<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Dangerous Magazine</title>
	<atom:link href="http://dangerousmagazine.com/feed/" rel="self" type="application/rss+xml" />
	<link>http://dangerousmagazine.com</link>
	<description>For Those Who Live On The Edge</description>
	<lastBuildDate>Wed, 01 Feb 2023 19:49:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>Into The Lost World of Borneo</title>
		<link>http://dangerousmagazine.com/2019/02/13/lost-world-borneo/</link>
		<comments>http://dangerousmagazine.com/2019/02/13/lost-world-borneo/#comments</comments>
		<pubDate>Wed, 13 Feb 2019 18:30:01 +0000</pubDate>
		<dc:creator><![CDATA[claire]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[borneo]]></category>
		<category><![CDATA[borneo safari]]></category>
		<category><![CDATA[Dusun villagers]]></category>
		<category><![CDATA[jungle]]></category>
		<category><![CDATA[jungle adventure]]></category>
		<category><![CDATA[malaysia]]></category>
		<category><![CDATA[maliau]]></category>
		<category><![CDATA[maliau basin]]></category>
		<category><![CDATA[Robert Young Pelton]]></category>
		<category><![CDATA[sabah]]></category>
		<category><![CDATA[the adventurist]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2583</guid>
		<description><![CDATA[<p>The Lost World Excerpt from The Adventurist by Robert Young Pelton The light lives to show off its creations The mountain sits, smugly waiting, growing larger with each arc of the blade Clouds hold hands and circle the bruised green crown A delicate necklace of light The head scraped clean, hard, thrust upward The mountain ignores preparing for the dark Kota Kinabalu, Malaysia &#8211; The helicopter ascended: white, clean and gleaming. I was filthy; burnt, brown, mud-dirty and disheveled, from exploring bat...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2019/02/13/lost-world-borneo/">Into The Lost World of Borneo</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p class="p1" style="text-align: center"><strong>The Lost World</strong></p>
<p class="p1">Excerpt from <a title="Buy The Adventurist" href="https://www.amazon.com/Adventurist-My-Life-Dangerous-Places/dp/0767905768" target="_blank"><em>The Adventurist</em> </a>by Robert Young Pelton</p>
<div class="p3" style="text-align: center">The light lives to show off its creations</div>
<div class="p3" style="text-align: center">The mountain sits, smugly waiting,</div>
<div class="p3" style="text-align: center">growing larger with each arc of the blade</div>
<div class="p3" style="text-align: center">Clouds hold hands and circle the bruised green crown</div>
<div class="p3" style="text-align: center">A delicate necklace of light</div>
<div class="p3" style="text-align: center">The head scraped clean, hard, thrust upward</div>
<div class="p3" style="text-align: center">The mountain ignores preparing for the dark</div>
<p class="p1">Kota Kinabalu, Malaysia &#8211; The helicopter ascended: white, clean and gleaming. I was filthy; burnt, brown, mud-dirty and disheveled, from exploring bat shit filled caves in the interior of Borneo, shooting rapids and sliding through dark forest floors. This was the quickest way to get where I wanted to go. A place where no one had been. Once on board and aloft, the complexities of the jungle intermingled into a rich, green blanket. The heavy heat became an icy coolness as the Bell 206 gained altitude.</p>
<p class="p1">From above the miles and miles of jungle carpet, the ground was unbroken, except by a few large rivers that had cut the dirt right down to the sandstone. Here, there was diversity, but also a monotony of endless green: a carpet of color every few miles from a flowering tree, subtle shades of green, blending from dark brownish green to light green and even yellowish green. If the helicopter went down in this canopy, we would never be found.<img class="aligncenter" src="https://cdn.shopify.com/s/files/1/1375/5009/files/2074_55_strolling_the_maliau_large.jpg?v=1549658094" alt="" /></p>
<p class="p1">Off in the distance we saw the crisp shape of a continent rising above an ocean of mist. The sharp outline of the steep cliffs cut an exact shoreline in this cloud as if it were an island.</p>
<p class="p1">The only ground access in is a full day hike from the nearest timber camp on the Tawau Keningau timber road. The downside to this method is a very steep and dangerous cliff ascent late in the day or early the next morning.</p>
<p class="p1">My plan is to drop the gear at a crudely cleared helipad first, then have the pilot drop us off wherever he can find a hole. First I wanted to see just what I was up against.</p>
<p class="p1">I motioned the pilot to take us higher to get a better idea of the shape of this vast island within an island. <a title="The History of the Maliau Basin" href="http://maliaubasin.org/about-mbca/" target="_blank">The Maliau basin</a> looks like an elephant track in hard dirt that has been washed by rain. The basin also could be described as a crown shape that rises in the north to a tiara-like configuration and slopes down on each side to where rivers have cut a series of jagged canyons through which they spill like wax from a candle. The Maliau is an important drainage basin that creates the Sungai Maliau, which tumbles down to create the Maliau Falls, then drains into the Kuamut, which links up with the Kinabatangan.</p>
<p class="p1"><img class="aligncenter" src="https://cdn.shopify.com/s/files/1/1375/5009/files/BORNEO_MOUNTAIN_large.jpg?v=1549675999" alt="" /></p>
<p class="p1">The area is so vast that we flew long and hard before we found the chain of rapids and waterfalls spilling out of the basin seen by so few people. The drainage of the entire 25 kilometer-wide basin made a most impressive showing. As the pilot dived and maneuvered between the steep cliffs, the ground turned from a smooth carpet to individual giants. What had looked like strewn pebbles were house-sized boulders. What had looked like rapids, were 20-30 foot waterfalls that cascaded into basin after basin. An extraordinary sight.</p>
<p class="p1">The pilot tapped his gauge, alerting us to his low fuel. We broke out of our aerial reverie and began to search for the helipad. Crude helipads had been hacked out of the dense jungle to let the research and survey teams in. But no one had penetrated the remote interior. Until now.</p>
<p class="p1">The helicopter touched down lightly in a clearing, not really putting any weight on the undergrowth. I leaped out and immediately sank up to our chests in moss. Shocked by the lack of solid footing,<span class="Apple-converted-space">  </span>the firm peat forest floor was an illusion. Their were three to four feet of moss and leaf litter before the trees rooted in the thin hard bedrock.</p>
<p class="p1">Labored like horses in deep snow we moved the gear away from the rotor wash. As the chopper lifted back into the bright sunlight, we had a chance to record our first impressions of the Maliau Basin.</p>
<p class="p1">It was cool near the rim. The altitude and humidity created an agreeable atmosphere. There was moss everywhere. The curious lack of soil and depth of the moss was typical of a peat forest. The trees were not the typical lowland dipterocarps. Here, there were conifers. Big conifers.</p>
<p class="p1">It was a discomforting feeling to descend from the clear, piercing blue sky into the dark grasps of the jungle. The trees towered above us. The contours of the basin, which had seemed gentle and caressing, were now wickedly steep and forbidding. Instead of seeing clearly in 360 degrees, we were now confined to staring at patches of sky through 60-100 foot trees.</p>
<p class="p1">Our weight restrictions and the distance we needed to fly to get to the Maliau dictated that we make two trips. Our solution was to send Jon back with the pilot to help find the helipad.</p>
<p class="p1">We flew into helipad four and set up camp at the base of the hill, lugging our gear and crashing through the dense brush like drunk elephants.</p>
<p class="p1">We were just five minutes down the trail and suddenly Tony asked us to stop. It appeared he had already made a discovery. He pointed to a thimble-sized plant that closely resembled a cross between an alien spaceship and a Victorian light standard. He collected the second finding ever of a small saprophytic plant; Thysmia aescananthus. The tiny plant is nestled under the roots of a tree and would have been easily crushed. Tony mentioned in a casual manner that the first time this plant was found was in exactly this same spot on an earlier expedition. The uniqueness and fragility of this area began to sink in.</p>
<p class="p1">Tony explained that we were in unique coniferous forest dominated by huge Agathus (related to the New Zealand cowrie pines), dacridiums and podocarpus trees, mixed with oaks and casserinas as it mixes with the lower hill dipterocarp forest.</p>
<p class="p1"><img class="aligncenter" src="https://cdn.shopify.com/s/files/1/1375/5009/files/maliau-wide-river_large.png?v=1549676205" alt="" /></p>
<p class="p1">This was truly pristine forest. There was no evidence of fire. There have been no natural calamities. There are no people to disturb the forest and there is no wind. Nothing to disturb the test tube-like conditions for creating new species. The only major trauma is the life cycle of the giant trees as they grow, die, and then crash into the forest, unheard and unseen, creating a gaping hole in the canopy for their offspring to fill.</p>
<p class="p1">In 1947, a pilot flying from the west coast of British North Borneo to Tawau experienced a rude shock when he narrowly avoided colliding with a wall of steep cliffs emerging from the misty jungle. This minor incident is the first recorded mention of the Maliau Basin. The &#8220;Lost World&#8221; was recorded in the Borneo Bulletin—and then quietly slipped back into obscurity.</p>
<p class="p1">The nearest Dusun villagers lived only four days away, but their belief that a fierce dragon inhabited Lake Limunsut at the base of the cliffs didn’t encourage exploration. Muruts along Sungai Sapulut were known to have reached the lower basin, calling it the &#8220;Mountain of Stairs&#8221; in reference to the many waterfalls and limestone ledges.</p>
<p class="p1">The first Western attempt to enter the &#8220;Lost World&#8221; was in 1976 during a forest service expedition to Lake Limunsut. They tried in vain to scale the escarpment but were forced to turn back just forty feet from the upper edge</p>
<p class="p1">Four years later, the Sabah Museum mounted an expedition to penetrate this remote area. The expedition ran out of supplies, was felled by malaria, and had to give up before they could conquer the escarpment.</p>
<p class="p1">In 1982, they managed a brief reconnaissance by helicopter, landing on a gravel bar near the falls.This preliminary mission was designed to lay the groundwork for a more intensive expedition a year later. They were greeted by animals that had never seen man before: a docile 22 foot, 400 pound python, mildly curious bearded pigs and a kijang, deer. In all, this brief foray into the wilderness posed more questions than it answered.</p>
<p class="p1">Finally, in April-May of 1988, a 43 man expedition spent three weeks in the Maliau unlocking its secrets. What they found was impressive. The 390 square kilometer basin covers an area of 25 kilometers across and is protected by an encircling escarpment that climbs up to 1500 meters. The highest point is Gunung Lotung, estimated to be 1900 meters high, but it has yet to be properly surveyed.</p>
<p class="p1">This expedition identified 47 species of mammals, including rhino, proboscis monkey and clouded leopard; 175 species of birds, including the Bulwer’s Pheasant (once thought extinct in Sabah); and 450 species of plants, many of them rare species.Their scientific finds and increased understanding of this absolutely untouched region led them to declare it a conservation area. But, along with the numerous rare plants and unusual ecosystems, the expedition also discovered significant coal seams.</p>
<p class="p1">There had also been a more adventurous and less scientific foray into the Maliau. Jon Rees walked in from Sapulut with three other Americans, a New Zealander and a Brit. They had heard there was a place no one had ever been, so they hiked through solid jungle from Sapulut for three days, plunged down into the Maliau River, walked along the ridge trail for five days, spent time in the central area and then devised a curious way to exit the basin. They had carried in canisters of two chemicals, used in boat building to create a buoyant foam. They also carried in two presewn plastic socks sewn in the shape of a Hobie cat.</p>
<p class="p1">The group tried to create hulls by hanging the socks in a tree, mixing the chemicals and pouring the chemical mixture into the socks. However, instead of a light, crisp vessel, they got two soggy bananas. The foam did not expand to its full volume, due either to altitude, heat, humidity or to all three. Nonetheless, they made a platform with roughly hewn crossbars and an old tennis net, tied sticks to the sawed-off blades of paddles, and proceeded to float down the Kuamut for 10 days to get out.</p>
<p class="p1">Their total time in the country was 27 days longer than any other outsider before them. During their foray they came across all the major mammals of Borneo except the rhino, and discovered &#8220;Jalan Babi,&#8221; a curious highway used by pigs to enter the Maliau. The profusion of coniferous and oak trees attracts the pigs in impressive numbers every year. The interior and the edge was still a tantalizing goal for scientific discovery.</p>
<p class="p1">Because of the area’s inaccessibility, various expeditions had passed the Maliau Basin by, or skirted its perimeter. The Maliau also had a curious history of being discovered and then undiscovered. My team would consist of Coskun who would cover our trip for European and Turkish magazines, Jon Rees a British born expeditor who lived in Sabah and Tony Lamb, a botanist whose fascination and experience with the Maliau Basin made him the perfect choice for our expedition. Tony was in charge of the Tenom Research Center, now retired, and his special interest is in the identification, propagation, and domestication of tropical fruits. He also has a vast knowledge of local insects, birds and mammals. His knowledge of the orchids and plants is encyclopedic. Only accurate identification of the multitude of trees prompts him to defer to a tree expert.</p>
<p class="p1">Tony was born in Ceylon, (now Sri Lanka) and grew up on a tea plantation during the British colonial period. Being educated in England and spending many years in Malaysia, another former British colony, may explain his genteel and pleasant nature.</p>
<p class="p1">The idea was to penetrate the upper basin and then head into parts unknown. We began our trek to the rim and then down along the edge to our rendezvous at a pre agreed base camp. For navigation we had a compass and a crude map.</p>
<p class="p1">The size of the Maliau is overwhelming. Like most wilderness areas, there is a mixture of monotony and surprise: smooth skinned gum trees, disrobed and red in the normally green jungle; streams that run with tea-colored water; pitcher plants that festoon trees like Christmas decorations. As we increased in altitude the trees became stunted, the moss became thicker and the forest wetter.</p>
<p class="p1">We could tell when we were close to the rim because we hit a green wall of moss. There is a distinct rim forest that lives in the constant wash of the mist and fog that pours over the rim. The trees are twisted and gnarled with their roots raised as if to keep their feet dry. The moss is constantly wet. Walking through the almost impenetrable maze of roots and branches drenches you as they squish their burden of water. It is chilly. It is also silent. There does not appear to be any life along the rim.</p>
<p class="p1">Another surprise was that the spectacular view we thought would greet us, did not exist. The dense growth at the rim blocked any chance to get a clear view of the surrounding jungle. We were floating in a &#8220;sea of mist&#8221; that stretched as far as the eye could see. &#8220;Sea&#8221; is an appropriate description because the mist bobs and ebbs like an ocean. It hits the cliffs, curls up and then floats above the trees, spraying a fine cool mist over the trees and moss.</p>
<p class="p1">I pushed out to get a view over the ledge and had a gut wrenching revelation. When the mist cleared for a few seconds, I saw below me over a thousand feet of sheer cliff. More correctly, &#8220;behind&#8221; me was over a thousand feet of sheer cliff. I had learned another intriguing fact about the rim forest. The roots of the trees grew far out over the cliffs. Covered with moss and detritus and being continually moist, the roots support more plants and trees, encouraging the process to repeat itself. I should have learned my lesson when we leaped off the helicopter into a mossy trap. Wiser, I gently returned to the safety of the cliff five feet behind me.</p>
<p class="p1">Tony and I, realizing that the day was getting late and that we had a long hike ahead of us, made haste along the rim. From the air, the rim looks like a smooth, clean edge sloping softly to a basin. Toiling ant like on the ground, it is a wonderland of ravines, cliffs, gullies and inaccessible smaller cliffs. In some places, water too impatient to flow into the central basin, has sliced through the edge of the precipice, creating a magical series of waterfalls and ledges ending in one last leap of escarpment. The water never hits the ground, dissipating into mist and drops of moisture.</p>
<p class="p1">We made our way through alleys of 20 feet high, five feet wide and 60 feet long slabs of sandstone. We clambered up the root-bound cliffs and slid down the other side. We passed the remains of a camp. This was the first evidence of man after the helipad—further evidence of the search for coal. In the coming days we would come upon holes dug to measure the depth of soft black coal. They had picked a most impressive spot: water had carved a notch in the cliff face providing a picture window view of the top of the mist sea.</p>
<p class="p1">Soon the path flattened out. Instead of the steep climbing and tumbling, we were dodging, ducking and twisting around the chaotic moss forest. I couldn’t help but think of British Columbia or the Olympic National Park in Washington. It was cool, green and refreshing when we were moving at a clip. We took a short breather. As soon as we stopped, the chill attacked.</p>
<p class="p1">We pressed on. Tony vaguely remembered there is a quicker route further down the rim. I chose to travel along the rim in my quest for a photograph that would capture the congested wet moss forest and the ocean of fog that gave us tantalizing peeks, but never the full picture.</p>
<p class="p1">The game path was now marked with survey sticks and occasionally flagging tape. We had been walking for a full day without food or water. Luckily, we were traveling light and the cool wet rim had made water abundantly unnecessary.</p>
<p class="p1">Tony’s muttering, normally an ongoing description of plant life and other information, turned to concern. He didn’t remember that ridge. We should be higher up. It was getting rather late.</p>
<p class="p1">Our crude maps showed we were still quite a long way from the helipad and eventual base camp where our gear was stored. Looking back, I could see the profile of the cliff that matched the map. The problem was, I was looking up at the ridge and it was behind me.</p>
<p class="p1">We continued. We were losing altitude at an alarming rate. It was getting darker. Now Tony and I were sure something was wrong. The map showed a smaller plateau below the cliff edge. We had been mindlessly following a game trail that we assumed would follow the ridge. Instead, we had found a way out of the basin and down the cliff.</p>
<p class="p1">We discussed our situation. We could turn back, but we didn’t know exactly where we went off the ridge and down onto this lower plateau. Since the path winds and curves tree by tree there would be no sure way of knowing where the path diverged, if it diverged at all. Plus, it was getting dark. Being lost in unexplored jungle at night with sheer cliffs was not a welcome feeling.</p>
<p class="p1">We decided to go forward because it would take us closer to our rendezvous. We would then cut in towards the cliff face as we got to the end of this minor plateau. There might be a way up, similar to the way we were fooled into coming down.</p>
<p class="p1">We continued losing height until we were in the depths of a black swamp. Trees blocked the light as our feet were sucked into the dark ooze. We were tired. It was late and the swamp was a depressing place to spend the night. Noxious gases were released as we struggled to pull our feet free. A blue oily film floated on the surface of the mosquito infested slime.</p>
<p class="p1">We decided that the swamp was the last place we wanted to spend our first evening in the Maliau. We could see the cliffs looming above us. We made a bold decision. We would push up the cliffs since the path we were taking went deeper and deeper into the lowland jungle.</p>
<p class="p1">Tony was tired. He had been helicoptered in from his comfortable desk job and he was now sitting in a dark swamp, about to cliff climb with a stranger, at night, in one of the most remote jungles in the world.</p>
<p class="p1">I was concerned about him. He had twenty years on me, but he was the one who suggested that we haul ourselves up the cliff. All he asked was that we have a good rest before we attempted the ascent. I gave him what little water I had, knowing it would be the last of our water for some time.</p>
<p class="p1">The sun had set, but there was still a dull light that illuminated our climb. The first section up was through tight brush and razor-sharp rattan. It was demanding, but doable.</p>
<p class="p1">We hit the first ledge. Using cracks in the rock, we pulled ourselves up. We hit our second ledge. Once again there were enough crevices to gain a purchase. Then we hit the wall—sheer cliff that ended in a green cornice of tangled, moss-covered roots. Momentarily set back, we explored the base of the cliff for a way up. We were drenched by the constant fall of water from the moss forest high above us. We had followed a narrow game trail along the base. We could spend the night here in the overhang below the face, but the sight of our quest, after working so hard, drove us on.</p>
