have huma help you. Your old berry has messages back to august 29 2009 and then only saved messages prior to that. The saved messages should be on your berry as well. </em></p>
<p><em>J</em></p>
<p><strong>New Gear for a New Year</strong></p>
<blockquote><p>Colin Powell that warned her that if people find out that she was using a Blackberry to do both personal and government business, then all that content including personal communications can become the official record and is subject to oversight and FOIA.</p></blockquote>
<p>&nbsp;</p>
<p>But wait, this is September of 2009, Clinton had a new server installed in her home after she became Secretary of State. Huma Abedin even set up an new URL called clintonemail.com  on January 13, 2009. It would appear that Clinton was using multiple email addresses for personal and official business with overlap between official and personal storage devices. Something not uncommon but increasingly frowned upon as governments turned to electronic communications and knowledge of hacking and data leaks grew exponentially.</p>
<p>On January 24, 2009 the State Department proposed putting together a secure communication system for her but she declined. It was actually former Secretary of State Colin Powell that warned her that if people find out that she was using a Blackberry to do both personal and government business, then all that content including personal communications can become the official record and is subject to oversight and FOIA.</p>
<p>As Secretary of State, Clinton was also surprised to discover that Blackberries were banned in sensitive communication areas or SCIFs. The standard procedure is to put all phones in a locker outside  and pick it up as you leave the secure area. Clinton&#8217;s office on the 7th floor of the State Department was a secure area and her phone was banned. Despite this she used her insecure phone backed up to her home server.</p>
<p>On March of 2009, after Clinton began her job as Secretary of State, Bryan Pagliano a Clinton aide turned State Department employee installed two new servers in the Clinton&#8217;s basement in Chappaqua New York. Delegated to her assistant Huma Abedin, Abedin turned to long time Bill Clinton assistant Justin Cooper,  &#8220;I usually called Justin. He was our go-to guy. He always was, you know, ‘I’m having a problem, can you help me fix it,’ and he always did…&#8221;</p>
<p>Cooper along with Doug Band had been around Bill Clinton since 2006 and by 2009 he pulled down <a href="https://www.washingtonexaminer.com/clinton-tech-aide-netted-six-figure-salary-from-foundation">a $127,200 annual salary</a> from the Clinton Foundation. Cooper not only helped the former President in his post Presidential career, but also helped him with his book and financials.</p>
<p>After Hillary lost the 2008,  Cooper helped Hillary Clinton with her comms and emails, Cooper turned to Bryan Pagliano who actually put the Clinton email system together. Tech savvy Cooper, watched the activity logs and made it clear to the young Pagliano that wanted to make sure that he had physical access to the server, something the more IT- sophisticated Pagliano didn&#8217;t agree with.</p>
<p><a href="https://www.reuters.com/article/us-usa-election-clinton-emails-idUSKCN11U0PG">Pagliano was smart enough to tell Clinton&#8217;s Chief of Staff Cheryl Mill</a>s of his concerns about the Clintons using a rudimentary home server and smart enough to refuse to testify in front of congress after being served with a subpoena. Pagliano, who worked for Clinton as a political appointee between May 2009 and February 2013, <a href="https://www.washingtonpost.com/world/national-security/in-clinton-email-investigation-justice-department-grants-immunity-to-former-state-department-staffer/2016/03/02/e421e39e-e0a0-11e5-9c36-e1902f6b6571_story.html?utm_term=.3e2be4b90656">was granted immunity</a> b the DoJ and also plead the fifth amendment multiple times and refused to cooperate with government investigations into Clinton&#8217;s emails. Clearly the disregard his client and boss had for secure communications was becoming criminal.</p>
<p>Clinton also had no interest in responding to the a request from the National Archives and Records Administration (NARA) as to <a href="https://abcnews.go.com/Politics/gop-accuses-state-dept-cover-protect-hillary-clinton/story?id=43050810">why Pagliano had so few emails </a>on record. The truth may simply be that Clinton used a Blackberry and kept her sensitive business off FOIA friendly .gov channels. Or perhaps Hillary Clinton was very knowledgeable about how communications can be used in politically motivated investigations.</p>
<p>As part of her job, Clinton had &#8220;SCIF&#8217;s&#8221;  (SCIF means <em>Sensitive Compartmented Information Facility)</em> installed in her northwest Washington DC home and in Chappaqua, New York, each with a secure phone and fax machine. Her favorite working tool was the lowly Blackberry cel phone, Clinton resigned herself do doing her sensitive office business with the three supplied secure phones, color coded for level of security but outside of the office Clinton and her &#8220;berry&#8221; were inseparable.</p>
<p>On March 18, 2009, Clinton&#8217;s new server set up was installed in Chappaqua, replacing what Justin Cooper would later confirm to Utah Rep Jason Chaffetz in his 2016 missing emails <a href="https://www.youtube.com/watch?v=Fy0AP7JqmaU">query</a> n 2016 an &#8220;out of the box solution.&#8221; running on one Apple G5 server and the by now ancient two iMacs, one in each Clinton home.</p>
<p>The new gear was good: a Dell PowerEdge 2900 running Windows Small Business Server and Microsoft Exchange and a Dell PowerEdge 1950 running Blackberry Enterprise Server to handle her and the staff&#8217;s Blackberry communications. A 3-terabyte hard drive was a good setup for a small to medium sized business and could handle the expected volume of emails Clinton&#8217;s team.</p>
<p>How email heavy was Hillary Clinton?  Outgoing not much but incoming was a lot. Clinton&#8217;s Chief of Staff, Cheryl Mills estimated she received an average of 500 emails a day at this time. There was no clear understanding of what was archived to where or by whom but the new server was reliable in handling the volume of traffic plus Blackberry comms. The servers automatically made daily backups and at some point an external Seagate back drive was added until September when a Cisco Network Attached Storage device was added. Servers are usually backed up to the cloud or stack of hard drives usually configured in a group of hard drives called a RAID (Redundant Array of Independent Disks) meaning if drive one goes down the others still have the data. Often these drives are swapped out in and kept in separate locations. In other words there are plenty of ways to backup data if a computer or drive goes down. The G5 server operated without encryption and even  the Clinton URLs did not have an SSL certificate until March 18, 2009 the date the new server was installed. SSL or Secure Sockets Layer allows encrypted links between a web server and a browser in an online communication.</p>
<p><strong>Gone Forever</strong></p>
<blockquote><p> It also meant that whatever Secretary of State Hillary Clinton was working on electronically as a government employee for the previous seven weeks no longer existed except in files and emails she might have sent to other people</p></blockquote>
<p>Despite all the various methods available to backup critical data and the seeming lack of basic safeguards, there was one major problem when the new server was installed, intentional or otherwise. When the new server and account <a href="mailto:hrod17@clintonemail.com" target="_blank">hrod17@clintonemail.com</a> was fired up all of Clinton&#8217;s previous emails and messages vanished. Forever. Without any any sense of suspicion this meant that when Clinton became an elected federal government official she deleted all of her emails and electronic communications. And the back ups.</p>
<p>It is important to note that the March installation/migration meltdown handled by, Cooper and Pagliano two competent IT Clinton insiders  It also meant that whatever Secretary of State Hillary Clinton was working on electronically as a government employee for the previous seven weeks no longer existed except in files and emails she might have sent to other people. In corroboration of this, Clinton did not provide any emails before March 19, 2009 to the FBI. To the casual observer, the complete and total destruction of all emails and associated attachments was a clear indication that even though Hillary was a Blackberry Luddite, she know how and when to burn the evidence.</p>
<p>The DNC hack would later show the cross over between Clinton&#8217;s personal, business and Clinton Foundations communications as Chelsea Clinton, John Podesta and members of both Clinton&#8217;s staff would cross pollinate discussions and emails. It could be expected that the missing emails could also contain that same structure. Just as Colin Powell hard warned her earlier about the need to separate personal and business. Let alone classified and Secret communications.</p>
<p>Luckily Huma Abedin was the main conduit for Clinton&#8217;s communications. She used a Dell Innova laptop that she shared with her husband Anthony Wiener. Clinton would regularly send, cc and bcc emails from her Blackberry to Abedin for print out or discussion later. It was not known what security was installed on the Innova laptop but anyone who had access to either computer would know the location and ID of everyone on the network.</p>
<p>This mundane laptop will feature prominently in Clinton&#8217;s career and not in a good way.</p>
<p>After the disappearance of the first round of personal and government emails, the previous Apple computer hard drive and we assume back ups were wiped clean and repurposed to a Clinton staff member. This type of cavalier handling of government and personal communications would be viewed by investigators as a convenient and deliberate attempt to hide communications rather than the Clinton&#8217;s technical incompetence. But without any emails or Blackberry comms surviving what evidence was there other than the act of destroying the data?</p>
<p>Clinton had very savvy tech people handling and closely guarding her data. When matched up against Clinton&#8217;s legal background and long years in public office with <a href="https://medium.com/@kfrydl/hillary-clintons-private-email-server-4e799a298eaf">full knowledge of the laws </a>that require preserving federal and Presidential records the two month missing email gap becomes suspicious and self serving.</p>
<p>If you add the reality that &#8220;Evergreen&#8221; (as Clinton was codenamed by the Secret Service) was surrounded by security staff and was constantly aware of the strict protocol for transmitting and storing classified, secret and other sensitive government communications the potential for deceit becomes more obvious. Matched up against the clear difference between a server, a backup storage devices, networks, email software, text messages, Blackberry communications and the need to use encryption, passwords, security protocols etc etc. it becomes more problematic. For a person holding one of the most important positions in the world dealing with sensitive diplomatic discussions worldwide,  not caring about the handling and whereabouts of her communications is well, criminal.</p>
<p>Let&#8217;s work the argument that  Hillary Clinton didn&#8217;t know or didn&#8217;t care about all this&#8230;</p>
<p>The FBI estimates that Clinton went through about a dozen different Blackberries while Secretary of State, Huma Abedin estimates 11and says that Hillary didn&#8217;t even know her own login information. Cooper remembers smashing a couple of Blackberries but it is not know what happened to the others. Clinton preferred the older BlackBerry Curve 8310 with the trackball and would switch handsets based on email was just a small part of her commutation stream, only about a dozen people sent emails. Most went through Abedin, who used the soon to be infamous cheap consumer laptop. There is no evidence of Clinton using a laptop or computer so it can be assumed that Clinton&#8217;s aging non secure Blackberry was the weapon of choice and Abedin&#8217;s cheap laptop that she shared with her husband were the communication node. Again with all these duplicate devices and backups. Where are the missing emails?</p>
<p><a href="https://www.politico.com/magazine/story/2016/09/hillary-clinton-emails-2016-server-state-department-fbi-214307"> Journalist Garrett M. Graff working for Politico</a> stitched together numerous interviews and documents to paint the clearest story of a group of civil servants simply not able to keep up with technology and dodging rules in the interest of getting things done. That same incompetence. That James Comey would carefully describe as “extremely careless” in an official statement July 5, 2016.  Again let&#8217;s just assume that Hillary was behind the curve on technology and security. Let&#8217;s also assume that Huma Abedin was the central hub for most of Clinton&#8217;s email traffic. It would be more likely that a smart hacker would go after an associate to get Clinton&#8217;s emails. Let&#8217;s say like, Clinton confidante <a href="https://www.politico.com/story/2013/03/report-blumenthal-email-hacked-088928">Sydney Blumenthal</a> who had his archaic AOL account hacked in March of 2013, or John Podesta who in March of 2016 was told to go ahead and click on a bad link that uploaded his password to Russian hackers.</p>
<p><strong>Everybody Must Get Hacked</strong></p>
<p>The list of outside hacks and successful breaches against Clinton staff and friends is impressive.</p>
<p>The first official time Clinton&#8217;s personal server was severely attacked was January 9, 2011 according to Clinton employee and server custodian,  Justin Cooper in an interview with the FBI. Someone was using a software program to try multiple passwords to get in. Cooper actually turned the server off. The IP address was quickly blocked. The Clinton server was set up so only a few people could access it, firewall logs and notices were sent to Cooper. Pagliano knew this was deliberate and serious. Cooper also told Abedin that someone was trying to hack into the server. What kept the email safe was the small number of users despite the vast numbers of attempts to guess the passwords.</p>
<p>By the spring of 2011 The Clinton&#8217;s email server was under full assault. A number of Clinton&#8217;s employees in the State Department employees had been phished and typed in their personal Gmail and Yahoo accounts</p>
<p>On March 11,  Eric Boswell, the State Dept security head sent an email to everyone warning of the attacks but it wasn&#8217;t until June that Pagliano trekked to Chappaqua to upgrade the two servers.  The FBI would use forensics and determine that it wasn&#8217;t u until January 2013 that someone managed to hack into the Clinton server. The trail was left by someone using the Tor browser and three times, successfully rummaged through a female aide to Bill Clinton. The official version is that this is the only successful hack into the Clinton server. Hillary Clinton would resign as Secretary of State on February 1, 2013.</p>
<p>In would be in March of 2013, that Guccifer would hack into Sydney Blumenthal&#8217;s email and Colin Powell&#8217;s AOL account, again by resetting the passwords using clues. Guccifer aka Lazar was able to get 30,000 emails, the attachments and address books. The next morning when Blumenthal realized he had been locked out he reset his password and no idea he had been hacked. Now remember the number of times that Clinton staffers were locked out or tried to log into their accounts.  By March 15, the Clinton email URL was public and the server was constantly scanned for weaknesses by Russian sources.</p>
<p>So who was hacking Clinton so hard?</p>
<p><strong>Putin Denies This</strong></p>
<blockquote><p>On December 3, 2011, Clinton <a href="https://www.youtube.com/watch?v=Lv2X3dZdeyQ">spoke out a</a>gainst Russian &#8220;elections that were neither free nor fair&#8221;</p></blockquote>
<p>Vladimir Putin was a former Lt Colonel in the KGB, a spy turned nationalist who had effectively ruled Russia since a curious string of apartment bombings launched him into to power in 1999. He was running for election as Prime Minister in 2009, after taking a time as President due to term limits letting his close friend Dmitri A. Medvedev be President.  He made a powerful outdoor speech in front of an estimated 100,000-supporters at the Luzhniki Stadium on February 23, demanding that foreign interference in Russian affairs should not be allowed.</p>
<p>Vladimir Putin didn&#8217;t like Obama&#8217;s well intentioned February 2009 &#8220;<a href="http://www.washingtonpost.com/wp-dyn/content/article/2009/02/07/AR2009020700756.html?nav=emailpage">reset</a>&#8221; of U.S./Russia relations. America had sat out Putin&#8217;s successful war to steal back Chechnya but pushed back as Russia made a grab for parts of neighboring Georgia. In July, 2009,<a href="https://www.nytimes.com/2009/07/08/world/europe/08prexy.html"> President Obama met with Putin</a> and President Medvedev. In the Moscow meeting, Putin monopolized a breakfast meeting lecturing Obama in a monologue about Russia’s perspective of global politics.</p>
<p>Putin also didn&#8217;t like Obama&#8217;s new hawkish Secretary of State, Hillary Clinton. Putin had <a href="https://www.nytimes.com/2011/12/09/world/europe/putin-accuses-clinton-of-instigating-russian-protests.html%20">accused Hillary Clinton of creating unrest</a> in Russia and manipulating the Russian elections.  Prime Minister Putin <a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/03/19/AR2010031902065.html">scolded Clinton publicly in March of 2010</a>. He was upset that sanctions on Russian companies doing business in penalties on firms doing business with Iran, Syria and <a href="http://www.washingtonpost.com/wp-srv/world/countries/korea.html?nav=el" target="">North Korea</a> was hurting business.</p>
<p>On November 27, 2010 there are a <a href="http://www.judicialwatch.org/wp-content/uploads/2016/11/JW-v-State-Pagliano-Secret-Service-01441-1.pdf">number of attempts to penetrate</a> the Clinton server as detailed in a series of emails between Clinton techs Cooper and Pagliano. Denial of Service attacks, multiple failed log in attempts from at two staffers could also have meant someone changed their passwords forcing them to reset them again to gain access after the hack.</p>
<p>On December 3, 2011, Clinton <a href="https://www.youtube.com/watch?v=Lv2X3dZdeyQ">spoke out a</a>gainst Russian &#8220;elections that were neither free nor fair&#8221; Putin later accused Clinton of disrupting Russians parliamentary elections and blamed her for sending &#8220;signals&#8221; to Russian groups to protest. There is no evidence to support a link between Putin&#8217;s anger at Clinton and the brute force attempt to hack her server but the timing is worth remembering. As 2011 developed more and more hacking attempts against State Department employees began to unnerve staff as they received more and more &#8220;spearphishing&#8221; emails.</p>
<p>Before we leave the topic of Justin Cooper as the loyal Clintonite advisor and IT soldier  it is important to note that Clinton daughter Chelsea accused Cooper of loading spyware onto Clinton related emails accounts and devices. &#8220;I know Justin reads my Dad&#8217;s emails&#8217; Chelsea would complain in a <a href="https://wikileaks.org/podesta-emails/emailid/12401">leaked</a> DNC email to John Podesta. Chelsea accuses Cooper of multiple acts of wrongdoing in a November 2011 email including loading spyware on a Clinton foundation staffer&#8217;s computer; &#8220;Ilya  (Ilya Aspis was a special assistant to Bill Clinton at the Clinton Foundation<em>) </em>physically saw/caught Justin a couple of days ago reading his bberry and loading the same spyware onto his computer that he loaded onto Bari&#8217;s (Bari Lurie, an assistant to Chelsea Clinton). computer&#8221;</p>
<p>She continues, &#8220;multiple people shared with me how upset they were at hearing how Justin referred to my father in the last week in very derogatory ways widely sadly &#8211; Oscar told my father he knows Justin reads his emails&#8221;, then Chelsea wraps up,  &#8220;As ever, on some of the above I am sure there are three sides as my grandmother would say &#8211; his, hers and the truth.&#8221;</p>
<p>Again Cooper had worked with in the White House and with the Clinton&#8217;s since 1999 and was a key part of the Clinton Foundation, Clinton Global Initiative and the Clinton Family Foundation.  The Clinton daughter&#8217;s account of Cooper not just a falling out with her father, but hacking into other Clinton devices would bring his need to have access to the Clinton server at Chappaqua into question as well.</p>
<p>Justin Cooper worked for the Clinton&#8217;s for 15 years but according to Chelsea, by late 2011 he was clearly not a happy man.</p>
<p>So four years later after Guccifer broadcast Clinton&#8217;s email and URL to the world, there was a decision to change data storage again. but they didn&#8217;t forget the email Apocalypse of March 2009. <a href="https://wikileaks.org/clinton-emails/?q=&amp;mfrom=Monica%20Hanley">Monica Hanley</a> Hillary&#8217;s &#8220;confidential assistant&#8221;, began carefully downloading all of Hillary&#8217;s emails from her email accounts onto a old MacBook borrowed from Bill Clinton&#8217;s office. The logic was that these emails would be helpful in writing Clinton&#8217;s autobiography. In April, it was <a href="https://www.washingtontimes.com/news/2013/apr/5/hillary-clintons-book-advance-hovers-14m/">announced</a> that she would be paid $14 million dollars to write &#8220;Hard Choices&#8221;, the book that was designed to begin her journey to run for President of the United States. Emails, that were not considered important enough by Clinton to be kept as official records on government servers.</p>
<p><strong>Backing Up The Past</strong></p>
<blockquote><p>It appears that Hillary Clinton put importance on retaining her electronic communications.</p></blockquote>
<p>&nbsp;</p>
<p>We know the that the Cintons used a plugged Apple. G5 server and lost months of data when they upgraded to a new Dell server at the advice of her employer while Secretary of State. We also know that on June 30 2013 in her return to private life,  Clinton physically migrated her servers and the data that was on her servers at her home to a professional data management company in New Jersey called Platte River Networks. They kept the old servers running for 60 days before migrating to a modern cloud based system backup. The &#8220;cloud&#8221; stores data across multiple networked storage systems and is better than traditional hard drive or swap out RAID back up. But when the Clinton people found out that her old server was being backed upon the cloud, they specifically terminated that feature. They went back to a traditional hard drive back system.  This is pretty convincing proof of an premeditated need to control data should it need to be quick deleted rather than to archive it. By February 2014, Clinton assistant, Monica Hanley had finished loading 5 years of Clinton&#8217;s emails on to the Mac Laptop. She shipped it to New Jersey and them them back it up to an archive email account. The hope at the time was that the emails would also be useful in writing her future memoir.</p>
<p>The exposure of the email account encouraged Clinton’s aides to change the secretary of state’s address. Abedin selected <a href="mailto:hrod17@clintonemail.com" target="_blank">hrod17@clintonemail.com</a>, but the staff feared that they’d lose her existing emails when they changed addresses, so Monica Hanley retrieved an old MacBook laptop from Bill Clinton’s Harlem office and spent several days at her apartment transferring years of Hillary’s emails from the server files into Apple’s Mail program on the laptop.</p>
<p>It appears that Hillary Clinton put importance on retaining her electronic communications.</p>
<p>To understand just how aggressive and often hackers targeted the White House, we go back to the trail of evidence from the Dutch counterespionage group who watched the emails of the White House being hacked in the summer of 2014. As the Russian state spies become emboldened, they watched the attack on the State Department in November of that year. Note that the discussion about the DNC hack narrative removes Hillary Clinton’s very real exposure to hackers and that the White House had been hacked in the summer of 2014.</p>
<p>According to<span class="apple-converted-space"> </span><a href="https://english.aivd.nl/about-aivd/the-aivd-who-we-are">AIVD</a> a unit of<span class="apple-converted-space"> </span><a href="https://www.volkskrant.nl/wetenschap/dutch-agencies-provide-crucial-intel-about-russia-s-interference-in-us-elections~b4f8111b/">Dutch intelligence</a>, the cyber team watched Russian state hackers successfully phish the White House as far up the chain until they got into President Obama&#8217;s emails. They did not get access to Obama&#8217;s secure Blackberry but by 2014 it was clear the U.S. government had been compromised at the highest levels.</p>
<p>The Dutch agency had located a building in the university complex off Red Square in Moscow where hackers using Cozy Bear tools routinely went after foreign state assets. By November of 2014, the 10 or so Russian hackers working in Moscow had enough email addresses from their White House hack to go after a State Department target. The Dutch patched in the Americans and for 24 hours a cyber battle waged between the Russians and the Americans as the Russians tried to get into State Department computer systems. As the Americans blocked access to their servers, the Russians try various techniques and hacks. None succeeded. Towards the end of 2015, the American hackers at the NSA have used new technology to force their way into mobile phones of a number of targeted Russian GRU intelligence officers. Finally, the counter hack was discovered by the Russians and they shut out the Dutch.</p>
<p>The word &#8220;watch&#8221; is used repeatedly in this description that is because the Dutch had not only managed to penetrate the Russian hacking network, they had access to the security cameras in the Moscow hacker&#8217;s building allowing them to watch in real time.</p>
<p>That evidence along with evidence that Trump insides were actively colluding with Russian intelligence agents was turned over to Robert Mueller to begin his investigation into Russian interference during the election.  An election that began with a scandal over Clinton’s missing emails and then morphed into an investigation into allegations about Trump’s links with Russians to influence the election.  Concerns about attacks on the U.S. government were not idle concerns as American went into the 2016 elections but the Democrats were compromised long before it hit the election cycle news.</p>
<p>The noise from clashing narrative drowned out a lot of the laser type forensics being done by nerds on the internet. Nerds who actually knew what they were talking about.</p>
<p><strong>Who Among You Has Not Been Hacked?</strong></p>
<blockquote><p>Clinton had ordered someone to wipe out her servers and backups between December. 5, 2014, and March 27, 2015.</p></blockquote>
<p>The stains of three narratives flow and intermingle was the DNC hack an inside job by a disgruntled employee, did the data get hacked by an unemployed Romanian cab driver or was this a sophisticated orchestrated attack by a hostile nation? Or was it all three? The answer is likely to be the latter.</p>
<p>In December 2014 after discovering that Clinton never used a .gov address,  the State Department asked for her emails, Hillary Clinton through her lawyers handed over over 30,490 separate emails but there were on 55,000 pages in 12 banker’s boxes</p>
<p>Clinton set up a new URL for her email &#8220;hrcoffice.com&#8221;</p>
<p>On March 2, 2015 the New York Times revealed Clinton had not used a .gov email address, triggering the House Select Committee on Benghazi to subpoena her emails.</p>
<p>During the Benghazi investigation, Clinton&#8217;s true mastery of her personal data was revealed. In the fall of 2014, Clinton said her lawyers had reviewed all the emails on her server, Specifically the &#8220;hdr22@clintonemail.com&#8221; account between January. 21, 2009, to February. 1, 2013. &#8220;After the review was completed to identify and provide to the Department of State all of the secretary&#8217;s work-related and potentially work-related emails, the secretary chose not to keep her non-record personal emails and asked that her account (which was no longer in active use) be set to retain only the most recent 60 days of email.&#8221;</p>
<p>&#8220;No emails from hdr22@clintonemail.com for the time period Jan. 21, 2009, through Feb. 1, 2013, reside on the server. Thus, there are no hdr22@clintonemail.com e-mails from Secretary Clinton’s tenure as secretary of state on the server for any review, even if such review were appropriate and legally authorized.&#8221;</p>
<p>Clinton had ordered someone to wipe out her servers and backups between December. 5, 2014, and March 27, 2015.  The FBI <a href="https://www.nationalreview.com/2015/08/hillary-clinton-email-server-seized-fbi/">would not seize Clinton&#8217;s servers</a> until five months after they discovered them.</p>
<p>On March 16, 2016 WikiLeaks announced that they had &#8220;dumped over 30 thousand emails &amp; email attachments sent to and from Hillary Clinton&#8217;s private email server while she was Secretary of State. The 50,547 pages of documents span from 30 June 2010 to 12 August 2014. 7,570 of the documents were sent by Hillary Clinton.&#8221;These emails were not hacked but a direct result of a Freedom of Information Act or FOIA&#8221;</p>
<p><a href="http://dangerousmagazine.com/2018/07/29/hack-part-four/%20‎">Continue to Part Four</a></p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/07/19/hack-part-tworobert_young_pelton/">The Hack &#8211; Part Three: Deception and Deceit</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2018/07/19/hack-part-tworobert_young_pelton/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Hack Part One &#8211; The Attack On America</title>