<p class="p1">We had no ropes, no climbing gear, so it would be tough going. Office building size chunks of cliff had fallen off and blocked our way on the side. Occasionally there was a collapsed section but they ended up in sheer overhangs. Finally, we found what we were looking for: a section of the cliff that had fallen away leaving a crack that enabled us to get tantalizingly close to the green overhang—more importantly, a large tree root that gave us something that would allow us to hike up the clean, cliff face.</p>
<p class="p1">I climbed up to see if it was possible. I pointed out to Tony that once we were over, we could not come back down. We could find another cliff face just as high, if not higher, beyond this climb. Tony told me to go first. We could barely see in the dusk. We were soaked with sweat, hungry and thirsty after our climb. We didn’t know if we had the energy to make this climb.</p>
<p class="p1">I began to climb. I fell back, a handful of moss and dirt clutched in each hand. I burrowed my hands to find something solid. I began to climb slowly and nervously. A slight tug or pressure could bring down tons of rock and trees on top of me.</p>
<p class="p1">As I gained in height, the chance of going back down seemed dimmer and dimmer, making each upward move that much more desperate. My muscles were shaking with exertion as I reached the cornice. What looked like a green ledge was now a four foot overhang covered in slippery moss and elastic roots. For awhile I was baffled. I could not get a grip on anything to move myself back and then over. I could not go down, sideways or up. My muscles were turning weak and my mouth was dry. I locked my legs around the dangling roots and jammed my hand into the deep moss. Still nothing to hold onto. If there was nothing to hold onto, maybe I could use that to my advantage. Desperately, I began to burrow through the roots and moss with my bare hands. I almost laughed with the sight I must have presented as I broke through the dirt and moss to finally find a tangle of solid roots above. My strength was drained as I wedged my arm in like a stick and threw my leg up to avoid falling back to the rocks below.</p>
<p class="p1">Catching my breath, I found myself in the cloud forest of the rim. I crawled the remaining fifty feet under roots and over moss to discover that we were back on the rim.</p>
<p class="p1">Covered in dirt and my clothes dripping, I weakly made my way to the ridge. I yelled to Tony we had made it. I searched for a creeper or vine to help Tony up.</p>
<p class="p1">I tore off a creeper and dangled it down for Tony to tie his pack to. Tony said, &#8220;Don’t worry. I’ll come up with my pack.&#8221; He began to climb using the vine for support. When he reached the green wall that I had to burrow through, he used the vine to crawl over. As he tried to lift his leg up for the final push, he paused, looked at me and then fell back down. It all happened in slow motion. I almost laughed as Tony calmly looked at me as he slowly shrank in size and fell to the rocks below. When he hit, back first, I don’t think he even blinked. No screams, yells, or grunts. He just lay there calmly, eyes wide open. I assumed he was dead. I felt detached. A combination of the dim light and fatigue.</p>
<p class="p1">From down below I could hear Tony say quietly said, &#8220;I think I hurt myself.&#8221; Surprised he was alive, I asked if he needed assistance.</p>
<p class="p1">&#8220;No, just let me lie here awhile.&#8221;</p>
<p class="p1">He had fallen a sickening distance. Later we discovered what had saved his life. He had fallen in the crevice of two large moss covered rocks. In the crevice, the moss was almost three feet thick. Twelve inches either way, he would have had only two inches of moss to cushion the impact.</p>
<p class="p1">He rested for quite a while. This time, I hauled his pack up and then used the vine to take him all the way up. It was dark now. We shivered with cold as the temperature dropped and the sweat from our exertion chilled us. It looked like rain.</p>
<p class="p1">I found a hollow tree large enough to hold two people in moderate comfort. Lining it with fern fronds, it made a passable bivouac for the night. Tony’s pack held a cornucopia of treasures: a tin of sardines, one can of orange juice, newspaper, plastic bags—and eureka!—a pack of matches.</p>
<p class="p1"><img class="aligncenter" src="https://cdn.shopify.com/s/files/1/1375/5009/files/Bamboowatervert_large.jpg?v=1549656670" alt="" /></p>
<p class="p1">After planting Tony in his fern bower, I set about building a fire to dry our clothes and to provide some heat. It was not easy to create fire with wood that has been continuously wet.</p>
<p class="p1">After a few false starts and with the last of the dry newspaper, the fire reluctantly smoked to life. It is almost perverse to say we spent quite an enjoyable evening with a roaring fire on the edge of the cliff inside a fern-lined hollow tree. It is hard to describe the pleasures of relative existence. I say &#8220;relative&#8221; because we might have had to spend the night in the swamp. We might have had no matches, no food, and Tony could be dead.</p>
<p class="p1">The rain came down in polite periods, allowing us to dry out in front of the fire. Each onset was heralded by gentle showers before the deluge.</p>
<p class="p1">Tony became consumed by thirst, so I set off to find water, using the large plastic bags Tony brought to collect plant samples. At night the confused tangle of trees turned into a nightmare of dead ends, pits, and the ever present cliff face.</p>
<p class="p1">I tried walking down to where the water eventually gathers in small streams before joining the rivers that flow everywhere in the Maliau Basin. In the blackness I realized that by going down and then coming back up, it would be impossible to know if I should go left or right to return to our camp, despite the light from the roaring fire, which disappeared within 20 feet. I yelled to see if sound travels. The thick moss absorbed all sound. I wisely decided to follow the edge.</p>
<p class="p1">I walked for about a mile in the dark along the rim in search of water and almost fell into an open pit. Open is not a good description because it was full of brown water. I kneeled down and drink my fill from the gritty stagnant water. I kindly did not tell Tony where I found the water.</p>
<p class="p1"><img class="aligncenter" src="https://cdn.shopify.com/s/files/1/1375/5009/files/RYPjungle_large.jpg?v=1549656192" alt="" /></p>
<p class="p1">The morning dawned cold and wet. The fire was still smoldering. The sun skittered across the top of the mist, creating a strange sunrise. I climbed out on an overhanging limb to take a picture. The trees grew out and over still blocking a clear view of the golden ocean below. I still couldn’t capture the sense of being on the edge of a lost world. I was barred in by the jungle.</p>
<p class="p1"><strong>FURTHER READING</strong></p>
<p class="p1"><a title="RYPs Jungle Tips" href="https://dpxgear.com/blogs/news/jungle-boogie-jungle-tips-and-essential-equipment-to-keep-you-comfortable">Read RYPs</a> jungle tips <a title="RYPs Jungle Tips" href="https://dpxgear.com/blogs/news/jungle-boogie-jungle-tips-and-essential-equipment-to-keep-you-comfortable">here</a>.</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2019/02/13/lost-world-borneo/">Into The Lost World of Borneo</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2019/02/13/lost-world-borneo/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Hack Part Seven</title>
		<link>http://dangerousmagazine.com/2018/10/11/hack-part-seven/</link>
		<comments>http://dangerousmagazine.com/2018/10/11/hack-part-seven/#comments</comments>
		<pubDate>Thu, 11 Oct 2018 20:25:27 +0000</pubDate>
		<dc:creator><![CDATA[Lisa]]></dc:creator>
				<category><![CDATA[New Issue]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2572</guid>
		<description><![CDATA[<p>&#160; It would be hard to imagine a less likely candidate that Donald Trump for President of the United States.  To many Trump was a relic of the 80’s, an aging, uneven dilettante, a serial womanizer, a repeat bankrupt, a narcissistic Manhattan B lister, a media bull shitter and obnoxious loudmouth. To others he was a successful real estate tycoon a deft business genius turned flamboyant reality TV star. To those who loved his TV series The Apprentice he was an American icon, a...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/10/11/hack-part-seven/">The Hack Part Seven</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>&nbsp;</p>
<p>It would be hard to imagine a less likely candidate that Donald Trump for President of the United States.  To many Trump was a relic of the 80’s, an aging, uneven dilettante, a serial womanizer, a repeat bankrupt, a narcissistic Manhattan B lister, a media bull shitter and obnoxious loudmouth.</p>
<p>To others he was a successful real estate tycoon a deft business genius turned flamboyant reality TV star. To those who loved his TV series <em><a href="http://fortune.com/2016/09/08/donald-trump-the-apprentice-burnett/">The Apprentice</a></em> he was an American icon, a golden haired symbol of hard won success and outspoken support of America and Americans. To law enforcement Trump had lawyered up and papered over misdeeds that ranged from mob connections, affairs, money laundering, and to the media elites who worked for the broadsheets. He used mob savvy lawyers like Roy Cohn and later a softer, equally crooked version called Michael Cohen to do his dirty deniable clean-up work. Trump was a long time Manhattan publicity whore, a man who even <a href="https://www.washingtonpost.com/politics/donald-trump-alter-ego-barron/2016/05/12/02ac99ec-16fe-11e6-aa55-670cabef46e0_story.html">posed</a> as &#8220;John Barron&#8221; or &#8220;John Miller&#8221; as his own PR person to compliment himself and now possibly suffering from some geriatric ailment that prevented him from forming a compete sentence.  There was no way a tainted throw-back like Trump would ever win an election, let alone pay for one. Unless you were running against Hillary Clinton.</p>
<p>Initially, the conservative right backed an outsider, a plain speaker, a tough talking patriot who would focus his efforts on restoring the esteem of the much maligned middle aged white conservative male and someone who didn’t care what the elite media or the entitled left thought. That man was Ted Cruz.</p>
<p>When Ted Cruz lost steam after losing in the Indiana primary on May 3, 2016 to Donald Trump, the extreme right and the center right gravitated to the reality show star. The man with <em>wasta </em>and a rapidly growing following was now Trump. Trump, with a little help and a lot of money, could be the perfect wrecking ball to swing in the sclerotic insider world of DC and smash down the  politically correct left. This appeal was also bolstered by a general sense of dread that the elderly Hillary Clinton, much abused wife of Bill Clinton, former Senator who moved to New York and frequent flier mile secretary of state had been carefully placed into political positions to assuage her naked hungry for power. The Democrats had elected a man from mixed parentage, why not the first woman?</p>
<p>Despite what the left considered an ideal candidate, Clinton appeared to just patiently await her coronation. She did not connect with voters. Aloof, entitled and not in touch. It was not an ideal election and the poor choices sparked fierce debate. A knock down slugfest creating a perfect place for someone to light a fire. Something the world of social media was happy to do.</p>
<p>Trump had no money to win and Clinton was drowning in it. Elections run on advertising and image. Raising funds requires making bargains with the devil and using every tactic available. What was needed was something that would push the ball over the line. Cinton had weak points. Trust, arrogance, inability to tell the truth, a dodgy family foundation, deleted emails…there must be something in those deleted emails….if they could be found. Clinton’s camp found finding fault with Trump laughably easy All they had to do was Google the thousands of outrageous statements, deplorable acts and thousands of silly statements.</p>
<p>Surprisingly, this mudslinging only emboldened Trump. His followers didn’t trust the media. He would simply tweet if he had something to say and the media would go nuts chasing Trump&#8217;s insulting tweets until he tweeted again.All of this perfectly in line with Steve Bannon&#8217;s <a href="https://www.newyorker.com/news/john-cassidy/steve-bannons-war-on-the-press">desire to destroy the cozy old school relationship</a> between government and the media. Bannon&#8217;s history as a investor in Hollywood, turned propaganda film maker turned blogger made him an outsider and Trump inflamed the old school media with his lack of respect.</p>
<p>Tweeting vs Sunday print editorials is perfect OODA loop stuff. The O.O.D.A. Loop, which stands for Observe, Orient, Decide and Act was Col John Boyd&#8217;s way of explaining to fighter pilots in the 50’s how combatants go through the process of reacting to stimulus Boyd’s idea was that if you move faster than your opponent you will always maintain the initiative. Even if what you are doing does not make sense. It is more important to confuse and wrong foot the enemy until you strike. So Donald Trump and his strategic advisor Steve Bannon worked the short game while a group of supporters worked the long game. If Clinton wanted coverage on Sunday news shows and magazine profiles, Bannon was happy to roll ini the viral mud of social media. It was all about controversy the electricity that drives popular discussion and top of mind awareness.  He needed fuel to stoke this fire just as he had built up Brietbart on bashing Clinton and Obama.</p>
<p>The press still has not regained their balance. Demanding, facts, in depth interviews, real concepts Bannon and Trump just fired off more tweets more Facebook ads and laughed all the way to the bank. Trump&#8217;s media maven Brad Pasquale <a href="https://www.washingtonpost.com/news/politics/wp/2018/03/22/all-the-ways-trumps-campaign-was-aided-by-facebook-ranked-by-importance/?utm_term=.ab95cbaf5096">spent 80% of their ad</a> budget on Facebook and created another perfect way to alienate the main stream media. A business that relied heavily on campaign ads to swell their coffers.  It also created a petri dish for Russian trolls and fake news as the monetization of clicks drove thousands of enterprising people to <a href="https://www.washingtonpost.com/news/the-intersect/wp/2016/11/18/this-is-how-the-internets-fake-news-writers-make-money/?utm_term=.99d7fa34baa6">capitalize</a> on Trump&#8217;s stickiness and viral qualities. The election was so viral that Romanian kids could create hyperbolic political ads and fake news sites and then use monetization sites like Adsense to make up to $10,000 a day. <a href="https://www.washingtonpost.com/news/the-intersect/wp/2016/11/03/the-only-true-winners-of-this-election-are-trolls/?utm_term=.958a116fb0ff">Trolls</a> not pundits rose to the top of the food chain.</p>
<p>+ + +</p>
<p>Controversy needs dirt. There were plenty of willing miners that searched for dirt that would be used to feed the trolls.</p>
<p>The Clinton Dirt posse were a strange cabal of characters straight out central casting. They range from Chicago investment banker Peter W. Smith, then an aging and now dead scandal monger, Iowa activist Sam Clovis an obese radio host, Charles C. Johnson  a short pudgy red headed ginger muckracker, former folk singer and Reagan era speechwriter Dana Rohrabacher, ex-Blackwater neo-mercenary Erik Prince, Knight of Malta and former Inspector General Joseph Schmitz, Rohrbacher employee and Prince supporter Paul Behrends, Victoria Toensing (muckraking media savvy lawyer for Clovis and Prince)  and even Prince’s best buddy and role model Olly North of Iran Contra fame popped up in media reports. Other than Johnson and Prince (who also worked together against Weiner) It was the 80’s all over again. And this election suddenly seemed to be all about dirt and dirty tricks.</p>
<p>This group of aging political super villains (to the Democrats at least) appeared to act in concert or in support of candidate Trump’s National Security Team under General Mike Flynn. Flynn was not a politician, he was a war fighter, so the people he picked seemed heavy on enthusiasm and short on diplomacy. The extreme took front and center, with neocons. alt-rights and just plain scary featured prominently. An Iran Contra level of paranoia, slippery dealing and skullduggery took hold. Conversations, speeches and <a href="https://foreignpolicy.com/2017/08/10/heres-the-memo-that-blew-up-the-nsc/">memos</a> with terms like “deep state”, “fake news”, “political warfare”, “information campaigns” and “islamofascism” peppered conversations. There was an enemy out there, but the comingling of enemies that included Antifa, Muslim Brotherhood, Clinton supporters, Marxists, ISIS and the media made for a heady brew.</p>
<p>When Trump assembled his “brightest minds” <a href="https://www.nytimes.com/2016/03/23/us/politics/donald-trump-foreign-policy-advisers.html">foreign policy team</a> the media had to hit Google to figure out who they were. It didn’t help that the reality show candidate said he formed his world view by watching television on the weekends.  His starting line-up was Joseph E. Schmitz, Gen. Keith Kellogg, Carter Page, George Papadopoulos and Walid Phares and would be chaired by Jeff Sessions.  Jeff Sessions had to recuse himself from the later investigation into Russian interference because he actually met with Russians as did most if not all of the rest except for pro-Israel, Lebanese-born Christian <a href="https://www.washingtonpost.com/news/worldviews/wp/2016/03/22/the-dark-controversial-past-of-trumps-counterterrorism-adviser/?utm_term=.6c9be26552e7">Walid Phares</a> who was a virulent critic of Islam and Kellogg who had briefly run the Iraq CPA and had worked for <a href="https://www.thenation.com/article/one-of-trumps-top-military-advisers-played-a-key-role-in-the-disastrous-iraq-occupation/">intelligence contractors</a> after becoming an expert on network centric warfare</p>
<p>Almost immediately various elements of the Russian government began reaching out to this crew to offer “Clinton Dirt”. It is important to remember that at a certain point the right assumed that Clinton had deleted both embarrassing and sensitive emails and assumed that many of these were Classified or above.  The most high profile “Clinton Dirt” was the June 2016 meeting between Trump campaign staff and Russians. But the search began much earlier.</p>
<p>Some of the team <a href="https://www.politico.com/story/2017/12/06/trump-europe-russia-travel-281134">surreptitiously travel</a>led to Europe to make contact. The spring summer and fall of 2016 were full of multiple random meetings with multiple random Russians and Trump proxies. That intensity of randomness about one topic and within that short window would make the whole affair not random at all. This was in addition to the formal contacts the Trump team had with the Russian ambassador in the U.S.</p>
<p>Trump was no stranger to Russia or Russians in his business dealings. His checkered business past swung from grandiose to bankrupt to cash flush. His decision to shift from building and owning to licensing meant he had to be a brand. The idea of a TV show that featured him as wealthy and successful self-made man was perfect. In 2004 <em>The Apprentice</em> was born, produced by TV’s most successful reality show producer, former nanny and Venice T-shirt hawker Mark Burnett. It also meant the classic TV watching demographic began to meet the man from Queens as a tough, no nonsense purveyor of the poor man’s view of American Dream. Trump insists he made over 200 million dollars over the 14 seasons he was on the show and was able to successfully license his name on properties from hotels to golf courses. More importantly Trumphad managed to gild his tarnished brand with thin 12 carat TV reality star gold. .</p>
<p>Trump had plenty of Russian customers, friends and was working on a hotel in Moscow  (among other locations) before his run for office but he would constantly downplay his business and personal interests in Russia to the media during the campaign. Did Russia really figure into Trump&#8217;s thinking during the election?</p>
<p>The one area where Russia was important in the campaign was the general sense was that Trump wanted to move Russia away from Iran in their war against extremists in Syria and move our support towards Israel and the Gulf dictators in the UAE and Saudi Arabia. Trump was going to not only embrace Assad but work with Russia to push back Iran. The reverse of what Obama tried to do in overthrowing Assad using covert &#8220;moderate&#8221; rebels trained by the CIA. Trump&#8217;s idea of working with the Russians was dangerous, it had elements of Stalin working with Roosevelt in World War Two against a common enemy only to watch most of Eastern Europe vanish into the Soviet empire. President Obama, seeing decades of endless warfare had moved away from the anti Iran/pro Israel Neocon vision of a new Order in the Middle East.</p>
<p>The other incentive to include Russia was <a href="https://www.reuters.com/article/us-usa-trump-flynn-nuclear-exclusive/exclusive-mideast-nuclear-plan-backers-bragged-of-support-of-top-trump-aide-flynn-idUSKBN1DV5Z6">a multi-billion-dollar plan</a> from <a href="http://acustrategicpartners.com/">ACU Strategic Partners</a> to bring nuclear power to the Gulf States with Russian nuclear reactors. A project Flynn had helped push before joining the Trump machine. A plan that would haver required lifting sanctions from the Russian state owned nuclear energy company <a href="https://intpolicydigest.org/2018/07/19/rosatom-as-a-tactic-in-russia-s-foreign-policy/">Rosatom</a> and <a href="https://www.reuters.com/article/us-russia-vtb-sanctions/russias-vtb-bank-head-kostin-shrugs-off-u-s-sanctions-risk-idUSKBN1FB13N">VTB bank</a>.  Instead of waiting for after the election to not interfere with the current President’s policies, Trump’s people jumped right into the middle of foreign policy discussions on multiple and confusing fronts. Searching both for damaging information against opponent Clinton and discussions on their foreign policy plans to drop sanctions and partner with Russia.</p>
<p>George Papadopoulos was approached by Maltese professor Joseph Mifsud. Excited he contacted Sam Clovis about his March 24, 2016 meeting with “Putin’s niece” Sam Clovis’ lawyer is Victoria Toensing, Erik Prince’s lawyer. By August of 2016, Clovis was encouraging Papadopoulos to set up a meeting. <a href="https://www.washingtonpost.com/politics/whos-who-in-the-george-papadopoulos-court-documents/2017/10/30/e131158c-bdb3-11e7-97d9-bdab5a0ab381_story.html?utm_term=.583cce9f9337">Manafort disagreed</a>, insisting that a low level person should travel to Russia to meet and discuss dropping sanctions.</p>
<p>The clown circus continued. Russians appeared to pop up from every nook and cranny offering Clinton Dirt but delivering nothing. When samples were found, they were forgeries. There was even attempts to counter the idea that the Russians were hacking. In August of 2016, that Florida political operative <a href="https://www.wsj.com/articles/how-alleged-russian-hacker-teamed-up-with-florida-gop-operative-1495724787">Aarons Nevins</a><a href="http://www.sun-sentinel.com/news/politics/fl-reg-russia-hacker-guccifer-connection-20170525-story.html">also reached out to Guccifer</a>, as did Roger Stone. Stone first <a href="https://www.breitbart.com/2016-presidential-race/2016/08/05/dear-hillary-dnc-hack-solved-so-now-stop-blaming-russia/">tried to say that</a> Guccifer 2.0 was not a Russian hacker.</p>
<p>In the summer of 2016, <a href="https://www.newsweek.com/donald-trump-joseph-e-schmitz-foreign-policy-pentagon-dod-germany-wrong-doing-439239">Joseph Schmitz</a> was the former Inspector General for the DoD, turned <a href="http://www.americanfreedomlawcenter.org/about/advisory-board/joseph-e-schmitz/">Blackwater</a>meltdown-era lawyer had been accused of slow rolling investigations against George W. Bush officials, pitching <a href="https://www.wsj.com/articles/private-group-sought-to-arm-syrian-rebels-1400464766">wonky arms deals</a>to rebels in Syria. He <a href="https://www.cnn.com/2018/04/06/politics/joseph-schmitz-trump-adviser-clinton-emails/index.html">approached the FBI</a>and other government agencies to verify an offer to hand over the missing Clinton emails from the Dark Web. The offer came via an American contractor he code named “Patriot”. Schmitz took the material to at least two federal agencies and two congressional committees he realized he had been duped.</p>
<p>Carter Page went to Hungary towards the end of the summer and later told the House Intelligence Committee he “did a lot of sightseeing and went to a jazz club. Not much to report.” He did note that “there might have been a Russian in there” Page would later plead guilty to lying to the FBI. The FBI had been granted a FISA surveillance warrant in October of 2016.</p>
<p>Why would so many Trump campaign members be lying about meeting with Russians?</p>
<p>Donald Trump Jr, <a href="http://www.cnn.com/interactive/2017/07/politics/donald-trump-jr-full-emails/">got an email</a> from Rob Goldstone on June 3 2016 saying that “The Crown prosecutor of Russia met with his father Aras this morning and in their meeting offered to provide the Trump campaign with some official documents and information that would incriminate Hillary and her dealings with Russia and would be very useful to your father.”</p>
<p>Trump Jr. would later fly to Paris the day before election day to give a $50,000 speech at a think tank. He lunched with  At the Hotel Ritz Paris with Syrian Peace activist Randa Kassis a women who <a href="https://www.theguardian.com/us-news/2016/nov/23/donald-trump-jr-syria-russia-meeting-randa-kassis">supports Russian intervention</a> in the war, and her French husband, Fabien Baussart. A man with Russian ties who is said to have <a href="https://www.politico.com/story/2017/12/06/trump-europe-russia-travel-281134">nominated</a>Russian President Vladimir Putin for the Nobel Peace Prize. She <a href="https://www.theguardian.com/us-news/2016/nov/23/donald-trump-jr-syria-russia-meeting-randa-kassis">summarized</a> her October meeting on Facebook: “I succeeded to pass [to] Trump, through the talks with his son the idea of how we can cooperate together to reach the agreement between Russia and the United States on Syria”</p>
<p>In addition to the globetrotting there were a host of supporters and insiders who made suspicious trips. Suspicious only because the Trump team kept insisting these meetings weren’t happening. In November of 2017.  Russian Ambassador Sergey Kislyak would say that it would take him 20 minutes to list all the Trump people he met with or spoken to on the phone. His <a href="https://www.cnbc.com/2017/11/16/kislyak-wont-name-trump-officials-hes-met-because-list-is-so-long.html">recollection</a> did include lengthy meetings with Jeff Sessions and with Mike Flynn on sanctions.</p>
<p>What had turned into an attempt to shape or perhaps reverse Obama&#8217;s foreign policy in the Middle East found Trump being played by Russian intelligence. To the media, during the campaign, all of this is just churn, no smoking gun, just multiple examples of Trump’s campaign people acting out John Le Carre novels but getting nothing in return, only finding more and more tentacles reaching out from Moscow hoping to get sanctions lifted to free up Putin’s money.</p>
<p>As October 2016 and the election loomed it was clear there was no Clinton Dirt to be had, and Hillary had as she said wiped her servers clean, “like with a cloth”.  With Clinton climbing in the polls, Trump needed that October Surprise, even if there wasn’t any dirt on Clinton.</p>
<p>Perhaps some enterprising supporter could invent some?</p>
<p>+++</p>
<p><a href="https://www.newsweek.com/right-wing-web-168906">Peter W. Smith</a> (who died at 81 in May of 2017) bankrolled muckrakers going back giving $25,000 to <a href="https://www.newsweek.com/right-wing-web-168906">support</a> the State Troopers who ratted out Bill Clinton and hired then Breitbart reporter Chuck Johnson to find Hillary Clintons missing emails. According to Johnson, he had first met in 2013 when they worked on opposition research on President Obama. It’s not quite clear why a second term President would be of much interest. But Johnson worked with Andrew Auernheimer aka “the Weev”, a convicted hacker living in the Ukraine to help him out. Smith had put 50,000 of his own money and a donor had provided 100,000 in additional funds.</p>
<p>Just after July 22, 2016 When WikiLeaks began publishing the DNC emails, Smith <a href="https://www.lawfareblog.com/time-i-got-recruited-collude-russians">contacted</a> Matt Tait a senior cybersecurity fellow at the Robert S. Strauss Center for International Security and Law at the University of Texas at Austin. Tait was covering Clinton’s email woes and as an expert on hacking,</p>
<p>Smith assumed that <a href="https://www.lawfareblog.com/realnews-trump-et-laffaire-russe-resource-page#1.%20Russia%20Hacks%20and%20DC%20Leaks,%20WikiLeaks%20and%20Guccifer%202.0%20Data%20Dumps">Tait could help him with to the “Clinton Dirt”.</a> Smith conveyed the impression that he was a Trump campaign insider and told Tait that someone from the “Deep Web” had offered his team erased emails and could Tait verify that they were real? Tait had little interest in Smith and wrote up a blog pieceto memorialize the conversation.</p>
<p>On <a href="https://www.vox.com/policy-and-politics/2018/7/13/17569264/mueller-indictment-trump-russia-email-hack">July 27, Donald Trump</a> tweets, “I hope you’re able to find the 30,000 emails that are missing. I think you will probably be rewarded mightily by our press.”  The July 13, 2018  DoJ <a href="https://int.nyt.com/data/documenthelper/80-netyksho-et-al-indictment/ba0521c1eef869deecbe/optimized/full.pdf?action=click&amp;module=Intentional&amp;pgtype=Article">indictment</a>insist that on the same day, Russian hackers then tried to gain entry into Hillary Clinton’s personal servers. The 20,000 DNC emails released on July 22, 2016 by Wikipedia three days before the Democratic National Convention. Despite the <a href="https://twitter.com/wikileaks/status/756501723305414656?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E756501723305414656&amp;ref_url=https%3A%2F%2Fabcnews.go.com%2FUS%2Fpapadopoulos-documents-offer-insight-dnc-email-hacking-timeline%2Fstory%3Fi">cartoon</a>of an angry Clinton in front of a computer with bombs and money (remember she primarily used a Blackberry) this was still not the “Clinton Dirt” Trump was seeking.</p>
<p>Later on, Tait remembers is being sent an invitation to join Trump associated opposition effort dated September 7, 2016 and labeled, “A Demonstrative Pedagogical Summary to be Developed and Released Prior to November 8, 2016”. KLS Research. the company authoring the report was owned by Smith and registered in Delaware. For nitpickers, a pedagogical summary is not actual evidence but facilitates the presentation of evidence. The assumption was that Clinton had done something illegal but complicated and that crowdsourcing hackers and data would put together a convincing case before the election. The goal was to hire hackers to find anyone or someone who had Clinton Dirt on the dark web.</p>
<p>Again, there was no actual evidence the <a href="https://www.wsj.com/articles/gop-activist-who-sought-clinton-emails-cited-trump-campaign-officials-1498872923">purpose</a> of the document was to recruit hackers to find and analyze the Clinton Dirt. Tait remarked at the need of the dirty tricksters to create a corporation designed to avoid campaign reporting linked to his recollection that Flynn had asked for go between to receive Clinton emails from the Russians. Tait was also upset that his name had been included and he had no interest in participating. Tait was intrigued enough to start poking holes in the theory of Russians being the source of the DNC hack.</p>
<p>What did happen was an <a href="https://theforensicator.wordpress.com/guccifer-2s-west-coast-fingerprint/">ever expanding analysis</a> of the Guccifer 2.0 documents by the digirati that concluded that Guccifer 2.0 spoke very bad Romanian, had artificially put time codes in documents and tripped up when he made a change to a Word .doc on West Coast time under the name “Ernesto Che’. And that there was no clear evidence of Russian or Western authorship.  The slipup <a href="https://twitter.com/pwnallthethings/status/744101214774767617">Tait had spotted</a> was someone on the West Coast of the U.S. had added an invisible space in Word’s “Track Changes” features to “brand” the document. A peculiar idiosyncrasy that none other than Matt <a href="https://twitter.com/pwnallthethings/status/744101214774767617">Tait first noticed</a>.</p>
<p>On January 16 2017 the late Smith wrote an interesting blog before his <a href="https://web.archive.org/web/20170629213647/http:/peterwsmith.com/">death and laid you the whole hacking affair</a> blaming Obama’s spin doctors on bringing in Russia as the culprit.</p>
<ol>
<li><em>(Clinton&#8217;s email) <a href="https://web.archive.org/web/20170629213647/http:/arstechnica.com/information-technology/2016/09/fbi-clintons-first-e-mail-server-was-a-power-mac-tower/">operated on a virtually unprotected server</a>. Its contents were openly available to nation-states and to individuals. WikiLeaks said it was in possession of the 33,000 or so missing Clinton emails and has sat on them for nine months without releasing them.</em></li>
<li><em>Guccifer (Marcel Lehel Lazar), <a href="https://web.archive.org/web/20170629213647/http:/www.foxnews.com/politics/2016/05/04/romanian-hacker-guccifer-breached-clinton-server-it-was-easy.html">an individual self-trained in cybersecurity</a>, successfully hacked into 100 private email accounts of prominent U.S. and world government officials with ease. His unchallenged legal testimony indicated no Russian involvement.</em></li>
<li><em>John Podesta, chairman of the Clinton campaign, had his <a href="https://web.archive.org/web/20170629213647/http:/www.cnn.com/2016/10/28/politics/phishing-email-hack-john-podesta-hillary-clinton-wikileaks/">commercial email account hacked</a>when he fell for a bogus password-change request. His emails were released through WikiLeaks, with no evidence of Russian involvement.</em></li>
<li><em>While Guccifer 2.0 is an individual who claims to have modeled his work after the original Guccifer, his <a href="https://web.archive.org/web/20170629213647/http:/www.csoonline.com/article/3084594/security/dnc-hacker-slams-crowdstrike-publishes-opposition-memo-on-donald-trump.html">DNC server leaks</a>resulted in the resignation of the discredited head of the DNC. The material was readily available from the DNC site, which had protection deficiencies which were unattended to for 18 months. WikiLeaks said that the copies delivered to them came from a leak from a disgruntled DNC staffer, not a hack.</em></li>
<li><em><a href="https://web.archive.org/web/20170629213647/http:/www.thesmokinggun.com/documents/investigation/tracking-russian-hackers-638295">DCLeaks</a> appears to involve individuals in the Washington, D.C. area who are interested in disseminating political information. Included in these emails were those belonging to the author, which were on a weakly-protected state GOP server. It is difficult to see that such mundane content would be of interest to Russia.</em></li>
</ol>
<p><em>- Peter W. Smith</em></p>
<p>To make matters more obvious a bizarre PR campaign was mounted in Washington D.C. to show a fictional/documentary film to convince the media and lawmakers <a href="https://www.theatlantic.com/politics/archive/2017/07/bill-browders-testimony-to-the-senate-judiciary-committee/534864/">Bill Browder does the best job of laying this out</a> in his testimony to the Senate Judiciary Committee :</p>
<p><em>&#8220;Rinat Akhmetshin, a former Soviet intelligence officer naturalised as an American citizen, was hired to lead the Magnitsky repeal effort. Mr. Akhmetshin has been involved in a number of similar campaigns where he’s been accused of various unethical and potentially illegal actions like computer hacking.</em></p>
<p><em>Veselnitskaya also instructed U.S. law firm Baker Hostetler and their Washington, D.C.-based partner Marc Cymrot to lobby members of Congress to support an amendment taking Sergei Magnitsky’s name off the Global Magnitsky Act. Mr. Cymrot was in contact with Paul Behrends, a congressional staffer on the House Foreign Affairs Committee at the time, as part of the anti-Magnitsky lobbying campaign.</em></p>
<p><em>Veselnitskaya, through Baker Hostetler, hired Glenn Simpson of the firm Fusion GPS to conduct a smear campaign against me and Sergei Magnitsky in advance of congressional hearings on the Global Magnitsky Act. He contacted a number of major newspapers and other publications to spread false information that Sergei Magnitsky was not murdered, was not a whistle-blower, and was instead a criminal. They also spread false information that my presentations to lawmakers around the world were untrue.</em></p>
<p><em>As part of Veselnitskaya’s lobbying, a former Wall Street Journal reporter, Chris Cooper of the Potomac Group, was hired to organize the Washington, D.C.-based premiere of a fake documentary about Sergei Magnitsky and myself. This was one the best examples of Putin’s propaganda.</em></p>
<p><em>They hired Howard Schweitzer of Cozzen O’Connor Public Strategies and former Congressman Ronald Dellums to lobby members of Congress on Capitol Hill to repeal the Magnitsky Act and to remove Sergei’s name from the Global Magnitsky bill.</em></p>
<p><em>On June 13, 2016, they funded a major event at the Newseum to show their fake documentary, inviting representatives of Congress and the State Department to attend.</em></p>
<p><em>While they were conducting these operations in Washington, D.C., at no time did they indicate that they were acting on behalf of Russian government interests, nor did they file disclosures under the Foreign Agent Registration Act.&#8221;</em></p>
<p>Browder makes the case that the sanctions imposed by the Obama administration were deeply hiring Putin and his inner circle but why the oblique approach? And why didn&#8217;t they just do something on the Clinton Dirt they had been so eagerly offering&#8230;but never producing?</p>
<p><a href="https://www.rferl.org/a/rinat-akmetshin-russia-gun-for-hire-washington-lobbying-magnitsky-browder/27863265.html">Rinat Akmetshin,</a> and this <a href="https://abcnews.go.com/Politics/russia-bistro-bis-calif-congressman-dined-accused-russian/story?id=56839486">unusual cast of characters</a> including Paul Behrends, Erik Prince, Natalia Veselnitskaya  would appear at <a href="http://www.latimes.com/nation/politics/trailguide/la-na-trailguide-updates-rep-dana-rohrabacher-throws-liberty-1484956921-htmlstory.html">Dana Rohrabacher&#8217;s L</a>iberty Ball at the Library of Congress. The 680 photos of the participants have been since taken down but snagged by a number of people on <a href="https://twitter.com/MsMariaT/status/954857659106131968">social media</a></p>
<p>&nbsp;</p>
<div id="attachment_2526" style="width: 1210px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/07/DUBV9-kVwAAiy8q.jpg"><img class="size-full wp-image-2526" src="http://dangerousmagazine.com/wp-content/uploads/2018/07/DUBV9-kVwAAiy8q.jpg" alt="Rinat Akhmetshin &amp;  and Natalya Veselnitskaya at Dana Rohrabacher's Liberty Ball at the Library of Congress, Friday, January 20th, 2017" width="1200" height="675" /></a><p class="wp-caption-text">Rinat Akhmetshin &amp; and Natalya Veselnitskaya at Dana Rohrabacher&#8217;s Liberty Ball at the Library of Congress, Friday, January 20th, 2017</p></div>
<p>Next Part Three</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/10/11/hack-part-seven/">The Hack Part Seven</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2018/10/11/hack-part-seven/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Hack Part Six: The War On You</title>
		<link>http://dangerousmagazine.com/2018/08/02/hack-part-three/</link>
		<comments>http://dangerousmagazine.com/2018/08/02/hack-part-three/#comments</comments>
		<pubDate>Thu, 02 Aug 2018 17:47:33 +0000</pubDate>
		<dc:creator><![CDATA[Lisa]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2363</guid>
		<description><![CDATA[<p>The Hack By Robert Young Pelton continued from Part Five  When the truth is found To be lies And all the joy Within you dies - Jefferson Airplane The political discussion up to the 2016 election was populated by earnest debate, partisan passion and well thought out decisions but also poisoned by false information, fear mongering, insults, deceivers, deceit and distrust. What should have been an informed electorate making clear decisions on candidates was infected with every manner of deception. Partly due to...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/08/02/hack-part-three/">The Hack Part Six: The War On You</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="text-align: center"><strong>The Hack By Robert Young Pelton</strong></p>
<p style="text-align: center">continued from Part Five</p>
<p style="text-align: center"> When the truth is found<br />
To be lies<br />
And all the joy<br />
Within you dies</p>
<p style="text-align: center">- Jefferson Airplane</p>
<p><img class="aligncenter size-full wp-image-2440" src="http://dangerousmagazine.com/wp-content/uploads/2018/08/Gerasimovs-linjal.jpg" alt="Gerasimovs-linjal" width="687" height="703" /></p>
<p>The political discussion up to the 2016 election was populated by earnest debate, partisan passion and well thought out decisions but also poisoned by false information, fear mongering, insults, deceivers, deceit and distrust. What should have been an informed electorate making clear decisions on candidates was infected with every manner of deception. Partly due to Trump&#8217;s embracing of chaos and division as an election strategy against Clinton&#8217;s, cool distant, carefully coached and manufactured approach.</p>
<p>Social media and the media took the bait and there were so many hot buttons and arguments that in retrospect it is difficult to understand how America was fooled so easy. To date there has been granular evidence of Russians hacking into the DNC, but that is only a silver of what attempts were made by various parties. What we have learned is that deceit was built into almost every facet of the election. Something that has nothing to do with technology but rather the fallibility of the human brain. Who played who, who lied, who cheated, did American get conned? As we have painfully learned, the answer appears that it was easier to deceive that to use the truth.</p>
<p>Where was the Clinton Dirt? Why were so many Russians offering dirt but coming up empty handed. What did they want? Why did they have nothing? The seeds of the Mueller investigation were planted when a young,  eager George Papadopoulos was propositioned by a <a href="https://www.bbc.com/news/world-us-canada-43488581">Joseph Mifsud</a>, a Maltese professor who promised dirt. When t<a href="https://www.nytimes.com/2017/12/30/us/politics/how-fbi-russia-investigation-began-george-papadopoulos.html">hey met on April 26, there was nothing, just more promises of further meetings to keep him interested</a>. It was May 10, 2016 when Papadopoulos b<a href="//www.nytimes.com/2017/12/30/us/politics/how-fbi-russia-investigation-began-george-papadopoulos.html">ragged about the Russians having Clinton Dirt to an Australian diplomat at </a>a posh bar in London.</p>
<p>The FBI counterintelligence unit opened an investigation after someone tipped off the FBI about an American named Papadopoulos running his mouth to Australian high commissioner Alexander Downer at the <a href="https://www.businessinsider.com/kensington-wine-rooms-george-papadopoulos-russia-probe-alexander-downer-2018-1#kensington-wine-rooms-is-located-just-south-of-the-trendy-notting-hill-neighborhood-in-london-the-building-used-to-be-a-pub-1">Kensington Wine Bars</a> in Notting Hill, London on May 2016.   The Russians had dirt on Clinton, hacked emails, and they were going to use it to influence the election, was the version told to the FBI.  This clearly was linked to Clinton&#8217;s sloppy and perhaps criminal, handling of her emails but it didn&#8217;t seem that way to the FBI, they were going to open an investigation into Trump, not Clinton.</p>