		<link>http://dangerousmagazine.com/2018/07/19/hack-part-one/</link>
		<comments>http://dangerousmagazine.com/2018/07/19/hack-part-one/#comments</comments>
		<pubDate>Thu, 19 Jul 2018 16:26:35 +0000</pubDate>
		<dc:creator><![CDATA[Lisa]]></dc:creator>
				<category><![CDATA[New Issue]]></category>
		<category><![CDATA[Clinton]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[DNC]]></category>
		<category><![CDATA[Emails]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Steele]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[Wiki]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2357</guid>
		<description><![CDATA[<p>&#8220;And then secondly, sir, does the Russian government have any compromising material on President Trump or his family? PRESIDENT PUTIN:  (As interpreted.)  (Laughs.)&#8221; Sometimes What You Think Happened Is What Someone Wants You To Think Happened. By Robert Young Pelton Note: The name of the cyber company and the owners have been changed. It’s midnight in Manhattan, Friday January 13th, 2017 and someone is hacking into Rudolph Giuliani’s server at his corporate headquarters.  A few hours earlier Giuliani, head of a...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/07/19/hack-part-one/">The Hack Part One &#8211; The Attack On America</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><em>&#8220;And then secondly, sir, does the Russian government have any compromising material on President Trump or his family?</em></p>
<p><a href="https://www.whitehouse.gov/briefings-statements/remarks-president-trump-president-putin-russian-federation-joint-press-conference/">PRESIDENT PUTIN</a>:  (As interpreted.)  (Laughs.)&#8221;</p>
<div id="attachment_2373" style="width: 1098px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/07/180221-F-SK383-0012A.jpg"><img class="size-full wp-image-2373" src="http://dangerousmagazine.com/wp-content/uploads/2018/07/180221-F-SK383-0012A.jpg" alt="Cyber-warfare specialists serving with the 175th Cyberspace Operations Group of the Maryland Air National Guard engage in weekend training at Warfield Air National Guard Base, Middle River, Md., Jun. 3, 2017. (U.S. Air Force photo by J.M. Eddins Jr." width="1088" height="784" /></a><p class="wp-caption-text">Cyber-warfare specialists serving with the 175th Cyberspace Operations Group of the Maryland Air National Guard (U.S. Air Force photo by J.M. Eddins Jr.</p></div>
<p><strong>Sometimes What You Think Happened Is What Someone Wants You To Think Happened.</strong></p>
<p>By Robert Young Pelton</p>
<p>Note: The name of the cyber company and the owners have been changed.</p>
<p>It’s midnight in Manhattan, Friday January 13<sup>th</sup>, 2017 and someone is hacking into Rudolph Giuliani’s server at his corporate headquarters.  A few hours earlier Giuliani, head of a cyber security provider and senior advisor to a <a href="http://www.gtlaw.com/People/Rudolph-W-Giuliani">law firm</a> was just announced as Trump’s guru on cyber security for the President Elect. The timing of the hack less than a few hours later is not a coincidence. Giuliani’s cyber team had knocked off for the weekend at noon.  Giuliani no stranger to the media but not known for his cyber security skills had appeared on Fox and Friends the day before to boast about his new cyber security effort.</p>
<p>I am on a conference call with the members of SybrTek (the name has been changed at the companies request), a new Texas-based cyber security and big data startup that could be described as the real world equivalent of the Cyber Expendables. Five men each with deep experience singularly and collectively inside the CIA, NSA, JSOC, NASA, SEALS and other government agencies. The “black” teams that support Special Mission Units and covert operations that go as far back as Angola and 80’s Afghanistan. Like a comic book super team, each has an unusual skill in addition to their military and intel training; hacking, jamming, disinformation, Psyops, etc, all honed in real world counter terrorism missions and now available for hire.</p>
<p>These men are not bespectacled nerds yelling “I’m in!” but they are combat vets pushing 60 with the usual assortment of paunches, bad necks, fading vision, military pension checks and about 150 combined years of experience fighting terrorists on the electronic and mud battlefields. They also know that demand for their services is high. America is losing the cyber war not because of terrorists or hackers, but because one of their main enemies was, and is, the glacial pace of their own government to adapt and change to new technology.</p>
<p>Now that they retired they are free to surf the big wave, 30 to 60-day cycle of cyber tool development. Not surprisingly their first clients were overseas. Sentiment tracking of the population for Saudi Arabia’s government to measure the impact of change was one task. Could the kingdom survive a sales tax? How far could they shift to more moderate politics without triggering an uprising? These dull questions are the lifeblood of data analytics.</p>
<p>Their new company deals with the never ending and ever changing problems of hackers; The high level and low level espionage that has been hogging the headlines every since Hillary Clinton wiped her server with a cloth. These men battle in the world of Information Operations aka Strategic Communications aka psyops aka Influence Operations aka dirty tricks. A battleground of selective and targeted information designed to create an alternative universe.</p>
<p>This might require deceiving your opponent,  hacking the enemy, black bagging a server by breaking in and physically stealing computers and hard drivers, creating rumors or fake news or even generating false documents (the OSS called them &#8220;Black Letters&#8221; in World II), use psychographic profiles to target and rile up certain &#8220;excitable&#8221;groups, create confusion by rapidly injecting conflicting evidence or statements, run &#8220;false flag&#8221; operations to fool the enemy and even distribute manufactured or real scandal that might include video of sexual activity, something the Russians call &#8220;kompromat&#8221;.</p>
<p>Most of these tactics are not actually the end result but are created by proxies to generate secondary and tertiary effects like public outrage, scandal, loss of confidence.  Ideally a population can be controlled by outside forces if they lose trust in their leaders, leaders are  less subject to accountability if the media loses the trust of the public in publishing what is true and what is false.</p>
<p>This group of battered and bruised warriors, hope their dark mastery of the full spectrum of &#8220;strategic communications&#8221; will match the government, business and public&#8217;s sudden realization that the once militarized doctrine of psyops has now become a everyday marketing weapon against civilians. The recent publicity involving Cambridge Analytica, Facebook and election marketing are just a few examples of a new deceptive assault on our senses and thought process.</p>
<p>They hope that harnessing their skills of gathering human intelligence to understanding marketing trends, to even geo-targeting individuals to within a 3 by 3-foot space will provide truth and clarity to clients. Tonight however, they are just trying to find someone to report the hack of Giuliani to. Something the SybrTek team had been doing for members of the Trump transition team since the summer of 2016.</p>
<p>+ + +</p>
<p>Finally our interview was interrupted by an urgent telephone call from the client. “Someone is trying to hacking Giuliani” repeats the former operative to the computer executive as he   watches the screen on his laptop. The hacker has logged in through a backdoor on Giuliani&#8217;s site put there by Anonymous. “Somebody didn’t put a patch on some old software and they are in” says one cyber analyst.  “You can tell Anonymous by its malware” he says matter of factly while watching the digital stranger poke around Giuliani’s New York-based server called http://giulianipartners.com.. The timing is perfect. Maybe the new government will take cyber security seriously and they might get a contract.</p>
<div id="attachment_2366" style="width: 1210px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/07/Fox-Friends.jpg"><img class="wp-image-2366 size-full" src="http://dangerousmagazine.com/wp-content/uploads/2018/07/Fox-Friends.jpg" alt="Fox-Friends" width="1200" height="614" /></a><p class="wp-caption-text">January 12, 2016 &#8211; Rudy Giuliani on Fox and Friends discussing his new role as cyber security organizer for President Trump. His server was hacked hours later.</p></div>
<p>In early January of 2016, Presidential candidate Donald Trump mentioned that he would bring in private individuals to work on cyber security. He was quickly learning that the vast machine that is the government is slow to react and even slower to adopt rapidly changing threats against computer systems. That 30 &#8211; 90 day battlefield during which hackers and counter hackers joust back and forth, generating new software and tricks.</p>
<p>Rudolph Giuliani then went on Fox &amp; Friends on the morning of January 12, saying that he was going to &#8220;<a href="http://video.foxnews.com/v/5279565760001/?#sp=show-clips">coordinate all this</a>&#8220;. Giuliani is not known for having any experience in cyber security but he did have a consultancy and had a broad business based from his post 9/11 popularity. By that evening, his server was under assault. Keep in mind, it wasn&#8217;t the hack, there was nothing of value on the cheap web page, it was the secondary effect of being hacked, that the hackers were after.</p>
<p>Russians weren&#8217;t doing the hacking. That night on Twitter, Kansas-based cyber security expert,  <a href="https://twitter.com/fienen/status/819657572483563520">Michael Fienen</a> found himself the <a href="https://www.facebook.com/michael.fienen">star</a> of a real time <a href="https://www.sacbee.com/news/politics-government/article126490159.html">social media crowd attack</a> on Giuliani’s server as thousands of computer nerds began picking apart every aspect of the Giuliani’s servers security or lack thereof. After a long night of real time tweets and surprised at his sudden viral fame, he <a href="https://twitter.com/fienen/status/819772871455084545">posted</a>. “If I&#8217;d known this was gonna blow up like it did, I&#8217;d have given it a witty hashtag. Someone else said #RudyOnRails (a pun on Ruby On Rails <a href="https://rubyonrails.org">open source software)</a> and that made me laugh.”</p>
<p>Tech critics publicly <a href="http://www.theregister.co.uk/2017/01/13/giuliani_joomla_outdated_site/?mt=1484391320350">lambasted</a> Giuliani’s <a href="https://regmedia.co.uk/2017/01/13/5479857698456.jpg">system</a> and his simple page for being outdated and easy to penetrate. Critics pointed that the web site using doing everything wrong from running Flash to having multiple open ports to having an expired SSL certificate. It wasn’t that hard.</p>
<p>+ + +</p>
<p>“Hacking”, the criminal electronic act of breaking and entering into a computer or email system to steal or access information is little different than the 1972 Watergate break in and wiretapping of the Democratic National Headquarters hatched by ex-FBI agent, G. Gordon Libby. That analog hack was discovered by a night watchman and later exposed to be part of a much more nefarious election plan by journalists Bob Woodward and Carl Bernstein of the <em>Washington Post</em>. Although hacking is a common as physical theft, the act becomes magnified during political campaigns generating doubt in &#8220;the system&#8221;. A fictional idea that governments are somehow secure and moral.  Political hacking adds a cinematic measure of deceit and intrigue when compared to simply data or information theft from consumers.</p>
<p>In the room with the SybrTekpatched in by phone, the conversation stops as they monitor the activity going in and out of the <a title="" href="http://www.giulianipartners.com/" target="_blank">giulianipartners.com</a> server.</p>
<p>“Holy shit, they just sent Giuliani an email from his own server.</p>
<p>“Did you contact him?</p>
<p>“I just sent one of his guy’s a text”</p>
<p>“Do you want to stop it? This is going to be really fucking embarrassing tomorrow if he gets in”</p>
<p>“We can’t, it’s against the law, we could but a bot on this and send it back to the hacker”</p>
<p>This hack on Giuliani is just one of thousands of attempts every minute against high profile targets particularly against members of political parties. And they are almost impossible to stop and harder to prosecute. Again, this real life hacking scenario was designed to have what is called a &#8220;secondary effect&#8221;: Embarrassing a Trump team member with the idea that a cyber consultant got hacked within hours of the announcement. Much like the search for Clinton&#8217;s missing or deleted or classified emails became the singular scandal of the election.</p>
<p>This hack occurs just after midnight, there is no one in the office, it is when most companies back up their files and if the hacker findsanything of value the appointment of Giuliani and the media payments for scandalous dumps would make the exercise worthwhile. Luckily it is caught and reported to the government authorities by SybrTek. Again, hacking favors the criminal because counter hacking is just as illegal as hacking.</p>
<p>+ + +</p>
<p>The SybrTekcrew rattle off a list of major hacks of political figures on both election teams in the last few months.  Jim (an alias) for a former Navy SEAL says “Information is worth money. <a href="http://www.washingtonexaminer.com/wikileaks-offers-30000-bounty-for-evidence-of-obama-officials-destroying-records/article/2610930">There is a $30,000 bounty from Wikileaks</a> for anyone providing proof that Obama is deleting or dumping data. Hackers have been after Trump, his family, the foundations and major supporters forever.&#8221;</p>
<p>Jim insists that in the closing hours of the Obama administration IT techs were removing the markers from hard drivers rendering them impossible to search but maintaining the data on the drives.</p>
<p>&#8220;Trump can brag that the RNC didn’t get hacked but it was actually just easier to hack the DNC.”</p>
<p>Hacking is illegal, it’s theft, digital breaking and entry, but it is the new normal. Millions and millions of servers have been compromised with all the sensitive and exploitable data along with. Swingers sites like Ashley Madison, email accounts like Yahoo, financial sites complete with addresses, credit card numbers and even the Federal Government’s employee data all end up somewhere for sale somewhere.   It’s not personal, it is just a business.</p>
<p>Listening to the real time hack and discussion in the background, we discuss just how vulnerable our government and their employees are.</p>
<p>“The transition team’s emails are all compromised” says Ray, a former CIA Special Activities Division/Ground Branch officer and Marine, “we were helping some of the team defend against hackers on their personal and business emails but they now have to use a dot gov address. We discovered that the transition emails were hacked in 2008 and 2009 with malware that the government didn’t’ notice. Why because they didn’t’ need to use them in 2012 and it wasn’t until a few weeks ago that we ran some <a href="https://www.dhs.gov/national-cybersecurity-and-communications-integration-center">tests and found the bug. We reported it to the NCCIC National</a> Cyber Security and Communications Integration Center and a few other places. That bug has gone on to infect 140 different government departments.” Ray explains. “We could fix it quickly but then again it would be against the law” Ray says with a slice of irony. According to the 586-page report records and submissions to the NCCIC, as of January 13,2017 so far nothing has been done by the Department of Homeland Security.</p>
<p>+ + +</p>
<p style="text-align: center"><em>&#8220;I will say this: I don’t see any reason why it would be, but I really do want to see the server.  But I have — I have confidence in both parties.  I really believe that this will probably go on for a while, but I don’t think it can go on without finding out what happened to the server.  What happened to the servers of the Pakistani gentleman that worked on the DNC?  Where are those servers?  They’re missing.  Where are they?  What happened to Hillary Clinton’s emails?  Thirty-three thousand emails gone — just gone.  I think, in Russia, they wouldn’t be gone so easily.  I think it’s a disgrace that we can’t get Hillary Clinton’s 33,000 emails&#8221;</em> &#8211; <a href="https://www.whitehouse.gov/briefings-statements/remarks-president-trump-president-putin-russian-federation-joint-press-conference/">President Donald Trump</a></p>
<p>The Intelligence community insists that America is at war with hackers, specifically Russian hackers.  On January 2017, the DNI released a comprehensive <a href="https://www.dni.gov/files/documents/ICA_2017_01.pdf">report</a>, “Background to “Assessing Russian Activities and Intentions, in Recent US Elections”: The Analytic Process and Cyber Incident Attribution”. On Friday July 13, 2018 the DoJ indicted 12 Russian hackers and alleged that Russian intelligence agents were behind the hack of the Democratic National Committee and other computers. The <a href="https://www.justice.gov/file/1080281/download">indictment</a> is very focused, much of this publicity on hacking, cyber security and missing emails started with the controversy around Hillary Clinton’s use of private servers and the deletion of an estimated 31,830 of the 62,320 emails on her server.</p>
<p>The indictment was also well timed, being dropped just before President Trump was to meet with Russian President Vladimir Putin. It was clear, the Department of Justice and related agencies were painting a red bullseye on Vladimir Putin, a former Russian spy and naming names. Just before President Donald Trump was about to make a &#8220;<a href="https://www.economist.com/node/21716609/comments?page=5">grand bargain</a>&#8220;, in a private meeting and with Russia, America&#8217;s former public enemy #1</p>
<p>But let&#8217;s go back</p>
<p>The connection between President Trump and SybrTek began with Lt General Mike Flynn. Some of the men on the team worked with Flynn’s during his 33-year military career, particularly during his time in Iraq and Afghanistan. Flynn is now a civilian and in the early days of the campaign, was often seen at the side of the yellow haired, casino owner turned reality TV host. The flamboyant Trump and his grim-faced war horse advisor made for an odd couple  A lifetime Democrat, Flynn was part of an advisory group of ex-intel leaders who made themselves available to council candidates about the threats to national security. In July of 2016 Flynn had released a book penned by well-known Neocon Michael Ledeen called “The Field of Fight: How We Can Win the Global War Against Radical Islam and Its Allies Hardcover” and was quite vocal about the need to destroy ISIS.  The hatchet faced and taciturn Flynn had a calming effect on Trump during the campaign according to the SybrTekteam members.</p>
<p>Flynn became a sage advisor who provided Trump clear analysis of confusing events, his battle cred and rough style also appealed to Trump’s fans. Not surprisingly,  Flynn was Trump&#8217;s original pick for Vice President.  A few off-putting TV appearances and some over enthusiastic public speeches in which he led anti-Hillary chants to “Lock Her Up” showed that the man who worked in the shadows might not be cut out to be in the glare of the spotlight. Flynn also had enemies on home turf. In addition to his hardline view on ISIS, Flynn’s greatest sin is that he wanted to stop the revolving door black budget gravy train inside the major intelligence agencies. Money that is generously back doored to faithful intel retirees. Money that is in the billions and will never be held accountable to the public. Back i January of 2010. Flynn even suggested that spies should be <a href="http://online.wsj.com/public/resources/documents/AfghanistanMGFlynn_Jan2010.pdf">more like journalists</a> in a controversial report that surprised the intelligence community.</p>
<div id="attachment_2391" style="width: 1098px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/07/151021-A-ZZ999-999.jpg"><img class="size-full wp-image-2391" src="http://dangerousmagazine.com/wp-content/uploads/2018/07/151021-A-ZZ999-999.jpg" alt="The military has some of the most sophisticated computer tools and techniques. The problem is we fight wars in counties where the even electricity is an innovation." width="1088" height="723" /></a><p class="wp-caption-text">The military has some of the most sophisticated computer tools and techniques. The problem is we fight wars in counties where even electricity is an innovation.</p></div>
<p>Although Flynn was an Obama pick to run the DIA, Flynn’s aggressive style soon banded the career bureaucrats together into an angry cabal and he was forced out a year early. In demand as an intel pundit, he started <a href="https://www.linkedin.com/company/flynn-intel-group">Flynn Intel Group</a>. His equally aggressive efforts to woo foreign clients became the target of negative media, focusing on his unregistered <a href="http://www.huffingtonpost.com/david-l-phillips/lt-gen-michael-t-flynn-gu_b_13013248.html">lobbying</a> and foreign meetings to pitch his intel firm including his <a href="https://www.nytimes.com/2016/11/18/us/politics/michael-flynn-national-security-adviser-donald-trump.html">dinner in Russia for <em>Russia Today</em></a>. At the dinner afterwards Vladimir Putin walked about and sat next to Flynn. Suddenly he was viewed as a Russian proxy. Nobody really held up his client list to see that it also included a wide variety of Middle Eastern and other countries that we do deals with.</p>
<p>Flynn’s new media fame also led to an intensification of hacks on his platforms. In early July 2016, SybrTek told Flynn that his phone had been compromised. Nothing sensitive “I’m an open book” he told the SybrTek team but still,  someone was targeting the Trump campaign team.</p>
<p>SybrTekquickly found the sender of the phishing email that led to the hack.  The ISP, caller code, originators address, registered database was open source. Which led them to two different servers in Poland.</p>
<p>The team then traced the hacker back to yet another server located a small town of 100,000 people in the Carpathian Mountains in Romania. They hard pinged a location in a town called <a href="https://www.wired.com/2011/01/ff_hackerville_romania/all/1">Râmnicu Vâlcea</a>.</p>
<p>They quickly found a person attached to the server. A young female Romanian hacker.  Ray remembers seeing her profile picture, “She was cute. She did her homework. She was offering her services at 700 euro to target and hack anyone you wanted. It’s a business. Turned out she had emptied Flynn’s phone… and we found other things.”</p>
<p>Three weeks before the July 18<sup>th </sup>Republican convention, the SybrTek team not only found Flynn’s stolen data but stolen data (not emails) from journalist and Clinton confidante and former journalist Sidney <a href="http://dailycaller.com/2016/10/17/fbi-sidney-blumenthals-computer-files-are-found-on-a-romanian-server/">Blumenthal</a>  That wasn’t all there was embarrassing material on Hillary Clinton and Donald Trump kept on that same server.  They won’t discuss what they found. “Embarrassing” is all they will say about the files. What they found were Clinton&#8217;s medical records stolen from a visit to a doctor in Germany.</p>
<p>The team then reported to the government that they had found  sensitive information sitting on a foreign server on both parties. These files on either former candidates have not been released to the media or public. The hackers who hack the hackers are paid to keep their mouth shut and they don&#8217;t  want to get caught up in the polarized media hysteria that doesn&#8217;t understand the world of hacking.</p>
<p>They are quite vocal about the stunning lapses in simple security taken by both Clinton (who was discovered to be using a private unsecured home computer for government business) and the DNC, an organization that had security systems penciled in for installation but never actually installed them.</p>
<p>Although internal government agencies were concerned about Clinton’s use of a private emails system as early as 2009, hackers had tried numerous times to breach Clinton’s basement stored Apple server. in Chappaqua, New York.  It wasn’t until a December 2012, FOIA request from Citizens for Responsibility and Ethics in Washington came up empty that the public began to wonder where Clinton’s emails actually were. In June of 2013, Clinton hired Platte River Servers <a href="https://www.denverpost.com/2015/08/19/platte-river-networks-clinton-e-mail-server-was-never-in-denver/">who physically moved her home-based server</a> into a data service center in New Jersey.</p>
<p>+++</p>
<p>Clinton finally hired an expert to deal with data after Romanian hacker named “Guccifer”  dumped a number of emails between Clinton and insider Sidney Blumenthal in <a href="http://www.foxnews.com/politics/2016/05/04/romanian-hacker-guccifer-breached-clinton-server-it-was-easy.html">March of 2013</a>, Clinton’s private server came to light. Throughout the Benghazi investigation, the idea of Clinton not ever using a .gov email address never really took hold.  Her motivation appeared simple. She and her staff wanted to keep their communications simple away from FOIAs and government employees. Her excuse was that any emails she sent would be resident on the recipient’s government servers. There were concerns about her servers handling sensitive and classified information. These questions would lead to a July, 2016 FBI <a href="https://vault.fbi.gov/hillary-r.-clinton/Hillary%20R.%20Clinton%20Part%2001%20of%2023/view">investigation</a>.</p>
<p><em>New York Times </em><a href="https://www.nytimes.com/2015/03/03/us/politics/hillary-clintons-use-of-private-email-at-state-department-raises-flags.html">broke the story</a> in March 2, 2015 letting the world know that Clinton had been using a personal computer at home since 2009. Based on Guccifer&#8217;s boasting and Clinton&#8217;s high profile address but low profile security, by then the DNC and Clinton staffers and most likely Clinton’s computer had been under attack and most likely had been compromised. The data, movements, communications, plans and files of the former President of the United States, his family and the current Secretary of State would be of the highest interest to all foreign intelligence agencies.  Various tech experts and <a href="https://www.commentarymagazine.com/politics-ideas/hillary-clinton-email-scandal-victim/">government officials</a> pointed out that Clinton initially operated her laptop and Blackberry without encryption software making it extraordinarily easy to hack her and other people who communicated with her. In Part Two we will explore just how badly compromised the White House was.</p>
<p>It would be relevant to note that there was little to no mention of Russia in any of this initial U.S. media and political generated furor over Clinton’s lax security and mishandling of government files. There is also the given that hackers have little incentive to broadcast their break in’s. They are happy to sift and sort through compromised computers for years if needed. Had Clinton been hacked? Well her friends had. Why not her email.</p>
<p>+++</p>
<p>On January, 22, 2014, a 40-year old Romanian named Marcel Lazar Lehel was <a href="https://www.reuters.com/article/us-usa-cyber-guccifer/hacker-guccifer-extradited-from-romania-appears-in-u-s-court-idUSKCN0WY5MK">arrested</a>in Arad near his village of Sâmbăteni. Arad 337 miles west of Bucharest. Lehel was “Guccifer”. In 2013, Guccifer had hacked in a computer and found jpg&#8217;s with President George Bush’s home paintings including one of the naked Bush in his bathtub. He stole them from the former president&#8217;s sister and he <a href="https://www.inverse.com/article/14231-remember-that-bush-paintings-hacker-guccifer-used-wikipedia-to-hack-email">guessed her personal security codes </a>by using Wikipedia.</p>
<p>He had also been busy hacking “into the email and social media accounts of high-profile victims, including a family member of two former U.S. presidents, a former U.S. Cabinet member, a former member of the U.S. Joint Chiefs of Staff and a former presidential advisor” according to the nine count DoJ indictment. It was determined that Guccifer was busy hacking between December 2012 to January 2014 mostly out of boredom since he was not working his normal job as taxi driver.</p>
<p>Blumenthal’s files found on the Romanian server, <a href="https://vault.fbi.gov/hillary-r.-clinton/hillary-r.-clinton-part-04-of-05/view">according to the FBI</a> were dated from January 2012. As Hillary Clinton quite rightly predicted, her emails were on other people’s servers just not government ones. Regardless of what security protection Clinton had or didn’t have, her emails were clearly being hacked through her associate’s computers.</p>
<p>In May of 2016, <a href="http://www.foxnews.com/politics/2016/05/04/romanian-hacker-guccifer-breached-clinton-server-it-was-easy.html">Guccifer told Fox News reporter Catherine Herridge</a> that he had breached Clinton’s server in early 2013 and it was “easy” not just for Lazar but for “everybody”. In the jailhouse interview Lazar provided detailed information on how he breached the server. Lazar also hacked Clinton confidante, Sydney Blumenthal’s AOL emails in March of 2013.  The Romanian insisted that all he had to do was find Clinton’s IP, wait until the ports were open and use software to breach the data. He told Fox “As far as I remember, yes, there were … up to 10, like, IPs from other parts of the world,” referring to other hackers online at the same time. Guccifer&#8217;s favorite hack was to reset the password and then use Wikipedia and Google to find the names of pets, or schools used as security questions.</p>
<p>There is no evidence that Clinton’s servers were compromised by Lazar other than Guccifer&#8217;s statements, but Clinton&#8217;s servers were compromised as we will find out in Part Two.  Things started getting serious in the Spring of 2016&#8230;two years after Guccifer went to jail.</p>
<p>+++</p>
<p>A Wikileaks document dated March 19, 2016 details how John Podesta, Chairman of Hillary Clinton’s campaign received an email from Gmail notifying that someone had <a href="https://wikileaks.org/podesta-emails/emailid/34899">logged into</a> his personal Gmail account and to please click on the email to enter his username and password so it could be changed.  Podesta’s Chief of Staff, Sara Latham then pinged the campaign staff tech consultant Charles Delavan (both of whom were was using a hillaryclinton.com email, not the Gmail account in questions). Delvan responded:</p>
<p>“Sara, This is a legitimate email. John needs to change his password immediately and ensure that two-factor authentication is turned on his account. He can go to this link: https://myaccount.google.com/security to do both. It is absolutely imperative that this is done ASAP.”</p>
<p>The source of log in was identified by Google as:</p>
<p>Saturday, 19 March 8:34:30 UTC</p>
<p>IP Address: 134.249.139.239</p>
<p>Location: Ukraine</p>
<p>Podesta or his assistant then inexplicably used the phishing link in the email rather than the link Delavan provided. This simple act opened a back door to all of Podesta’s emails and any passwords he may have typed into those emails and more importantly the ability to fool other people on his email list into opening what looked like legitimate documents from Podesta. Again a hacker only reveals their presence once they feel they have enough data to sell. If a freelancer was to market real time access to the DNCs strategy and communications during an election, it would hard to put a price on that access.</p>
<p>Delavan later insisted he meant to type “illegitimate” rather than the word “legitimate” to describe the phishing email.</p>
<p>This is where it starts to get weird. DNC leaders were tipped to the hack in late April 2016 after some had gained entry to the DCCC and then used stolen credentials to then gain entry into the DNC system. The DNC insists that the breach was discovered the month before in April. Not coincidently a site called “DC Leaks” was registered on April 19, 2016. This hack by what was now a team calling themselves<a href="https://www.slideshare.net/ThreatConnect/guccifer-20-the-dnc-hack-and-fancy-bears-oh-my"> Guccifer 2.0 was professional and aggressive.</a> Unlike the more random Guccifer 1.0 , this 2.0 Guccifer appeared to be politically motivated. The goal appeared to get as many files into the public domain even though few of them qualified as &#8220;Clinton Dirt&#8221;  Over 300 individuals related to Clinton’s campaign and the Democratic political groups had been targeted since March but no Clinton dirt.</p>
<p>There was dirt on Trump. Not very dirty dirt, but it generated the perception that there was an embarrasing dossier on Trump .</p>
<p>Among <a href="http://gawker.com/this-looks-like-the-dncs-hacked-trump-oppo-file-1782040426">the files leaked</a> on June 15, was a massive “oppo” file on Donald Trump.  Not the more famous and rancid “golden shower” dossier published in January 2017 by <a href="https://www.documentcloud.org/documents/3259984-Trump-Intelligence-Allegations.html">Buzzfeed</a>. The first oppo file was a massive unreadable collection of open source articles.  It was the Steele dossier, which was not hacked, that began to push the Russian/Trump narrative. The Steele file was not only a work in progress but had been actively shopped around to major media outlets who found the accusations salacious and potentially libelous. The shopping <a href="https://www.pbs.org/newshour/politics/newly-leaked-dossier-trump-circulated-dc-months">began in Octobe</a>r 2016, with <em>Mother Jones</em> and that was after Steele had <a href="https://www.motherjones.com/politics/2016/10/veteran-spy-gave-fbi-info-alleging-russian-operation-cultivate-donald-trump/">handed over the report </a>in July 2016 to the FBI. The FBI initially agreed to continue to fund Steele&#8217;s work but changed their mind. The main architects were a research company called Fusion GPS who inexplicably had  clients Natalia Veselnitskaya and Rinat Akhmetshin.  According to the New York Times, Glen Simpson was not only developing dirt on Clinton via Steele, but working for a law firm, BakerHostetler, representing Prevezon Holdings, the company who had also hired Veselnitskaya and Akhmetshin to dig up dirt and attack Bill Browder, the man behind the Magnitsky Act.</p>
<p class="css-1i0edl6 e2kc3sl0">“He’s a professional smear campaigner and liar for money,” Browder lashed out at Simpson in the <em><a href="https://www.nytimes.com/2018/01/08/us/politics/fusion-gps-glenn-simpson.html">New York Times</a></em>. “The credibility of anything that he does is in question.”</p>
<p>The <a href="https://www.washingtonpost.com/graphics/2018/politics/steele-timeline/?noredirect=on&amp;utm_term=.f56ba41c691f">Steele </a>Dossier as it became known, is classic Russian <em>kompromat</em> and clearly attempts to link Trump to Russia influence via blackmail and financial dealings with dirty bits sprinkled in to catch the media&#8217;s attention. James Comey of the FBI notified President Trump on January 6, 2017 that the intelligence community believed the Russians were attempting to interfere with the election. On January 10, <em>Buzzfeed</em> published the Steele dossier. The singular document had shifted the focus from Hillary Clinton&#8217;s use of a private server to the   potential of a Russian asset running the country. A perfect secondary effect of psyops.</p>
<p>Remember this is not the <a href="https://assets.documentcloud.org/documents/2861555/1.pdf">massive 211 page open source opposition report</a> that focuses mostly on Trump&#8217;s marriages and business squables using published articles.  This clear attempt to conflate one &#8220;leaked&#8221; dossier with one that created and shopped after the election began the slow spin of the media towards linking Russia with Trump. An accusation that continues to gather speed and substance as Special Prosecutor Robert Mueller continues his investigation and the FBI indicts Russians and Trump associates in numerous indictments.  But the reality was that Trump didn&#8217;t win the popular vote, Hillary Clinton did. And the victory in the election was decided by the electoral college.</p>
<p>Where did the idea that Russia had hacked the election and linked to Donald Trump come from?</p>
<p><a href="http://dangerousmagazine.com/2018/07/29/2407/">Continued in Part Two: &#8220;The Hunt for Clinton Dirt&#8221;</a></p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/07/19/hack-part-one/">The Hack Part One &#8211; The Attack On America</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2018/07/19/hack-part-one/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Story of How Robert Young Pelton Created DPx Gear</title>
		<link>http://dangerousmagazine.com/2018/04/23/story-dpx-gears-hostile-environment-survival-tools/</link>
		<comments>http://dangerousmagazine.com/2018/04/23/story-dpx-gears-hostile-environment-survival-tools/#comments</comments>
		<pubDate>Tue, 24 Apr 2018 01:56:49 +0000</pubDate>
		<dc:creator><![CDATA[Lisa]]></dc:creator>
				<category><![CDATA[New Issue]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2228</guid>
		<description><![CDATA[<p>Back in the late 90’s and early oughts, I used to bump into a well known survival expert named Jeff Randall. If you know Jeff you know he doesn&#8217;t tolerate much but he zeroed in pretty quickly on the work I was doing in war zones. We became fast friends and spend many a long night discussing the business of adventure. We would meet up at the Soldier of Fortune convention or the SHOT show back when real mercenaries, militia...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/04/23/story-dpx-gears-hostile-environment-survival-tools/">The Story of How Robert Young Pelton Created DPx Gear</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-Original-on-case.jpg"><img class="aligncenter size-full wp-image-2312" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-Original-on-case.jpg" alt="HEST-Original-on-case" width="1200" height="798" /></a></p>
<p>Back in the late 90’s and early oughts, I used to bump into a well known survival expert named Jeff Randall. If you know Jeff you know he doesn&#8217;t tolerate much but he zeroed in pretty quickly on the work I was doing in war zones. We became fast friends and spend many a long night discussing the business of adventure.</p>
<p>We would meet up at the Soldier of Fortune convention or the SHOT show back when real mercenaries, militia members and clandestine folks used to gather around the pool and tell stories.  One of the things Randall kept pestering me about was designing a knife; something I had never really thought of, despite being a product designer and marketer in my past career.</p>
<div id="attachment_2236" style="width: 810px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/DPx-HEST-ORiginal-Prototype.jpeg"><img class="size-full wp-image-2236" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/DPx-HEST-ORiginal-Prototype.jpeg" alt="The original prototype for what would launch a entire knife business. " width="800" height="533" /></a><p class="wp-caption-text">The original prototype for what would launch a entire knife business.</p></div>
<p>In my travels to conflict, I was more of a &#8220;local screwdriver in a bag&#8221; kind of self defense carry or a &#8220;cheap locally made knife that I could ditch before flying&#8221; type.  Randall is an expert on survival training and ran classes in the Peruvian jungles for pilots. Since then, he has branched out into just having fun doing ditch medicine, wilderness, rope and caving type classes. I stuck to entering conflict zones and doing missions with U.S. Special Forces in Afghanistan, accompaning South African mercenaries in Somalia fighting pirates and being on the front lines in Libya in Siirt as local militias wiped out ISIS. Each trip was an education on what worked, an what was superfluous.</p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/hest-handle-high-res.jpeg"><img class="alignleft size-large wp-image-2308" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/hest-handle-high-res-1024x642.jpeg" alt="hest-handle-high-res" width="670" height="420" /></a>By 2008, and after ten years of pestering by Jeff, I thought I would give the idea of designing a knife a shot. I knew that the first rule of survival is not to get into trouble.  The second is to make sure you actually have your survival tools with you if you need them.</p>
<p>That meant they had to be small, easy to carry and multi functional. If you really needed a survival tool, it can&#8217;t break. This meant the classic Swiss Army Knife or ten dollar gas station knife might cause you more harm than benefit if it broke under hard use.</p>
<p>A key part of all our knife designs is the concept of self confidence; that the tool you bring will perform the job when you need it the most.</p>
<p>I decided to call it the HEST, short for &#8220;Hostile Environment Survival Tool&#8221; &#8211; a knife that could be useful in the wilderness as well as for self-defense. When I was ready to show my design, Jeff was surprised at how compact the knife was. The HEST also had a number of features not found on simple knives. It was beefy, thick and indestructible. I made it out of spring steel, the kind that locals make machetes out of. I refined its finish by enlisting the skills of Shon Rowen, who had perfected a heat treat on the famous high carbon 1095 steel.</p>
<div id="attachment_2310" style="width: 376px" class="wp-caption alignright"><img class="  wp-image-2310" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/pry2.jpg" alt="pry2" width="366" height="366" /><p class="wp-caption-text">H•E•S•T stands for Hostile Environment Survival Tool. Just one minor change like the pry bar can add numerous features and benefits to a survival tool. The two hole provide lashing points and light weight while the pry bar allows the knife to be hammered, saves the tip and is an ideal non lethal self defense tool.</p></div>
<p>The DPx Gear HEST Original was only four and a half ounces, under eight inches long and was designed to be affordable. Every square millimeter of the knife was examined for usefulness, ergonomics and function. The handles could be removed revealing a hidden storage compartment. The sheath came with a washer designed to remove the scales.</p>
<p>The blade was hardened to Rockwell hardness 58, which allows for stropping or field sharpening, much like professional butchers use high carbon steel instead of exotic harder blends.</p>
<div id="attachment_2305" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/hest-high-res.jpeg"><img class="wp-image-2305 size-large" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/hest-high-res-1024x397.jpeg" alt="hest-high-res" width="670" height="260" /></a><p class="wp-caption-text">Small but tough. The best survival tool is the one you actually have on you when you need it.</p></div>
<p>There are holes integrated to both lighten and balance with the most unusual feature being the pronounced pry bar where the pommel is. This allows the HEST to be hammered like a chisel, and provides a reverse grip, a non-lethal concealed grip and quite the nasty surprise for back alleys.</p>
<p>The blade has our patented notch for opening bottles, lifting pots and lashing.  The Original continues to sell well and is a knife that has made a lot of friends from professional Bear skinners to Army EOD.</p>
<div id="attachment_2270" style="width: 1090px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/11085844_978325525525882_429371346_o.jpg"><img class="wp-image-2270 size-full" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/11085844_978325525525882_429371346_o.jpg" alt="11085844_978325525525882_429371346_o" width="1080" height="720" /></a><p class="wp-caption-text">The HEST Original has fans among the military, LEO and even big game hunters. Experts who know why a Shon Rowen heat treat on 1095 is the professionals choice.</p></div>
<p><strong>DPx Gear HEST ORIGINAL Features and Specifications</strong></p>
<p>Fixed blade survival knife in black textured powder coated, high carbon 1095 hardened and tempered steel with Rockwell hardness of 57-58</p>
<ul>
<li><em>Brass hardware</em></li>
<li><em>Pry bar</em></li>
<li><em>Lashing points</em></li>
<li><em>Wire breaker</em></li>
<li><em>Bottle opener/ Pot lifter/ thumb control point</em></li>
<li><em>Green canvas Micarta scales with hollow storage area</em></li>
<li><em>Designed to be used as a neck knife by removing scales</em></li>
<li><em>Black Kydex sheath with optional belt clip</em></li>
<li><em>Made in America by Shon Rowen in Idaho Falls</em></li>
<li><em>Lifetime warranty</em></li>
</ul>
<ul>
<li><em>Weight:  4.40 oz</em></li>
<li><em>Overall Length: 7.63&#8243;</em></li>
<li><em>Blade Length: 3.13&#8243;</em></li>
<li><em>Blade Thickness:  0.19&#8243;</em></li>
<li><em>Handle Material: Green Canvas Micarta</em></li>
</ul>
<div id="attachment_2232" style="width: 4266px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/DSC_5572.jpg"><img class="wp-image-2232 size-full" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/DSC_5572.jpg" alt="DSC_5572" width="4256" height="2832" /></a><p class="wp-caption-text">The HEST folder is simple, overbuilt without a single wasted feature or curve. It is also ergonomically designed to fit in the hand as a self defense tool.</p></div>
<p>&nbsp;</p>
<p><strong>The DPX Gear HEST/F Folder.</strong></p>
<p>In 2010, I had sold enough HEST blades to learn that folders are where the real business is. Traditional fixed knives are important tools but folders, well they are a work of art.  At this point, my neophyte entry into knife design needed help.</p>
<p>I leaned on Tom Novak, a young outdoor enthusiast and fan to enter the world of engineering and digital design. Both Tom, a self-taught expert and his talented designer twin brother Andre would later come to work as a team to take concepts to 3D drawings, to digital rendering, then 3D printouts and then finally prototypes that I would take to the rough zones to test.</p>
<div id="attachment_2314" style="width: 385px" class="wp-caption alignright"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/hest21.jpg"><img class="wp-image-2314" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/hest21-300x168.jpg" alt="hest2" width="375" height="210" /></a><p class="wp-caption-text">A three dimensional renderings of the DPx HEST/F to test with customers.</p></div>
<p>We wanted to retain the ergonomics and function of the fixed HEST in the new folding HEST. I also wanted the frame and blade over engineered and over built.</p>
<p>In my years in the bush as a lumberjack and on various expeditions, I was not a fan of folding knifes due to the horrific injuries they can create and the multiple failures.</p>
<p>The choices of materials for the frame side were easy. A thick but light slab of aviation grade Titanium was an expensive, but perfect material as the back bone of the HEST. on the other side, instead of using a liner and a scale we went with a thick slab of phenolic laminate in a rough grip.  Lighter than using all Ti but well within the requirements I set.</p>
<div id="attachment_2277" style="width: 680px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-Ti-Africa.gif"><img class="wp-image-2277 size-large" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-Ti-Africa-1024x684.gif" alt="HEST-Ti-Africa" width="670" height="448" /></a><p class="wp-caption-text">A sturdy hard use pocket knife may not be that big of a deal back home but as you slowly head towards the front lines, having a dependable tool becomes critical. This is a week before entering the fighting in South Sudan for a piece in Vice. You can see the the slogan &#8220;When Survival Is Your Life&#8221; applies. https://www.youtube.com/watch?v=lDSu8wlQG6c</p></div>
<p>&nbsp;</p>
<p>The next task was to design a blade of equal thickness, but stronger. A high carbon German D2 tool steel was chosen. The knife would hold an edge and still take a razor edge for tough tasks like skinning and dirty work. To make sure the knife could not collapse, I introduced an idea in development by Rick Hinderer called a Roto Block. Very similar to a gun safety. Once the dial was turned to “lock” it is physically impossible for the blade to close on the user’s fingers.</p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/ASM_9354.jpeg"><img class=" size-medium wp-image-2329 alignleft" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/ASM_9354-300x200.jpeg" alt="ASM_9354" width="300" height="200" /></a>I put a lot of usability into the folder design like jimping that worked with gloves and wet hands, but also functioned as wire strippers for household, automotive and thin detonation wire. I had worked in tunnels blasting and always wanted this feature.</p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/258330_201337649911781_6451614_o.jpeg"><img class=" size-medium wp-image-2325 alignleft" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/258330_201337649911781_6451614_o-300x200.jpeg" alt="258330_201337649911781_6451614_o" width="300" height="200" /></a>The most serendipitous discovery was how well the potholder/opener in the blade worked as a rapid opener. The idea that a knife must open faster than an automatic and to the rear is important in hostile encounters. After a few times opening the DPx Gear HEST/F flippers and autos seem painfully slow and awkward.</p>
<div id="attachment_2278" style="width: 1010px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/IMG_20150416_144939_1.jpg"><img class="wp-image-2278 size-full" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/IMG_20150416_144939_1.jpg" alt="IMG_20150416_144939_1" width="1000" height="1000" /></a><p class="wp-caption-text">The Milspec version of the DPx Gear HEST/F folder features Sleipner steel. A proven hard cutting tool steel formula that keeps on slicing and still can be sharpened in the field. We chose this unusual steel because it has proven itself in the meat processing industry where blade sharpness is measured to the penny.</p></div>
<p>&nbsp;</p>
<p>Simple things like converting the lanyard hole into a standard hex driver was overlooked by most, if not all, knife makers.  Designing features like a deep carry clip that fit on heavy pants or military gear that had the exact amount of tension for rapid deployment was easy.  The trick was designing the whole system to be held on by a stout enough screw that doubled as a glass breaker (complete with Tungsten Carbon insert).  More implementation of ideas that came from hard time in the field.</p>
<div id="attachment_2309" style="width: 338px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Hestinbox.jpg"><img class="  wp-image-2309" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/Hestinbox-300x200.jpg" alt="Hestinbox" width="328" height="223" /></a><p class="wp-caption-text">A folder that was designed to last a lifetime or more</p></div>
<p>&nbsp;</p>
<p>Finally, what made DPx Gear unique was not only were these knives tested in places like Borneo, Somalia, Afghanistan and other hard use environments, but that I keep tweaking them to get it exactly right.</p>
<p>Real lasting customer service is also part of that long term commitment to our customers. Paying attention and respecting customer input again helps us modify, design and built better and better products, by having constant input and feedback.</p>
<p>DPx Gear takes pride in starting everyone of our designs in the field. Only once I can fully feel comfortable that our customer gets everything they expect, do we go into production.</p>
<p>So next time you are in Syria, Somalia, Iraq, Afghanistan or any other areas where our customers work. Look for Mr DP.</p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/ODA-595-in-Iraq.jpg"><img class="aligncenter size-large wp-image-2238" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/ODA-595-in-Iraq-1024x768.jpg" alt="ODA 595 in Iraq" width="670" height="503" /></a></p>
<p><strong>DPx Gear HEST/F 2.0 Features and Specifications</strong></p>
<p>The DPx HEST/F 2.0 is a German D2 tool steel folder mated to a U.S. made Titanium alloy frame with a durable American G10 scale assembled by the craftsmen at LionSTEEL in Northern Italy.</p>
<p>The HEST/F was developed as the direct folding version of the HEST fixed blade knife and was dubbed the 2.0 because there were a number of significant modifications made to the original design of this brutal use folder. The goal was to increase strength without adding weight and to directly address concerns about ease of opening, &#8220;strength of lockup and usability.</p>
<ul>
<li><em>Blade is German D2 tool steel polished, then Milspec phosphate coated tumble finish</em></li>
<li><em>6Al4V Grade 5 titanium alloy frame and spring frame lock</em></li>
<li><em>Patented LionSTEEL RotoBlock system</em></li>
<li><em>American-made G10 handle scale</em></li>
<li><em>1/4&#8243; hex driver</em></li>
<li><em>Unique wire stripper jimping and hard lashing points</em></li>
<li><em>Thumb grip/bottle opener</em></li>
<li><em>Removable stainless steel clip and glass breaker with integrated lanyard attachment</em></li>
<li><em>Knife includes a unique, collectible Mr. DP skull adjustment tool which is used to adjust the pivot tension and remove/replace the glass breaker screw with an included flat screw. The tool may also be used as a handy EDC by itself.</em></li>
</ul>
<ul>
<li><em>Weight:  5.1 oz</em></li>
<li><em>Overall Length: 7.63</em></li>
<li><em>Blade Length:  3.15</em></li>
<li><em>Steel:  D2</em></li>
<li><em>Rockwell Hardness:  60</em></li>
<li><em>Blade Coating:  Milspec Phosphate</em></li>
<li><em>Blade Thickness:  0.19&#8243;</em></li>
<li><em>Handle Material:  OD green textured G10/6Al4v Titanium Frame lock&#8221;</em></li>
</ul>
<p><em> </em></p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/D70_9088.jpg"><img class="wp-image-2235 size-full" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/D70_9088.jpg" alt="D70_9088" width="4256" height="2832" /></a></p>
<p>The Original DPx HEST/F Urban Kickstarter Campaign Models: (T to B) Sterile, Bronze, America and Mr. DP Editions.</p>
<p>&nbsp;</p>
<p><strong>The Tougher, Younger, Smaller Brother: The DPx Gear HEST/F URBAN</strong></p>
<div id="attachment_2231" style="width: 1450px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-Original-in-vest.jpg"><img class="size-full wp-image-2231" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-Original-in-vest.jpg" alt="How do you transfer the rock solid confidence the DPx Gear Original provides in a small urban friendly folder? " width="1440" height="1920" /></a><p class="wp-caption-text">How do you transfer the rock solid confidence the DPx Gear Original provides in a small urban friendly folder? Easy make it stronger.</p></div>
<p>As you can imagine, as soon as you announce a product you insist is perfect, the requests for something different begin. I had designed the HEST series for my large hands and less than gentle use of gear. I actually built in the idea of patina into every material and finish. There are many DPx Gear HEST owners who brag on just how beat up and beautiful their blade is.</p>
<div id="attachment_2334" style="width: 1210px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/urban-moody-spine_1200.jpg"><img class="size-full wp-image-2334" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/urban-moody-spine_1200.jpg" alt="Everything you expect in a hard use knife but in a smaller tougher package" width="1200" height="685" /></a><p class="wp-caption-text">Everything you expect in a hard use knife but in a smaller tougher package</p></div>
<p>What I was missing was the trend for people who want a smaller knife, one that fits within legal carry city limits which is roughly a three-inch blade. These knife fans didn’t foresee any trips into Yemen or Syria, but wanted some of the cachet that comes with products used by U.S. Special Forces, first responders and expedition leaders.</p>
<p>With some hesitation, I set about shrinking down the DPx Gear HEST/F 2.0 into what became the DPx Gear HEST/F Urban. I refused to shrink overall strength and thickness ratios, but I did want to upgrade the materials where possible. I also wanted input from the target audience, so we went to Kickstarter in an innovative campaign to both insert consumer ideas and gauge response.</p>
<p><a href="https://www.kickstarter.com/projects/170295107/the-dpx-hest-f-urban-the-all-american-hard-use-poc"><img class="fit aligncenter" src="https://ksr-ugc.imgix.net/assets/004/915/168/79d6e6eb6595b6565cdadfa5d64bd5c9_original.jpg?w=680&amp;fit=max&amp;v=1447597243&amp;auto=format&amp;q=92&amp;s=9820204429078e56277833acf9e48cc4" alt="DPx Gear HEST/F Urban Specifications Features" width="474" height="698" /></a></p>
<p>The final product was a tougher knife than it’s big brother. At only 3.35 ounces and with marginally thinner frame and blade, the Urban was small and tough. Adding things like a caged bearing system and all American hardware and manufacturing also made the knife a hit.</p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/urban-frame-side-full-open_1200.jpg"><img class="aligncenter size-full wp-image-2336" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/urban-frame-side-full-open_1200.jpg" alt="urban-frame-side-full-open_1200" width="1200" height="773" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-URBAN-Ti-Production-side.jpg"><img class="aligncenter size-full wp-image-2337" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-URBAN-Ti-Production-side.jpg" alt="HEST-URBAN-Ti-Production-side" width="4770" height="3840" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/9-Urban-DPx-Logo-clip.jpg"><img class="aligncenter size-full wp-image-2338" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/9-Urban-DPx-Logo-clip.jpg" alt="9 Urban-DPx-Logo-clip" width="2400" height="1602" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban_Frame_Only_Rock-1200.jpg"><img class="aligncenter size-full wp-image-2339" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban_Frame_Only_Rock-1200.jpg" alt="Urban_Frame_Only_Rock-1200" width="2400" height="1165" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Screen-Shot-2017-10-04-at-12.08.46-PM.png"><img class="aligncenter size-full wp-image-2340" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/Screen-Shot-2017-10-04-at-12.08.46-PM.png" alt="Screen Shot 2017-10-04 at 12.08.46 PM" width="854" height="838" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban_BW_Framelockside.jpg"><img class="aligncenter size-full wp-image-2341" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban_BW_Framelockside.jpg" alt="Urban_BW_Framelockside" width="2400" height="1452" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-Side-one-layer.jpg"><br />
</a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/BriefcaseUrbanbanner.jpg"><br />
</a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-on-LED-Lights-.jpg"><br />
</a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/DPxUrbanbriefcasebanner.jpg"><br />
</a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/DPx-GEAR-URBAN-Ti-GRAY-CASE.jpg"><img class="aligncenter size-full wp-image-2346" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/DPx-GEAR-URBAN-Ti-GRAY-CASE.jpg" alt="DPx GEAR URBAN Ti GRAY CASE" width="1766" height="1182" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-handle-on-white.jpg"><img class="aligncenter wp-image-2347 size-medium" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-handle-on-white-300x169.jpg" alt="Urban-handle-on-white" width="300" height="169" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/8-Urban-Closed-Side-Sillhouette.jpg"><img class="aligncenter wp-image-2348 size-medium" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/8-Urban-Closed-Side-Sillhouette-202x300.jpg" alt="8 Urban-Closed-Side-Sillhouette" width="202" height="300" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-Side-on-Table-White.jpg"><img class="alignleft wp-image-2349 size-medium" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-Side-on-Table-White-300x200.jpg" alt="Urban-Side-on-Table-White" width="300" height="200" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/URBAN-_GRAY_CASE_1200.jpg"><br />