<p>This begins the key event that will flip an investigation of Hillary Clinton for sloppy or perhaps deceitful email handling into one of Donald Trump colluding with the Russian government to steal the election away from Clinton.</p>
<p>The FBI opened the &#8220;Crossfire Hurricane&#8221; investigation on July 31, 2016 just a few days after Director James Comey very publicly <a href="https://www.fbi.gov/news/pressrel/press-releases/statement-by-fbi-director-james-b-comey-on-the-investigation-of-secretary-hillary-clinton2019s-use-of-a-personal-e-mail-system">closed the investigation of Hillary Clinton</a> for using a private email account on July 5.</p>
<p>The Papadopoulos meeting with Downer was not a simple affair. Depending on who you believe, Papadopoulos reached out to a friend named <a href="https://il.linkedin.com/in/christian-cantor-05928318">Christian Cantor</a> at the Israeli Embassy official in London. Cantor introduced Papadopoulos to Downer&#8217;s lawyer, Erika Thompson. Thompson then set up the meeting at the wine bar.</p>
<p>Downer said he said up the meeting and that <em>after</em> getting a &#8220;tip&#8221; that the Russians were going to use Clinton Dirt during the election, <a href="https://www.news.com.au/world/north-america/alexander-downer-facing-fresh-questions-over-meeting-with-george-papadopoulos/news-story/b5b80aae1f353ccf421607ff44e2f2f0">Downer said he went to the U.S. Embassy in London</a> to report it.  T<a href="https://www.wsj.com/articles/the-curious-case-of-mr-downer-1527809075">he FBI said the tip came</a> from two FBI agents flown to London on August 2, 2016 to interview Downer, &#8220;within hours of opening an investigation into the Trump campaign’s ties to Russia&#8221; according to the<a href="https://www.nytimes.com/2018/05/16/us/politics/crossfire-hurricane-trump-russia-fbi-mueller-investigation.html"> <em>New York Times</em></a>.</p>
<p>A third version is very different, six days before the boozy wine bar meeting, Papadopoulos was <a href="https://www.thetimes.co.uk/article/say-sorry-to-trump-or-risk-special-relationship-cameron-told-h6ng0r7xj">interviewed</a> by the<em> Times</em>. Papadopoulos said that David Cameron should apologize for his negative comments about candidate Trump. It was Thompson, the lawyer who worked in the Australian embassy that reached out to Papadopoulos two days after the Times interview ran.  According to this version, Downer met with the Trump foreign policy aide and told him to leave Cameron alone. All of these could be the same story told <a href="https://www.youtube.com/watch?v=xCZ9TguVOIA"><em>Roshomon</em></a> style with each person having a different recollection of events.</p>
<p><a href="https://static01.nyt.com/packages/pdf/politics/2017/statement_of_the_offense.filed_.pdf">The FBI would question</a> Papadopoulos and he would omit the multiple meetings with Mifsud beginning on March 14, to set up Russian meetings, but it was not until April 26, a hotel in London that Mifsud would tell Papadopoulos that he had Clinton Dirt. As the FBI recounts Papadopoulos quoting Mifsud saying. &#8220;They [the Russians] have dirt on her&#8221;; &#8220;the Russians had emails of Clinton&#8221;; &#8220;they have thousands of emails.&#8221;</p>
<div class="page" title="Page 9">
<div class="layoutArea">
<div class="column">
<p>On January 27, 2017, the FBI questioned Papadopoulos in a voluntary meeting, but Papadopoulos would lie about his activities and timing. He would also delete his Facebook Account and change his cel phone.<a href="https://static01.nyt.com/packages/pdf/politics/2017/statement_of_the_offense.filed_.pdf"> He was arrested in July of 2017. </a> The FBI didn&#8217;t arrest Papadopoulos for colluding with Russians&#8230;.they arrested him for lying to them. This was the first brick in the foundation of collusion.</p>
<p><strong>Paul Singer</strong></p>
<p>In 2015, long before he was golden haired choice of the GOP, a Republican donor, Marco Rubio supporter and hedge fund billionaire <a href="https://www.institutionalinvestor.com/article/b15d9s2xbmkr99/paul-singers-fight-for-the-soul-of-the-gop">Paul Singer</a> through his right wing blog <em>Washington Free Beacon</em>, hired D.C. based oppo-research company FusionGPS to dig into Donald Trump&#8217;s background. He didn&#8217;t like what he saw but when Trump became the Republican candidate Singer got with the program. A month later, in April of 2016, Clinton campaign and DNC lawyer Marc E. Elias hired FusionGPS to keep digging. By June, Christopher Steele began looking for connections to Russia and Nellie Ohr, a <a href="https://www.h-net.org/people/person_view.php?id=125406">Harvard educated, Russian-speaking academic </a>is hired to manage the project.</p>
<p>In an odd but important detail, it turns out that much of the information in the Steele Dossier comes from an American source. This is from a conversation with Ohr&#8217;s husband, Bruce who worked for the FBI and took hand written notes in a December 10, 2016, meeting reveal that “Much of the collection about the Trump campaign ties to Russia comes from a former Russian intelligence officer (? not entirely clear) who lives in the U.S.,”</p>
</div>
</div>
</div>
<p>Ohr, was a high ranking member of the Organized Crime Drug Enforcement Task Forces but kept in touch with Steele long after the FBI had dropped him as a source. Ohr knew gangsters and Trump as a former casino owner, bankrupt and New York construction magnate ticked all the boxes.</p>
<p><a href="https://www.documentcloud.org/documents/3259984-Trump-Intelligence-Allegations.html">The 35 page Steele Dossier </a>is not written in any particular intel style, nor does it have any legal provenance or show the hallmarks of academic research like cites, footnotes or sources It is mostly unsupported anecdotes or second hand conversations all designed to build suspicion that Trump and his then campaign manager Manafort were being controlled by Vladimir Putin. The tools were supposedly a compromising &#8220;golden shower&#8221; video and perhaps documents, or financial leverage. It has all the hallmarks of a &#8220;Black Letter&#8221; an unsubstantiated collection of accusations that would send the media on a thousand journeys to find &#8220;Trump Dirt&#8217;.</p>
<p>Christopher Steele had leaked information to the media and was fired on November 1, 2016 but continued to provide information and chat with Associate Deputy Attorney General Bruce Ohr, who had reported to Deputy Attorney General <span class="rollover-people"><a class="rollover-people-link" href="http://thehill.com/people/sally-yates">Sally Yates</a>.  </span></p>
<p><a href="http://thehill.com/hilltv/rising/400810-opinion-how-a-senior-justice-official-helped-dems-on-trump-russia-case">On July 1, 2016 Steele emailed Oh</a>r, “There is something separate I wanted to discuss with you informally and separately. It concerns our favourite business tycoon!” On July 5, Steele would meet with the FBI in Rome to discuss possible Russian attempts to influence the American election.  That could be Trump but it could also<a href="https://www.forbes.com/profile/oleg-deripaska/#7761e656804c"> Oleg Deripaska</a>, a Russian oligarch who had been refused a visa and worked very closely with Paul Manafort, Trump&#8217;s campaign manager, a campaign manager who owed ten million dollars to Deripaska. according to litigation.</p>
<p>Deripaska&#8217;s lawyers filed suit in the Cayman Islands in 2014 saying that he invested  $19 million with Manafort that year to create a TV station called Black Sea Cable.</p>
<p>Conversely, for the last decade, Manafort figured prominently i<a href="https://taskandpurpose.com/manafort-connected-ukraine-attack-marines-trump/">n defeating U.S. interests</a> in Crimea, supporting a <a class="css-1g7m0tk" title="" href="http://www.nytimes.com/topic/person/viktor-f-yanukovych">Viktor F. Yanukovych</a> a Ukrainian gangster turned politician and furthering Putin&#8217;s <a href="https://themoscowproject.org/collusion/paul-manafort-pitches-oleg-deripaska-plan-greatly-benefit-putin-government/">regional interests</a>.</p>
<p>President Trump <a href="https://www.politico.com/magazine/story/2017/12/04/paul-manafort-and-me-216004">would later ask Manafort to resign</a> after AP revealed that Manafort was lobbying for the pro-Russian Ukrainian government.</p>
<p>Ohr, his wife Nellie and Steele would meet on July 30, 2016, at the Mayflower Hotel, in Washington D.C. Steele sent a thankyou note after the meeting, “Great to see you and Nellie this morning Bruce, let’s keep in touch on the substantive issues/s. Glenn is happy to speak to you on this if it would help.”</p>
<p>On July 31, the FBI would open &#8220;Crossfire Hurricane&#8221;</p>
<p><strong>Guccifer 2.0</strong></p>
<p>The Russians had begun to spearfish DNC officials on March 10 of 2016. On Wednesday, June 15,  Guccifer 2.0 appeared with an email to the <em>Smoking Gun</em> with DNC emails. &#8220;Hi,this is Guccifer 2.0 and this is me who hacked Democratic National Committee.&#8221;</p>
<p>The DNC knew they had been hacked. But none of this material contained Clinton&#8217;s missing emails, any dirt nor did it include the Steele file. But the DNC now knew that they had been hacked. Again a fine but important distinction. Mifsud was offering Papadopoulos the missing 30,000 emails supposedly hacked by the Russians not the DNC hack. Papadopoulos first met Mifsud in Italy on March 14,telling him he was going to be on Trump&#8217;s team, They met again</p>
<p>The agent who opened the investigation into Russian collusion to influence the election was Peter Strozk. Someone who vehemently to Congress that his hatred of Trump evidenced in texts to his mistress, another FBI employee would influence his decision to influence the election.</p>
<p>The FBI was under pressure the second Trump took office, he felt that the law enforcement agency was not only partisan but working against him. The Steele Dossier was  probably the most embarrassing document and Steele had not only been working with FusionGPS but also for the FBI as an informant. Trump began to blame &#8220;Deep State&#8221; and insist he was being bugged, spied on and set up. The left wing media constantly referenced the Steele Dossier and the right wing pushed &#8220;Clinton Dirt&#8221; neither of these were absolute or even close to being factual. The election had been hacked by the U.S. media&#8217;s obsession with &#8220;Dirt&#8221; from each side.</p>
<p><strong>Back to the Hack</strong></p>
<p>“You have about 18 seconds to catch the hack”, one of the SybrTek tech experts explains, “then you might have another hacker slide in behind him and exploit that hack, or sometimes you can jump ahead of the hack. You can make it look like someone else did the hacking” Ray explains as he tries to shape the rapid, chaotic world of hacking. He and others make it clear that hacking has no religion, it’s often done just to see if the hacker can get in. Most have no idea what they will find once they are inside a server or computer. Hackers work both as security experts and as “red team” hackers. An associate of mine made a living by hacking into nuclear subs and sensitive bases for the NSA. It was easy considering how old, large and slow government acquisition for IT products is. You hire a thief to catch a thief.</p>
<p>In a stunning example, the U.S. government banned the anti hacking software program provided by the Moscow-based, Kaspersky Security Network because it posed a threat to the U.S. government computers&#8230;only to discover that the Kaspersky coding <a href="https://www.thedailybeast.com/exclusive-us-government-cant-get-controversial-kaspersky-lab-software-off-its-networks">was built deep into thousands</a> of U.S. government programs and had the ability to access any computer that had their software installed, examine and in some cases transfer files to any where they want. <a href="http://ksn.kaspersky.com">Kaspersky estimates</a> that there are 315,000 new malicious programs created every day and there is no evidence of any malicious acts by the Russian national. It was a head smacking moment on just how vulnerable government computers are. And still are.</p>
<p>Even the CIA is often confused about how to identify hackers with even legendary Carl Bernstein taking <a href="https://www.thenation.com/article/why-are-the-media-taking-the-cias-hacking-claims-at-face-value/">the media to task</a> for being pawns of the CIA and then supporting the CIA findings in the latest CNN story by promoting the “golden shower” dossier. To make things more obscure James Clapper head of the <a href="http://www.reuters.com/article/us-usa-trump-intelligence-idUSKBN14204E?il=0">Office of the Director of National Intelligence</a> which manages the 17 U.S. intelligence agencies did not initially endorse or deny the CIA allegations against Russia because “they can’t prove intent”.  Eventually only four of them weighed in on a Russian hack.</p>
<p>The threat is not just to computers, During her time as Secretary of State, Hillary Clinton continued to use unsecured Blackberry&#8217;s during her visits to foreign countries, all coordinated well in advance. As a Blackberry user. There are devices like a false Wi FI base station or femtocel that can fit in a pocket using t<a href="https://www.wired.com/2014/07/hackers-can-control-your-phone-using-a-tool-thats-already-built-into-it/">he same tools the phone companies</a> use to refigure Blackberry firmware.</p>
<p>Malware and hacking software is <a href="http://www.csoonline.com/article/2970932/security/ten-scary-hacks-i-saw-at-black-hat-and-def-con.html">freely available</a>. Anything that can be run by software can by hacked by software including the software that U.S. government agencies use to prevent hacking.   A group calling themselves Shadow Broker is <a href="https://bit.no.com:43110/theshadowbrokers.bit/post/messagefinale/">offering a collection of NSA hacking tools</a> for the equivalent of $1.8 million in bitcoin. The CIA found themselves &#8220;hacked&#8221; by an insider who dumped their tools on WikiLeaks. Cozy Bear and Fancy Bear with their password reset scams, almost seems like an archaic way to hack these days.</p>
<p>“There was a guy at Black Hat outside of the hall selling CD’s with that Cozy Bear and that other Russian malware out of a duffel bag for $50 a copy last year” remembers Ray from SybrTek.</p>
<p>Hacking is both a business and a social force.  Whether it is the social media that fueled Arab Spring of locking down computers for bit coin ransom. There an now plenty of &#8220;data analytics&#8221; companies like the defunct Cambridge Analytica who transferred their skills used from military election and psyops projects in Iraq, Somalia, Nigeria and other regions to the U.S. elections.</p>
<p>A member of SybrTek who has been inside the transition team and has a background in military influence operations explains the tool used to help Donald Trump get elected, “Trump’s son in law hired Cambridge Associates to help in the campaign, Jim explains, &#8220;They were battling an unseen robotic enemy that would automatically retweet negative responses to a Trump tweet.</p>
<p>“It’s called Message Flooding. Social media platforms that run machine software bot-generated traffic. It makes you appear like you have a million followers and can be generated automatically. You push preloaded message. One tweet can be retweeted 5000 times 6 times an hour. The secret is to not do it too much so you don’t get caught by other bots that look for spamming.”</p>
<p>“There is also a group of cyber mercenaries and hactivists that screwed around both the Trump and the Clinton campaign that would trigger automated responses. Around 38% of Trump’s retweets and responses were machine spoofed. There is a $40,000 piece of software you can buy in Russia that does this well. This system is designed to fool the analytics crowd.&#8221; Analytics is how you measure the effectiveness, audience and other factors of an online campaign.</p>
<p>Jim estimates that 80% of the fake retweets from the machine responses were negative to fool the analytics. “Trump averaged about 14,000 retweets. There’s a lot of people that don’t like him so this software simply used an algorithm to find those negative sentiments and retweet them.” Twitter h<a href="https://www.bbc.com/news/technology-44682354">as only recently wiped out</a> 70 million bot accounts.  Pew Research <a href="http://www.pewinternet.org/2018/04/09/bots-in-the-twittersphere/">estimated that two thirds of all accounts </a>linked to major organizations or companies are fake. They estimate that between 41 and 44% of accounts linked to political sites are bots. Not as damning as the 90% rate for adult content sites but just under half the political discussion on Twitter was artificial.</p>
<p>It took two years for <a href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-fake-accounts-removed-deleted-spam-abusive-content-latest-a8353021.html">Facebook to shut down 538 million fake site</a>s, a quarter of their  base of 2 billion user.  Not all these sites are political but the concept of contentious, outrageous, inflammatory and polarized content feeds the advertising machine.</p>
<p>Did Trump win because of these bot armies? Did Hillary lose because of these automated public opinion shapers? Were they from Russia? “No Clinton had the same problem.” Says Bill,  “There is a definite science on how to influence people’s thinking. It’s called influence operations in the military.” Realizing that this may sound too Orwellian, he walks it back “The great thing about this is that anything that can be designed can be reverse engineered. We can screen that traffic and block it. In reality these tools come from the marketing world not the military”.</p>
<p>President Obama was the first to really use social media. DC-based Bluelabs was founded by data scientists Elan Kriegel and Chris Wegrzyn worked for Obama measuring shaping and timing messages to match big data research.  They are now a successful analytics and technology company that promise to get politicians elected. Trump also used social media to great success. It is the future of targeted advertising.</p>
<p>The SybrTek points out that, in their opinion, Clinton’s tactics were flawed and archaic. Bill points out, &#8220;Clinton used one <a href="https://www.washingtonpost.com/news/post-politics/wp/2016/11/09/clintons-data-driven-campaign-relied-heavily-on-an-algorithm-named-ada-what-didnt-she-see/?utm_term=.323cbeb211fb">algorithm from the mid to late 80’s named Ada</a> to focus visits and ads. Although Ada could absorb and analyze 400,000 simulations a day the data entered from traditional phone polls were flawed.&#8221; Ironically Ada was named after the daughter of Lord Byron,  <a href="https://www.biography.com/people/ada-lovelace-20825323">Ada Lovelace</a>, an early 19<sup>th </sup>century female mathematician and a close associate of Charles  Babbage inventor of the first computer or &#8220;counting machine&#8221;. “She (Clintons campaign) relied on traditional polling and advertising but the majority of people are moving to smart phones as their primary news media” he says, “Obama used social media in the 2012 elections back when Twitter first started using <a href="http://www.bluelabs.com/">Bluelabs</a> were the pioneer in social media and big data science.  Trump was also able to do sentiment analysis using geo data to find clusters. People think differently in New York than Texas&#8221;</p>
<p>+ + +</p>
<div id="attachment_2446" style="width: 810px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/08/O-O-D-A-Loop.gif"><img class="size-full wp-image-2446" src="http://dangerousmagazine.com/wp-content/uploads/2018/08/O-O-D-A-Loop.gif" alt="Designed to teach fighter pilots, the OODA Loop is now a tactic used in politics and business. " width="800" height="321" /></a><p class="wp-caption-text">Designed to teach fighter pilots, the OODA Loop is now a tactic used in politics and business.</p></div>
<p>This new internet blitzkrieg on voters and to a certain degree Trump&#8217;s style of governing, is understandable in a pre-social media concept known as the <a href="http://www.valuebasedmanagement.net/methods_boyd_ooda_loop.html">OODA loop</a> created in 1997 by the late United States Air Force Colonel <a href="http://www.dnipogo.org/boyd/boyd_bio.pdf">John Boyd</a> to describe a decision cycle of “observe, orient decide and act”. “40 Second” Boyd (so named because he bragged no one could ever evade him for 40 seconds in aerial maneuvers) used his successful aerial dog fighting theory to handle complex ever changing scenarios that occur in larger aspects of warfare. Boyd laid out the idea that the goal is to react faster than your enemy forcing him to react and then speeding up your reaction time until the enemy fails. The need to insert ambiguity and unpredictability also prevents the enemy from reshaping his tactics or strategy in any meaningful fashion. This combination of constantly shifting, reacting and repetition is designed to put the opponent on the defensive and rapidly degrading their capabilities to respond or predict.   His theory is still very popular in both military and business strategy planning.</p>
<p>Although a wide range of academics have tried to create a precise taxonomy of influence strategies they range from <a href="http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_13.pdf">military targeting of communications networks</a> and <a href="http://http://www.iwar.org.uk/iwar/resources/usaf/iw/corner.html">entire nations</a> to <a href="https://www.playmakersystems.com/playmaker-system/the-taxonomy/">playful</a> game like scenarios. and you an entire toolbox of deception to steer the population.</p>
<p>The Russians with their small size and large army, along with aggressive isolated posture but expansionist acts.  The Russians have eagerly embraced information warfare. In 2013, the Valery Gerasimov, Russian Chief of the General Staff of the Armed Forces and Deputy Defense Minister was said to lay out what he called the “Gerasimov Doctrine” in an speech, later referenced by NYU resident Russia expert, <a href="https://bigthink.com/think-tank/russia-expert-and-nyu-global-affairs-professor-mark-galeotti-answers-your-questions-about-the-future-of-russia">Professor Mark Galeot</a>ti in his blog.</p>
<p>Gerasimov is supposed to have outlined non military means of achieving political and strategic goals with the “combination of political, economic, information, technological, and ecological campaigns.” One of his <a href="https://inmoscowsshadows.wordpress.com/2014/07/06/the-gerasimov-doctrine-and-russian-non-linear-war/#more-2291">examples</a> was the Arab Spring and the use of social media to plunge nations into chaos. A form of Guerrilla Geopolitics that can preserver trade and social links but create devastating social impact without linking to the cause. The confusing and opaque Russian forays into the Crimea and Ukraine are examples of this. An older version was Russian creating a false insurgency or coup and then that invented political Russian proxy inviting Russian troops in to rescue them. There is one minor wrinkle to this story, the professor who <a href="https://inmoscowsshadows.wordpress.com/2014/07/06/the-gerasimov-doctrine-and-russian-non-linear-war/#more-2291">wrote the story about the doctrine in 2014</a>, Mark Galeotti later apologized for inventing The Gerasimov Theory in a <a href="https://foreignpolicy.com/2018/03/05/im-sorry-for-creating-the-gerasimov-doctrine/">March 2018, Foreign Policy article</a>. It turns out the Russian General was interpreting what he though caused the Arab Spring but the media and pundits picked up Galeotti&#8217;s term as precisely what the Russians were doing in Ukraine and Crimea. A brilliant example of psychological operations in which fiction becomes fact and then fiction again.</p>
<div id="attachment_2441" style="width: 656px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/08/corner_chart1.gif"><img class="size-full wp-image-2441" src="http://dangerousmagazine.com/wp-content/uploads/2018/08/corner_chart1.gif" alt="A brutally simple chart of information warfare options, ranging from physical destruction to psyops. " width="646" height="311" /></a><p class="wp-caption-text">A brutally simple chart of information warfare options, ranging from physical destruction to psyops.</p></div>
<p>Is Trump a genius of social media? Does he practice psychological operations on Americans?  Is he harnessing complex OODA loop thinking that constantly wrong foots his opponents yet emboldens his supporters? Could his tweets be precisely written by algorithms and then sent by bots to hit the right eyeballs at the right time? No, but buried in the mumbo jumbo science of information operations are the natural instincts of sociopathy. Doing things to manipulate people instead of plainly explaining goals and tasks to garner support.</p>
<p>Sociopathy, is defined as &#8220;a personality disorder characterized by persistent antisocial behavior, impaired empathy and remorse, and bold, disinhibited, and egotistical traits&#8221;</p>
<p>On the road, Trump would see 6000 people standing outside a stadium for hours and he felt that he got the pulse of what people were thinking and that is why he crushes.” John, a Psyops specialist from SybrTek, when what the logic Trump is using when he turns to Twitter to send out negative comments, the answer is quite analog. “People were so tired of ten minute long Obama answers that mean nothing” Even when he (Trump) does a big whopper, they laugh and move on”</p>
<p>Is Trump a genius of the dark arts or a sociopath?</p>
<p>John laughs, “Trump doesn’t give a shit.  The man is a billionaire for a reason.  I am not saying he is a genius, in some areas he is shallow, but he understands human nature. But (if he has a problem) he can find the right people at the right price.”</p>
<p>And that may be the ultimate psyop. The ability to confuse and baffle your enemies as to your intentions and activities. A leader of a country who will choose any tactic that suits him and from any source that is willing to provide that expertise.</p>
<p>Was that Russia?</p>
<p>+ + +</p>
<p>The traditional media is losing credibility as the public doesn’t know who to believe anymore. A recent Edelman poll showed that the trust of the U.S. government had dropped lower than at any time in their 18 –year-long <a href="https://www.edelman.com/trust-barometer">Trust Barometer</a> report and that the media was the least trusted institution. Now seven in ten American’s worry about fake news and almost 60% polled say it’s harder to tell if the media is telling the truth.</p>
<p>John the man who messes with minds fromSybertek, insists the media is played and wants to be played.</p>
<p>&#8220;At first people didn’t take the casino owner turned reality show star seriously. There was a lot of public opposition. When Trump appeared at rallies, people would violently protest. Many were genuine, but some weren’t. The public didn’t’ see the ads that appeared on Craigslist offering $15 an hour to protest Trump. It was a tactic seen in the riots in Ferguson. John insists, “All you need is few people to show up for the media and an iPhone to post it on social media. Counter hacking put wrong information in the ads, phone numbers were programmed to be multi-dialed and the protest organizers were flooded with fake emails.”</p>
<p>The end result is a loss of faith in both media and politicians. And more dangerously a lack of interest in what the government is actually doing or what is real.  Sentiment tracking is part of government control and it doesn’t really matter if what you like is real or imagined. But it is how governments and politicians work.</p>
<p>So with the loss of trust in traditional media, populations turn to social media for their news. They are essentially the news sources and form their own networks. These users can like or dislike, support or argue, comment and amplify anger and outrage . This is called <a href="https://www.engineering.com/DesignerEdge/DesignerEdgeArticles/ArticleID/14145/Sentiment-Analysis-Offers-a-Better-Way-to-Conduct-Polls.aspx">sentiment tracking</a> another word for opinion polling. The life blood of politics.</p>
<p>Ray explains, “Sentiment is based on a particular event. There are algorithms that can be used (to measure sentiment). Knowing the cultural differences across a large area or small area you can tell what people are thinking. You can actually see people on mobile devices, you can see the density in a specific area by using word choices. We (SybrTek) have algorithms that can predict the rise of that sentiment.”</p>
<div id="attachment_2445" style="width: 650px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/08/Sentiment_Analysis_izxze5.jpg"><img class="size-full wp-image-2445" src="http://dangerousmagazine.com/wp-content/uploads/2018/08/Sentiment_Analysis_izxze5.jpg" alt="Sentiment Tracking during the 2016 election." width="640" height="371" /></a><p class="wp-caption-text">Sentiment Tracking during the 2016 election.</p></div>
<p>Sentiment trackers use the innovation curve used in marketing to find early adopters. The curve starts off slow and then picks up speed until it reaches peak adoption and then drops. The key is to find that sharp rise and exploit it hard. Sentiment is more accurate, faster, cheaper,  broader based and perhaps sneakier than traditional polling. Traditional polling is someone asking a question of a sample and tabulating the answers. Politicians like consumer brands, use this science to develop campaign platforms, slogans, and even pick words in their speeches.  That sentiment can be skewed by robots, retweets and false actors, as laid previously. There are ways to determine and eliminate robots. The bottom line is that Trump&#8217;s people were tracking <a href="https://techcrunch.com/2016/11/10/social-media-did-a-better-job-at-predicting-trumps-win-than-the-polls/">positive growth and sentiment using social media tool</a>s while Clinton&#8217;s polls and many media polls were missing key or disenfranchised voters in what they thought were Blue States.</p>
<div id="attachment_2447" style="width: 650px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/08/Hilary-Clinton-surges-ahead-in-Presidential-Campaign-with-Saunders-endorsement.jpg"><img class="size-full wp-image-2447" src="http://dangerousmagazine.com/wp-content/uploads/2018/08/Hilary-Clinton-surges-ahead-in-Presidential-Campaign-with-Saunders-endorsement.jpg" alt="Polls as of July" width="640" height="551" /></a><p class="wp-caption-text">Polls as of July</p></div>
<p>&nbsp;</p>
<p>The ultimate irony in all this is that Trump managed to lose the popular vote but win the presidency despite having no political experience and having probably one of the most corrosive and combative campaigns in modern history.  Some confirm that Trump enjoyed the free publicity. Around $2 billion of free media coverage according to some estimates</p>
<p>“I don’t’ think Trump wanted to win, or rather maybe he didn’t care if he won” says James who has been part of the campaign insiders, “but sentiment analysis on October 28 started to show “positive” growing. The analysis of Hillary showed negative growing but positive was stable. That’s when Trump started winning.”</p>
<p>Was Clinton’s stalling and Trump’s upward move caused by Vladimir Putin and his Russian hackers? Well after vociferously criticizing his intelligence agencies and the reports, President Elect Donald Trump finally admitted that it might be Russia. But could it have been Deep State, or the liberal opposition….or even a cute young girl in Romania?</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/08/02/hack-part-three/">The Hack Part Six: The War On You</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2018/08/02/hack-part-three/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Hack Part Five: Catfish and Honey</title>
		<link>http://dangerousmagazine.com/2018/07/29/hack-part-five-catfished/</link>
		<comments>http://dangerousmagazine.com/2018/07/29/hack-part-five-catfished/#comments</comments>
		<pubDate>Mon, 30 Jul 2018 04:11:27 +0000</pubDate>
		<dc:creator><![CDATA[Lisa]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2425</guid>
		<description><![CDATA[<p>The Hack by Robert Young Pelton Part Five &#8220;My name is Sydney. I&#8217;m a 22 year old college student from a small town looking to move to Chicago with one of my friends. I&#8217;ll be in Chicago from Thursday the 9th, until Monday afternoon and would love to meet someone special. I&#8217;m Seeking: Sugar Daddy I expect: Open &#8211; Amount Negotiable I&#8217;m looking for a discrete mutually beneficial relationship, Each person gets what they desire. How irresistible is that?&#8221; – August...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/07/29/hack-part-five-catfished/">The Hack Part Five: Catfish and Honey</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="text-align: center"><strong>The Hack</strong> by Robert Young Pelton Part Five</p>
<div id="attachment_2602" style="width: 710px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2020/10/enhanced-buzz-orig-11598-1374621635-18.jpg"><img class="size-full wp-image-2602" src="http://dangerousmagazine.com/wp-content/uploads/2020/10/enhanced-buzz-orig-11598-1374621635-18.jpg" alt="A photo submitted by Sydney Leathers to the Dirty to prove she had been sexting with Anthony Weiner and then matched up to her social media account by Buzzfeed" width="700" height="358" /></a><p class="wp-caption-text">A photo submitted by Sydney Leathers to the Dirty to prove she had been sexting with Anthony Weiner and then matched up to her social media account by Buzzfeed</p></div>
<p style="text-align: center"><em>&#8220;My name is Sydney. I&#8217;m a 22 year old college student from a small town looking to move to Chicago with one of my friends. I&#8217;ll be in Chicago from Thursday the 9th, until Monday afternoon and would love to meet someone special.</em></p>
<p style="text-align: center"><em>I&#8217;m Seeking: Sugar Daddy</em></p>
<p style="text-align: center"><em>I expect: Open &#8211; Amount Negotiable</em></p>
<p style="text-align: center"><em>I&#8217;m looking for a discrete mutually beneficial relationship, Each person gets what they desire. How irresistible is that?&#8221;</em></p>
<p>– August 8 2012, personal solicitation placed by Sydney Leathers on the &#8220;SeekingArrangement&#8221; website. Profile Number 11332091</p>
<p><strong>Lonely and on the Internet</strong></p>
<blockquote><p>By mid 2012, a 22-year old Leathers was selling sexual and internet based companionship services for money on sites where young women hook up with older men for money and &#8220;gifts&#8221;.</p></blockquote>
<p>Hillary Clinton had weathered numerous sexual affairs and scandals caused by her roving husband. Not surprisingly she kept a tight grip on personal information and data. We know that Hillary Clinton knew how to handle her data and with the Benghazi controversy there was a sudden interest in the idea that she had deleted thousands of potentially incriminating emails. When she announced her run for President on April 12, 2015. There was a sense of inevitability even though she was not a popular choice. If Obama could be the first African American President, then she would be the first female president.</p>
<p>She would rely heavily on her inner circle of friends chief among them her top aide Huma Abedin, wife of Anthony Weiner who handled much of Clinton&#8217;s correspondence. She kept a home computer to keep backups from Clinton&#8217;s Blackberry. And it appeared shared that home laptop with her husband. A lonely and gregarious man who seemed to spend a lot of time on the internet with strangers. It was no secret that Weiner used his devices to communicate with other women but it is very important to understand how some people deliberately took advantage of that knowledge.</p>
<p>In April of 2011, one month before Anthony Weiner became famous as a sexter<a href="https://www.thecut.com/2016/05/pain-triumph-weiner-sexter-sydney-leathers.html"> a young woman sent him a message of Facebook</a>. According to Sydney Leathers It took until July of 2012 for him to respond with a &#8220;Poke&#8221;</p>
<p>By mid 2012, a 22-year old Leathers was selling sexual and internet based companionship services for money on sites where young women hook up with older men for money and &#8220;gifts&#8221;. <a href="http://www.tmz.com/2013/07/31/anthony-weiner-sydney-leathers-sugar-daddies-website/">According to TMZ</a> who discovered Leathers&#8217; ad in 2013, she had been doing this for three years which would sync up with sending a communication to a fairly high profile politician in New York.</p>
<p>A &#8220;Sugar Baby&#8221; looking for an older man or Sugar Daddy to send her money. What they got in return was up to the donor and what services were provided were up to the provider.</p>
<p>Leathers insisted that she never provided sex for money but provided companionship&#8230; just phone or video sex and/or photos of a sexual or non sexual nature. That wasn&#8217;t entirely true, she would later talk about meeting many of these men for sex and complain about being paid for her clients performing oral sex on her and how boring it was. Shortly after she was outed by TMZ, she provided &#8220;10 Secrets For Seducing a Politician&#8221; on how to seduce men on the internet. On July 21, 2013 she had sent screen shots to &#8220;the Dirty&#8221; to prove she was sexting with Anthony Wiener. On July 23, 2013 <a href="https://www.buzzfeednews.com/article/andrewkaczynski/here-is-the-woman-linked-to-anthony-weiner-in-sex-chats">Buzzfeed</a> and others revealed that she was the 23 year old woman sexting to Anthony Wiener. By August of 2013, <a href="https://forward.com/schmooze/181744/of-course-sydney-leathers-has-a-sex-tape/">she was doing porn</a> for Vivid. There was little doubt about the goals and aspirations of Sydney Leathers who was billed as a &#8220;writer&#8221;</p>
<p><strong>Anthony Wiener</strong></p>
<p>In April of 2013,  Anthony Wiener announced he was running for mayor of New York. Weiner began as an aide to Democrate Chuck Shumer in 1985 until 1991. He spent six years on the New York City Council from 1992 until 1998. He took Schumer&#8217;s job by a narrow 258 votes in September of 1998. In 2005 he took a shot at Mayor of New York and lost.  He was most famous as the defender of 9/11 victims in <a href="https://www.youtube.com/watch?v=vqJxp7w919o">a fiery August 2010 speech</a> shortly after marrying Huma Abedin in July. Weiner was the <a href="https://www.youtube.com/watch?v=JBjif02ZLmI">mouthy Democrat populist </a>from from New York. Abedin was then deputy chief of staff to Hillary Clinton in the <a title="" href="https://en.wikipedia.org/wiki/United_States_Department_of_State">State Department</a>. Abedin had grown up in Jeddah, Saudi Arabia. &#8220;He was smart, he was passionate&#8221; she <a href="https://www.vogue.com/article/huma-abedin-family-job-hillary-clinton-campaign-strategist">told Vogue</a>. They were a throughly modern couple.</p>
<p>Huma Abedin was born in Kalamazoo Michigan in 1976, but her Pakistan-born father and India-born mother moved to Saudi Arabia to teach. Abedin came to the U.S. at 18 years old to study at George Washington University. She began working for First Lady Hillary Clinton&#8217;s Chief of Staff in the East Wing of the White in 1996. Another West Wing intern Hillary&#8217;s husband at the time was Monica Lewinsky. Huma Abedin <a href="http://fortune.com/2012/05/24/hillary-clinton-deputy-shares-career-advice/">wanted to be </a>Christiane Amanpour and work as a journalist but she has never had another job except taking care of Hillary Clinton and her various institutions.</p>
<p>Abedin met Weiner on Martha&#8217;s Vineyard in 2001. He asked her out on a date. Abedin wasn&#8217;t impressed. After they began to cross paths more and more they became an item. They married in 2010. She did not know that  Anthony Weiner had a problem. He liked to chat with strangers on the internet when he was alone. Young women ideally.</p>
<p><em>Kompromat</em> is a Russian word for comprising information. Ideally of a politician who has much to lose if the information is released. The idea is to blackmail the victim or if they have no use, end their careers. Weiner was a rising star in the Democratic party in a key part of the country. His position at the inner circle of the Clinton dynasty meant he was a threat. Bill Clinton had taken the back seat and it was clear the party was pushing his wife as a potential candidate. There was little chance the Republicans would unseat the incumbent Barak Obama and Hillary bowed out early, like in 2009, early.  If the right wing could do enough damage to the left&#8217;s inner circle. Maybe, just maybe they could make headway. Hillary Clinton, had failed in 2008, but had been handed the high profile position of Secretary of State. She had used the position to bolster her lack of experience in international politics as she and Huma Abedin traveled the world. Clinton was definitely a threat if she ran in 2016. Things looked fine.</p>
<p>Remember that back in May of 2011 a young Obama organizer named Sydney Elaine Leathers posted on Anthony Weiner’s Facebook page. She said she admired him and said she was &#8220;shocked and intrigued&#8221; when he “poked” her back on July 12, 2012 when she 20 as &#8220;sidneyelainexo&#8221;. For the next two years, they used a number of platforms to exchange sexual discussions, have <a href="https://www.thecut.com/2016/05/pain-triumph-weiner-sexter-sydney-leathers.html">phone sex</a> (as often as five times a day)  and send each other nude photos on platforms that included Facebook, Formspring, Yahoo (as Carlos Danger). Leathers told “the Dirty” that by November 2012 her online relationship with Weiner relationship began to fizzle out&#8230; but she kept everything. She was surprised when Wiener texted her on April 10, 2013, to look at a massive New York Times <em>mea culpa</em> profile on his <a href="https://www.nytimes.com/2013/04/14/magazine/anthony-weiner-and-huma-abedins-post-scandal-playbook.html">comeback</a> six months before running for Mayor.</p>
<p>By July of 2013 she had leaked photos to the Dirty and <a href="https://www.buzzfeednews.com/article/andrewkaczynski/here-is-the-woman-linked-to-anthony-weiner-in-sex-chats">Buzzfeed</a> and others quickly figured out that she was the 23 year old woman who had been sexting with Anthony Wiener. Even if the scandal was a year old.</p>
<p><strong>Stephanie Clifford</strong></p>
<p>May 19, 2011 is also when a heavy chested porn actress named Stephanie Clifford aka &#8220;Stormy Daniels&#8221; took a <a href="https://www.nbcnews.com/politics/politics-news/lie-detector-test-shows-stormy-daniels-truthful-about-trump-affair-n858281">polygraph test </a>at Western Security Consultants <a href="https://www.newsweek.com/how-touch-weekly-stumbled-upon-its-explosive-stormy-daniels-interview-about-818437">in Las Vegas</a>.  Clifford claimed truthfully (according to the test) that she met then married reality star Donald Trump&#8217;s at a <a href="https://www.gettyimages.com/event/american-century-celebrity-golf-championship-july-16-2006-75338169">July 16, 2006 golf tournament</a> in Lake Tahoe  and they carried on an affair until <a href="https://www.gettyimages.com/event/launch-party-for-trump-vodka-arrivals-75239550#donald-trump-at-the-les-deux-in-hollywood-california-picture-id75486135">January 17, 2007</a>.  Her agent, Gina Rodriquez. had set up an interview with <a href="https://www.washingtonpost.com/politics/trump-lawyers-efforts-to-suppress-stormy-daniels-started-in-2011/2018/03/17/56924c54-29db-11e8-874b-d517e912f125_story.html?utm_term=.061ddfa0c8dc">Bauer publications tabloid reporter Jordi Lippe-McGraw</a> about a sexual encounter with reality show start Donald Trump. Gina Rodriquez a former porn actress had set up the interview for $15K with a 20% cut for herself. The former husband of Rodriquez (2006 &#8211; 2008 )was porn actor Greg Deuschle aka &#8220;Randy Spears&#8221; remembers being called and threatened by lawyer Michael Cohen. <a href="https://drive.google.com/file/d/1jNw1j5WL96gUVCycXk5nSPgSwk1f6c9Q/view">Ron Slay&#8217;s polygraph indicated that Clifford&#8217;s statements about the affair were truthful</a>.</p>