</a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-Poster-Product-Only_1200.jpg"><br />
</a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-closed-Type_12001.jpg"><br />
</a>So now the DPx Gear HEST family is comprised of the Original Fixed Blade, the HEST/F 2.0 folder and the compact Urban series.</p>
<p><strong>DPx HEST/F Urban Specifications</strong></p>
<p>The DPx HEST/F Urban is the last pocket knife you&#8217;ll need for every day carry.</p>
<ul>
<li><strong>Small, Tri-gauge wire stripper jimping</strong>.  The thumb grip features three notches in the exact gauges to strip household, auto and timer wire for blasting or electronics</li>
</ul>
<ul>
<li><strong>Fully reversible, deep carry pocket clip.  </strong>A deep pocket clip means your pocket knife rides as low and unobtrusively as possible in your pocket. The angle of the clip over the frame lock adds additional support to the lock. The DPx HEST/F Urban is made from not just durable materials but stain free materials. Even the clip screws and hardware are designed to take harsh environments with ease.</li>
</ul>
<ul>
<li><strong>A U.S. invented tested and proven frame lock</strong> has become the standard locking feature for high-end custom knives. We added a stainless steel cap to reduce wear on the lock face.</li>
</ul>
<ul>
<li><em>Weight:  3.35 oz</em></li>
<li><em>Overall Length:  6.7&#8243;</em></li>
<li><em>Blade Length:  2.9&#8243;</em></li>
<li><em>Steel:  CPM S35VN</em></li>
<li><em>Rockwell Hardness:  61</em></li>
<li><em>Blade Coating:  None</em></li>
<li><em>Blade Thickness:  0.16&#8243;</em></li>
<li><em>Handle Material:  6Al4v Titanium</em></li>
</ul>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/04/23/story-dpx-gears-hostile-environment-survival-tools/">The Story of How Robert Young Pelton Created DPx Gear</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2018/04/23/story-dpx-gears-hostile-environment-survival-tools/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>General Dostum and 12 Strong: THE LEGEND OF HEAVY D AND THE BOYS</title>
		<link>http://dangerousmagazine.com/2018/01/20/general-dostum-12-strong-legend-heavy-d-boys/</link>
		<comments>http://dangerousmagazine.com/2018/01/20/general-dostum-12-strong-legend-heavy-d-boys/#comments</comments>
		<pubDate>Sat, 20 Jan 2018 18:09:25 +0000</pubDate>
		<dc:creator><![CDATA[Lisa]]></dc:creator>
				<category><![CDATA[New Issue]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[12 Strong]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Dostum]]></category>
		<category><![CDATA[Special Forces]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2077</guid>
		<description><![CDATA[<p>This article on ODA 595, General Dostum, John Walker Lindh and the battle at Qali-i-Jangi was originally published in the March 2002 edition of National Geographic Adventure THE LEGEND OF HEAVY AND THE BOYS  By Robert Young Pelton The Regulators flew in from Uzbekistan at night on a blacked-out Chinook helicopter. They landed near a mud-walled compound in the remote Darra-e Suf valley in northern Afghanistan. As they began unloading their gear, they were met by Afghans in turbans, their faces...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/01/20/general-dostum-12-strong-legend-heavy-d-boys/">General Dostum and 12 Strong: THE LEGEND OF HEAVY D AND THE BOYS</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/HeavyDTitle.jpg"><img class="aligncenter size-full wp-image-2188" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/HeavyDTitle.jpg" alt="HeavyDTitle" width="1200" height="820" /></a></p>
<p><em>This article on ODA 595, General Dostum, John Walker Lindh and the battle at Qali-i-Jangi was originally published in the March 2002 edition of National Geographic Adventure</em></p>
<p><em><strong>THE LEGEND OF HEAVY AND THE BOYS  </strong>By Robert Young Pelton</em></p>
<p>The Regulators flew in from Uzbekistan at night on a blacked-out Chinook helicopter. They landed near a mud-walled compound in the remote Darra-e Suf valley in northern Afghanistan. As they began unloading their gear, they were met by Afghans in turbans, their faces wrapped. “It was like that scene in Close Encounters where the aliens meet humans for the first time,” one soldier says later. “Or maybe that scene in Star Wars: These sand people started jabbering in a language we had never heard.” The Americans shouldered their hundred-pound rucksacks while the Afghans hefted the rest of the equipment. The gear seemed to float from the landing site under a procession of brown blankets and turbans.</p>
<p>The next morning, about 60 Afghan cavalry came thundering into the compound. Ten minutes later, another 40 riders galloped up. General Abdul Rashid Dostum had arrived.</p>
<p>“Our mission was simple,” another soldier says. “Support Dostum. They told us, ‘If Dostum wants to go to Kabul, you are going with him. If he wants to take over the whole country, do it. If he goes off the deep end and starts whacking people, advise higher up and maybe pull out.’ This was the most incredibly open mission we have ever done.”</p>
<p>Before heading in-country, the soldiers had been briefed only vaguely about Dostum. They’d heard rumors that he was 80 years old, that he didn’t have use of his right arm. And they’d been told that he was the most powerful anti-Taliban leader in northern Afghanistan. “I thought the guy was this ruthless warlord,” one soldier says. “I assumed he was fricking mean, hard. You know: You better not show any weakness. Then he rides up on horseback with one pant leg untucked, looking like Bluto.”</p>
<p>Dostum dismounted and shook everyone’s hand, then sat on a mound covered with carpets. He talked for half an hour. Dostum’s strategy was now their strategy: to ride roughshod over Taliban positions up the Darra-e Suf Valley, roll north over the Tingi Pass in the Alborz Range, then sweep north across the plains and liberate Mazar-e Sharif, Afghanistan’s second largest city. When the council broke up, Dostum stood and motioned toward the horses. America’s finest were about to fight their first war on horseback in more than a hundred years.</p>
<p>The rocket howls over the roof of General Dostum’s house in Khoda Barq at about 10 p.m. It’s November 26, my second day in Afghanistan, and already I’m in the middle of a hellacious firefight. Although nighttime gunfire is normal in Afghanistan, there is an urgency to the sound of the deep explosions that come from the 19th-century fortress of Qala Jangi, just over a mile east from Khoda Barq, a Soviet-era apartment complex west of Mazar. The heavy shooting, the worried soldiers, the rapid radio chatter—all signal that something ugly is going on over there.</p>
<div id="attachment_2198" style="width: 680px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_dead-at-qala_small.jpg"><img class="size-large wp-image-2198" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_dead-at-qala_small-769x1024.jpg" alt="Airstrikes, AC130's and Hazara guards had killed all but 86 al Qaeda and Taliban fighters  © Robert Young Pelton, all rights reserved" width="670" height="892" /></a><p class="wp-caption-text">Airstrikes, AC130&#8217;s and Hazara guards had killed all but 86 al Qaeda and Taliban fighters<br />© Robert Young Pelton, all rights reserved</p></div>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-154.jpeg"><br />
</a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_DSCF0031.jpeg"><br />
</a><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_JW2.jpeg"><br />
</a>Meanwhile, I’m hunkered down, waiting for Dostum. I’ve arranged through intermediaries to spend a month with the general, but for the past week, he has been a hundred miles east, trying to subdue Taliban forces that control the city of Kunduz. General Abdul Rashid Dostum is a man who has rarely been interviewed but has often been typecast as a brutal warlord—usually because of his reputation for winning. He is a kingmaker who works the ethnic minority to choose who will rule and who will fail. A man who is said by some journalists to define violence and treachery. (In his book &#8220;Taliban&#8221;, author Ahmed Rashid reports a tale he heard that Dostum once ordered his men to drag a thief behind a tank until all that was left was a bloody pulp of gore. Rashid later admitted that not only did he not witness it but it the event was fictional.  Beyond that, all I know is that Dostum, born a poor peasant, grew up to be a brilliant commander, a general, and a warlord—one of the many regional leaders across Afghanistan whose power derives both from ethnic loyalties and from military strength. That he is known to be a deft alliance maker—and breaker. And that he became the first Afghan commander to take over a major city when he entered Mazar-e Sharif on November 10. It’s an irresistible story, made all the more so by a convincing rumor I’ve been hearing since my arrival: that Dostum triumphed with a little help from his friends—specifically, the Green Berets.</p>
<p>As I wait for Dostum to return, though, the constant chatter of machine guns and the badoom badoom of cannons from an American gunship bombarding the fort—Dostum’s military headquarters—suggest that I might be a bit premature in offering any congratulations on winning the war. I soon learn that yesterday some 400 foreign Taliban prisoners overpowered their guards, broke into arsenals, and took over part of the fortress. Right next to where I am staying. I had first tried to meet the General in May of 1997. At the same moment he was trying to flee Mazar from the Taliban assault. I had jumped a train in Tajikistan, snuck into Uzbekistan and remained holed up in a dusty border town. My attempts to convince the Afghans took place in a building in which men with dark beards sat in from of Tony Montana style palm tree sunset wall paper murals. Finally after two weeks they admitted they could not smuggle me across. This time I had less worries with just a few hours waiting for Uzbek guards to look the other way while we hustled our kit over the blockade Friendship Bridge at night.</p>
<p>At 3:30 a.m., I go to bed. Three hours later, I am awakened by a massive explosion a few yards from the house—another near miss by a rocket fired from inside the fort. The sound of canon fire continues without a break but at a slower pace. In the morning Villagers come out in the crisp, golden light of morning, shivering and tired. Some huddle together to watch the gray pillars of smoke from the bombing runs. Others begin the work of the day without even paying attention to the nearby fighting.</p>
<p>In the afternoon, when I visit the 1985 fort called &#8220;Qala i Jangi&#8221; or Fort of the Soldiers,  bullets sing over my head. Up on the parapets, Dostum’s troops stream toward a gap in the ramparts created yesterday by an errant American 2000 lb bomb. Soldiers run up to the bite in the wall, shoot into the fort, and then scurry back down. I watch a fighter go up to the top, then crumple into a black pile of rags. Astoundingly, after two days of bombardment, the prisoners still control the fort.</p>
<div id="attachment_2161" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-026.jpeg"><img class="size-large wp-image-2161" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-026-1024x541.jpeg" alt="ODA 595 Prepares to retrieve the body of Mike Spann from Qala-i-Jangi  ©Robert Young Pelton, all rights reserved" width="670" height="354" /></a><p class="wp-caption-text">ODA 595 Prepares to retrieve the body of Mike Spann from Qala-i-Jangi ©Robert Young Pelton, all rights reserved</p></div>
<p>Late in the afternoon, a convoy of mud-spattered off-road vehicles pulls up, and a dozen dusty Americans in tan chocolate chip camo climb out. They have Beretta pistols strapped to their thighs like gunslingers and short M-4 rifles slung across their chests. They’re polite but wary about having their pictures taken as they set up their night-vision scopes. After a final check of their gear, they head into the fortress. Later, I find out that they’ve come hoping to retrieve the body of Central Intelligence Agency officer Johnny Micheal Spann, who was killed by Taliban prisoners—the first American combat casualty in Afghanistan.</p>
<p>Dostum arrives that night, ducking to avoid banging his head as he strides through the guest-house door. He takes my hand in a meaty grip and apologizes for being dirty and tired; he has just driven eight hours on a shattered road from Kunduz. He has two weeks of beard, beetling eyebrows, and a graying brush cut. When Dostum frowns, his features gather into a dark, Stalin-like scowl—his usual expression for formal portraits. But when he smiles, he looks like a naughty 12-year-old.</p>
<p>He sits and makes small talk, then excuses himself to take a shower. When he returns, the dark weariness has lifted. Over chai (tea), he announces good news. He has ended the bloody battle for Kunduz by negotiating with Mullah Faizal and Mullah Nuri, the two most senior Taliban leaders in the north. It seems that the “brutal warlord” has engineered the biggest peaceful surrender in recent Afghan history—more than 5,000 Afghan Taliban fighters and foreign volunteers laid down their arms. He waves the accomplishment aside with a shy smile even as he promises to introduce me to his new trophies—the mullahs. It turns out they’re staying next door, guests in Dostum’s house.</p>
<div id="attachment_2098" style="width: 235px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-032.jpeg"><img class="size-medium wp-image-2098" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-032-225x300.jpeg" alt="Mullah Faizel, commander of the Taliban Army in the North. © Robert Young Pelton, all rights reserved" width="225" height="300" /></a><p class="wp-caption-text">Mullah Faizel, commander of the Taliban Army in the North. © Robert Young Pelton, all rights reserved</p></div>
<p>Dostum proves to be significantly more expansive in conversation than his scant press clippings would suggest, and he’s happy to fill me in on his background. Over the next few weeks I privately coin for him a nickname based on the media&#8217;s fear and his in person good humor: I call him Heavy D, after the 1980s rapper.  &#8220;Dostum&#8221; is actually a nickname that means &#8220;my friend&#8221; was born Abdul Rashid in 1954 in the desolate village of Khvajeh Do Kuh, about 90 miles west of Mazar. Headstrong and known to get into fights,  was adept at the game of <em>buzkashi</em>, in which horsemen attempt to toss the headless carcass of a calf into a circle. Dating at least to the days of Genghis Khan, the violent game is not so much about scoring as it is about using every dirty trick possible—beating, whipping, kicking—to prevent the opposing team from scoring. Buzkashi is the way Afghan boys learn to ride—and it’s the way Afghan politics is played: There are few rules and the toughest, meanest, and most brutal player takes the prize.</p>
<p>After the seventh grade, Dostum left school to help his father on the family farm. At 16, he started working as a laborer in the government-owned gas refinery in nearby Sheberghan, where he dabbled in union politics.</p>
<p>The people of Dostum’s village were so impressed with his leadership that they recruited 600 men for him to command. It was about this time that Abdul Rashid became “Dostum.” In Uzbek, <em>dost</em> means “friend”; <em>dostum</em> means “my friend.” It was a nickname that the young soldier was given for his habitual way of addressing people. When a local singer wrote a song about “Dostum,” the name stuck. He was quick to defend the weak and if negotiations failed he had no shortage of armed men that would stand beside him.</p>
<p>When a Marxist government came to power in a bloody coup in 1978, the new regime’s radical reforms ignited a guerrilla war with the mujahidin who based themselves in the country’s remote mountain ranges.</p>
<div id="attachment_2208" style="width: 310px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/Screen-Shot-2018-01-21-at-7.35.31-AM.png"><img class="wp-image-2208 size-medium" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/Screen-Shot-2018-01-21-at-7.35.31-AM-300x207.png" alt="Screen Shot 2018-01-21 at 7.35.31 AM" width="300" height="207" /></a><p class="wp-caption-text">The young commando Abdul Rashid, quickly rose through the ranks.</p></div>
<p>Dostum enlisted in the Afghan military—one of the few ways for poor men to escape lives of labor and hardship in rural Afghanistan. He rose through the ranks quickly becoming a paratrooper in 1973, an armored unit in 1978 and Battalion 734 KhAD by 1983. Dostum&#8217;s real success was in negotiating enemy commanders to lay down their arms and to join him. He was authorized to transform his Jowyzjani militia into the 53rd Infantry Division in 1988 and ultimately under the Soviet backed regime of Najibullah, he became commander of the 7th Army Corps in charge of all of Northern Afghanistan. Again he began integrating mujahideen into the political military ranks among them his number two against the Taliban Lal Kamadan. At the end of the Soviet period Dostum had 45,000 troops with about half of them as village reserves. If one was to look for the roots of Dostum&#8217;s &#8220;warlord&#8221; reputation it began when he was the direct and most successful enemy of the CIA-backed insurgency of fundamentalist warlords based out of Pakistan. The idea that that Dostum would actually save the day for an embattled America is an irony that has not fully played out.</p>
<p>In the bewildering matrix of Afghan politics, Dostum has frequently—and nimbly—switched allegiances. In the 1980s, as a young army officer in the Soviet-backed government, he fought against the mujahidin. When the regime fell in 1992, three years after the Soviets departed, Dostum fought alongside the mujahidin and helped the Northern Alliance’s legendary Ahmad Shah Massoud battle the fundamentalist Pashtun forces of Gulbuddin Hekmatyar and gain control of the capital. The shelling, raping, pillaging, looting, and house-to-house fighting that then befell Kabul stained the name of every mujahidin commander, including Dostum’s, and fueled his reputation for brutality. Today the government of President Ghani has welcomed the fighters of Hekmatyar from exile in Pakistan and is looking to bring the Taliban into the government. All the while ostracizing the now First Vice President Dostum who is currently in exile in Ankara plotting his next move.</p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/HeavyDpainting.jpg"><img class="aligncenter size-large wp-image-2201" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/HeavyDpainting-1024x350.jpg" alt="HeavyDpainting" width="670" height="229" /></a></p>
<p>But back in 2001, &#8220;Warlord&#8221; Dostum who was head of the Jumbesh political party had simpler but identical goals: Align with the U.S. to return from exile in Turkey and bring the Taliban into the new government.  show Dostum the chapter in Rashid’s book that includes the account of the gruesome execution of the thief. Dostum chuckles and denies the allegation. He freely admits that in two decades of war, abuses have been committed by the troops of every commander. “What else do you expect my enemies to say?” he asks. “That I am kind and gentle? I will let what you see be the truth.”</p>
<p>In 1996, when the Taliban rolled into Kabul, Dostum was forced to retreat to his stronghold in Mazar as the mullahs instituted their version of a pure Islamic state. “At first I thought, Why not let them rule?” he says. “Power is not given to anyone forever. If the Taliban can rule successfully, let them.” A year later, betrayed by his second in command, who had defected to the Taliban, Dostum fled to Turkey. The U.S. refused to work with Dostum until former UN envoy Charlie Santos pointed out to the CIA that the only functioning fighting group besides the Panjshiris of Massoud were Dostum&#8217;s Uzbeks. Based on history and dossiers full of Pakistani provided intelligence, the Agency wanted nothing to do with Dostum. Santos pointed out that with Massoud dead, and no Pashtun resistance, Dostum was America&#8217;s only hope.</p>
<div id="attachment_2085" style="width: 310px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/CrJ1elDWgAE3s6Q.jpg"><img class="wp-image-2085 size-medium" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/CrJ1elDWgAE3s6Q-300x225.jpg" alt="CrJ1elDWgAE3s6Q" width="300" height="225" /></a><p class="wp-caption-text">The Uzbeks and Hazara took to the mountains to escape the mechanized columns of the Taliban</p></div>
<p>Those among Dostum’s men who had remained in Afghanistan now became guerrilla fighters, moving on horseback holed up in the mountains under the command of his former number two La. Staying off the roads and in the wilds, they could swoop down and attack the Taliban but could not hold the ground. Dostum’s lieutenants would call him in Turkey and tell him how difficult life had become. They had to kill their horses for food. They didn’t have enough cloth for shrouds, so they had to bury dead comrades in burqas. “People demanded that I do something,” says Dostum. “Commanders, clergymen, women—they would all tell me very bitter stories. I was full of emotions. My friends were struggling against the Taliban, and I was sitting there.”</p>
<p>Dostum says that to help him get back into the fray, the former president of Afghanistan, Burhanuddin Rabbani, sliced off about $40,000 from the CIA funds. The CIA had begun to work with Massoud&#8217;s people in October of 1999 hoping to pay him to kill Osama bin Laden.  The Turks, long staunch enemies of Islamic extremism, contributed a small sum as well, and, on April 22, 2001, General Dostum and 30 men were ferried into northern Afghanistan on Massoud’s aging Soviet helicopters. “That,” says Dostum, “was when the war against terror began.”</p>
<p>Living in caves and raiding Taliban positions, Dostum’s men slowly began to harass the well-entrenched Taliban along the Darra-e Suf. They moved and attacked mostly at night, riding small, wiry Afghan horses that are well suited to steep slopes and long desert walks. “The money was hardly enough for feeding my horses,” Dostum says. “They had tanks, air force, and artillery. We fought with nothing but hope.”</p>
<p>Then came September 11. Despite actively fighting the Taliban, it was not until Santos introduced Dostum to JSOC that the United States might want to give him some help. Even the CIA was reticent to land paramilitaries and officers to set up the conditions for an Special Forces ODA to be inserted. At the last minute the Agency was told by the SF ground commander that his men were going in with or without the Agency. A small group of CIA that included Mike Spann, flew in to the Darra-e Suf the day before ODA 595 would land.</p>
<p>Now three weeks later the war was supposed to be over. The Taliban had surrendered at Qali i Jangi to CIA officer JR and Dostum and surrenders were under way in Kunduz. The B-Team had already set up shop at the Turkish School in Mazar and was getting ready for the push to Tora Bora. Until a group of 480 al Qaeda and talibs showed up at the gates of Mazar. Dostum and the Green Berets drove by them as they headed for Kunduz.</p>
<p>&nbsp;</p>
<div id="attachment_2092" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-013.jpeg"><img class="size-large wp-image-2092" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-013-769x1024.jpeg" alt="General Abul Rashid &quot;Dostum&quot;   © Robert Young Pelton, all rights reserved" width="670" height="892" /></a><p class="wp-caption-text">General Abul Rashid &#8220;Dostum&#8221;<br />© Robert Young Pelton, all rights reserved</p></div>
<p>The morning after Heavy D’s return from Kunduz, he greets me with a deep, booming “Howareyou?” Today, he tells me, he is eager for me to meet his trophy mullahs.</p>
<p>Next door, in Dostum’s pink house, Mullah Faizal and Mullah Nuri sit on pillows in a small room. These are two of the Taliban who chased Dostum out of Mazar in May 1997, but still he treats them more like honored guests than prisoners of war. Faizal has his prosthetic leg off. He is a thick man with a pug nose, bad skin, tiny teeth, and a cruel stare. Nuri has the black look of a Pashtun who has endured a lifetime of war. Wrapped in blankets, members of the mullahs’ entourage fix me with soulless stares. Nuri is chatty, although he often looks to the silent Faizal before answering my questions. During the Taliban’s reign, thousands of Hazara Shias were murdered in northern Afghanistan; the mullahs are unrepentant. “We fought for an idea,” says Nuri. “We did all that we could. Now we hope that America will not be cruel to the Afghan people.”</p>
<p>That afternoon, Dostum and I set off for the fort, where the uprising has been all but quelled. He brings the mullahs along, to show them the havoc incited by their foreign volunteers. Perhaps they’ll convince any surviving prisoners to surrender.</p>
<p>After four days of bombardment, the interior of the fort is a scene of utter devastation. Blackened, twisted vehicles are perforated with thousands of jagged holes. The crumpled bodies of prisoners, frozen in agony, are scattered everywhere. Most of the fallen look as if they were killed instantly. Some are in pieces; others have been flattened by tank treads. More than 400 prisoners are said to have died;</p>
<p>I count only about 50 bodies in the courtyard. The estimated 30 Alliance soldiers who died have already been taken away by their friends. When an American team finally recovered Spann’s body, they discovered it had been booby-trapped with a live grenade (which they removed without incident).</p>
<p>It is also rumored that there are many dead and at least two live prisoners holed up in the subterranean bomb shelter. The entrance to the bunker was pierced by cannon shots and is blackened from explosions. Dostum’s men have been throwing down grenades and pouring in gasoline and lighting it, but the foreign Taliban refuse to come up. Dostum implores the mullahs to call down to the bunker and tell the remaining men to surrender. Mullah Faizal and Mullah Nuri refuse: They claim they don’t know these people.</p>
<div id="attachment_2158" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-022.jpeg"><img class="size-large wp-image-2158" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-022-1024x769.jpeg" alt="There are 86 al Qaeda fighter in the basement, including John Walker Lindh. Mullah Nuri insists he doesn't know them and they refuse to come up.  © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">There are 86 al Qaeda fighter in the basement, including John Walker Lindh. Mullah Nuri insists he doesn&#8217;t know them and they refuse to come up.<br />© Robert Young Pelton, all rights reserved</p></div>
<p>The trapped Taliban volunteers, it seems, remain hungry for martyrdom. A day later—Thursday, five days since the uprising broke out—they are still firing sporadically at soldiers removing bodies from the courtyard of the fortress. At least two Red Cross workers who descend into the bunker are shot and wounded.</p>
<p>Later that week, Dostum casually mentions that 3,000 other foreign fighters from the surrender at Kunduz are in a Soviet-era prison in the city of Sheberghan, 80 miles west. Anticipating more fireworks, I head there with him and move into another of his residences, a huge, high-walled compound that includes a mosque and, improbably, an unfinished health-club complex.</p>
<div id="attachment_2187" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-094.jpeg"><img class="size-large wp-image-2187" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-094-1024x769.jpeg" alt="By the time the team had arrived in Qali-i-Jangi they were gaunt, sick but eager to keep up the fight. Over 5000 Taliban remained hidden in surrounding villages. © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">By the time the team had arrived in Qali-i-Jangi they were gaunt, sick but eager to keep up the fight. Over 5000 Taliban remained hidden in surrounding villages. © Robert Young Pelton, all rights reserved</p></div>
<p>Some American soldiers are billeted upstairs in the guest houses; men in camo pants run up and down the stairs. Their rooms are filled with green Army cots, dirty brown packs, and green flight bags. Rifles, night-vision gear, and boots are strewn everywhere. I head downstairs and discover a group of soldiers bantering cheerfully, mostly in southern accents. They’ve just finished installing a satellite TV. When the television begins to blare, the men stare at the screen. “We haven’t seen a TV or news in two months,” one soldier says apologetically. Transfixed, they watch the Christmas tree being lit in Rockefeller Center.</p>
<p>These are the soldiers I saw back at Qala Jangi preparing to go in and retrieve the body of the dead CIA agent, Mike Spann. “Don’t I know you?” one of them says. “Aren’t you the guy who goes to all those dangerous places?”</p>
<p>It feels more than a bit odd to be recognized for my books and TV show—as someone who specializes in traveling to the world’s hot spots—while poking around a war in Afghanistan. It feels even more odd when I discover that these are Green Berets—soldiers who truly specialize in the world’s hot spots. But I never travel without a few “Mr. DP” hats, so I dig them out of my bag and pass them around.</p>
<p>Over the ensuing days, I take every opportunity to spend time in these makeshift barracks, particularly once I discover that this is the very unit of Green Berets that I’d been hearing rumors about—this is Dostum’s covert support team. At night we sit around talking over stainless steel cups of coffee. Some details of their mission they can’t discuss. Some are provided by Dostum and others. But the story gradually emerges.</p>
<p>There are twelve Green Berets here and two Air Force forward air controllers. Green Berets work in secrecy, so only their first names can be used: There’s Andy, the slow-talking weapons expert who is never without his grenade launcher; back home, he keeps the guns in his collections loaded “so they are ready when I am.” Both he and Paul, a quiet, bespectacled warrant officer, have been in the unit 11 years. Then there’s Steve, a well-mannered southern medic; Pete, the burly chaw spitter; Mark, their blond, midwestern captain; and so on. It’s like a casting call for The Dirty Dozen. Their motto is “To Free the Oppressed”—something they have done so far in this war with no civilian casualties, no blowback, and no regrets.</p>
<div id="attachment_2051" style="width: 680px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2017/10/a_Afghanistan-2001-058.jpeg"><img class="size-large wp-image-2051" src="http://dangerousmagazine.com/wp-content/uploads/2017/10/a_Afghanistan-2001-058-1024x769.jpeg" alt="In between conflict there was time to celebrate.  A typical meal at Dostum's guesthouse.  © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">In between conflict there was time to celebrate. A typical meal at Dostum&#8217;s guesthouse.<br />© Robert Young Pelton, all rights reserved</p></div>
<p>These soldiers, I soon realize, come from much the same background as Dostum’s: sons of miners, farmers, and factory workers; some are men whose only way out of poverty is the military. They range in age from mid-20s to early 40&#8217;s. They are men with wives, children, mortgages, bills. Men who are the Army’s elite, who are college educated and fluent in several languages, yet who are paid little more than a manager at McDonald’s. They spend every day training for war, teaching other armies about war, and waiting for the call to fight in the next war.</p>
<p>They are direct military descendants of the Devil’s Brigade, a joint Canadian-American unit that fought in Italy during the Second World War. That group was disbanded and then re-formed in the early 1950s as Special Forces, which John F. Kennedy later nicknamed the Green Berets. The men I’m staying with have dubbed their unit the Regulators, after the 19th-century cowboys who were hired by cattle barons to guard their herds from rustlers. The Regulators have served in the gulf war, Somalia, Saudi Arabia, the United Arab Emirates, and in other places they can’t talk about. Their home base is Fort Campbell, Kentucky, but they spend only a few months of the year there. The rest of the time they travel.</p>
<p>On the morning of September 11, the team was returning to base after an all-night training exercise. “The post was in an uproar,” says Paul. No one knew just when or where the team would be sent. They cleaned and stowed their gear and awaited the order. And waited. There was talk that the team might be split up—rumors of differences with a commanding officer who didn’t appreciate the traditional independence of the Green Berets. They were all quitting demanding to be sent to other units rather than put up with new commander ideas on what soldiering was. But 9/11 changed all that. Toward the end of September, the word came down: “Pack your shit.”</p>
<p>Fifteen days later, the team boarded a C-5 Galaxy with a secret flight plan. The Regulators’ final destination turned out to be Uzbekistan, where they spent a week building a tent city and waiting for a mission. “We were at the right place at the right time,” says Steve. “Fifty tents later, they told us to pack our shit again.”</p>
<div id="attachment_2190" style="width: 310px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/168036-dostumMarkN.png"><img class="size-medium wp-image-2190" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/168036-dostumMarkN-300x196.png" alt="First arrival on the Observation Post. Now the tiny group of Americans need to show General Dostum what they can do. " width="300" height="196" /></a><p class="wp-caption-text">First arrival on the Observation Post. Now the tiny group of Americans need to show General Dostum what they can do.</p></div>
<p>“We had two days to plan,” another Regulator says. “The CIA gave us a briefing.” Although the Regulators were among the first, other small teams of U.S. forces would soon be airlifted in for similar missions, a response to Dostum’s request for American assistance to be sent to other Northern Alliance commanders. In an effort to trim Dostum&#8217;s control the CIA would insist that rival commander Ustad Atta Mohammed get his own Green Beret escort several weeks later as he raced Dostum to claim Mazar. Surprisingly Dostum agreed. Once they hit the ground, the Regulators would be writing their own game plan. “Our commanders said they didn’t know what to expect, but at least they were honest enough to admit it,” the Green Beret continues. “They said, ‘You guys will be on the ground; you figure it out.’ ”</p>
<p>Within half an hour of meeting Dostum at the mud-walled compound in the Darra-e Suf, the Regulators swung into action. Some stayed behind to handle logistics and supplies. The rest mounted up and rode north. “It was pretty painful,” Paul says. “They use simple wooden saddles covered with a piece of carpet, and short stirrups that put our knees up by our heads. The first words I wanted to learn in Dari were, ‘How do you make him stop?”</p>
<p>Their most important immediate order of business was to establish themselves in Dostum’s eyes. “The first thing we wanted to do was to say to Dostum, ‘The Americans are here,’ ” Paul explains, “and to make it a fearsome prospect to mess with us.” The Americans set up their gear at Dostum’s command post—which overlooked Taliban positions about six miles away—and immediately began the process of calling in close air support, or CAS. “You see the village; you see the bunkers,” says a second Steve, one of the two Air Force men attached to the team to help coordinate air strikes. “You call in an airplane; you say, ‘Can you see that place? There are tanks. You see this grid? Drop a bomb on that grid.’ Pretty straightforward stuff.”</p>
<p>It took a few hours for bombers to arrive from their carriers. At first, the planes wouldn’t fly below 15,000 feet—the brass was worried about surface-to-air missiles—so targeting was sketchy. But coordination soon improved, and the improbable allies fell into a rhythm: The Americans would bomb; Dostum’s men would attack.</p>
<p>A crude videotape made by one of Dostum’s men shows a battle in the rolling hills of the Darra-e Suf, where the yellow grass contrasts with the deep blue sky. The Americans, up on the ridge, are using GPS units to finalize coordinates. Down below, small Afghan horses are nipping the dry grass on the safe side of the hill, their riders chatting while awaiting the order to charge. The horses cast long shadows in the late afternoon. The only sign that something is about to happen is a white contrail high in the sky. The radio crackles with call signs and traffic broadcast between bombardiers and the American soldiers. First, a soft gray cloud of smoke rises in a lazy ring. Then the concussion: ka-RUMPH!</p>
<p>The tape now shows Dostum, leaning against a mud wall, watching through large binoculars. The dirty gray mushroom cloud slowly bends in the wind. Dostum stays in contact with the Americans by radio, working to help focus the bombing: a man with a seventh-grade education directing the fire of the world’s most powerful military.</p>
<p>Ka-RUMPH! More hits: Tall, fat smoke plumes cast moving shadows on the grass. The riders mount their horses, check their weapons, and begin the one-kilometer sprint to the Taliban front lines. There’s the erratic chatter of AK-47s and the deep dut dut dut dut of Taliban machine guns. Then the radios are jammed with Dostum’s men shouting and celebrating. The Taliban are running.</p>
<p>The videotape cuts to the next morning. Dostum’s men are touring the battle scene. The twisted rag doll bodies of dead Taliban fighters lie heads back, fingers clutched, legs sprawled as if they fell running. Dostum’s men kick the corpses into the trenches and cover them with the tan dirt, not bothering to count the dead.</p>
<p>The Regulators were joined by at least three CIA officers kitted in full combat gear, including a 32-year-old ex-Marine named Mike Spann. “We were surprised at how good they were,” says Captain Mark. “What we are doing now has not occurred since Vietnam. Up until now the CIA has been hog-tied. Now the CIA and spec ops have been let loose.”</p>
<div id="attachment_2087" style="width: 729px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/CrJ1hDhWIAAC4Da.jpg"><img class="size-full wp-image-2087" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/CrJ1hDhWIAAC4Da.jpg" alt="Dostum's men were a loose alliance that grew with every victory against the Taliban" width="719" height="475" /></a><p class="wp-caption-text">Dostum&#8217;s men were a loose alliance that grew with every victory against the Taliban</p></div>
<p>Each night, Dostum would sit down with the Americans and lay out the battle plan for the next day. “He would say he is going to attack at about 2 p.m.,” says Air Force Steve. “So we would put in for priority for the planes.” The team’s primary weapons were not pistols or rifles; they were the most fearsome tools in the American arsenal: F-18s, F-16s, F-14s, and B-52s. They chose not bullets or grenades but ordnance that ranged from Maverick missiles to laser-guided bombs.</p>
<p>In contrast to the Americans’ high-tech warfare, some of Dostum’s tactics would have seemed familiar to the British troops who tried and failed to pacify this region in the 19th century. Before the arrival of the Americans, Dostum fought mostly at night. “He couldn’t expose his small force to Taliban missile strikes,” explains Captain Mark, “so they would hit and retreat. He never sacrificed his men. He would take a village by getting the mounted guys up close. When it looked like they would break the back of the position, he would ride through as fast as he could and keep the Taliban on the run.”</p>
<p>With their knowledge of military history, the Regulators appreciated the ironies of this strange war: “The Taliban had gone from the ‘muj’ style of fighting—in the mountains, on horseback—to working in mechanized columns,” says Will, another member of 595. That heavy reliance on tanks and trucks meant the Taliban wound up fighting a defensive, Russian-style war. “Then, here is Dostum,” says Will, “a guy trained in tanks who’s using tactics developed in Genghis Khan’s time.”</p>
<p>The Regulators’ job was to invent a new form of warfare: coordinating lightly armed horseback attacks with massive applications of American air power—all without hitting civilians or friendly forces. “In an air attack,” says Air Force Steve, “you do one of two things. You can bomb it until there is no resistance, or you bomb and, as soon as the bomb goes off, you charge. By the time they come up and look, you are on them.” The latter approach was well suited to Dostum’s style of attack. “A cavalry charge is an amazing thing,” Will says. “At a full gallop, it’s a smooth ride. The Afghans shoot from horseback, but there is no aiming in this country. It’s more like, ‘I am coming to get you—whether I hit you is another story.’ It’s Old World combat at its finest.</p>
<p>“There’s one time I’ll never forget,” he says. “The Taliban had dug-in, trench-line bunkers shooting machine guns, heavy ma-chine guns, and RPGs [rocket-propelled grenades]. We had an entire 250-man cavalry ready to charge.” The Regulators wanted Dostum’s right-hand man, Commander Lal, to hold off while they got their aircraft in position, but Lal had already given the order. In seconds, 250 men on horseback were thundering toward the Taliban position a mere 1,500 meters away.</p>
<p>“We only had the time it takes 250 horses to travel 1,500 meters, so I told the pilot to step on it,” Will says. “I looked at Lahl and said, ‘Bombs away.’ We had 30 seconds till impact; meanwhile, the Afghan horde is screaming down this ridgeline. It was right at dark. You could see machine gun fire from both positions. You could see horses falling.” An outcrop obscured views of the last 250 meters to the target. The lead horsemen disappeared behind the rocks, and the Regulators all held their breath, praying the bombs would reach the bunkers before the cavalry did. “Three or four bombs hit right in the middle of the enemy position,” says Will. “Almost immediately after the bombs exploded, the horses swept across the objective—the enemy was so shell-shocked. I could see the horses blasting out the other side. It was the finest sight I ever saw. The men were thrilled; they were so happy. It wasn’t done perfectly, but it will never be forgotten.”</p>
<p>&nbsp;</p>
<div id="attachment_2171" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-049.jpeg"><img class="size-large wp-image-2171" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-049-1024x769.jpeg" alt="Over 3200 prisoners were kept in Sheberghan © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">Over 3200 prisoners were kept in Sheberghan © Robert Young Pelton, all rights reserved</p></div>
<p>Around eight o’clock on Saturday night, while I’m talking with the Green Berets, one of Dostum’s men comes into the house and asks us to follow him outside. Beyond the high steel gates is a confusion of trucks, headlights, and guns, and the sound of men moaning in pain. Lined up against a wall is the most pathetic display of humanity I have ever seen: the survivors of the bunker at Qala Jangi fortress. Dostum’s men had finally flooded them out by sluicing frigid water into the subterranean room. Instead of the expected handful of holdouts, no fewer than 86 foreign Taliban emerged after a week in the agonizing dark and cold—starved, deaf, hypothermic, wounded, and exhausted. Their captors brought them here en route to the Sheberghan prison.</p>
<p>They send off steam in the cold night, their brown skin white with dust. Some hide their faces, others convulse and shiver. I talk to an Iraqi, as well as to Pakistanis and Saudis—all of whom speak English. On another truck are the seriously wounded. Some cry out in pain, some are weeping, and others lie still, their faces frozen in deathly grimaces.</p>
<p>They put the prisoners back on the truck. A few minutes later, one of Dostum’s men runs up breathlessly, saying there is an American in the hospital. I grab my cameras and ask Bill, a pensive Green Beret medic, to come with me.</p>
<div id="attachment_2202" style="width: 680px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-105.jpeg"><img class="size-large wp-image-2202" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-105-1024x769.jpeg" alt="The soldiers stay well away from the al Qaeda prisoners as I interview them. They have been blowing themselves up with grenades. © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">The soldiers stay well away from the al Qaeda prisoners as I interview them. They have been blowing themselves up with grenades. © Robert Young Pelton, all rights reserved</p></div>
<p>The scene at the hospital is ugly. The warm smell of gangrene and human waste hits me as I open the door to the triage room. Shattered, bearded men lie everywhere on stretchers, covered by thin blue sheets. The doctors huddle around a steel-drum stove, smiling and talking, oblivious to the pain and suffering around them. In the back, a doctor leans over a man with a smoke-blackened face, wild black hair, and an unkempt beard. He lies staring at the ceiling. The doctor yells in halting English, “What your name?” He jabs at the half-conscious man’s face. “Open your eyes! What your name? Where you from?” The man finally answers. “John,” he says. “Washington, D.C.”</p>
<p>The man is terribly thin and severely hypothermic. At first he is hostile, like a kitten baring its claws. He won’t tell me who to contact, or provide any information that would get him out of the crudely equipped hospital. I convince the staff to move him to an upstairs bed, where Bill inserts an IV of Hespan into the man’s dehydrated body to increase blood circulation. As Bill checks for wounds, he talks to the young man briefly in Arabic. I tell the prisoner where he is and who he’s talking to. Bill finds a shrapnel wound in the emaciated man’s right upper thigh and wounds from grenade shrapnel in his back; he also finds that part of the second toe on his left foot has been shot away.</p>
<div id="attachment_2057" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2017/10/a_walker.jpeg"><img class="size-large wp-image-2057" src="http://dangerousmagazine.com/wp-content/uploads/2017/10/a_walker-1024x769.jpeg" alt="John Walker Lindh was the second Irish American jihadi who was trained in Bin Laden's camps. He refused to talk to his parents and we took him back to our guesthouse for his protection. © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">John Walker Lindh was the second Irish American jihadi  I had met who was trained in Bin Laden&#8217;s camps. He refused to talk to his parents and he was taken back to our guesthouse for his protection. © Robert Young Pelton, all rights reserved</p></div>
<p>As the Hespan drips into his veins, I fire up the video camera, and the man begins to tell his story. His name, he says, is John Walker. He studied Arabic in Yemen and then enrolled in a madrasah, or religious school, in northern Pakistan. He says it was an area sympathetic to the Taliban and that his heart went out to them.</p>
<p>Six months ago, he traveled to Kabul with some Pakistanis to join the Taliban. Since he can’t speak Urdu, he was assigned to the Arab-speaking branch of Ansar (“the helpers”), a faction that Walker claims is sponsored by Osama bin Laden—whom Walker says he saw many times in the training camps and on the front lines.</p>
<p>He ended up in the Takhar Province, in the northeastern part of the country. Then the war began. After the American bombing campaign decimated their forces, Walker and members of his unit fled on foot nearly a hundred miles west to Kunduz—all for nothing, as it turned out. Mullah Faizal and Mullah Nuri soon surrendered Kunduz to Dostum, and Walker was imprisoned with the other foreign volunteers in the bunker at Qala Jangi.</p>
<p>When I look at the terrible conditions and the predicament that Walker is in, I have to ask him if this is what he expected.</p>
<p>“Definitely.”</p>
<p>Was his goal to become martyred?</p>
<p>“It is the goal of every Muslim.”</p>
<p>Then the morphine begins to kick in. I suggest to Bill that we remove Walker from the hospital, where he might be killed by other patients, many of whom were fighting against him at the fortress. We transfer him to Dostum’s house, and the next day he’s spirited away at the same time that his story is being broadcast around the world.</p>
<p>When the videotape of my interview with Walker hits the airwaves back in the U.S., the country focuses its white-hot anger on him, and some of that anger spills over onto me. In the conservative press I am criticized for being too gentle in my questioning of an obvious traitor, on the left for cold-bloodedly tricking a helpless boy into incriminating himself.</p>
<p>&nbsp;</p>
<div id="attachment_2089" style="width: 862px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/Regulators-RObin-Moore-.jpg"><img class="size-full wp-image-2089" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/Regulators-RObin-Moore-.jpg" alt="The team was ordered to exile to meet Donald Rumsfeld and be interviewed by Robin Moore. What happened next was the first of many distortions and fictional retelling of their story. " width="852" height="316" /></a><p class="wp-caption-text">The team was ordered to exile to meet Donald Rumsfeld and be interviewed by Robin Moore. What happened next was the first of many distortions and fictional retelling of their story. This is the back jacket of The Hunt for Bin Laden ghostwritten by the late Jack Idema and published as non fiction by Random House editor Bob Loomis. The book was quietly taken out of print.</p></div>
<p>If you drive west from Mazar, past Qala Jangi, past Khoda Barq, past the ancient, crumbling city of Balkh, and head south toward a ridge of snow-dusted mountains called the Alborz Range, you will see a gap—the Tingi Pass. This is where the Taliban made their last stand. The Green Berets call it the Gap of Doom.</p>
<p>Two of the Green Berets I’ve been chatting with—Andy and Paul, the pair with the longest tenure in the company—have decided that I need to see this place for myself, or maybe simply that they need to go see it again one last time. We jump in a Toyota off-road vehicle and set off. Soon we’re winding past an ancient brick bridge that crosses a roaring gorge; on the west side are large caves that shepherds have scooped out of the soft rock over the centuries.</p>
<p>As we drive, Paul tells me that, back in the U.S., even the Regulators are subject to a military culture of rules and red tape. Planning a one-day live-ammo training exercise can require six months of paperwork. “If there is no enemy, then bureaucracy is the enemy,” he says. But on the ground in Afghanistan, they’re on their own. The greatest restrictions they face have been placed on them by Dostum himself. “Dostum was very concerned about us getting too close to the battlefield,” Captain Mark had told me back at the barracks. “In the last two semi-wars we have been in, every time American soldiers get killed we pull out. That is one of the premises Osama bin Laden operates under.” Dostum wasn’t about to let an American casualty put a premature end to his battle plan.</p>
<p>Their closest call came toward the end of the campaign, before they’d reached the Tingi Pass; I’d gotten an account of it last night from Mike, a big, bearded, soft-spoken soldier. The conflict began with several hundred Taliban troops moving into positions on an adjacent hill. Outmanned, the Green Berets decided to move out on horseback. They had gone only about 600 meters when they started taking fire. “I figured I could whip my horse and run across an open area,” Mike said. “I whip my horse, it takes three steps, and stops. The rounds are zinging over my head. Somehow I make it across the open area. I get off the horse and say, ‘Screw this; I’m walking.’</p>
<p>“We set up in a bomb crater and used it as our bunker. We were receiving more fire. It was somewhere between harassing and accurate—enough to keep our heads down. We called in a couple of bomb strikes. We could see a bunch of Taliban come out of another bunker complex off to the south and disappear behind a hill. It took about an hour to get the aircraft. All the while, we could see troops moving and disappearing. I’m looking through the optics while rounds are zinging all around us.” At this point in the tale, Mike nodded toward Paul, who was sitting next to him on the couch at Dostum’s guest house. “Paul here is busy shooting at guys. What we didn’t realize was that the Taliban who we saw coming out of the bunker had gone into the low ground and were sprinting up the hills at us in a flanking maneuver.</p>
<p>“Our Afghans are running out of ammo. Their subcommander has told us at least six times over the radio to get out of there. You have to understand: Dostum had told them, ‘If an American gets hurt . . . you die.’ We were focused on calling in an air strike to take out this truck that had rumbled into view, and now RPG rounds are flying over our heads. We’re not about to stand up and watch what’s going on. The pilot asked us, ‘What’s the effect [of the bomb attack on the truck]?’ We yell over the radio, ‘We don’t know! We’re not lifting our heads up!’</p>
<p>“When we turn around and notice what’s going on, we see our Afghans have split.”</p>
<p>The team decided to call in a B-52 strike practically on their own position—a drastic move considering the planes were flying above 15,000 feet. The enemy was 700 meters out and moving quickly. “Matt yelled, ‘Duck your head and get down!’ And that pilot dropped a shitload of bombs,” Mike said. “You felt the air leave. After the bombs hit, I peeked over the side of the bunker; our horses were gone. We grabbed our stuff and ran.”</p>
<p>&nbsp;</p>
<div id="attachment_2185" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-088.jpeg"><img class="size-large wp-image-2185" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-088-1024x769.jpeg" alt="The team knew that their story would be stolen, rewritten and misused as Rumsfeld and others seized the moment. © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">The team knew that their story would be stolen, rewritten and misused as Rumsfeld and others seized the moment. © Robert Young Pelton, all rights reserved</p></div>
<p>Paul, Andy, and I drive past villages of round, domed huts, past a checkpoint manned by Dostum’s men, and up along the winding road to the Tingi Pass. Three years of drought have broken: A cold rain pours down in gray sheets. We pass the twisted, stripped wrecks of trucks and Toyotas. Afghans in a blue truck are scavenging for parts. The two Green Berets are solemn; they insist on driving through the gap so they can tell their story from the right perspective.</p>
<p>We wind through the tight pass alongside a swollen mountain river, go over the pass, then head a kilometer down the south side of the divide and stop at a freshly mudded house. We get out of the jeep and stand in the rain and slick mud. Paul picks up the story, raindrops dotting his gold-rimmed, government-issue glasses.</p>
<p>“We kept moving north on horseback, but at that point, no one could tell where the front line was anymore. Once we hit Keshendeh-ye Bala, we picked up a road and followed it north in a truck Dostum’s men had captured from the Taliban. At eight that night, we pulled in to Shulgareh, which is the biggest town in the valley. We were ready to throw down the mattress and settle in for the night when one of the security guards came up with a radio and said that Dostum needed someone to go up to the front to call in aircraft. We jumped in the back of a truck and drove up to Dostum’s HQ here in this house.”</p>
<p>In the courtyard, a soft-eyed cow tries to eat spilled oats just beyond its reach. A hundred yards away, villagers stand against a long compound. They huddle in brown blankets, trying to avoid the soaking rain. Paul points to a misty, triangular peak that forms one side of the gap. It served as Paul’s command post.</p>
<p>“When we climbed up to the top of that hill, we could see the Taliban on the other side, regrouping for the final attempt to stop us. They were setting up fixed positions—bunkers with Y-shaped fighting trenches—on the northern side of the gap. It works against tanks, but it’s plain stupid in this terrain. We had unrestricted movement into the gap, which gave us the high ground.”</p>
<p>Andy chimes in. “Whoever gets the high ground first wins the wars here.” From their perch on the east side of the gorge, the Green Berets could shoot directly into the trenches of the Taliban.</p>
<p>“Once the plane got there, it circled about six times,” Paul says. “Every time the plane would circle, the Taliban would run behind their bunker. After four times or so, they didn’t get bombed, so they just stayed there.</p>
<p>I targeted a spot right next to this guy’s head. I was sick of this guy running back and forth getting ammo. Then the bombs are dropped, and I look through the scope and see body parts flying everywhere. We moved our targeting up along the ridgeline to the second bunker. Same thing: We identity it and boom! No more Taliban. I target the third bunker. They just can’t figure it out. The bomb lands and hits and bam! After that hit, all of them took off on foot to Mazar. And that ended the resistance.” As the three of us climb back into our vehicle, I glance at the battlefield. All I see is grass growing beside abandoned trenches. Only Paul and Andy are able to appreciate what happened here.</p>
<p>Early in the afternoon on November 10, Dostum reached Mazar. His men rounded up vehicles that the Taliban had left behind, and Heavy D entered the city as a conquering hero, standing through the sunroof of a Toyota Land Cruiser. The crowds quickly grew; people threw money in the air for good luck. Dostum’s first stop was the blue mosque at the tomb of Hazrat Ali, the revered son-in-law of the Prophet. Men wept as the imam prayed and thanked Dostum for deliverance.</p>
<div id="attachment_2104" style="width: 680px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-043.jpeg"><img class="size-large wp-image-2104" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-043-1024x769.jpeg" alt="A local mullah sings a prayer of deliverance and thanks to Dostum. © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">A local mullah sings a prayer of deliverance and thanks to Dostum. © Robert Young Pelton, all rights reserved</p></div>
<p>The joy was short-lived. It turned out that 900 Pakistani Taliban had been left behind in a madrasah in the center of a compound about the size of a city block, and they were ready to fight to the death. Dostum and his commanders wanted to negotiate, but the foreign Taliban shot and killed their peace envoys, which left Al-liance leaders with little choice. “We had hardened fighters holed up in the middle of an urban area who wanted to die,” says Will. “And we were going to oblige them.”</p>
<p>The team set up on the roof of a building about 400 meters from the madrasah and called in a strike. When the two aircraft were on location, the Green Berets radioed Alliance commanders to evacuate civilians from the area. The pilots, however, could not lock in on the laser-sighting device that the team was using to identify the target. The madrasah was surrounded for about a mile on each side by identical buildings, which made it difficult for the pilots to pick out the school. “Finally, the pilot says he has the target in sight. I asked him to describe it, just to be sure,” says Will. “He described the building we were sitting on to a T.” Finally, Air Force Steve guided the pilot to the correct building, and he dropped the ordnance: direct hit.</p>
<p>The team cleared him for immediate re-attack, but the pilot radioed back that he had “hung a bomb”—a bomb had not released. When the pilot radioed that he needed to return to base, the other pilot swung into action. On the next pass, three more bombs went through the hole in the roof made by the first bomb, killing most of the holdouts inside.</p>