<p>Ron Slay the owner of <a href="http://www.westernsecurityconsultants.com/my_credentials">Western Security Consultants</a> was said Daniels took the lie detector test for Bauer Publishing,  <em>Life &amp; Style</em> magazine. But they never ran the story. In January Bauer&#8217;s <em>In Touch Weekly</em> published  “Stormy Daniels’ Explosive Full Interview on Donald Trump Affair: “I Can Describe His Junk Perfectly.”. Later Slay said he sold the videotape of the polygraph Daniel&#8217;s lawyer, Michael Avenatti for $25,000</p>
<p>Michael Cohen would pay Daniels $130,000 in October 2016 to sign a non disclosure, a month before the election. What is evident was that Trump had many skeletons in his closet and his strategy was to attack even if it meant inventing or exaggerating dirt on his opponent. The affair would reappear in 2018 as a scandal even though the original  <a href="https://www.intouchweekly.com/posts/stormy-daniels-full-interview-151788">InTouch interview </a>was seven years old.</p>
<p><strong> Sidney Leathers</strong></p>
<p>On November 7, 2012, the day Obama was reelected as Presidtan,  the election former congressman Anthony Weiner went on twitter and tweeted for the first time in a year and a half. Almost instantly Donald Trump tweeted;</p>
<blockquote><p>Pervert alert. @RepWeiner is back on twitter. All girls under the age of 18, block him immediately.”</p></blockquote>
<p>Trump was no <a href="https://www.nbcnews.com/news/us-news/tape-shows-donald-trump-jeffrey-epstein-discussing-women-1992-party-n1030686">stranger</a> to sleaze. Leathers was not the shy political groupie Weiner thought she was. According to texts exchanged between work mate Lou Colagiovanni and the 23 year old over a four months between April 12, 2013  and just one month before the news broke, she confided to a friend that not o<a href="http://www.dailymail.co.uk/news/article-2380865/ANTHONY-WEINER-EXCLUSIVE-Sexting-partner-Sydney-Leathers-offered-sex-cash.html">nly was she charging “sugar daddy” a $1000 for sex.  According to texts published by the Daily Mail</a>, Leathers comes off as quite experienced and comfortable chatting with older men online and in person and charging some money for sexual favors. What is notable is that on April, 12, 2013, Leathers told Colagiovanni that somebody had found out about her online relationship with Weiner and was threatening to blackmail her. Was this a hack?  Weiner was running for Mayor and her initial concern about being exposed suddenly became a concerted effort to expose him.</p>
<p>Leathers reached out to Hooman Karamian aka Nic Ritchie, the owner of a Scottsdale, AZ based scandal blog called “The Dirty”.the editor of one of her favorite scandal sites, “The Dirty”. A site used to expose bad behaviors of ex’s and current lovers, ideally with embarrassing photos, usually for money. She didn’t expect the answer:  Pics or it didn’t happen.</p>
<p>On June 27, 2013 23-year old Leathers contacted Ritchie again, she said  she had incriminating photos of Weiner. A man who insisted he had changed his ways after his 2011 sexting disaster. Weiner’s high profile run for mayor <a href="https://www.thedailybeast.com/weiners-sexting-matters-hes-running-for-mayor">featured appearances with his wife</a> Huma Abedin who made statements like ““Anthony has spent every day since [the scandal] trying to be the best dad and husband he can be”. Ritchie wasn&#8217;t that interested until she sent in pics. Leathers was angry and finally sent proof.on the 23<sup>rd</sup>.</p>
<p>Ritchie set Leathers u<a href="https://www.buzzfeednews.com/article/andrewkaczynski/sdyney-leathers-carlos-danger">p with his agent</a> <a href="https://twitter.com/MzGinaRodriguez">Gina Rodriquez at GR Media</a>. Rodriquez had specialized in fringe porn and D-listers like Octomom, Mama June Nadya Suleman and Lindsay Lohan’s father, Michael. who then pitched her to <em>Inside Edition</em> who paid her for an <a href="https://www.buzzfeednews.com/article/jtes/woman-who-sexted-with-anthony-weiner-speaks-out">exclusive interview </a>on July 25, 2013. Her hack was all about the money, branding herself a social activist she went after Weiner in the media as he had preyed on her.</p>
<p>Although “the Dirty” heavily blurred the photos, geeks at Buzzfeed quickly found the original photos on the internet. By July 31 she was <a href="https://www.buzzfeednews.com/article/andrewkaczynski/here-is-the-woman-linked-to-anthony-weiner-in-sex-chats">outed</a>.</p>
<p>On July 31, 2013, Chuck C. Johnson busy <a href="http://dailycaller.com/2013/07/31/conflicting-accounts-about-anthony-weiners-2011-text-flirtation-with-high-school-girl/">exposing</a> every aspect of the 2011 event to sync with the mayoral race in New York while writing for <em>The Daily Caller</em>.</p>
<p>Weiner had been potentially <a href="https://www.mediaite.com/online/andrew-breitbart-did-not-run-weinergate-evidence-which-turned-out-to-be-fabricated/5/">catfished</a> as early as 2011 when false personas named <a href="https://www.mediaite.com/online/mediaites-sources-on-weinergate-betty-and-veronica-turn-out-not-to-be-who-they-claimed/">&#8220;Betty&#8221; and &#8220;Veronica&#8221;</a>. Sydney Leathers was ju<a href="Weiner%20admits he sent explicit texts under the alias “Carlos Danger” to as many as 10 women, ">st one of ten women</a> &#8220;Carlos Danger&#8221; liked to chat with. In reality, and according to his own confessions, Anthony carried on hundreds of conversations with women. All of them.</p>
<p><strong>Meagan Broussard</strong></p>
<p>Breitbart had been accused of going after Weiner ever since he scored a scoop by publishing Wiener&#8217;s May 27, 2011 screen shot of his erect penis while wearing tightey whiteys on his BigGovernment site. A place where Charles Johnson <a href="https://www.breitbart.com/big-government/2010/02/08/access-to-guns-not-jihad-to-blame-for-ft-hood-says-noted-islamic-scholar/">began</a> contributing to Breitbart in February 8, 2010 while attending college at private liberal arts Claremont Mckenna. He began targeting <a href="https://www.breitbart.com/big-government/2011/06/02/weiner-a-history-of-backfilling-bravado-part-1/">Weiner</a> on June 2 of 2011 starting off his piece about the hacking of Weiner’s email account.</p>
<p>But there were two women. Breitbart was terrified that if Weiner were to go to forensics experts or the FBI he could cast doubt on the veracity of the pics. But Breitbart had been tossed another lifeline and after spending the weekend desperately trying to contact her, he hit pay dirt. He then <a href="https://www.breitbart.com/big-journalism/2013/04/15/lies-upon-lies-how-anthony-weiner-went-down/">built a rapid fire PR assault with Broussard</a> using ABC news as the keystone appearance to give him credibility. Most of the media did not distinguish between  the hacked photo that was reset to post as public and the genuine photos provided by Broussard.</p>
<p>Meagan immediately began making the <a href="http://www.chicagotribune.com/news/nationworld/sns-viral-video-anthony-wiener-photo-scandal-htmlstory.html">media circuit</a> including ABC News paying to &#8220;license&#8221; her photos.</p>
<p><strong>Andrew Breitbart</strong></p>
<p>Breitbart even went on Hannity to say how he felt he was under attack by left wing bloggers &#8220;when these ideas get out in there in the media, you have to fight back or they become the truth, even if they are not truthful&#8221;  He is discussing four photos taken from Weiner&#8217;s photo files without actually explaining the provenance of how he got them.</p>
<p>He rattled off the list of photos he had &#8220;the underwear, the wedding ring, kitty cats at home, the shirts off in the next one the other one is naked shot. The one he won&#8217;t release is considered &#8220;pornographic&#8221; . These are the <em>PatriotUSA76 </em>supplied photos. Images supplied by @goatsred not the female in question.</p>
<p>In a bizarre use of logic, <a href="https://www.youtube.com/watch?v=Ume4JD28I4c">Breitbart tells Hannity,</a> &#8220;I am not enjoying the salacious aspect&#8221; Breitbart says, &#8220;had I not shown those photos, he would continued down a campaign of smearing me&#8221;</p>
<p>&#8220;I know how politics work, I know how the politics of personal destruction works. Don&#8217;t go after Meagan.. don&#8217;t go after the other girls.&#8221;</p>
<p>How did Breitbart get the image that launched his career?  As he tells it in his book <a class="x5l" href="http://www.amazon.com/Righteous-Indignation-Excuse-While-World/dp/0446572837/ref=tmm_pap_title_0" target="_blank" rel="noopener external">Righteous Indignation: Excuse Me While I Save the World</a> <em>(Grand Central Publishing, 2012, </em> it was a Saturday and&#8230;.</p>
<p><em>&#8220;As the sun began to set at the start of a weekend meant to delineate spring from summer, (Memorial Day Weekend) I asked my wife if she’d like me to open up a bottle of white wine. No sooner had I opened the bottle of Chardonnay and poured two glasses, standing at our kitchen island, then I began multitasking, refreshing my Twitter stream on my iPad. It was at that moment that the best-laid vacation plans of mice and men ended, and my recommitment to the story began four days ahead of schedule.</em></p>
<p><em>Huh, I thought, what’s this?</em></p>
<p><em>Someone, using the Twitter handle PatriotUSA76, had re-tweeted an alleged tweet of sitting congressman Anthony Weiner (D-NY). The message included a link to an image, which I immediately clicked.</em></p>
<p><strong> Gennette Nicole Cordova</strong></p>
<p>That woman was a 21 year old student from Bellingham Washington Gennette Nicole Cordova. Cordova lays out a very different scenario in her May 29, 2011 statement to the Daily News.  She says she checked in to her Twitter account on a Friday eventing and found obscene photos with her name linked to them. They were not from Anthony Weiner, they were from a group that harassed her. &#8220;Since I had dealt with this person and his cohorts before I assumed that the tweet and the picture were their latest attempts at defaming the Congressman and harassing his supporters.&#8221; She blocked them, turned her page &#8220;private&#8221; and assumed the prank was over. It wasn&#8217;t. she came under unrelenting attack for the next 36 hours as she was attacked, insulted, her personal information spread around and accused of being Weiner&#8217;s mistress.  In other words she was set up. In her summing up of the event, &#8220;There have never been any inappropriate exchanges between Anthony Weiner and myself, including the tweet/picture in question, which had apparently been deleted before it reached me. I cannot answer the questions that I do not have the answers to.&#8221;</p>
<p>Her <a href="https://www.mediaite.com/online/alleged-recipient-of-alleged-rep-weiner-photo-gennette-nicole-issues-statement/">underage friends had also been targeted</a>. Something that slo slips between the reporting cracks.Not by Weiner but by individuals looking to get a pornographic photo from Weiner&#8217;s ImageShack account onto followers phones and computers.  Something Breitbart never mentioned then or in his book. In a stunning lapse of clear reporting, the young women had never seen the photographs sent to Breitbart.  Her comments about the photo after she was told about it were used to act as confirmation that she had received it. She had been hacked.</p>
<p><strong>Meagan Broussard</strong></p>
<p>What saved Breitbart&#8217;s ass was Meagan Broussard.</p>
<p>That woman turned out to be Meagan Broussard, a 26-year old single mother from Texas. She clicked &#8220;Like&#8221; on his Facebook page on April 20, 2011 and said he looked &#8220;hottt&#8221; in a YouTube video. He replied back on Facebook Chat. For a month they swapped photos on Facebook and Weiner sent his photos via anthonyweiner@aol.com and RockOh77@yahoo.com until May 18, when she got an erect penis shot with the last <a href="http://www.dailymail.co.uk/news/article-1395011/Megan-Broussard-reveals-Anthony-Weiner-pursued-Facebook.html">communication on May 27,</a> at 4:21pm East coast time.  It is worth noting that all AOL user accounts had been breached in<a href="https://www.nytimes.com/2006/08/23/technology/23search.html"> August of 2006 </a>by a publication of search terms that had been mirrored and distributed. In an attempt to provide data to scientists, AOL provided data from their 650,000 AOL users with the names removed, but ample information for hackers to recreate user&#8217;s identities.</p>
<p>Let&#8217;s continue with Breitbart&#8217;s recollection</p>
<p><em>&#8220;Nine days beforehand, we had received an e-mail tip from a gentleman in Texas who claimed to have compromising photographs and communications between a single mother in Texas and Congressman Weiner.  In any event, the source spoke to (Joel B.) <a href="https://twitter.com/joelpollak?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor">Pollak</a> once but never followed up with him. In truth, we probably would have forgotten about it had PatriotUSA76 not re-tweeted Weiner’s original tweet that Friday night.</em></p>
<p>This puts a very different spin on the innocent way Breitbart came to come into the possession of Anthony Weiner&#8217;s personal photos. Even his ace in teh hole was not from the actual woman involved but by a go between who was desperately trying to salvage the   skanky provenance of the first photos provided form USAPatriot76</p>
<p><em>But Weiner very nearly got away with it. Without further evidence except his own self-destructive interviews, the story could not move forward. For the next few days, the media began asking about PatriotUSA76 and the sources of the original story. Even though Weiner was clearly in implosion mode, the mystery of what really happened on Friday night, May 27,  was still a hot topic in the blogosphere, and even in my own camp. While Lee Stranahan, Patterico (Patrick Frey), and LibertyChick (Mandy Nagy) tried to figure out who PatriotUSA76 was, I was more focused on a much bigger fish: Megan Broussard, the woman in Texas whose friend tipped us eight days before the congressman’s now-infamous tweet.</em></p>
<p><em>When I first spoke with Megan Broussard’s friend on Saturday, May 28,</em></p>
<p>Saturday May 28, was the exact same morning as when Breitbart received the emails from USAPatriot76. What exactly are the odds of two agents having compromising pics of Weiner on the exact save Memorial Day Weekend?</p>
<p>To get some insight on how fast the spin doctors work, on 11:49 am PDT that same Saturday, May 28 the <a href="https://www.dailykos.com/stories/2011/05/28/979547/-Brietbart-to-use-SEX-SMEAR-on-Rep-Anthony-Weiner-UPDATEX2:-Easily-Debunked-FRAUD-EPIC-FAIL">Daily Kos </a>was already sandbagging in preparation for a propaganda fight. The Ministry of Truth posted a headline &#8220;Brietbart to use SEX SMEAR on Rep Anthony Weiner UPDATEX2: Easily Debunked FRAUD EPIC FAIL&#8221;Breitbart was called a&#8221;serial liar and corporate hack&#8221; and were accused of &#8221; another Shirley Sherrod&#8221;  and &#8220;ACORN&#8221; type con. Breitbart had been accused of editing Rural Development head, Sherrod&#8217;s <a href="https://www.politico.com/blogs/under-the-radar/2014/02/judge-rips-feds-in-sherrod-breitbart-lawsuit-183689">speech</a> to appear racist and had also created fictional characters to apply for <a href="https://www.nytimes.com/2010/03/21/opinion/21pubed.html">government housing assistance</a> as pimp and prostitute. They offered digital forensics as proof that Breitbart had doctored the screed shot of Weiner&#8217;s underwear.</p>
<p><strong>Dan Wolfe</strong></p>
<p>Let&#8217;s create a secondary narrative to Breitbart&#8217;s convenient re-ordering of events. <em>PatriotUSA76 </em>was a right wing of Dan Wolfe. Wolfe had been tweeting as far back as May 12, 2011  that a &#8220;top5 RightWing blogger has sexscandal pics&#8221; of Weiner.</p>
<p>Remember that name Dan Wolfe and more importantly his partner, 39-year old New Jersey resident, <a href="http://www.thesmokinggun.com/documents/internet/mike-stack-weinergate-co-pilot-219073">Mike Stack</a>. It was actually Stack that started the ball rolling on May 5 when he tweeted as @goatsred  that a big time congressman was about to be involved in a sex scandal. He attributed that information to a person named Dan Wolfe. Wolfe&#8230;according to the <a href="http://www.thesmokinggun.com/documents/internet/mike-stack-weinergate-co-pilot-219073"><em>Smoking Gun</em></a>, told Stack that he had heard the rumor from a source who worked for a well-known conservative web site.&#8221;</p>
<p>Now we have come full circle. The Weiner pics originated with &#8220;a conservative web site&#8221; not sold or leaked to it.</p>
<p><img src="http://thesmokinggun.com/sites/default/files/assets/goatsredtwittericon.jpg" alt="" width="302" height="82" /></p>
<p>&#8220;Wolfe&#8221; as <em>PatriotUSA76</em> began to tweet “via@goatsred” on May 5, that the Congressman was Anthony Weiner and did it again on May 12.  This is a full fifteen days before the May 27 tweet sent from Weiner of the grey underwear/erection photo sent to a 21-year-old college student in Washington state. We are to believe that that tweet was spotted on Friday by <em>PatriotUSA76 aka Wolfe aka Mike </em>aka<em> @goardsred </em>and then on the next day brought to the attention of <em>BigGovernment</em> editor Andrew Breitbart while he was sipping Chardonnay at his LA home getting ready to decamp to the desert for the long weekend.</p>
<p>Despite sending Breitbart a tweet at  4:16 AM (Eastern, 7:16AM Pacific) he refused to speak to Breitbart. He did email (not tweet) 6 jpgs of screen shots from a photo hosting site called yfrog. Remember these are what he calls &#8220;screen caps&#8221; which are from the phone of the person getting the photos and communications, but the other photos are from Weiner&#8217;s password protected yfrog site. <a href="https://www.dailydot.com/layer8/anthony-weiner-yfrog-hack/">Using a security hole, a hacker can reset the privacy settings </a>on the ImageShack photo storage site to automatically post photos from yfrog. A vulnerability that affected 50 million monthly users, was pointed out on June 1</p>
<p>Wolfe’s reluctance to actually speak with Breitbart surfaced only hours after he had <a href="http://www.thesmokinggun.com/file/weinergate?page=1">emailed</a> the conservative blogger a series of screen captures that he “took live” . <a href="http://www.thesmokinggun.com/file/weinergate?page=1">Wolfe’s e-mail to Breitbart</a> was sent at  and included six .jpg images. His e-mail to Breitbart concluded, “We have more.” It is worth remember that hacking is against the law.</p>
<p>The yfrog emails accounts were automatically generated Yfrog’s automatically generated using words of the same length and the did not require a confirmation using another email address, ideal for a brute force attack in which software can try millions of words until they hit pay dirt.   Stranger was Brietbarts attempt to contact and confirm the photos before his 2pm publication deadline:</p>
<blockquote><p>Come out, come out wherever you are &#8216;Dan Wolfe&#8217; @patriotUSA76! Stop hiding behind anonymity! Own up to your role &amp; motivation.</p>
<p>&nbsp;</p></blockquote>
<blockquote><p>Is there a real &#8216;Dan Wolfe&#8217; @PatriotUSA76 or has someone for months elaborately pretended to be? #Weinergate gets more confusing!</p>
<p>&nbsp;</p></blockquote>
<blockquote><p>Lookin&#8217; for some clarifying data from @patriotusa76. Call me. I&#8217;m listed. Article coming by 2pm EDT @BigGovt</p></blockquote>
<p>The fear was that perhaps Breitbart was being set up by Democrats just as he set up Democrats.</p>
<p>On Monday May 30, at 12:25 pm   &#8220;Dan Wolfe&#8221;suddenly appeared by email to lay out a <a href="http://www.thesmokinggun.com/file/weinergate?page=0">laundry list of personal problems</a> and why he didn&#8217;t want to talk on the phone.</p>
<p><strong>Breitbart Ascendent</strong></p>
<p>A June 6, 2011 at a <a href="https://www.youtube.com/watch?v=Yv16RtcHpsQ">bizarre press conference</a> intended to allow Weiner to make a statement, was hacked by Andrew Breitbart who learned of the event and walked over.</p>
<p>While answering questions and defending himself, Breitbart went live. The media was not that interested in the war of left vs right on the internet. Catfishing, spoofing, ghosting, spearphising, doxing, outing, sock puppeting, swarming, shaming or even the strategy of bloggers linking together to flood the search engines to <a href="https://www.theguardian.com/technology/2016/dec/16/google-autocomplete-rightwing-bias-algorithm-political-propaganda">game google searches</a> was not really on their radar. The rise of the right wing blogosphere was viewed with some suspicion. Brieibart knew just how crazy the extreme left was.</p>
<p>Then there was the <a href="http://patterico.com/index.php?s=alicia%20pain&amp;submit=Search">radical left</a>. A group of people who saw what was being doing to Weiner by the right wing and would go as far as to <a href="http://patterico.com/2012/05/25/convicted-bomber-brett-kimberlin-neal-rauhauser-ron-brynaert-and-their-campaign-of-political-terrorism/">threaten</a> and then SWAT,  right wing bloggers and instigators like <a href="http://patterico.com/2011/06/27/weinergate-mike-stack-is-threatened/">Mike Stack</a>, who they blamed for setting up and taking down Weiner. Blogger Patterico, a deputy prosecutor in Los Angeles was treated by email, then by phone and then SWATed on July 1, 2011. He blamed a cabal of left wingers Ron Brynaert, Neal Rauhauser, and Brett Kimberlin for his harassment.</p>
<p>When Weiner weiner showd up 15 minutes later he confessed to sending a photo &#8220;last Friday night&#8221;to a supporter in Seattle <a href="https://www.youtube.com/watch?v=Yv16RtcHpsQ">but in his very public <em>mea culpa</em></a>, he said  &#8220;once I had realized I had posted it to Twitter, I panicked and took it down and said that I had been hacked&#8221;. He insisted he would not resign. Weiner was not innocent, he also admitted to inappropriate online conversations with 6 women over the last three years but he had been tricked. He just couldn&#8217;t put his finger on how.</p>
<p>AT 4:46 Weiner <a href="https://www.youtube.com/watch?v=Yv16RtcHpsQ">says something </a>that will bite him, his wife and Hillary Clinton in the ass years later  &#8220;My Blackberry is not a government Blackberry, my home computer is usually where I did these things.&#8221;</p>
<p>Weiner resigned from congress after the Breitbart publication on June 16 of that year.</p>