<p>Under intense pressure, the Regulators had called in a perfect surgical strike—a bomb drop in a crowded urban area without a single civilian casualty. “This is the first close-air-support strike in years in an urban area,” says Air Force Steve. “It was old-fashioned professionalism. The whole team jelled.”</p>
<p>&nbsp;</p>
<p>The steel gate to the guest house opens, and Dostum strolls out, hands in pockets, and is ushered into a black Audi Quattro with tinted windows. Dozens of dark-eyed men in turbans scramble into battered Toyota pickup trucks and assorted four-wheel-drive vehicles. Armored personnel carriers jerk to life in clouds of black diesel exhaust. It’s three weeks after the madrasah bombing, and word has come down that 3,000 Taliban are still occupying the city and environs of Balkh, Alexander the Great’s old walled capital, a few miles west of Mazar. Dostum has decided to clean up the region’s last remaining pocket of Taliban himself.</p>
<p>I ride in the warlord’s communications truck, a white Land Cruiser. The Regulators rush to catch up in two mud-covered cars. We roll past weathered villages unchanged in two millennia. Abandoned Soviet-era tanks are scattered about the flat countryside like dinosaur skeletons.</p>
<div id="attachment_2055" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2017/10/a_Afghanistan-2001-120.jpeg"><img class="size-large wp-image-2055" src="http://dangerousmagazine.com/wp-content/uploads/2017/10/a_Afghanistan-2001-120-1024x769.jpeg" alt="Not everything goes to plan during a raid on a village  © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">Not everything goes to plan during a raid on a village<br />© Robert Young Pelton, all rights reserved</p></div>
<p>This part of Afghanistan is ancient, arid, windblown—and is the real cradle of its history and wealth. This is where Alexander ruled, where Zoroaster was born, where Buddhists came on pilgrimages, a center of art, poetry, and study where lions were hunted and where Genghis Khan came to conquer. Now, in a scene that has been repeated over and over for the past 2,000 years, a warlord is arriving.</p>
<p>In a village on the outskirts of Balkh, the convoy rumbles to a halt near an ancient castle that is now a rounded mound of tan mud. The truck-mounted ZU antiaircraft guns are cranked down to eye level. Twenty Urgan missiles point toward the village. Dostum’s men load RPGs and check their ammo drums. About 200 men have taken up positions around the village, eyeing ragged locals, who stare back from a careful distance. It feels like a scene out of a bad Mexican movie.</p>
<p>After a cinematic pause to allow the implications of his arrival to sink in, Dostum phones the village leadership from the Audi: Send out your weapons and any fighters or we’re going in. The deadline is noon.</p>
<p>The general climbs out of the tiny black car and tucks his hands into his belt. He rolls in a John Wayne walk to Commander Lal, who’s in charge of the standoff. The two Afghan leaders study a map with Captain Mark, just in case air strikes are needed. When noon comes and goes, I expect the order to fire. I am surprised, then, to see Dostum wrap his blue turban around his head and chin and stride into the village . . . to talk.</p>
<p>Ironically, it was this sort of diplomatic triumph—the surrender at Kunduz just before my arrival—and not a battle that gave the Regulators their most bitter experience of the war. “We thought Kunduz was [going to be] a full-scale attack,” says Captain Mark. “When we got there, we were sitting on our asses.” It was while they watched the drawn-out surrender that Mike Spann was attacked at Qala Jangi and the uprising began. “This was a guy we considered part of our unit,” says Mark. “If we had been there, Mike’s death would not have happened.”</p>
<p>When they got word of the incident, the unit desperately wanted to get back to the prison. “The info I had was that he was MIA,” Mark says. “We thought he was wounded. The old creed is that we never leave a guy behind.” The Regulators wanted to find the prisoners who had killed Spann and attacked a second CIA man who was questioning the Taliban. “We begged,” Mark says, “but we were told to stay away.” (In the end, the Regulators wouldn’t get clearance to enter Qala Jangi until the uprising was over.)</p>
<p>Commander Abdul Karim Fakir, who was in charge of the fortress while Dostum was in Kunduz, had worked with the Green Berets since they landed in Afghanistan. “I saw this look in Fakir’s eyes,” says Mark, “like, Why didn’t you help?”</p>
<div id="attachment_2134" style="width: 650px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-130.jpeg"><img class="size-full wp-image-2134" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-130.jpeg" alt="Dostum, triumphant on a return to the simple village of his brith. © Robert Young Pelton, all rights reserved" width="640" height="480" /></a><p class="wp-caption-text">Dostum, triumphant on a return to the simple village of his brith. © Robert Young Pelton, all rights reserved</p></div>
<p>Dostum has not been home in five years to the village of Khvajeh Do Kuh. His father is old. Two weeks after Dostum descended on Balkh, things have calmed down, so the warlord climbs into the front passenger seat of a Nissan, and we head across a sandstorm-blasted desert. This time there is no convoy; just a son paying his respects to his father. As we drive through a drought-ravaged wasteland, he points out battlefields and the sites of ambushes and skirmishes. Dostum tells me that he has fought on every inch of Afghan soil and can recite the names of his men who have died, describe each battle in detail, and tell you what he has learned from every encounter. He says it sadly.</p>
<p>A few yards before the turnoff to Khvajeh Do Kuh, he gestures to a place where 180 of his men died fighting the Taliban. All I see is brown dirt and men on donkeys leading camels along the road. Nothing of the war, death, exile, and victory that have shaped the man sitting in the front seat. There is an emotional landscape here I cannot see.</p>
<p>As we approach the village, the men and boys are lined up in a perfect row a hundred yards long, waiting to greet Dostum. The general gets out of the car and goes down the line, trying to embrace and talk to each person, but it is getting dark. The crowd of men follows Dostum into his father’s compound.</p>
<p>In a tiny, sparse room are his father, Dostum’s former teacher, and a village elder. The old men are frail, with deeply lined faces. The teacher giggles, his white beard shaking with joy. Dostum’s father talks to his son as though he were a child, telling him that he and the teacher have been praying for his success. They reach out to shake his hand, to embrace him. The men in the room try to act formally, but as Dostum starts to leave, some begin to cry. An old man yells, “God bless you. We are alive thanks to you.” As Dostum stands on the porch, looking at the place of his birth, he chokes up.</p>
<p>He takes me to the hilltop above the village. It’s a high, lonely place. When war first came to Afghanistan, two decades ago, he built his first stronghold here to guard the village. Dostum points to the fresh dirt of new graves in the cemetery. “The men who first defended this post with me are all dead now. The new graves belong to those who were fighting terrorists.” He is silhouetted against the slate-blue sky, the long tails of his silver turban whipping in the wind.</p>
<p>For a brief moment, the general stands triumphant, the conquering hero, the bring-er of peace, the warlord who has ended war in the north—and, therefore, perhaps eliminated his own reason for being. As he leans into the Afghan wind, the light falls, and a moment in history fades.</p>
<div id="attachment_2203" style="width: 630px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/image320504x.jpg"><img class="size-full wp-image-2203" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/image320504x.jpg" alt="The first monument to CIA officer Mike Spann, the first casualty in the war on terror was erected by General Dostum. Here Spann interviews Lindh but Lindh remains silent. Moments later Mike would be murdered by prisoners. " width="620" height="350" /></a><p class="wp-caption-text">The first monument to CIA officer Mike Spann, the first casualty in the war on terror was erected by General Dostum. Here Spann interviews Lindh but Lindh remains silent. Moments later Mike would be murdered by prisoners.</p></div>
<p>Dostum must now change his focus from fighting to rebuilding his country. (Within a week, he will be named deputy minister of defense for the new interim government of Afghanistan.) Now, on most mornings, Dostum emerges from his house, squinting into a crowd of turbaned men waiting for an audience. They sit patiently for hours, clutching tiny pieces of paper, seeking his aid. Dostum’s meetings do not end until well after midnight.</p>
<p>Not long before I’m to leave, Dostum asks for help with a letter of condolence to the widow of Mike Spann. The task inspires him to try to express his feelings about the past two months. He confesses that he had worried at first how the Americans would handle Afghan warfare: “It was cold; the food was bad. The bread we ate was half-mixed with dirt. I wondered if they could adapt to these circumstances. I have been to America and know the quality of life they enjoy. To my surprise, these men felt at home.”</p>
<p>And more than that: The Afghan warlord and his tiny band of American soldiers had clearly formed a bond that only men who have been through combat can understand. “I now have a friend named Mark,” Dostum says, referring to the Green Beret captain. “I feel he is my brother. He is so sincere; whenever I see him, I feel joy.” He pauses for a moment, lost in reflection. “I asked for a few Americans,” he says finally. “They brought with them the courage of a whole army.”</p>
<p>Down the road at the Regulators’ make-shift barracks, a call comes over the Motorola: “Pack your shit.” The men quickly gather their gear, as they have so many times before. Within hours, they are gone.</p>
<p>&nbsp;</p>
<p><strong>Afterword.</strong></p>
<div id="attachment_2135" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-132.jpeg"><img class="size-large wp-image-2135" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-132-1024x769.jpeg" alt="SFC Bill Bennet  © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">SFC Bill Bennett RIP<br />© Robert Young Pelton, all rights reserved</p></div>
<p>The team was under orders not to talk to journalists. Since I was a guest of General Dostum it was a little difficult for the men to avoid me. After a while we soon got along. There were some deep unresolved internal conflicts because of the death of Mike Spann and why they over their protests had been sent to Kunduz. After our time in country, I became friends with the men and defended them when they were accused of war crimes by the media. A bizarre story called &#8220;The Convoy of Death&#8221; surfaced and painted Dostum and the team in a negative light. After days of killing as many Taliban as they could they were accused of murdering prisoners in shipping containers. Newsweek, The New York Times and other outlets insisted that eyewitness had seen American soldiers laughing and shooting into containers. Prisoners were so hot that they had to lick the sweat off each other one man said. An NGO insisted that thousands of corpses were dumped at a graveyard called Dasht-i-Leili outside of Shiberghan but refused to actual exhume them.  It didn&#8217;t seem to matter that there was no actual evidence. An odd case of a lack of evidence being brought forward as the evidence. This scandal would tarnish General Dostum&#8217;s very real accomplishment of being America&#8217;s most aggressive and stalwart ally against the Taliban and al Qaeda.</p>
<div id="attachment_2178" style="width: 310px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-070.jpeg"><img class="size-medium wp-image-2178" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-070-300x225.jpeg" alt="The mystery of missing prisoners was never matched up to the careful medical records kept of each al Qaeda and Taliban detainee kept by doctors and local NGO's. ©Robert Young Pelton, all rights reserved" width="300" height="225" /></a><p class="wp-caption-text">The mystery of missing prisoners was never matched up to the careful medical records kept of each al Qaeda and Taliban detainee kept by doctors and local NGO&#8217;s. ©Robert Young Pelton, all rights reserved</p></div>
<p>The problem is that the the Convoy of Death story is false. I was at the prison in Sheberghan when they unloaded the trucks and watched the Red Cross medics count the dead and note the wounded. The wholesale conversion of talibs to the government side during the Kunduz surrender had created confusion in how many Taliban existed in the North. Was it ten thousand, five thousand,  The actual number was around 3,500 who surrendered, another 460 al Qaeda showed up at the gates of Mazar and around 250 &#8211; 300 died of their wounds, disease or suffocation during transport in the frigid weather. I know because I counted the dead bodies. The only mystery was the lack of interest in the NGO, governments and media in investigating the facts.</p>
<p>Although I spoke out on behalf of the team the media, didn&#8217;t publish my eyewitness photos and testimony because it would go against a narrative that a Pashtun backed by a European-backed central government must rule Kabul, not a coalition of regional leaders.We did not want the Taliban voting themselves back into power, yet we restrained the grass roots power of the ethnic minorities. Sidelined, and in exile in Turkey, In 2009, Dostum was begged by President Karzai to come back from exile to reelect him and again in 2014 Dostum engineered the victory of President Ghani&#8230;.only to go back into exile.  To this day the war continues and Dostum as First Vice President remains a staunch ally of America.</p>
<p>Back in 2002 and 2003 the film and book industry were not interested in books or movies about Afghanistan. Our war had been big footed by Iraq. When SFC Bill Bennett invited me over to join the team SCUD hunting before the war he did not like that war. Later on he had a dark  premonition. &#8220;I don&#8217;t think I will make it through this one&#8221; he wrote me in an email just hours before he was gunned down on a raid in Ramadi. It was September 12, 2003. Bill and the team were wearing  armor decorated with my logo when he died. I was asked to sit on the same row as the team during his funeral. An event and a man I will never forget. There is a need to never forget the sacrifices men make in war. We must honor their truth not the fiction that creates more wars.</p>
<p>In Hollywood I was asked to join meetings during which actors and producers pitched the story, read half a dozen books in which the idea of John Wayne like cavalry charges and Dostum&#8217;s ogre like cruelty were fictionalized into cartoons. The men know their story and I wrote it down. Some were angry then, some had been through enough wars to see what was coming.</p>
<p>They are currently enjoying some well earned recognition now that the film 12 Strong has been released but again, the film is not anywhere close to the truth. We will never end wars if we don&#8217;t understand how to win them. A story of how 12 Americans and a Afghan warlord won the war on terror, if only for a brief time still remains to be told.</p>
<p>© 2018 Robert Young Pelton, all rights reserved</p>
<p>&nbsp;</p>
<p>ryp@comebackalive.com</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/01/20/general-dostum-12-strong-legend-heavy-d-boys/">General Dostum and 12 Strong: THE LEGEND OF HEAVY D AND THE BOYS</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2018/01/20/general-dostum-12-strong-legend-heavy-d-boys/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Syria: Wish You Were Here?</title>
		<link>http://dangerousmagazine.com/2013/03/29/syria-wish-you-were-here/</link>
		<comments>http://dangerousmagazine.com/2013/03/29/syria-wish-you-were-here/#comments</comments>
		<pubDate>Fri, 29 Mar 2013 19:28:25 +0000</pubDate>
		<dc:creator><![CDATA[editor]]></dc:creator>
				<category><![CDATA[New Issue]]></category>
		<category><![CDATA[Matt VanDyke]]></category>
		<category><![CDATA[Robert Young Pelton]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Syria Journalists]]></category>
		<category><![CDATA[Toshifumi Fujimoto]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=1613</guid>
		<description><![CDATA[<p>By Robert Young Pelton Dirty wars attract a wide variety of odd types: Volunteers, journos, freedom fighters, NGOs, businessmen and even tourists. The traditional concept of war as one group of soldiers battling another until the other side surrenders or is vanquished is long outdated, as are many of the traditional roles associated with such a conflict. Among traditional wars have been the so-called neutrals—journalists, aid workers, NGOs and supposedly civilians protected in battle by The Hague or after capture...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2013/03/29/syria-wish-you-were-here/">Syria: Wish You Were Here?</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>By Robert Young Pelton</p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2013/03/SyriaShooters.jpg"><img class="aligncenter size-full wp-image-1846" alt="SyriaShooters" src="http://dangerousmagazine.com/wp-content/uploads/2013/03/SyriaShooters.jpg" width="798" height="392" /></a>Dirty wars attract a wide variety of odd types: Volunteers, journos, freedom fighters, NGOs, businessmen and even tourists. The traditional concept of war as one group of soldiers battling another until the other side surrenders or is vanquished is long outdated, as are many of the traditional roles associated with such a conflict. Among traditional wars have been the so-called neutrals—journalists, aid workers, NGOs and supposedly civilians protected in battle by The <a href="http://www.law.kuleuven.be/jura/art/45n3/verschingel.html">Hague or after capture by the Geneva Conventions</a>. Today’s wars make few distinctions between combatants and non-combatants, warfighter and peacemaker, observer or participant. Researchers will find few clearly delineated targets. The traditional barriers and lines that define players on the battlefield have also blurred.</p>
<p>In the case of journalism, the lines are thoroughly muddled. The roles and positions of citizen journalists, official embeds, propagandists, counter propagandists, hackers, hoaxers, unilaterals and credentialed media are no longer discrete. The NGO and humanitarian world finds itself powerless and targeted, with even the UN scrambling for cover, its workers being kidnapped by the dozen.  There is currently no better place than Syria to delve into these rapidly shifting roles of communication.</p>
<p><b>A New Day</b></p>
<p>The Arab Spring looked like it might bypass Syria and strongman Bashar al-Assad. Assad’s father, Hafez al-Assad, emerged from the minority Alawite, a Shi’ite sect, and used force and a massive police presence to govern a Sunni nation. Ophthalmologist Bashar, who never prepared to rule Syria, was selected to lead the country after his brother was killed in his Ferrari driving to the Damascus airport.   Bashar was considered a somewhat secular and progressive ruler until the Arab Spring arrived on March 15, 2011 with massive public demonstrations.</p>
<p>Surprisingly, Bashar took his father’s playbook from the ’80s when Sunnis rose up in Hama, and later crushed resistance with force. But the same strategy that worked 20 years ago didn’t work in an era of cell phones, Twitter and Internet. Syrians began to fight back, creating impromptu militias but gaining support from conservative Sunni backers like Saudi Arabia and Qatar. The violence dealt out against the Syrian people and the outcries to bring in the media began to attract traditional journalists from well-known publications.</p>
<p><b>THE END OF EMBED JOURNALISM</b></p>
<p>A year ago in March, veteran war reporter Marie Colvin broadcast live from a makeshift media center in Homs that had been pummeled earlier when CNN reported from the same building. <a href="http://www.telegraph.co.uk/news/worldnews/middleeast/syria/9097762/Syria-Sunday-Times-journalist-Marie-Colvin-killed-in-Homs.html">Colvin was killed</a> by direct shelling. There was no confusion about who she was, where she was or what she was doing. Her death, along with the ruthlessness of Assad’s regime, sent <a href="http://www.foreignpolicy.com/articles/2012/03/02/kill_the_messenger">shockwaves</a> through the media.</p>
<p>In 2012, according to the International Federation of Journalists, 35 journalists were killed in Syria. It is the most dangerous country in the world to report from. By comparison, 24 journalists were killed in Afghanistan <i>since 1992.</i> In 2013 alone at least five journalists have been killed, including Al Jazeera reporter Mohamed Al-Massalmeh, who <a href="http://www.youtube.com/watch?v=1I1QFVi42Uc">was shot as he ran across a road</a>, and French magazine publisher <a href="http://www.youtube.com/watch?v=O5RYZWXGf5w">Yves Debay</a> who was killed while Free Syrian Army soldiers fought to reclaim a hospital. It is clear that journalists are targets.  Some, like James Foley, Austin Tice, Richard Engel, Temoris Grecko and Balint Szlanko have been kidnapped, almost all in the vicinity of border crossings, the most dangerous of which seems to be the Bab al-Hawa crossing west of Aleppo. In each of these kidnappings, there were neither requests for ransoms nor word of the detainees’ conditions.</p>
<p>After Libya, the conflict in Syria is the second major “unembedded” war. A war in which both experienced and neophyte journalists need only money and gumption to get to the fighting. There is no guarantee of safety or money, and it is a war that shows little mercy. There has been little reward for the risk the media has taken, few international diplomacy gains for the rebels, and even less victory for the government.</p>
<p>Despite the grim statistics, hundreds of journalists, volunteers, fighters, stringers, tourists, aid workers, and even the UN has descended on Syria with little effect on the violence that has killed more than 70,000 and displaced 2.3 million so far.</p>
<p><i>Dangerous</i> tried to sort out what’s making Syria so deadly and yet so attractive to the press corps.</p>
<p><b>THE JOURNALIST</b></p>
<p>“The way I’ve described Syria to others is dark and hopeless, and there is a sense of futility,” says <i>Jane</i>, a broadcast journalist who went to Syria on assignment and who we’ve given an alias to protect her identity. “Very dreary… based on the dead people I saw lying in the streets, the blasé attitudes towards the bodies, the numbers of injuries, the destroyed buildings, the poverty, lacking infrastructure…”</p>
<p>Much like the recent conflict in Libya that resulted in the overthrow of Muammar Qaddafi, there are no Western forces present in Syria with which journalists can embed or shield themselves. Assad’s regime has allowed a handful of reporters with government troops, but permissions to join the regime’s ranks are becoming fewer as out-going reports are less agreeable to the government.</p>
<p>Those who have accompanied the Syrian government—largely to show the brutality of the rebels—have been attacked as propagandists. <a href="http://www.independent.co.uk/voices/commentators/fisk/robert-fisk-the-bloody-truth-about-syrias-uncivil-war-8081386.html">Robert Fisk was shown</a> armless children and brutalized prisoners and then derided for his efforts. The Syrian government continues to enact propagandist censorship on the media under its influence. One Syrian government reporter even interviewed children next to their recently killed mother.  For the media that the government cannot influence, it has resorted to kidnapping, arresting and killing reporters. Reporters Without Borders called Syria “<a href="http://en.rsf.org/syria-vicious-circle-of-disappearing-20-09-2012,43418.html">a Bermuda triangle for journalists</a>.”</p>
<p>The Free Syrian Army welcomes the media, but for the most part journalists describe FSA as a disorganized bunch of poorly trained, poorly disciplined and poorly armed young men. The stories tend to ignore the random violence, sectarian division and fundamentalist ideology in the rebel factions, even that they’ve <a href="http://www.ifj.org/en/articles/ifj-and-efj-warn-of-media-safety-crisis-in-syria-after-rebels-threats-to-execute-reporter">kidnapped journalists</a>.  A lot of the coverage locksteps to the meme of Libyans throwing off the yoke of dictatorship with tacit Western support. Except this is Syria, and many of the groups are foreign jihadis, fundamentalists bent on Sunni domination and fighting for causes unrelated to national liberation.</p>
<p>Syria resembles that of Libya only to the untrained onlooker.</p>
<p>“Libyans had tons of help and aid and protective parties interested in having a hand in the future, thereby lending a hand in ousting Gadhafi,” says Jane, whose next stop is Mali. “Libya was easy to navigate and cover… It didn&#8217;t have the same sordid twist that Syria&#8217;s got.&#8221;</p>
<p>Without Western combatants, gaining access to war is once again easier for a journalist—whether that journalist is aspiring on a shoestring or a seasoned professional on an expense account.  But venturing to the front is also more dangerous without Western soldiers. There is no MEDEVAC, there may not be anyone trained to apply a tourniquet.  Worse, as is the case in Syria, there are those who use the well-known methods of entry, like the Bab al-Hawa crossing, as a buffet table from which to kidnap journalists. And the Syrian government is fine with that. The regime has detained, assaulted and expelled journalists and disabled the mobile-phone network.</p>
<p>In August, President Bashar al-Assad signed a <a href="http://www.sana-syria.com/eng/361/2011/08/29/366490.htm">media law</a> veiled in claims of protecting the freedom of expression, but which is open-ended enough to allow for the arrest of journalists and the censorship of published material. But probably the biggest danger is that the Syrian government has shown a proclivity to simply killing Western journalists.</p>
<p>“The feeling inside [Syria] was like the proverbial fish in a barrel,” says Jane. “Fear of getting hit by air, mortar or sniper… Nowhere is safe. I hated covering Syria.”</p>
<p><b>THE WAR TOURIST</b></p>
<p>The ultimate put-down to a neophyte visitor to the battlefield is  “war tourist.” That is, someone who appears to be in the midst of misery and violence simply for personal aggrandizement and curiosity.  Ignoring, or perhaps capitalizing on, this term is Toshifumi Fujimoto, a self-proclaimed war tourist from Japan. The story he told curious media in Syria was that he grew bored with his truck-driving job in Japan, bought a ticket to Turkey, and crossed into Syria. From there he posted frontline dispatches to Facebook. He claimed to have no fear of the conflict, credits luck for keeping him alive but warns others that they face certain death if they travel to Syria. To some journalists he tells a story of sadness and wanting to die, to others he points to his dispatches as being a witness. He has a growing cadre of admirers on Facebook who see his personal journey and roughhewn coverage as accessible and honest.</p>
<p>Fujimoto wore Japanese military fatigues and carried two cameras and a video camera around his neck. He tagged along with other journos but with no helmet and no body armor. He said the prospect of death never bothered him because he is part samurai, part kamikaze.  His publicity seemed to feed the media’s need to make their quest more legitimate. In January he was featured in the AFP, the <i>Guardian</i>, <i>The New York Times</i> and many other outlets. Fujimoto’s explanation for being in harm’s way as being: “It fascinates me, and I enjoy it,&#8221; which isn’t too far off why professional journalists journey to Syria. Except the journalists make money from their reports of the Syrians’ strife and suffering and mask it under the noble goal of “bearing witness” or “telling the story”, though many admit privately that war is something that gives them more than just a job, it can be an obsession.</p>
<p>In a nod to his AFP interviewer but with no statistics to support it, Fujimoto said, “It’s more dangerous in Syria to be a journalist than a tourist.”</p>
<p>Whether Fujimoto was firing a rifle or a camera, Syrian soldiers weren’t likely to make the distinction. Although he was not filing for a media outlet, his <a href="https://www.facebook.com/toshifumi.fujimoto.52?fref=ts">Facebook</a> page quickly swelled to over 3,200 followers, and his posted photos were regarded with respect, essentially turning him into an information outlet. He has now returned to Japan where his presentations on his frontline experience have created another following. He’s reporting—through facts and images—the nature of the conflict and what he saw there.</p>
<p>And in much the same way that Fujimoto now has something to offer, a cadre of budding journalists are making the trip to Syria for the same reason. Some are looking to fast track their career via war reporting. Others are moved by the humanitarian crisis they feel needs coverage. Despite the plethora of disturbing photos and videos, and the high price paid by journalists to capture those images, the West appears to be unmoved, begging the question: Is Syria the place to make your bones?</p>
<p>Apparently, many think so. Journalist “Jane” asked that we change her name. She says the new generation has turned out in Syria, and is easy to spot. Jane is an icon amongst journalists known for both her reporting and bravery in the three decades she has spent covering conflict. She is shocked by the general lack of preparation.</p>
<p>“Their lack of gear in general, protective gear from flak [vest] to helmet, basics like torch or head lamp,” she says. “They’re lacking hostile-environment training, no first aid training, no medical type gear or kit, [and have] a knee-jerk desire to hit the frontlines without backgrounding the situation or the people involved in getting there.”<br />
We talked to one of the newbies who hopes that Syria will project him into the mainstream.</p>
<p><b>THE NEOPHYTE REPORTER</b></p>
<p><a href="http://tomdaams.com/">Tom Daams</a>, 28, a photographer from the Netherlands, heard of the Syrian conflict last August and decided to cover what seemed to be under-reported by journalists. He’d covered riots in Athens and Berlin, but most of his portfolio consisted of portraits of people or their pets.</p>
<p>“The people of Aleppo were pleading to the world to help them,” he emailed from Aleppo. “They just could not understand why the world wasn’t helping them. And I also couldn’t understand why the world was doing nothing. Why does the world turn its back against humanity?”</p>
<p>So he packed a backpack and “filled it with morphine-like painkillers” leftover from a bout with a hernia. He grabbed his camera, 350 Euros and booked a ticket to Turkey. He spent three days in Turkey mustering the courage to cross into Syria—after all, he’d never been to a war zone.</p>
<p>On the third day he took a bus to Kilis, Turkey, which is on the Syrian border, and hired a taxi to take him to the fighting. He had no idea what to expect. His only frame of reference was articles he’d read about other journalists crossing. In the taxi, a quick wave of his passport was all it took to enter Syria.</p>
<p>He was in. He had no money, no contacts, no idea where to go or what to do. But he did have a backpack full of painkillers. At Zarzur Hospital in Aleppo he told the doctors he had medicine to donate. Not surprisingly, they welcomed him. The security guard found him a bed to sleep in. The hospital even had Internet access.</p>
<p>While staying at the hospital, he made friends with a rebel sniper.</p>
<p>“Everyday he woke me up, and I jumped on the back of his motorcycle to head to the front lines. I spent 10 days with this sniper, making friends all over Aleppo.”</p>
<p>After ten days, Daams decided he was ready to leave. He’d feared for his life, been shot at by snipers, even had a flat tire in Assad territory while in a car with eight rebels. But now that he wanted to leave, he didn’t know how. He asked the hospital security guard how he might return to Turkey, and the guard set him up with two fighters from Libya. He decided to illegally cross into Turkey with the Libyans. He admits that this was not a wise decision.</p>
<p>Daams was detained at Oğuzeli International Airport in Gaziantep, Turkey for being in the country illegally. He had no entry stamp on his passport. He was banned from Turkey for three years.</p>
<p>That was in September last year. When Daams returned to the Netherlands, he sold his work from Syria for just over $9,000 USD, which was enough to finance another trip. Unable to enter Turkey, he tried to cross into Syria from Lebanon. It didn’t work. He then tried from Jordan, and that didn’t work either. After trying for two months to get back into Syria, he finally called a Dutch friend with high-level government connections, asking for his ban to be lifted. It worked.</p>
<p>“I now am the second person in Turkish history whose ban has been lifted in such a case,” he claims. When he returned to Aleppo, he says the friends he had made on his first trip had been killed.</p>
<p>Luckily Daams knew of a fellow Dutchman, 21-year-old Wijbe Abma, who was also in Aleppo. Daams asked Abma for a place to sleep.</p>
<p>“Wijbe saved my ass.”</p>
<p><b>THE ENTREPRENEURIAL AID WORKER</b></p>
<p>Wijbe Abma is barely old enough to get a job but already has a one-man relief program called <a href="http://www.dontforgetsyria.com/">Don’t Forget Syria</a>. After finishing a university exchange program in South Korea, Abma was traveling home to the Netherlands when he met a Syrian refugee in Turkey in October. Abma decided to help. He turned to Kickstarter for funding to buy blankets to be handed out to Syrian refugees. His efforts on the Internet have generated tens of thousands of dollars and delivered more than 1,000 blankets. In addition to working the long hours of an NGO, he’s also become a makeshift fixer for journalists, Daams included. When I spoke with Abma he was in Kilis, Turkey—which has become a bottleneck for people entering Syria from the north—about to take a group of Spanish journalists to Syrian refugee camps in Turkey.</p>
<p>“It’s a very easy place for journalists to come and go,” Abma said over Skype. “At any given time there are half a dozen to maybe two dozen journalists here. Many are staying at this hotel. It is one of the cheapest, and there is Internet.”</p>
<p>As is often the case, journalists have congregated where they are safe, where they can file their stories or upload photos, and where they can get a drink after a long day at the front. For about $200 USD, they hire a taxi to take them to Aleppo or refugee camps or other hot spots in Syria. In months past, many journalists reported from Syria during daylight hours and then returned to the safety of Turkey at night. But that is changing.</p>
<p>As the front has moved through Aleppo, media offices sprung up. Journalists could now stay in the city with less fear of government soldiers kicking down the door or shelling the building. Though Daams spent ten days in Aleppo last September, he may not have fully comprehended his vulnerability. The same could be said for the war tourist Fujimoto. Ignorance may be bliss, but it is not safety.</p>
<p>“Most journalists stick to the Free Army region, the liberated region,” Abma said. “It is safer there, in a way. But at the same time it is a region without government, without law. So anything might happen.”</p>
<p><i>Anything</i> in this case often means getting kidnapped. NBC’s <a href="http://www.thedailybeast.com/articles/2012/12/22/richard-engel-s-kidnapping-a-behind-the-scenes-look.html">Richard Engel</a> spent five days in captivity. Mexican journalist <a href="http://en.rsf.org/syria-abduction-of-journalists-becoming-29-01-2013,43965.html">Temoris Grecko</a> was held with two other journalists for five days. Former US Marine <a href="http://www.csmonitor.com/World/Middle-East/2012/1211/Family-of-journalist-Austin-Tice-struggles-with-silence-on-kidnapping">Austin Tice</a> has been missing for more than 200 days. US freelancer <a href="http://www.freejamesfoley.org/">James Foley</a> has been missing since November 22.</p>
<p>While Abma is by nature a person prone to help others—refugees, Daams, the Spanish journalists—he recognizes that the war has attracted scores of inexperienced journalists who are in many ways unprepared for the job. Money, contacts, plans and backup plans are necessary. Though it is a war zone and “never fully safe,” as he says, a lack of planning and preparation make it far more dangerous.</p>
<p>Broadcast journalist “Jane” went to Syria on assignment. Being no rookie, and part of an organization, the preparations for her coverage were extensive. And so were the expenses.</p>
<p>“As for expenses, thousands of dollars,” she says. “Tens of thousands for drivers, tippers, hotels, travel, fixers, translators, gear…”</p>
<p>Some insist that regardless of Western and UN inaction or even public disinterest, the story needs to be told. Many journalists like Marie Colvin, have insisted that dramatic images or gripping firsthand stories motivate readers and embarrass governments to move from inaction into action. This oft-stated high-minded motivation drives many new and veteran reporters to share violence, risk their lives and sometimes die with complete strangers in conflicts that have nothing to do with them.</p>
<p>But that cliché of a journalist risking their life to impact society, make a difference, tell the story or document history may have also vanished with the new shape of war.</p>
<p><a href="http://www.nirrosen.com/blog/">Nir Rosen</a> is an Arabic-speaking American journalist of Kurdish descent who began a reporting career in Iraq in 2003. His work, often critical of Western policy and often reported from inside insurgent groups for long periods at a time, is highly respected, even by his critics. His work has appeared in the <i>New York Times Magazine,</i> <i>Atlantic Monthly</i>, and the <i>Washington Post</i>. Even to Rosen, the notion that a journalist can make a difference in a conflict is unfounded.</p>
<p>“Journalists who think they can help are naive or think too highly of themselves,” he says.  He challenges the idea that journalists help or make a difference by risking their lives.</p>
<p>“They are usually harmless parasites who do not harm their hosts. But just like in any conflict, Syria is an opportunity for new journalists to get started. No different from Iraq or Afghanistan where I got started and where I did absolutely nothing to help or make any difference at all in my capacity as a journalist.”</p>
<p>The curious thing is that young activists, like Abma, don’t really need the media to tell their story. Instead, they can use social media to directly seek funds, which then translate into benefit, all the while communicating information. Much to the discomfort of the established media. Abma wrote an article for <a href="http://www.foreignpolicy.com/articles/2013/01/29/saving_syrians_one_blanket_at_a_time_refugees_aid">Foreign Policy magazine</a>, which is read by policymakers worldwide, beltway pundits and of course the media. Suddenly the idea that a person requires bona fide, sage experience and peer approval before publication in august journals has dissolved as social media chooses immediacy and relevancy over sagacity and longevity. The traditional barriers that kept neophytes out of the mainstream discussion have vaporized.</p>
<p><b>COMBAT ACTIVIST NGO</b></p>
<p>The latest and most contentious example of this changing stereotype may be 33-year old <a href="http://www.matthewvandyke.com/">Matt VanDyke</a>. When <i>Dangerous</i> reached him by phone he was upset. Mostly at journalists who classify him as freedom fighter posing as a journalist and NGOs who see his boundary-blurring role as a lethal threat.</p>
<p>“I am not there to observe. I am there to fight,” he says.  But he was talking about Libya, and not about his new venture in Syria, where he insists in the reverse that he was not fighting but making a “propaganda film.” Unfortunately when he invited donors to “join the Arab Spring,” he and his Libyan musician/fighter friend ended up getting <a href="http://www.kickstarter.com/projects/matthewvandyke/this-is-your-chance-to-become-part-of-the-arab-spr">kicked off Kickstarter</a>. But not before 60 donors pledged $15,134 of the modest $19,500 budget to fund his idea. Kickstarter does not support high-risk activities or charities, and none of the donors were charged for their contributions.  His credibility as a fighter had short-circuited his new career as a propagandist.</p>
<p>There are some journalists and NGOs also upset at VanDyke. Mostly for the cavalier and vague way they insist he shifts between a journalist, like writing <a href="http://www.huffingtonpost.com/matthew-vandyke/the-long-hard-slog-that-i_b_2422553.html">analyses</a> for the Huffington Post and calling himself an embed on his website, and a freedom fighter.  Being on YouTube yelling <i>takbirs</i> while shooting an anti-aircraft gun mounted on the back of a Toyota Hilux in Libya is what he wants to be known for. His published pieces do not make him a journalist, even though a number of media and human rights organizations campaigned for his release from a Libyan jail thinking he was a journalist. According to one journalist, he told his mother that he was in Libya as journalist. According to VanDyke, he never told his mother this, and was thrown in prison as a captured fighter. The confusion over him being a journalist is probably what saved his life. <a href="http://dangerousmagazine.com/2013/03/29/matt-vandyke-filmmakerfighter/">(SEE OUR STORY ON VAN DYKE)</a></p>
<p>He has been called “reckless and irresponsible” by the execu <a href="http://cpj.org/blog/2011/11/vandykes-deception-increases-risks-for-conflict-jo.php">Committee To Protect Journalists</a>, described as “mentally unstable” by a human rights group executive, and generally pummeled by the working press for putting them at risk.  This does not stop the media from interviewing VanDyke who seem to gain pleasure, as in the case of Fujimoto, in exploiting his media-friendly controversy. It’s a symbiotic do-loop of entertainment, news, information and propaganda.</p>
<p>The general consensus of the working media is that anyone who picks up a gun is a combatant. And anyone who claims to be a journalist should not carry a weapon. A non-combatant in the field or if captured, should be protected, regardless of their stance of country of origin, even though the vast majority of coverage comes from and is favorable to the rebels. VanDyke says he&#8217;s never crossed the line and feels he might be the only journalist-fighter-filmmaker-propagandist who knows where those lines are. In the age of polymaths and multitasking, VanDyke doesn’t care what they call him, he just wants his critics to be accurate.</p>
<p>VanDyke, Fujimoto, and Abma now have more in common than uncommon. Each considers his contribution tangible support for the cause, and each has published media on the conflict. With the protection and clear definitions of journalists gone, dirty wars allow for a mixing of roles that defy clean-cut categorization. An aid worker or freedom fighter will never replace the eyes and mind of an experienced reporter, like Marie Colvin, but in the rapidly changing Age of Information, and in a place like Syria, no position is safe.</p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2013/03/SyriaWeap.jpg"><img class="aligncenter size-full wp-image-1847" alt="SyriaWeap" src="http://dangerousmagazine.com/wp-content/uploads/2013/03/SyriaWeap.jpg" width="819" height="538" /></a></p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2013/03/29/syria-wish-you-were-here/">Syria: Wish You Were Here?</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2013/03/29/syria-wish-you-were-here/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Matt VanDyke: Filmmaker/Fighter</title>
		<link>http://dangerousmagazine.com/2013/03/29/matt-vandyke-filmmakerfighter/</link>
		<comments>http://dangerousmagazine.com/2013/03/29/matt-vandyke-filmmakerfighter/#comments</comments>
		<pubDate>Fri, 29 Mar 2013 19:17:09 +0000</pubDate>
		<dc:creator><![CDATA[editor]]></dc:creator>
				<category><![CDATA[New Issue]]></category>
		<category><![CDATA[American Freedom Fighter]]></category>
		<category><![CDATA[Matt VanDyke]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=1607</guid>
		<description><![CDATA[<p>By Robert Young Pelton Thirty-three year old Matt VanDyke is pissed. Mostly at journalists who classify him as a freedom fighter posing as a journalist. “I am not there to observe. I am there to fight.” The irony does not escape Matt who after fighting in Libya decided to return to Syria as a propagandist-documentary maker, and in July, after inviting donors to “join the Arab Spring,” ended up getting kicked off Kickstarter. But not before 60 donors pledged $15,135...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2013/03/29/matt-vandyke-filmmakerfighter/">Matt VanDyke: Filmmaker/Fighter</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>By Robert Young Pelton</p>
<p style="text-align: center;"><img class=" wp-image-1609 aligncenter" alt="VanDyke" src="http://dangerousmagazine.com/wp-content/uploads/2013/03/VanDyke1.jpg" width="900" height="625" /></p>
<p>Thirty-three year old Matt VanDyke is pissed. Mostly at journalists who classify him as a freedom fighter posing as a journalist. “I am not there to observe. I am there to fight.” The irony does not escape Matt who after fighting in Libya decided to return to Syria as a propagandist-documentary maker, and in July, after inviting donors to “join the Arab Spring,” ended up getting kicked off Kickstarter. But not before 60 donors pledged $15,135 of the modest $19,500 budget to fund his “propaganda” documentary. Kickstarter does not support high-risk activities or charities, and the donors were never charged for their contributions.</p>
<p>He went anyways and is now working on a 15-minute film that focuses on young Syrians trying to change their country. He has been called “reckless and irresponsible” by the executive director of the Committee To Protect Journalists, described as “mentally unstable” by a human rights group employee, and on occasion pummeled by the working press.</p>
<p>Journalists are pissed at VanDyke. Mostly for the cavalier and vague way they insist he shifts between journalist and fighter. Credentialed media say that his actions endanger the safety of journalists in rapidly changing and confusing wars like Syria, Mali, Yemen and others.</p>
<p>More irritating to the media is a Heminwayesque self-promotional approach to documenting and participating in conflict. Despite their disapproval of VanDyke’s methods, he has no problem finding a journalist or outlet willing to interview him. In the modern world of love-hate relationships between journalists and their subjects, he may be the most valid, embarrassing and intelligent litmus test of moral purpose in modern conflict coverage.</p>
<p><b>HISTORY</b></p>
<p>There has been a historic thread of men who have both documented and participated in combat. Ernest Hemingway was a participant and reporter during the Spanish Civil War, John Reed was a chronicler and then a participant in the Russian Revolution, or Stephen Crane an author who was commended for his service as a courier under fire during the Spanish American War. These men characterize the romantic mythology of rebel/artist that has vanished from modern Western media.</p>
<p>Today’s besieged and politically correct media business is much less romantic. Embedded, insured, censored and literally under attack media workers find less room to influence in the face of social media, less protected in wars of terror and less relevant as their employers cut budgets or steer toward entertainment.</p>
<p>CPJ has documented the deaths of 972 journalists since1992, 70 in 2012 alone. CNN has dumped its investigative division and icons like the <i>New York Times</i> are laying people off. On-the-ground journalists are viewed as propagandists and a source of hostage swaps or revenue when kidnapped.</p>
<p>Despite the lack of any governing morality toward journalists, modern journalism maintains the third rail of excluding fighters from mythical protections supposedly afforded to the media. Their moral high ground of not taking sides has been eroded by military-controlled embeds or rebel groups that routinely chaperone, guide, gather and provide content.</p>
<p>Regardless of the hypocrisy and shifting barriers, the general consensus of the working media is that anyone who enjoys the protection of a media worker while engaged in fighting has crossed the line. VanDyke says he’s never crossed that line and feels he might be the only journalist/fighter/filmmaker/propagandist that knows where the lines are. In the age of polymaths and multitasking, VanDyke just wants his critics to be accurate.</p>
<p><b>BACKGROUND</b></p>
<p>VanDyke wanted to work for the American government. After earning a bachelor’s degree in political science from the University of Maryland, Baltimore County, he was lucky enough to go to Georgetown University in Washington for a master’s degree. He entered the two-year <a title="Security studies" href="http://en.wikipedia.org/wiki/Security_studies">Security Studies Program </a>at <a title="Walsh School of Foreign Service" href="http://en.wikipedia.org/wiki/Walsh_School_of_Foreign_Service">Georgetown University’s Walsh School of Foreign Service</a> in 2002.</p>
<p>“I educated for the three letter agencies. ‘Why Al Qaeda Targets the US’ was my thesis.” But despite his dreams of fast tracking into the CIA he failed. He blames it on the lie detector tests required.</p>
<p>“I had problems with the polygraph. I told the truth. I spilled my guts on all sorts of embarrassing stuff. They couldn’t get the base line. Inconclusive.”</p>
<p>Van Dyke is upfront about a having obsessive-compulsive disorder.</p>
<p>“I have OCD. I can’t get sugar on me. I feel guilty about the simplest thing. I don’t care if people criticize me but I want them to base it on fact.</p>
<p>“I had a romanticized view of what the CIA does. Now I realize it’s like the post office.”</p>
<p>After graduation VanDyke painted the bottom of boats and did roofs. He remembered watching Alby Mangels films on TV. He ordered the whole series and then decided to make travel adventure films.</p>
<p>He is candid about the challenges of going from sheltered college grad to warzone adventurer. “I was polite. Raised by my mother and grandmother. I had to learn some life lessons and fast. I decided to get out there. A crash course on manhood.”</p>
<p>By 2005 he had the idea that he would travel the world. Matt bought a 650cc bike and went to Spain then to Morocco. “My first day in Africa, I wouldn’t leave my room. My $60,000 Georgetown education never told me anything about squat toilets. I went to the bathroom in the shower. I left early in the morning figuring I messed up their plumbing.</p>
<p>“That’s how much of a pussy I was.”</p>
<p>Local drug dealers tried to convince him to carry hash in his bike. His dreams of adventure didn’t last long. VanDyke broke his collarbone on his third day. “I swerved off and crashed and ended up pinned under the bike.” But after 6 weeks he returned.</p>
<p>He smuggled cars bound for Europe between Morocco and Mauritania. “I lost two Mercedes with my Moroccan-American partner. He cruised the Sahara meeting people that would eventually lead him to friends in Benghazi, Libya.”</p>
<p>In March of 2008 he entered Libya with a business visa. He stayed for six weeks. He spent some time filming local bikers and was arrested by the police and kicked out.</p>
<p>His next stop was Northern Iraq. “I taught English in Irbil. It paid well. In 2009 I did an embed and wrote a front-page article for the <i>Baltimore Examiner</i>. They went out of business after the next issue, and I never got paid.”</p>
<p>His brief attempt at paid journalism left a bad taste but he became serious about documenting his own adventures. He bought body armor, paid for his own equipment, bought his own video. “I started with DV, then HDV then HD.” VanDyke met an American photographer in Iraq named Daniel Britt and together they decided to ride bikes in war zones and film their travels. “‘War Zone Bikers’ we called it.”</p>
<p>They rode through Kurdistan, Turkey, Iran and then into Afghanistan.</p>
<p>They crossed the border into Afghanistan on September 27, 2010 saying they were from Iceland. Dressed like Afghans, they put their bikes on a bus and drove to Kabul to Jalalabad, then the Panjshir valley and up to Bamiyan. They grew beards and carried shotguns hidden under their clothes. Afghanistan provided plenty of adventure. They were arrested numerous times, had their bikes stolen (but recovered them) and even did a little embed journalism so VanDyke could get footage for his film and his partner could make some money.</p>
<p>In December 2010 VanDyke went home.</p>
<p>He wrote a pitch for his television series that Alby Mangel had inspired. He went to TV meetings. But then the revolution in Libya began. His friends in Libya started to ask him through Gmail chat: “Why isn’t anyone helping us?”</p>
<p>On February 26, VanDyke flew to Cairo and entered Libya on March 6 in the evening. The next day he reunited with his 31-year-old friend Nuri, who was in the trucking business. He was surprised to see him in military clothes and a flak vest. Nuri had seized a military base and protected it from looters. The revolution involved everyone. They quickly fixed up a battered Toyota Hilux, mounting DShK’s, a 12.7mm anti-aircraft gun, on the back and joined a group of seven Libyan fighters.</p>
<p>“None of us had rank or paperwork. Qaddafi was winning. It was a dark time. We kept going. I was in a uniform.” He also kept filming. In VanDyke’s mind he was simply doing what every other Libyan was doing, all the while documenting the fight. In his mind, he was there to fight. But that’s not how everyone saw it, particularly Joel Simon, executive director of the CPJ. Simon believes that VanDyke told his mother he was going there as a journalist. VanDyke says that’s just not true.</p>
<p>VanDyke’s group went to Brega to scout the city for a day and find Qaddafi’s defensive positions. “We spend the night. The next morning everything was calm.</p>
<p>“As best as I can recollect, Ali was driving. He hits the brakes, and I lunge forward, I look over at Ali and there is a row of cinderblocks and two white pick up trucks with a little a green flag on the antennae…. Then I wake up in prison.”</p>
<p><b>PRISON</b></p>
<p>VanDyke did not see the Qaddafi soldier’s rifle butt that crashed into his head nor did see the impact that his March 2011 disappearance had within the media. He disappeared. His mother, Sharon VanDyke, began to reach out, desperate to find her son. She began doing interviews about her missing son. Politicians, State Department officials, human rights groups, and the media sprang into action.</p>
<p>Although some journalists in Libya had met Matthew and even filmed him yelling <i>takbirs</i> from his war wagon, it was quite clear to most that publicity around his self-documented motorcycle trips, his amateur writings for Georgetown University and the defunct <i>Baltimore Examiner</i>, along with his association with photographer Britt, were the rudimentary <i>bona fides</i> required to classify him as one of the 17 journalists detained by the Qaddafi regime.</p>
<p>The State Department, journalist groups and others continued to search for him assuming he was a wrongfully detained journalist. Hopefully wrongfully detained and not executed like some other unfortunate reporters. On May 23, 2011, Maryland Democrat and ranking member of the House Intelligence Committee, C.A. Dutch Ruppersberger, held a press conference where he pressed the Libyan government for information on VanDyke’s whereabouts. The Libyan government insisted it had no information on VanDyke.</p>
<p>In his Libyan prison cell VanDyke was more concerned about just surviving. “I knew I was in deep shit. I got caught with a camera full of video with me saying, ‘I will fight I am not leaving until Qaddafi is gone.’ I have weapons and ammo. I was wearing a uniform.”</p>
<p>He was found unconscious and loaded by Qaddafi’s soldiers onto a stretcher. When he awoke, they blindfolded VanDyke and put him in a small cell. They told him they were going to kill him. Rough but expected justice for a captured foreign fighter. For some reason they didn’t kill him.</p>
<p>“I was polite to the guards for the first three months. I acted innocent. In case there was some way I could explain away my actions.” The Libyans put him on a plane to Tripoli.</p>
<p>For the next five and a half months VanDyke was confined to a 7-foot-by-4-foot cell with scratch marks on the wall. The previous inmate only made it to 30 scratches. He listened to the sounds of prisoners being tortured. Large black insects lived in the toilet. He paced back and forth under the dim light of a tiny skylight. He ground his fingernails down in case his jailors tried to pull them out. He planned to fake a hunger strike, though never carried it out. Nothing happened. He turned 32 in prison. In early August, his mother and those working to find him were given a ray of hope. The Libyan regime finally admitted he was alive and being held as a prisoner.</p>
<p>Not coincidentally, a few days before August 24, 2011 the prison in Abu Salim was bombed twice, a few minutes apart.</p>
<p>“I heard them banging locks of the doors. A guy bursts in with a Koran and starts to yell. Then the guy in prison clothes said, ‘Qaddafi finished.’ I went with them. We ran to this mosque. The imam handed us money.” After five and half months, he was free.</p>
<p>After his release and sudden appearance, VanDyke did a number of interviews, and when members of the media realized he went there as a fighter, there was a backlash. VanDyke became a celebrity and a pariah.</p>
<p>Then VanDyke disappeared to rejoin the fight and joined the National Liberation Army. For the next few weeks he estimates he had about 40 engagements with the enemy. His tools were not the camera but his truck-mounted anti-aircraft gun, along with his AK47, FN and RPG.</p>
<p>As an amateur soldier, VanDyke didn’t know where to return rounds most of the time. “We were laying down fire at Sirte University. We went house to house in District Two toward the end of the war taking territory. I don’t know if I killed anyone. The range was a few hundred meters.”</p>
<p>The war was won. VanDyke came home on November 7<sup>th</sup> 2011.</p>
<p>“I had nightmares every night for the first month after I got home.”</p>
<p>Although his four-year motorcycle odyssey and his time as a freedom fighter have not made him money, he has gained a level of media awareness that he is exploiting.</p>
<p>He is just back from Syria where he documented the struggle of young people to topple the regime of the Assads. Journalists in Aleppo recognized him from Libya and were quick to knock out an article on his new venture. Although VanDyke describes himself as a “filmmaker and an activist,” he fully reserves the right to return as a fighter and, if he wants, to document his activities. The mutual love-hate relationship with certain members of the media still exists. He describes with some disdain the pack journalism in Syria and the ease with some journalists can profit from the misery of others while doing nothing.</p>
<p>“If I can get enough people off their asses to do something, then it will have been worth it.”</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2013/03/29/matt-vandyke-filmmakerfighter/">Matt VanDyke: Filmmaker/Fighter</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2013/03/29/matt-vandyke-filmmakerfighter/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Eric Harroun: Jihadi or Junketeer?</title>
		<link>http://dangerousmagazine.com/2013/03/29/eric-harroun-jihadi-or-junketeer/</link>
		<comments>http://dangerousmagazine.com/2013/03/29/eric-harroun-jihadi-or-junketeer/#comments</comments>
		<pubDate>Fri, 29 Mar 2013 18:52:10 +0000</pubDate>
		<dc:creator><![CDATA[editor]]></dc:creator>
				<category><![CDATA[New Issue]]></category>
		<category><![CDATA[Dangerous Magazine]]></category>