<p>Weiner had been <a href="http://www.slate.com/articles/news_and_politics/crime/2011/06/tricky_dick.html">told a week earlier</a> that his Twitter account had been hacked. Additionally the <a href="https://www.mediaite.com/online/exclusive-mediaite-analysis-of-weinergate-photos-supports-anthony-weiner-and-andrew-breitbart/">metadata does not match</a> other photos pulled from the YFrog site used by Weiner. Weiner was conducting risqué chats with women, and Weiner did not pursue law enforcement actions that might have vindicated him but someone was clearly messing with Clinton associate Anthony Weiner while Weiner was messing around.   This in the business is known as the “Honey Trap” using sex or the promise of sex to lure targets into trouble or providing information. In this case Weiner provided the access to Hillary Clinton’s emails kept on his laptop and used by his wife.</p>
<p>Weiner’s obscene Tweets had been initially captured and nailed by Breitbart in May 27, 2011. Weiner insisted the photos which did not show his face, were <a href="https://www.dailykos.com/stories/2011/05/28/979547/-Brietbart-to-use-SEX-SMEAR-on-Rep-Anthony-Weiner-Push-back-needed">faked</a> and that he was the victim of a hoax. Later he admitted it was his photo but that the picture of his screen shot was <a href="https://www.dailykos.com/comments/979547/41755372#c194">faked</a>. None of Weiner’s 45,000 followers managed to save a screen shot.</p>
<p>That hack was about politics.</p>
<p><strong> Betty and Veronica</strong></p>
<p>June 3 2011, right after Weiner&#8217; press conference, there are attempts to <a href="https://www.mediaite.com/online/andrew-breitbart-did-not-run-weinergate-evidence-which-turned-out-to-be-fabricated/">scam</a> Wiener and Breitbart with  “Betty and Veronica”. A scam in which the young girls turned out to <a href="https://www.mediaite.com/online/andrew-breitbart-did-not-run-weinergate-evidence-which-turned-out-to-be-fabricated/2/">be real but never followed or communicated</a> with Wiener. Coincidently these were also west coast residents. The <em>New York Times</em> <a href="https://www.nytimes.com/2011/06/18/nyregion/fake-identities-were-used-on-twitter-to-get-information-on-weiner.html?ref=jenniferpreston&amp;mtrref=undefined">dug into the complex story</a>.   The short version is that the mother of two underage girls provided a fake California driver&#8217;s license, blamed Andrew Brietbart and editor Dana Loesch</p>
<p>A group of “conservatives” called #were found to be <a href="https://www.nytimes.com/2011/06/18/nyregion/fake-identities-were-used-on-twitter-to-get-information-on-weiner.html?_r=1&amp;mtrref=en.wikipedia.org&amp;gwh=ACCB5F0948A1783839EA1817BBC03CF9&amp;gwt=pay">catfishing</a> Weiner, pretending to be underage women. They created two false identities on Twitter to gather information against him. One Twitter user labeled @starchild111 pretended to be a 16-year-old girl named “Nikki Reid” was created in September of 2011, and invited Weiner to be her prom date. Another false account was created under the name Marianela Alicea and she pretending to be a classmate at Hollywood High School. A third person claiming to be the mother of Nikki Reid provided a fake driver’s license and bad address <a href="https://www.mediaite.com/online/andrew-breitbart-did-not-run-weinergate-evidence-which-turned-out-to-be-fabricated/">to a media blog</a> to convince journalists that she was real.</p>
<p>“During the latter two Skype sessions, on February 18 and 23, 2016, and in a Snapchat communication on March 9, the defendant used graphic and obscene language to ask the Minor Victim to display her naked body and touch herself, which she did.”  Wiener also used an app called Confide.</p>
<p>In 2011, a young Chik Fil-et employee told <a href="//dailycaller.com/2013/07/31/conflicting-accounts-about-anthony-weiners-2011-text-flirtation-with-high-school-girl/">Chuck C. Johnson</a> a story.  “<a href="https://www.huffingtonpost.com/2013/09/10/pax-dickinson-fired-business-insider-tweets_n_3900548.html">BroGrammer</a>” Pax Dickinson was Johnson’s business partner in <a href="https://paxdickinson.wordpress.com/2016/02/08/introducing-wesearchr-an-information-marketplace/">WeSearchr created</a> in February 8, 2016 to monetize tips on news. “WeSearchr is an online information marketplace that crowdsources funds for desired information bounties” Their first customer appeared to Peter Theil with $50,000 bounty for information on Gawker’s Nick Denton and 10,000 for Gawker Plagiarism.</p>
<p><strong>Sydney Leathers Redux</strong></p>
<p>In January of 2015, Weiner started texting another woman. A well-built 40-year-old on the west coast. He barely saw his wife as she juggled book appearances, Clinton&#8217;s <a href="https://www.theguardian.com/us-news/2015/may/16/hillary-and-bill-clinton-earn-more-than-25m-for-giving-100-speeches">speeches</a>, Clinton Foundation <a href="http://www.foxnews.com/politics/2016/10/20/abedin-implicated-clinton-in-foundation-trade-off-with-morocco-amid-12-million-commitment.html">mess</a>es,  the upcoming campaign run President in May and her own PR to make her one of the jetset.</p>
<p>On April 16, 2015 Charles C. Johnson l<a href="https://www.gofundme.com/stophillary">aunched a fundraiser </a>called Clinton Secret Oppo Project to take down Hillary Clinton. Johnson proclaimed that &#8220;for the past three years my team and I have been researching Hillary Clinton and we have a lead on a game-changing story.&#8221; The month before the FBI had met with Clinton and warned her about the vulnerability of her server and URL.</p>
<div class="js-tweet-details-fixer tweet-details-fixer">A month after Clinton announced her run for President, on June 14, Weiner sent an <a href="https://nypost.com/2016/08/28/anthony-weiner-sexted-busty-brunette-while-his-son-was-in-bed-with-him/?utm_campaign=SocialFlow&amp;utm_source=NYPTwitter&amp;utm_medium=SocialFlow&amp;sr_share=twitter">almost identical crotch shot</a> to the woman but included his young son in the photo.</div>
<p>On August 3, 2015 at 8:50am Donald Trump <a href="https://twitter.com/realdonaldtrump/status/628231488794923008?lang=en">tweets</a> &#8220;It came out that Huma Abedin knows all about Hillary’s private illegal emails. Huma’s PR husband, Anthony Weiner, will tell the world.</p>
<p><strong>Guccifer 2.0</strong></p>
<p>A year later on March 10, 2016  the <a href="https://www.apnews.com/dea73efc01594839957c3c9a6c962b8a">first attempts to phish</a> the DNC begin by what was labeled as a Russian backed operation called Guccifer 2.0. It started small and most were long shuttered accounts from Clinton&#8217;s campaign in 2008. The next day they managed to get access to new emails and they were in.   Between the 22nd and the 25th of March Huma Abedin&#8217;s computer and other senior communications team members were targeted.</p>
<p>It wasn&#8217;t just Democrats, Forensics <a href="http://www.chicagotribune.com/news/nationworld/ct-russian-hacking-20171102-story.html">show </a>that hackers were targeting hundreds of Gmail email addresses in 19 countries. Not only were they hacking but they took the unusual step of dumping the information into the public realm. Something penny pinching hackers don’t do without getting paid.</p>
<p>On April 12, 2016 an attempt to set up a secure host from Romanian company, THCServers.com cost $37 in bitcoin. After the payment didn&#8217;t go through for ElectionLeaks.com, a week the customer fixed it and chose DCLeaks as the URL. The search for Clinton Dirt took on strange twist. Russians and middlemen kept popping up in front of Trump people insisting they had the “Dirt”.</p>
<p>It was April 26th that Joseph <a href="https://www.npr.org/2017/12/20/572376162/case-of-the-missing-london-based-professor-with-ties-to-russia-investigation">Mifsud</a>, a Maltese Director of the University of Stirling’s London Academy of Diplomacy told <a href="https://www.cnn.com/2017/11/01/politics/papadopoulos-timeline-events-russia-professor/index.html">George Papadopoulos</a> in London that he had &#8220;Clinton Dirt&#8221;. <a href="https://www.cnn.com/2017/11/01/politics/papadopoulos-timeline-events-russia-professor/index.html">Papadopoulos</a> had joined the Trump campaign as a foreign policy advisor in March and was looking to follow up on the campaign managers platform of better relationships with Russia. He first meets Mifsud in Italy on March 14, and they attempt to set up a trip to Russia. Ten days later they meet in London with a women introduced as &#8220;Putin&#8217;s niece&#8221; They meet again for breakfast on the 26th in London. the general back and forth is focused on setting up a trip for Trump to meet Putin.</p>
<p>In late May of 2016, Roger Stone met <a href="https://www.washingtonpost.com/politics/trump-associate-roger-stone-reveals-new-contact-with-russian-national-during-2016-campaign/2018/06/17/4a8123c8-6fd0-11e8-bd50-b80389a4e569_story.html?noredirect=on&amp;utm_term=.aca1fc76efe7">with a Russian named</a>“Henry Greenberg” in Florida after Greenberg offered Clinton Dirt in exchange for two million dollars. Greenberg was actually Henry Oknyansky, a long time FBI informant. Oknyansky denied he was working for the FBI and counter to Stone’s version, he said he brought along “Alexei” described as a Ukrainian and former Clinton Foundation staffer and that it was Alexei who asked for the money.  The Clinton Foundation denies they had any such person working for them.</p>
<p>On Tuesday, June 14, the DNC announced their email system had been hacked. The next day Guccifer 2.0 send a sample of documents to the legal doc site The Smoking Gun with the Boris Badenov sounding note &#8220;“This is Guccifer 2.0 and this is me who hacked Democratic National Committee.” The hackers would add the word CONFIDENTIAL to some emails.</p>
<p>By July the FBI <a href="https://abcnews.go.com/Site/transcript-james-comeys-interview-abc-news-chief-anchor/story?id=54488723">got wind that an American was helping Russian intelligence</a>influence the election. That person was George Papadopoulos and he was on the Trump foreign policy team. <a href="https://www.theguardian.com/us-news/2017/oct/30/george-papadopoulos-timeline-trump-campaign-adviser-russia-links">He would lie</a>about the professor and the niece in his January 27, 2017 interview to the FBI. He also forgets that he documented his meetings on Facebook which he does not shut down until after his second interview with the FBI on February 16, 2017. In keeping with the concept of an October surprise, the Obama administration did not release their findings until October 7,</p>
<p>A haphazard leak of AP estimated 150,000 documents from Guccifer 2.0 blog, the DCLeaks site and finally on July 22, WikiLeaks.</p>
<p>On June 9, 2016 a meeting in the Trump Tower Russia meeting was set between Russian lawyer Natalia Veselnitskaya, Rinat Akhmetshin  and Donald Trump Jr., Paul Manafort and Jared Kushner. Veselnitskaya was supposed to be in the U.S. on a legal case regarding sanctions but got the meeting by promising &#8220;Clinton Dirt&#8221;. She didn&#8217;t bring up emails at the meetings but discussed dropping sanctions. Natalia Veselnitskaya had been in DC working  with Paul Behrends and Dana Rohrabacher to promote an anti Magnitsky film. Something that had apparently been set up when Behrends and Rohrabacher were in Russia. More on that later.</p>
<p><strong>Rohrabacher and Behrend</strong></p>
<p>There is an assumption in the media that Mifsud and Veselnitskaya are trying to sell or barter &#8220;Clinton Dirt&#8221; meaning the hacks from Podesta and the DNC. They began to be downloaded on the 19th of that same month but there is no evidence that they are the same. It is clear that Russian wanted Obama imposed sanctions lifted and were eager to help Trump. This enthusiasm also spun on another axle, the idea that Russia could be convinced to move away from Assad ally in Syria and let the US and Israel war against Iran.</p>
<p>On August 14, 2016, Stone contacts Guccifer 2.0 via his website; &#8220;“Please ask Assange for any State or HRC e-mail from August 10 to August 30. particularly on August 20, 2011&#8243; Stone bragged that he was in contact with Assange and <a href="https://www.theatlantic.com/politics/archive/2018/02/roger-stones-secret-messages-with-wikileaks/554432/">in private messages </a>toadied up to hacker Wikileaks. Nothing.</p>
<p>Who were these damn Russians and why the hell did they keep offering Clinton Dirt?</p>
<p>It began with Erik Prince’s former employer and close friend former California politician and Reagan speechwriter Dana Rohrbacher. Prince had interned for Dana in the 90’s and had hired Rohrabachers aide Paul Behrends.</p>
<p>Two months before the Trump Tower meeting, Dana Rohrabacher and long-time Erik Prince employee/friend/lobbyist Paul Behrends went on a trip to Moscow between August 4 and August 8<sup>th</sup>2016.  There they met with Vladimir Yakunin, a member of Putin’s inner circle and one of the Russians sanctioned after the invasion of Crimea. Victor Grin, an aide to Russian prosecutor general Yuri Chaika and others that were described as FSB agents by the US State Department and Embassy security. The Russians handed Rohrabacher a folder marked “Confidential” with evidence against Magnitsky. Their goal was to get sanctions lifted in the US. They also met with Natalia Veselnitskaya…in <a href="https://news-front.info/2017/10/03/eksklyuziv-news-front-natalya-veselnitskaya-pravda-i-lozh-o-vstreche-s-trampom-mladshim/">April 2016</a>according to Veselnitskaya, five months before Rohrabacher and Behrends’ official trip in August and more than a year before the Trump meeting in June.</p>
<p>Veselnitskaya told a Russian television interviewer, “So, the first meeting was in the spring of 2016 here in Moscow with the head of the Subcommittee of the International Committee of the House of Representatives of the US Congress with Dana Rohrabacher. And with the members of his team who accompanied him. So, we talked with him, I explained to him what, in fact, happened, in our opinion, taking into account the evidence that we have. And I asked only one thing &#8211; that if it is, interesting for your committee, we are ready to come to you, give evidence, present all the evidence, and that&#8217;s it. We would just like to initiate an investigation procedure in the Congress of these circumstances. At the same time, Dana Rohrabacher was given a film by Andrei Nekrasov.”</p>
<p>That anti sanctions film would be the center point of Rohrabacher and Behrends <a href="https://www.thedailybeast.com/gop-lawmaker-got-direction-from-moscow-took-it-back-to-dc">mid-June 2016 DC Russian sanctions busting</a>dog and pony. Veselnitskaya , the original star of the Russian grand tour at first insisted she was related to promoting the reinstatement for adoption of Russian babies stopped after the sanctions but in fact was the lawyer for the FSB….Russia’s Federal Security Service when she operated as Kamerton Consulting, from 2005 to 2013.</p>
<p>One of the other people the dynamic duo met in Russia in 2016 was Russian spy Maria Butina. Butina was a Russian gun advocate who was caught using the NRA (now run by Olly North) as conduit for secret Russian government communications and perhaps for Russian funding of Trump election activity.  Rohrabacher and Behrends were also photographed in Berlin with anti Magnitsky filmmaker and a host of Russians involved in what the FBI describes as collusion and the same crowd along with Erik Prince and his family all are photographed attended Rohrabacher’s inaugural ball at the libray in DC.</p>
<p>After the media caught wind of this Russian boondoggling. Paul Behrends was fired and Rohrabacher moved him out of the lime light into a staff position.</p>
<p>But there was another target in the cross hairs. In December of 2016 Erik Prince was seen waiting to meet Trump carrying his famous large shiny briefcase at the Trump Tower bar it is one of at least two times he has met Trump and his team.</p>
<p>I had met Johnson at Erik Prince&#8217;s home in August of 2011 along with Oliver North, Victoria Toensing and Paul Behrends. They were all concerned about how they could affect the upcoming election. Prince with his then unpublished book. Johnson was just out of school and considered but a bright, but troublesome student. He went to work at Breitbart and would circle the Democrats like a shark. Dirty tricks were his game and it appeared he had no shame in pitching ideas to whoever listened. He told people that his main stock in trade was oppo research and even called it Charles C. Johnson Research.It was at that meeting that I was asked to help fix Prince’s manuscript. It was bad. Badly plagiarized lift from Joby Warrick of the Washington Post, basic google level backgrounders and clumsily injected slanders of those that Prince felt had done him wrong. I hired a fact checker to fix the mess and when I began writing in earnest, Prince refused to change a number of knowingly false entries. I moved on but Prince sued me to hide the original contents of that book. Contents that would contradict a federal weapons case that directly implicated Prince. A case which was only resolved after Prince and his lawyer David Boies had two CIA agents write letters seven years after the fact.</p>
<p>&#8220;“The campaign had no contact with Russian officials,” said Hope Hicks said in November. But she was lying. The Moscow Project, estimates over 82 contacts between just Trump campaign staff and Russian designated entities despite numerous vociferous denial from Trump’ camp.</p>
<p>Much has been said about the media’s coverage of Trump and Russia, while virtually none has bothered to discuss Hillary Clinton and Russia. Vladimir Putin hated Hillary Clinton. Clinton took it upon herself as Secretary of State to actually point out the horrible human rights violations, crooked system and rigged elections in Russia that returned Putin to power for the third time. In 2011 Clinton was accused by Putin of causing unrest in Russia and stating the parliamentary elections were rigged and <a href="https://www.cnn.com/2011/12/06/world/europe/russia-elections-clinton/index.html">called for a full investigation</a>. Russian media and even the Golos election watchdog site found themselves under attack from hackers. Not surprisingly a series of attacks on Clinton’s email servers began, a coincidence but in hindsight not a very difficult one to figure out. Beginning in 2011, Hillary Clinton was one of Putin’s least favorite people.  Even going as far as saying that <a href="http://time.com/4422723/putin-russia-hillary-clinton/">her adventuring</a>inLibya was akin to a Christian Crusade. Clinton’s <a href="https://www.washingtonpost.com/world/national-security/from-reset-to-pause-the-real-story-behind-hillary-clintons-feud-with-vladimir-putin/2016/11/03/f575f9fa-a116-11e6-8832-23a007c77bb4_story.html?utm_term=.2e93373b393a">written opinion</a>on Putin as she moved on in 2013 was simple “Snub him”.</p>
<p>+ + +</p>
<p>At 8:50am on August 3, 2015 then Presidential contender Donald Trump sent a <a href="https://twitter.com/realDonaldTrump/status/628231488794923008">tweet</a>.</p>
<p>&#8220;It came out that Huma Abedin knows all about Hillary’s private illegal emails. Huma’s PR husband, Anthony Weiner will tell the world.&#8221;</p>
<p>On August 31, Trump <a href="https://twitter.com/realDonaldTrump/status/638318502059880450?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E638318502059880450&amp;ref_url=http%3A%2F%2Fnymag.com%2Fdaily%2Fintelligencer%2F2016%2F10%2Fthe-fbi-reopens-investigation-into-hillary-clintons-emails.html">tweets</a> again.</p>
<p>&#8220;Huma Abedin, the top aide to Hillary Clinton and the wife of perv sleazebag Anthony Wiener, was a major security risk as a collector of info&#8221;</p>
<p>This hack is different from the DNC hack, the attack on Abedin&#8217;s computer appeared to be a catfish attack in which a hacker adopted the personas of Betty and Veronica to plant underage photos of themselves on Abedin&#8217;s laptop via Wiener&#8217;s shared usage of it. Rather than go into the complicated process of engineered stings, the black op conspired to put illegal child pornography on Abedin’s laptop, use the NYPD (which investigated underage sex crimes) to seize the laptop because of those photos and then accidentally discover Clinton&#8217;s missing emails on the same laptop hard drive. Now if that is though through the New York prosecutors&#8217; investigation into allegations that Weiner had sexted with an underage girl should have nothing to do with classified emails or political games in the case of pedophilia.</p>
<p>On October 28, 2016 the New York Times <a href="https://www.nytimes.com/2016/10/29/us/politics/fbi-hillary-clinton-email.html">carried the story</a>of Comey’s <a href="https://www.nytimes.com/interactive/2016/10/28/us/politics/fbi-letter.html?_r=0&amp;mtrref=undefined&amp;gwh=7557DA6AAC8D6A6853EAD9C6D0CD36FA&amp;gwt=pay">letter</a> announcing his decision to reopen the investigation into Hillary’s emails Abedin/Wiener emails after 650,000 emails were found.</p>
<p><strong>NYPD</strong></p>
<p>On September 22, 2016 Preet Bahara in the New York U.S. Attorney&#8217;s office issued subpoenas for Anthony Wiener&#8217;s electronic devices.</p>
<p>Bahara and NYPD detectives and the Manhattan District Attorney&#8217;s office also <a href="https://nypost.com/2016/09/22/nypd-investigating-weiners-sexting-relationship-with-teen/">confirmed</a> to the <em>New York Post</em> that they were investigating Weiner.  The core of the announcement was &#8220;The NYPD’s Special Victims Unit is investigating the matter after a 15-year-old high-school student released a trove of sick texts and photos she allegedly received from the disgraced politician.&#8221;</p>
<p><a href="http://dangerousmagazine.com/2018/08/02/hack-part-three/%20‎">Go to Part Five. The War on You</a></p>
<p>Back to <a href="http://dangerousmagazine.com/2018/07/29/hack-part-four/%20‎">Part Four of The Hack</a></p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/07/29/hack-part-five-catfished/">The Hack Part Five: Catfish and Honey</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2018/07/29/hack-part-five-catfished/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Hack &#8211; Part Two: The Hunt for Clinton Dirt</title>
		<link>http://dangerousmagazine.com/2018/07/29/2407/</link>
		<comments>http://dangerousmagazine.com/2018/07/29/2407/#comments</comments>