		<category><![CDATA[Eric Harroun]]></category>
		<category><![CDATA[Eric Moar Harroun]]></category>
		<category><![CDATA[Robert Young Pelton]]></category>
		<category><![CDATA[SITES Intelligence Group]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=1599</guid>
		<description><![CDATA[<p>By Robert Young Pelton Eric Harroun is from Phoenix, Arizona. He served in the U.S. military from 2000 until a car accident that left him with a plate in his head. He was discharged with full disability in 2003. Around Christmas of 2010 he visited Egypt and Lebanon. Two years later in September 2012 he returned to Egypt were he got caught up in the celebrations in Tahrir Square. In June of 2012 he was determined to do something with...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2013/03/29/eric-harroun-jihadi-or-junketeer/">Eric Harroun: Jihadi or Junketeer?</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>By Robert Young Pelton</p>
<p style="text-align: center"><a href="http://dangerousmagazine.com/wp-content/uploads/2013/03/Harroun.jpg"><img class=" wp-image-1600 aligncenter" alt="Harroun" src="http://dangerousmagazine.com/wp-content/uploads/2013/03/Harroun.jpg" width="960" height="477" /></a></p>
<p>Eric Harroun is from Phoenix, Arizona. He served in the U.S. military from 2000 until a car accident that left him with a plate in his head. He was discharged with full<ins cite="mailto:DPx%20Editor" datetime="2013-03-29T10:51"></ins> disability in 2003.</p>
<p>Around Christmas of 2010 he visited Egypt and Lebanon. Two years later in September 2012 he returned to Egypt were he got caught up in the <a href="http://rt.com/news/cairo-clashes-us-embassy-013/">celebrations in Tahrir Square.</a> In June of 2012 he was determined to do something with his life. He flew to Istanbul in November of 2012, and in January he was involved with the Free Syrian Army.</p>
<p>On January 26<sup>th</sup> he uploaded a video to YouTube that caught the attention of Rita Katz, co-founder of the <a href="http://news.siteintelgroup.com/">SITE Intelligence Group</a>. Katz is an Iraqi Jewish woman who sells videos posted by jihadi groups. Sometime in January, Eric friended what looked like a young Iraqi woman who was posting pictures of her in a bikini and full bosomed friends. Eric only had around 361 Facebook friends and as he gained notoriety he began to enjoy his new celebrity status. He posted videos on his page and on YouTube throughout February. In mid-February, the Syrian regime posted a video of him using a stranger in Miami with a different name from Mugshots.com as proof that Harroun was a criminal.  About that time he was pinged by SITES Intelligence, a provider of “Jihadist Threat Warnings” to the U.S. government and other clients.</p>
<p>It is quite normal to post videos of attacks and battles from Syria, and on February 13 Eric said he cheated death again. In the phone video, he’s sweating and looks visibly distressed as he crouches down with an AK in an empty house under fire. In other videos he is relaxing with fellow fighters threatening the regime of Assad.</p>
<p>On February 15 he hits the main-stream news as he posts videos on <a href="http://www.youtube.com/watch?v=9gtQev7CvsQ">YouTube</a>. Eric is with his friend “the Chechen” as he drives to inspect a recently shot down Syrian government helicopter.  The problem: the vehicle and his friend, a Syrian descendent of Caucasian fighters, are part of al Nusra, a franchise of al Qaeda created in Iraq ten years ago.</p>
<p>On March 11 he contacted Fox News reporters in Israel and things began to fall apart. He voluntarily went to the US Embassy where he found himself caught in the classic good cop, bad cop game.</p>
<p>When he walked in to the office, the male FBI agent had the <a href="http://www.foxnews.com/world/2013/03/11/muslim-holy-warrior-known-as-american-seen-in-syria/">Fox News story</a> printed on his desk. The bad cop was a woman from the CIA. Without being warned that what he was about to do was incriminate himself, he volunteered the information that he had shot ten people, traveled and fought with al Nusra and was deeply concerned he might be viewed as a terrorist.</p>
<p>The journalists who interviewed from Fox were Jewish, based in Israel, and got into heated discussion with the part-time jihadi. Eric thinks he was set up and called out as a terrorist by Fox News.</p>
<p>After a series of coy back and forth with Eric, we finally connected on March 14 after he had spent two days being whipsawed at the U.S. Embassy, the last session lasting ten hours.</p>
<p>“I’ll have to hire a fucking Jewish lawyer to sue their asses when I get back,” he said from Istanbul via Skype. “According to Fox News I am going to the Palestinian Territory, and then <i>they</i> said I was going there for violent reason. I should sue those assholes… I was going for peaceful reasons. But now I’m not. It’s too dangerous.”</p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2013/03/Harroun3.jpg"><img class=" wp-image-1604 alignleft" alt="Harroun3" src="http://dangerousmagazine.com/wp-content/uploads/2013/03/Harroun3.jpg" width="290" height="219" /></a><br />
Eric’s version on how he ended up going to fight with the FSA and ended up with al Qaeda is simple to him.</p>
<p>When he hung around in Turkey for month the buzz amongst young men was “let’s go fight in Syria.” It is a badly kept secret that the U.S., through Qatar, Saudi Arabia and Turkey, is recruiting, training and arming rebels to bring down Bashar al Assad. From where he sat in Istanbul and with the Arab Spring still the driving meme, it seemed like a grand adventure.  He crossed the border and was soon taken in by a Free Syrian Army unit. Harroun’s story is that in the confusion of combat he lost track of his FSA unit.</p>
<p>“I was separated from my unit in the fighting,” he said. “I found these guys, I didn’t even know they were al Nusrah until later. I said I need a ride back to my commander. It took 25 days to get them to give me a ride.</p>
<p>“When they’d go out and fight, I’d go along with them. What was I supposed to do? Grab my gun and go. We’re all fighting for the same thing. We’re trying to kill the same people. It’s not like I chose to fight with al Nusra.”</p>
<p>Eric is surprised at the negative portrayal of him as fundamentalist.  “I’m not al Qaeda,” he says. “I like my beer and my smoke, and I like my women. I’m not about the praying five times a day and all that shit.”</p>
<p>During the interview he pointed out that he was eating pork and just “chilling, having a beer and listening to music.” Despite his cool demeanor his meetings at the embassy obviously rattled him.</p>
<p>“I may not be a fighter anymore. After speaking with the FBI guy. If it’s illegal I’m not fighting anymore… If he says I cant go back, I’m not going back.”</p>
<p>But he thinks it’s “bullshit” that an American can’t come and fight.</p>
<p>“It’s illegal for an American to come and fight and that’s bullshit,” he said. He particularly did not like the “CIA lady from upstairs” who played bad cop. To mess with her, he asked her for Stinger missiles. “She didn’t exactly say no. She gave me the name of a guy in Turkey who is supplying weapons to the rebels.”</p>
<p>Erik describes the FBI guy as “nice” but still telling him it is against the law for him to fight in Syria.  Eric said, “I don’t know why they would want to prosecute me… I mean we’re killing the same people. They should give me medal for this shit.”</p>
<p>When asked why he had posted “The only good Zionist is a dead Zionist” on his private Facebook (he has just over 300 friends of which we are one of them), he said, “I do have on have in my face book that the only good Zionist is a dead Zionist and I don’t think those reporters like that. That could be causing some problems.”</p>
<p>“I hate Zionists,” he said. The irony that one of the Fox reporters names was “Ben Zion” didn’t seem to sink in. “If they prosecute do you think I could go to federal prison?”</p>
<p>Eric asked us if he was on the no-fly list, if he could sneak back in via Mexico. As we signed off from Skype he said. “The hash is good here, dude. I’ll just chill here…. fuck Assad.”</p>
<p>On March 20<sup>th</sup> his FBI “friends” obtained a search warrant for his Facebook account where he had posted a photo of himself posing with an RPG. The location is listed as Turkey, but its good enough for criminal charges. The FBI said he had also posed with “machine guns” not quite clarifying if they mean the heavy weapons on the truck or the AK 47 he held. The FBI references his contentious argument with Fox News and issues that as proof of guilt. And as expected his voluntary discussions with the U.S. embassy to see if he was in trouble, landed him exactly in that trouble he was worried about.</p>
<p>When he got back he was charged in a ten page <a href="Harroun_complaint.pdf">Criminal Complaint</a> by the FBI for conspiring to use a weapon of mass destruction outside the United States.</p>
<p style="text-align: center"><a href="http://dangerousmagazine.com/wp-content/uploads/2013/03/Harrouns2.jpg"><img class=" wp-image-1602 aligncenter" alt="Harrouns2" src="http://dangerousmagazine.com/wp-content/uploads/2013/03/Harrouns2.jpg" width="720" height="480" /></a></p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2013/03/29/eric-harroun-jihadi-or-junketeer/">Eric Harroun: Jihadi or Junketeer?</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2013/03/29/eric-harroun-jihadi-or-junketeer/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Taxman Cometh: Tips for Contractors</title>
		<link>http://dangerousmagazine.com/2013/03/18/the-taxman-cometh-tips-for-contractors/</link>
		<comments>http://dangerousmagazine.com/2013/03/18/the-taxman-cometh-tips-for-contractors/#comments</comments>
		<pubDate>Mon, 18 Mar 2013 09:24:19 +0000</pubDate>
		<dc:creator><![CDATA[editor]]></dc:creator>
				<category><![CDATA[New Issue]]></category>

		<guid isPermaLink="false">http://blackwatersa.dangerousmagazine.com/?p=4424</guid>
		<description><![CDATA[<p>By Will Grant After spending eight and half years in the Marine Corps, like a lot of veterans, the Kansas-born officer took a job contracting. He signed on with one of the big, generic-sounding U.S. contractors as a weapons instructor training Afghans in 2011. Like many contracts, the work is hard, hours are long, and conditions are Spartan, but every sunset means good money in the bank. Our contractor spends almost all of his time overseas to make that $220,000...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2013/03/18/the-taxman-cometh-tips-for-contractors/">The Taxman Cometh: Tips for Contractors</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>By Will Grant</p>
<p><a href="http://blackwatersa.dangerousmagazine.com/the-taxman-cometh-tips-for-contractors/pile-of-money12" rel="attachment wp-att-4425"><img class="alignleft size-medium wp-image-4425" title="pile-of-money12" alt="" src="http://blackwaterusa.dangerousmagazine.com/wp-content/uploads/2013/03/pile-of-money12-258x300.jpg" width="258" height="300" /></a>After spending eight and half years in the Marine Corps, like a lot of veterans, the Kansas-born officer took a job contracting. He signed on with one of the big, generic-sounding U.S. contractors as a weapons instructor training Afghans in 2011. Like many contracts, the work is hard, hours are long, and conditions are Spartan, but every sunset means good money in the bank. Our contractor spends almost all of his time overseas to make that $220,000 a year. Occasionally he gets a quick furlough stateside to visit friends and family to take care of those numerous nagging chores.</p>
<p>One of those chores is filing federal and state taxes.  Making $200,000 a year is good money, but when he looked at his tax returns he was shocked at how much he had to give right back to the same government that was hiring him. He was aware of the chunky $90,000-plus tax exclusion for expats because he worked overseas. But he was surprised how much he had to cough up in State and Federal taxes.  More than he made back in civilian life—and all in taxes. His fellow contractors had a number of theories and plans to reduce their taxes that involved living offshore, forming corporations and even moving their home address, but this Marine simply paid what his accountant told him to pay and sucked it up.</p>
<p>His girlfriend looked over his tax returns from 2010 and 2011 and suspected he’d overpaid. She invested in a little internet time and phone calls to see exactly what contractors who effectively work and live overseas should pay.  What ensued was a fascinating trip down the tax rabbit hole and fair warning to every contractor that they should seek competent advice as soon as they get their first letter of engagement.</p>
<p>Initially there was <a href="http://www.woodllp.com/Publications/Articles/pdf/blackwater.pdf">much confusion</a> over the use of contractors in the security industry. While the media was arguing “mercenary or contractor” the industry was trying to clarify if security contractors were in fact independent contractors or employees. Bob Wood a lawyer for <a href="http://www.woodllp.com/">Wood LLP</a> in San Francisco points out an isolated case in which the IRS actually determined that one security contractor was in fact an employee: “In early 2007, a Blackwater security guard who worked in Afghanistan in 2005 sought back-pay and requested clarification of his status from an IRS office in Vermont. “</p>
<p>On March 30, 2007, the IRS ruled he was an employee. The IRS called Blackwater&#8217;s independent contractor classification &#8220;without merit.&#8221;  While this ruling applied only to one man, the IRS warned that the ruling might &#8220;be applicable to any other individuals engaged by the firm under similar circumstances.&#8221;</p>
<p>The IRS in this case ruled as it had in many domestic cases of contractor-versus employer-cases, that the working relationship determined the classification, not the employer’s designation.</p>
<p>The IRS found several factors in determining employee versus independent contractor status:</p>
<p>&#8211; Blackwater had its personnel sign a written agreement to provide services, and the agreement explained the &#8220;type of work and work rotation, and that the worker&#8217;s services were an essential part of the services that the firm offers its clients&#8221;;</p>
<p>&#8211; To protect its financial investment, Blackwater retained the rights to &#8220;change the worker&#8217;s methods&#8221; and to direct the worker;</p>
<p>&#8211; Blackwater required the worker to personally perform the services for its client, paid the worker&#8217;s travel expenses, performed an evaluation and had the right to suspend the worker&#8221; for any violations. In addition Blackwater “contractors” followed instructions regarding his assignment from the client, had no opportunity to realize a profit or incur a loss because the worker did not invest capital or assume any risk.</p>
<p>Blackwater also had contractors <a href="http://democrats.oversight.house.gov/images/stories/documents/20071022100027.pdf">sign confidentiality</a> documents to protect this information.  Luckily this single case was not considered policy and security contractors are considered (and taxed) as independent contractors. This puts extra responsibility on the contractor to make sure he gets full benefit from their hard work in the field. Transitioning from a career in the military to essentially a private businessman takes some rethinking.</p>
<p>This lone case turned into a political football and the threat of massive back taxes owed by Blackwater were finally resolved in Blackwater’s favor.  But the lesson is that the world of taxes and security contractors is a murky and ever changing one.</p>
<p>Eventually the IRS realized that trying every case for every contractor was a losing proposition. By lumping hired guns into traditional expat tax classifications, the IRS focused on the <a href="http://www.tax-power.com/iraq_contractors.htm">“330/365” test</a>.  This shifts the confusion to that of where you hang your hat stateside. The IRS calls it your  “abode”.</p>
<p>Your Section 911 physical presence benefits might be denied if you continued to maintain a residence in the U.S., if you retained your state drivers license, voted in U.S. elections or even returned to the U.S. after your assignment ended.</p>
<p><a href="http://www.globalequity.org/geo/sites/default/files/United%20States%20IRS%20waives%20Section%20911.PDF">Last year the IRS waived certain Section 911 rules</a> if an American had left a certain country, after a certain date.  Americans who had left Egypt, Syria, Libya or Yemen due to unrest were allowed to return to the U.S. without tax penalty. But former military that worked in harsher conditions in Iraq and Afghanistan were not allowed to claim those same benefits regardless of the safety conditions. Unfair, confusing, complicated? Yep.  So despite even this advice seek out a tax pro that keeps up with the latest IRS rulings and actions.</p>
<p>One thing the search for a lower tax rate uncovered is that contractors should “reside” in a State with no local taxes. Our Marine discovered that California, his state of residency, is hard on all its residents. The contractor simply thought he was getting taken to the cleaners like everyone else. There are seven states in the U.S. that don’t levy a tax: Alaska, Florida, Nevada, South Dakota, Texas and Washington. Some of these states have high use taxes and opinions on the quality of life in each state may vary, but you are not going to be physically living there most of the year.</p>
<p>But our Marine turned contractor never thought of this when he took his first contract two years ago.</p>
<p>“My tax guy missed it,” says the contractor, “even after I specifically asked him about it.  Admittedly, he didn&#8217;t have much or any experience with overseas contractor tax preparation, which made me nervous.”</p>
<p>He should be nervous.</p>
<p>The security contracting industry has drawn the attention of Congress in the past few years not just for the usual <a href="http://blackwatersa.dangerousmagazine.com/the-taxman-cometh-tips-for-contractors/us-bills-in-bundles" rel="attachment wp-att-4427"><img class="alignright size-medium wp-image-4427" title="US Bills in Bundles" alt="" src="http://blackwaterusa.dangerousmagazine.com/wp-content/uploads/2013/03/cash-300x215.jpg" width="300" height="215" /></a>claims of violence, legality and conduct but the IRS has launched it’s own jihad in that prosecutorial environment. When Congress applies pressure, typically the IRS was lock stepped. At least part of this attention can be traced to a single tax preparer:  A company called Blackwater that came from nowhere and was soon providing most of the security personnel to embassies, the CIA and other government agencies in hostile areas.</p>
<p>“If you worked for Blackwater in 2009 chances are you were audited,” says <a href="http://www.linkedin.com/pub/luke-fairfield/5/358/9a6">Luke Fairfield</a>, a leading provider of tax service for the industry, in a release <a href="http://feraljundi.com/taxes-for-contractors/">posted on former contractor “Feral Jundi</a>”. “Count yourself lucky if you were not, as you are in the minority. If you have not heard of a teammate or fellow employee who has been through an audit I would be surprised. These audits have spread from ex-Blackwater employees to nearly anyone filing for the foreign income exclusion.”</p>
<p>The official story is that a batch of fraudulent returns filed by a preparer for a number of Blackwater employees effectively moved the industry higher up on the IRS’s priority list. The truth is that a new segment of high income earners were simply not filing correctly allowing plenty of financial return for the IRS, usually contracted, auditors. Chris Hughes, a partner at Fairfield Hughes, points to Triple Canopy, who replaced Blackwater on a number of contracts as being the current subject of a rumored “IRS project,” though on a larger scale, it’s the industry that concerns the IRS.</p>
<p>“They find an area when they think they can collect revenue, and they concentrate their resources on it,” Hughes says. “In other words, it’s not always random.”</p>
<p>If you work overseas as a security contractor, you’re in the IRS’s sights and you had better file a clean and correct tax return. Below are three tips to keep the IRS off your back.</p>
<p><strong><a href="http://blackwatersa.dangerousmagazine.com/the-taxman-cometh-tips-for-contractors/fives" rel="attachment wp-att-4429"><img class="alignleft size-medium wp-image-4429" title="Fives" alt="" src="http://blackwaterusa.dangerousmagazine.com/wp-content/uploads/2013/03/Fives-300x225.jpg" width="300" height="225" /></a>1. Contract a Professional</strong></p>
<p>Trained professionals need a trained professional to do their taxes. “Whether or not you understand it, you are responsible for your own return,” says Hughes. “You need to go somewhere [to get your taxes done] where you know you can get good, sound advice and not have to worry about problems with the IRS.”</p>
<p>Hughes and his partner, Luke Fairfield, review past returns of all new clients, and the two “find many, many mistakes.” While finding errors, like incorrect locations of work, may be possible to the amateur, there is no substitute for good hired help. The best way to a qualified certified public accountant is through referral—find someone in the industry who is satisfied with their CPA and contact the accountant.</p>
<p>“It’s not a good idea to use a preparer simply because a friend says, ‘Hey my guy gets $20,000 or $30,000 refunds for everyone,’” Hughes says. Saving money on your taxes should not be the focus of your tax preparation, say the accountants. Rather, the focus should be on filing as clean and correct a return as is possible while maximizing the use of tax benefits and deductions to achieve the lowest tax liability legally possible. The framework of the IRS allows for exemptions that should be viewed as opportunities, but first and foremost you need to avoid the pitfalls. Some sites that advertise tax advice are also fishing for disgruntled contractors who suddenly realize they owe back taxes and choose a legal dodge. Buyer beware. If a web site is screaming at you, perhaps the more low key professionals are where you should turn.</p>
<p><a href="http://www.krozelcpa.com/">Kaitlin Krozel</a>, a San Diego-based CPA specializing in preparing taxes for expats, says that a tax preparer who is unfamiliar with foreign income regulations can cost their clients thousands of dollars. The good CPAs make the most of their client’s situation and don’t blame</p>
<p>“If you currently have a tax preparer, make sure to ask his or her familiarity with the foreign earned income exclusion, physical presence test, et cetera,” Krozel says. “Also ask if they know how your state of residence taxes overseas income… Most contractors fall under the rules of the physical presence test, which limits the amount of days one can be in the US to claim the full-year income exclusion.”</p>
<p><strong>2. Watch the Straddle</strong></p>
<p>You can qualify for an exclusion but within a tax year. Your start date might straddle two years.  For 2013 is $97,600. That’s the maximum amount of foreign generated income that the IRS will allow you to declare tax-free. It’s called the <a href="http://www.irs.gov/Individuals/International-Taxpayers/Foreign-Earned-Income-Exclusion">Foreign Earned Income Exclusion</a>, and it can save you a lot of money. It’s also blood in the water for the IRS and, some think, increases your chances of being audited. If you’re audited and you Falsely filed for the exclusion—that is, you filed for it when you don’t qualify for it—you can expect a hefty year-end bill.</p>
<p>According to the IRS you can exclude a certain amount of income if you meet the following descriptions:</p>
<ul>
<li>A U.S. citizen who is a bona fide resident of a foreign country or countries for an uninterrupted period that includes an entire tax year,</li>
</ul>
<ul>
<li>A U.S. resident alien who is a citizen or national of a country with which the United States has an income tax treaty in effect and who is a bona fide resident of a foreign country or countries for an uninterrupted period that includes an entire tax year, or</li>
</ul>
<ul>
<li>A U.S. citizen or a U.S. resident alien who is physically present in a foreign country or countries for at least 330 full days during any period of 12 consecutive months.</li>
</ul>
<p>That’s a lonely window of 34 days to be Stateside for the typical contractor. Not much when you consider there is usually a week of travel just to get home and back. That’s right you have to be IN the foreign country for that gold month and three days. So your time stateside is even more limited.  That’s why you see a lot of long-term contractors moving to Bangkok, the UAE or other regions. For the newbies who don’t get it right, it can be a costly audit…with legal, accounting on top of fines and late fees.</p>
<p>“We get individuals who have very little withholding because they initially believe their foreign earned income is not taxable so they stop their withholdings but ultimately don’t qualify to exclude all or a portion of their foreign earned income from their taxable income,” Hughes says. “As a result, their tax bill can be upwards of $20,000 or $25,000 at the end of the year simply because they are under-withheld. Many are caught unprepared because they may have already spent that money on a new vehicle or included it with a down payment on a new house. Believe me, I’ve seen it happen many times.”</p>
<p>A big part of the withholding pitfall is that contractors falsely assume that filing an IRS Form 673 qualifies them for exclusion. That form, which is submitted to the contractor’s employer, tells the employer to stop all federal withholdings until the $97,600 amount is reached, according to Hughes. Whether the contractor actually qualifies for the exemption in the eyes of the IRS has nothing to do with the Form 673. IRS Form 2555 is the form that is submitted with the taxes to claim the foreign income exclusion.</p>
<p>“The real “gotcha” point is when you start work for a company,” says Jake Allen, former security contractor and founder of the job site <a href="Security%20Contracting%20Network">Security Contracting Network</a>. “The guys get burned in that first fragmented year. There’s an element of complexity there, but you don’t have to pay all that tax. It’s wise to get a pro to help.”</p>
<p><strong>3. Homeless and Loving It.</strong></p>
<p>“The biggest mistake I see guys make is that they don’t establish residency somewhere or they come home too often,” Allen says. “The guys that are smart just have their wife or girlfriend meet them in some other country and don’t come home more than once a year. Because once you break the seal on that 330-day limit, it costs you.”</p>
<p>Establishing a foreign residency means having a foreign “tax home,” which is basically your place of abode in a “real and substantial sense,” according to the IRS application. Pending a foreign tax home, there are two ways to qualify for the Foreign Earned Income Exclusion: Spend at least 330 days of the year outside the US, or demonstrate to the Secretary’s satisfaction that you’re a “bona fide resident” of another country.</p>
<p>To avoid social and economic ties to the US, which can be troublesome when disproving residency here, many young contractors, especially those without wives or families, set up residencies in other countries. But contractors may not claim residency in Iraq or Afghanistan, according the IRS.</p>
<p>Here is the rub, the IRS won’t accept that a contractor resides in what they consider a “combat zones”. Even though danger zones are exactly where contractors live and work.  And the same is true with a residence card from someplace like Kurdistan—it won’t fly with the IRS. In countries approved for contractors to live in, the agency uses common standards to qualify for residency: an electric bill, apartment lease, including involvement in the local economy. Yes the IRS knows the game because they have audited enough security contractors to repeat every story back to you.</p>
<p>“The IRS will look at what the substance of the claim is and compare that to what makes a foreigner a resident in the US,” Hughes says. “We look at it as a claim that’s going to be extremely difficult to sustain.”</p>
<p>You can minimize your taxes by qualifying for foreign residency. But if you live in the US, you can also minimize your taxes by living in states that don’t tax your income: Texas, Florida, Alaska, Nevada, Washington, South Dakota, Wyoming and Tennessee. Conversely, among the worst states that don’t allow for the foreign income exclusion are California, Alabama, Pennsylvania and Hawaii, though state programs within these states may allow for tax breaks in other ways.</p>
<p>If you choose a knowledgeable, reputable preparer, perform due diligence on your Foreign Earned Income Exclusion claim, and are smart about your residency, you can have a hassle-free relationship with the IRS—and save yourself money. You don’t want to garner undue attention from the agency, but you don’t want to distance yourself to where you’re completely off the radar, either. Like a lot of things, avoiding the common pitfalls and complying with regulations will serve you well.</p>
<p>“The best thing for contractors to focus on, what the goal should be,” says Hughes, “is to ask themselves where they can go to get sound tax advice and pay the least amount of tax legally possible without putting themselves in a risky tax position which may jeopardize their ability to continue working in the industry.”</p>
<p><strong>Happy Ending</strong></p>
<p>And what happened to our Marine turned contractor? At the end of the day, his girlfriend sent his tax return to a preparer who knew the IRS nut roll and saved him $50,000. So this tax season, put some money and effort into shopping for someone to do your taxes.</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2013/03/18/the-taxman-cometh-tips-for-contractors/">The Taxman Cometh: Tips for Contractors</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2013/03/18/the-taxman-cometh-tips-for-contractors/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