		<pubDate>Mon, 30 Jul 2018 02:15:13 +0000</pubDate>
		<dc:creator><![CDATA[Lisa]]></dc:creator>
				<category><![CDATA[New Issue]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2407</guid>
		<description><![CDATA[<p>by Robert Young Pelton “The campaign had no contact with Russian officials,” “It never happened, there was no communication between the campaign and any foreign entity during the campaign.” Trump spokesperson Hope Hicks November  11, 2016 &#8220;One who deceives will always find those who allow themselves to be deceived.&#8221; – Niccolo Machiavelli Read Part One As we learned in Part One, the hacking of emails, devices and computers are just one tool in the psyops toolbox. But it is what the hacker...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/07/29/2407/">The Hack &#8211; Part Two: The Hunt for Clinton Dirt</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>by Robert Young Pelton</p>
<div id="attachment_2436" style="width: 1804px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/07/Screen-Shot-2018-08-01-at-6.48.23-AM.png"><img class="size-full wp-image-2436" src="http://dangerousmagazine.com/wp-content/uploads/2018/07/Screen-Shot-2018-08-01-at-6.48.23-AM.png" alt="© 2018 Sarah Sole, all rights reserved. https://sarahsole.art/" width="1794" height="1148" /></a><p class="wp-caption-text">© 2018 Sarah Sole, all rights reserved. https://sarahsole.art/</p></div>
<p style="text-align: center"><em>“The campaign had no contact with Russian officials,”</em></p>
<p style="text-align: center"><em>“It never happened, there was no communication between the campaign and any foreign entity during the campaign.”</em></p>
<p style="text-align: center">Trump <a href="https://investigaterussia.org/media/2018-02-28/hicks-nov-2016-statement-under-scrutiny">spokesperson</a> Hope Hicks November  11, 2016</p>
<p style="text-align: center"><em>&#8220;One who deceives will always find those who allow themselves to be deceived.&#8221;</em></p>
<p style="text-align: center">– Niccolo Machiavelli</p>
<p>Read <a href="http://dangerousmagazine.com/2018/07/19/hack-part-one/">Part One</a></p>
<p>As we learned in <a href="http://http://dangerousmagazine.com/2018/07/19/hack-part-one/">Part One</a>, the hacking of emails, devices and computers are just one tool in the psyops toolbox. But it is what the hacker does with what they find that is important.  Even if nothing is found during the hack, the public cyber shaming of the victim for being incompetent on how they handle their communications can be a powerful psyops weapon as in the case of Hillary Clinton. An elderly woman who insisted on using Blackberry phones and telling her younger aide Huma Abedin&#8221;to print this out&#8221;. Huma used to also backup her Blackberry on her husband&#8217;s, laptop at home. Clinton as Secretary of State was expected to use government email to provide a historical record and a certain level of security. It would be discovered after she left office that she never used a .gov email address and had carefully wiped out her personal after her lawyers printed out the emails she felt were relevant. From this came the concept that Clinton had destroyed sensitive or incriminating emails. The unproven absence of something can be equally damaging as finding something during a hack.</p>
<p>So we begin our journey to find the fabled &#8220;Clinton Dirt&#8221; something that may have never really existed during the campaign but somehow allowed foreign powers, carpet baggers, hustlers and hangers-on to undermine the integrity of an election, and thereby casting doubt on the legitimacy of the democratically elected President. The search for Clinton Dirt was so powerful, so seductive that it created numerous provable links to Russian proxies and entities, none of whom actually had Clinton Dirt. Why would Russians promise they had Clinton Dirt and never deliver?  Was this a clever trap? The perfect way to ensnare a Presidential Candidate whose followers seemed obsessed with the idea that Hillary Clinton was a crook? Was this the perfect way to seduce Trump to prove that he was a crook and linked to Russian influence?</p>
<p>Is Donald Trump a Russian lackey? His staff’s constant denials set against the actual proof of clandestine, low key meetings and a list of compromised associates might appear to contradict his denials. There is no direct link of direct benefit to Trump but there is a stunning amount of circumstantial evidence that links dozens of Russia citizens to both Trump&#8217;s business and political campaign. Almost as if it was carefully planned that way knowing full well that there would be efforts to draw direct lines between Putin and Trump.</p>
<p>The allegation of Russian collusion would not be directly connected if Trump had not specifically asked the Russians to find Hillary&#8217;s missing emails. On <a href="https://www.pbs.org/newshour/politics/trump-asked-russia-to-find-clintons-emails-on-or-around-the-same-day-russians-targeted-her-accounts">July 27, 2016</a> Trump looked at the camera at a press conference and said&#8221; <em>Russia</em>, if you&#8217;re listening, I hope you&#8217;re able to <em>find</em> the 30000 emails that are <em>missing</em>, I think you will probably be rewarded mightily <em>by our press&#8221;. </em>Not Trump. The media.</p>
<p>Phishing emails from numerous Russian sources began to bombard the Clinton personal servers. So despite joking that the media would be all over any hidden emails from Clinton,  is that the proof that Trump conspired to hack Clinton?</p>
<p>It would be too simple to believe that is how the hack began. In reality the Internet Research Agency aka &#8220;the troll factor) was <a href="https://www.wired.com/story/inside-the-mueller-indictment-a-russian-novel-of-intrigue/">founded</a> in the summer of 2013 in Putin&#8217;s home town of St. Petersburg, They had already begun supporting Trump in 2015 by essentially backing anyone who ran against Clinton. Trump became the de facto candidate of choice.</p>
<p>Was Hillary Clinton hiding something in her deleted emails she “wiped clean, like with a cloth” as <a href="https://townhall.com/tipsheet/mattvespa/2015/08/18/hillary-presser-did-i-wipe-server-like-with-a-cloth-or-something-n2040633">she said</a> on August 2015? Probably. But there is no evidence that Clinton even really seriously used email for anything important. Most of the emails that were labeled as sensitive to classified were simply passing through along with the tedious back and forth of travel and meeting needs. Essentially if Clinton was involved in dirty deals or underhanded activities, she was smart enough not to create an email record.</p>
<p>Her response captured her sense of tone deafness after it was revealed her IT people had used a professional program called <a href="https://www.bleachbit.org/">BleachBit</a> to wipe out any useful data on her New Jersey-based server before handing it over to law enforcement. If you are towards the right you will believe that Hillary Clinton is hiding something terrible, or rather was hiding something and had to delete her emails.</p>
<p>Or are both narratives wrong?</p>
<p>Was the bizarre number of people linked to Russia offering Trump Clinton Dirt, but never delivering it,  a very clever way to entrap him into looking like he was working with the Russians? Could it be that Clinton or Obama was catfishing Trump with proxies offering Clinton Dirt that didn&#8217;t exist?</p>
<p>Fusion GPS, the manager and producer of the Steele Dossier <a href="http://www.foxnews.com/politics/2017/11/07/fusion-gps-official-met-with-russian-operative-before-and-after-trump-jr-sit-down.html">had another client in addition to the Democrats</a>. Prevezon Holdings, or rather through BakerHostetler, the law firm that represented Denis Katsyv in his fight to get sanctions lifted. According to records, Fusion GPS was paid $523,651 between March and October 2016 to find damaging information against Bill Browder, the main instigator of the Magnitsky Act and sanctions.</p>
<p>Katsyv had also hired Russian lawyer and FSB informant Natalia Veselnitskaya to represent his company in the U.S. plea bargains. Incredibly, Glenn Simpson, the owner of FusionGPS met with Veselnitskaya just hours before and right after the Russians met at Trump Tower. This puts an entirely different spin on the reason for the Trump meeting when it becomes apparent of  Fusion GPS role in not only providing Trump Dirt to Russia and what appears to be quarterbacking the meeting with Trump&#8217;s people. Remember the two spies were being squired around DC by Paul Behrends to promote lifting of sanctions, but offered to provide Clinton Dirt to Trump Jr.</p>
<p>The June 9, 2016 meeting at Trump Tower was odd. It was set up by Rob Goldstone. Goldstone worked for the Russian oligarch, Aras Agalarov, and his wannabe pop singer son, Emin.  Both had been part of getting Trump to stage the 2013 Miss Universe pageant in Moscow. In a fascinating do-loop Veselnitskaya had shared Fusion GPS Steele Dossier with Yuri Chaika, the prosecutor general of Russia which Goldstone offered to Trump Jr after Paul Behrends who worked for Dana Rohrabacher had pimped Veselnitskaya all over D.C. in incredibly clumsy attempt to smear Magnitsky and lift sanctions. There was a loop here.</p>
<p>Rob Goldstone <a href="https://www.telegraph.co.uk/news/2017/07/11/transcript-donald-trump-jrs-email-chain-meeting-russian-lawyer/">sent an email</a> to Donald Jr. promising that <em>&#8220;The Crown prosecutor of Russia met with his father Aras (Agalarov, real estate magnate) this morning and in their meeting offered to provide the Trump campaign with some official documents and information that would incriminate Hillary and her dealings with Russia and be very useful to your father.&#8221;</em> this was the intro to Veselnitskaya. Who didn&#8217;t have anything on Clinton and quickly turned the conversation to sanctions. Even odder was the Trump cover story that Veselnitskaya was there to discuss the lifting of the banning of Russian child adoptions by Putin in retaliation for the sanctions. Perception? Trump was colluding with Russians to affect the elections. Reality? A waste of time, but a very public waste of time that would be be pointed to as proof of collusion.</p>
<p>Goldstone would later shrug it off and tell the <em>Independent</em>, “If I’m guilty of anything, and I hate the word guilty, it’s hyping the message and going the extra mile for my clients. Using hot-button language to puff up the information I had been given,”</p>
<p>A perfect example of tertiary effects of psyops in which Trump&#8217;s enemies may have set a trap, knowing his desperate need for &#8220;Clinton Dirt&#8221;. The Trump camp would actually find themselves saddled with the appearance of potential criminality and Russian collusion. So did Fusion GPS, the same company that created and shopped the &#8220;Trump in bed with Russians&#8221; Steele Dossier, also make money setting up Trump to look like he was in bed with the Russians?</p>
<p>If it is proven that neither Trump or Clinton were hacked and that neither had a ulterior motive in hiding anything would it really matter anymore? Each side was fed a narrative that was comfortable to them. Both sides burdened with a narrative that has yet to be based on actual proof.</p>
<p>Such is the power of hacking the human brain.</p>
<p>+ + +</p>
<p>Not knowing,  or not having evidence, is a powerful weapon to use against a target in a psyops campaign. Just like lying, or not telling something,  to the FBI is a powerful tool in flipping witnesses.  Why was Hillary Clinton allowed to choose which emails to hand over and why was she allowed to delete these emails she felt were irrelevant? Why were her associates devices seized and searched for classified information?</p>
<p>Worse, why wasn&#8217;t Clinton and her lawyers treated the same way by the FBI as Trump and his lawyer Michael Cohen? These are legitimate questions that support Trump supporters views that there is a “deep state” friendly to Obama era appointees and staff. A very Soviet idea but one that has support in the way that now fired Trump opponent <a href="https://www.ctvnews.ca/world/fbi-fires-peter-strzok-in-wake-of-anti-trump-text-messages-1.4050697">Peter Strozk</a> firewalled any expansion of the search beyond Clinton&#8217;s server.</p>
<p>Although forensics and aggressive FOIA’s are still piecing together what happened, the Clinton records aka emails while Secretary of State are being demanded in <a href="https://www.cbsnews.com/news/emails-show-nsa-rejected-hillary-clinton-request-for-secure-smartphone/">38 different lawsuits</a>.  It is not surprising that the missing emails became the single most inflammatory part of the 2016 election cycle and as we will show, cost Clinton the election.</p>
<p>In the run up to the 2016 election, those around Trump were virulently anti-Clinton and wanted those emails. Trump himself consistently accused his opponent of hiding something, being a criminal and going as far as creating the &#8220;lock her up&#8221; chant. Donald Trump and his camp hoped that something was those missing emails that would disgrace Clinton and be part of what could be used or an “October Surprise”. A term used to describe a piece of surprising news or shocking discovery about a political candidate that is dropped just before voters decide on which party will run the country.</p>
<p>The most famous example of an October Surprise is the 1980 release of the Iranian-held hostages as soon as Ronald Reagan took office. A despicable act of cruel deceit engineered by campaign manager and spook William Casey according to author Gary Sick who investigated a plot to ensure that President Carter would look powerless and not be elected.  Casey had been in the OSS in World War Two and run the European intelligence network. After Reagan was elected he headed the CIA and was responsible for a robust approach against Soviet influence around the world. Carter’s perceived inability to release the hostages crushed his reelection hopes.</p>
<p>This Reagan-era dirty trick was not forgotten by a group of Reagan-era Trump supporters who include Iran Contra figure Oliver North, close friend Erik Prince former boss and Reagan speechwriter Dana Rohrabacher and others. Trump seemed to gather Reaganites around him even though he had a history of being a <a href="https://www.washingtonpost.com/news/the-fix/wp/2015/07/09/ths-many-ways-in-which-donald-trump-was-once-a-liberals-liberal/?utm_term=.77bd4fd939ab">liberal’s liberal</a> and a libertine. Family values, religion, conservative values did not seem to square with the oft married, oft gossiped 80’s era social icon from Queens. But for this election he was right, perhaps right of right. Alt Right.</p>
<p>+ + +</p>
<p>Libertarians have always yearned to hack the Republican party. Terrified to to stray too far right, Trump offered the chance to enter uncharted water. Anarchistic almost.<a href="https://www.franciscanmedia.org/steve-mceveety-catholic-producer-in-hollywood/"> Steve McEveety,</a> a deeply religious film producer that had worked for Mel Gibson at Icon and with Erik Prince on an anti-Iran film called the <em>Stoning of Soraya M</em>. McEveety introduced Bannon to Prince in late June of 2012.  After the death of Andrew Breitbart and a cash infusion from the Mercers, Bannon wanted to move fast and break things. He gathered around him lightening rods for controversy. Prince who had interned with Rohrabacher and Behrends was an ideal shit magnet.  Bannon was fascinated by my article on Benghazi. Prince and Bannon became fast co-conspirators against Hillary Clinton.</p>
<p>Erik Prince although too young to be a Reaganite, but was a Reagan-era groupie. He had gathered around himself many cast off conservatives ranging from his lawyer Victoria Toensing, Olly North, Paul Behrends, Dana Rorhabacher and many others. His father Edgar Prince had built and funded conservative organizations like Focus on the Family and supported Bush Sr and Reagan. He had a retro appeal to conservatives and even the mention of his company name Blackwater would trigger endless arguments among right and left wingers.</p>
<p>Prince also had a burning hatred for Secretary of State Hillary Clinton who he publicly blames for <a href="https://www.vanityfair.com/news/2010/01/blackwater-201001">singlehandedly disassembled and destroying Prince’s Blackwater business</a> legacy. A business built on working for the State Department providing armed guards, aircraft and vehicles in Iraq under Bush Jr, and then destroyed when President Obama and what would have been his new boss, Secretary of State Hillary Clinton came into power</p>
<p>Prince tends to minimize the bloody murders by his employees in Nissour Square as the reason for his company’s demise. Clinton not only took away Prince’s billion-dollar source of income but had 7 federal agencies on his tail until Prince was forced to sell all his contracting businesses and move to Abu Dhabi in 2010. So with the idea that a Republican would return to office, Prince and the Reaganite gaggle literally appeared at Trump’s doorstep waiting down at the bar until summoned up the elevator.</p>
<p>Once the Mercer family and Trump <a href="https://www.nytimes.com/2016/08/18/us/politics/donald-trump-stephen-bannon-paul-manafort.html">installed Breitbart firebrand and Benghazi basher Steve Banno</a>n in August of 2016, big and little donor money began to flow. Reagan political dinosaur Paul Manafort and Trump&#8217;s tower tenant had been r<a href="https://abcnews.go.com/Politics/timeline-paul-manaforts-role-trump-campaign/story?id=50808957">unning Trump&#8217;s campaign</a> for free since March 29, but although he had hitched the Republican money wagon to Trump&#8217;s campaign, it was quickly discovered he had other agendas. On July 24, 2016, ABC News&#8217; <a id="ramplink_George Stephanopoulos_" href="http://abcnews.go.com/topics/news/reporters/george-stephanopoulos.htm" target="_blank">George Stephanopoulos</a> asked Manafort &#8220;Are there any ties between Mr. Trump, you or your campaign and Putin and his regime?&#8221; on ABC&#8217;s &#8220;This Week” Manafort replied&#8221;No, there are not, It&#8217;s absurd and there&#8217;s no basis to it.&#8221;</p>
<p>Manafort held out as long as he could but when it was clear that Trump was cutting him loose, he flipped.</p>
<p>Paul Manafort would be slammed to the curb hard by Robert Mueller. First put on trial for laundering millions of dollars from his political work in Ukraine with any reference to Trump and the campaign omitted. Manafort went down hard. He was acting a second trial and threw in the towel. All part of the surgical dissection of connective tissue by Mueller.</p>
<p>The Mueller prosecution may deftly sidestep Clinton Dirt, Russians and Trump and go directly to the heart of the matter. Money laundering. According to his business partner, Prince is said to have been paid $13 million a month by the UAE for his arms length Reflex Response contract in cash. Paid in newly minted, 100 dollar bills banded and sequential. Paul Manafort is accused of moving millions from his work in the Ukraine, and Michael Cohen is going to go on trial for hustling millions for access to Trump. All of them hoped Trump would give them top cover. None received it.</p>
<p>As former Trump advisor and insider Steve Bannon is quoted to have said,<a href="http://www.chicagotribune.com/news/opinion/commentary/ct-trump-money-laundering-kushner-20180105-story.html"> &#8220;this is all about money laundering&#8221;</a>.</p>
<p>In Michael Wolf&#8217;s book <a href="https://www.amazon.com/Fire-Fury-Inside-Trump-White/dp/1250158060/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1534349001&amp;sr=1-1&amp;keywords=michael+wolf+trump"><em>Fire and Fury,</em></a>  Bannon is said to have said about , &#8220;Their (Mueller&#8217;s) path to fucking Trump goes right through Paul Manafort, Don Jr. and Jared Kushner. &#8220;It goes through Deutsche Bank and all the Kushner stuff,&#8221;</p>
<p>It&#8217;s not clear why Trump chose Reagan-era archival villians and political operatives like Roger Stone and his former partner Paul Manafort formerly partners in <a href="http://content.time.com/time/subscriber/article/0,33009,960803-1,00.html">Black, Manafort, Stone &amp; Kelly</a> were dusted off and put to work getting Trump elected. Stone had always considered Trump an ideal candidate for President and boasted about his skill at crafting falsehoods and dirty tricks. Manafort had just spent a few years working Pro-Russian Ukrainian politics. Everyone seemed old, in exile and burnt, everyone brought baggage. Trump didn’t seem to care.</p>
<p>They bragged of their lobbying work for dictators and warlords under President Reagan and they kept busy. Manafort’s work in the Ukraine kept him busy and well heeled, something he had done for a variety of dark horses. He is famous for turning Maoist warlords like Angola’s Joseph Savimbi into U.S. backed freedom fighters is not easy, but in a world where image is everything it didn’t much to fool the media. Roger Stone kept insisting that Trump could be President, <a href="http://www.slate.com/articles/news_and_politics/politics/2016/08/jacob_weisberg_s_classic_new_republic_profile_of_trump_adviser_roger_stone.html">some thought</a> that endorsement would actually hurt Trump’s chances.. After four months putting together a political machine, Manafort was ultimately fired as was Stone after a number of “two-martini tweets” as Stone calls them.</p>
<p>Eventually when the media began to research his inner circle’s missteps, Trump would methodically throw each of them down the media well, hoping their baggage would drown them.</p>
<p>+ + +</p>
<p>Next Part Three</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/07/29/2407/">The Hack &#8211; Part Two: The Hunt for Clinton Dirt</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2018/07/29/2407/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Hack &#8211; Part Three: Deception and Deceit</title>
		<link>http://dangerousmagazine.com/2018/07/19/hack-part-tworobert_young_pelton/</link>
		<comments>http://dangerousmagazine.com/2018/07/19/hack-part-tworobert_young_pelton/#comments</comments>
		<pubDate>Thu, 19 Jul 2018 17:33:10 +0000</pubDate>
		<dc:creator><![CDATA[Lisa]]></dc:creator>
				<category><![CDATA[New Issue]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2361</guid>
		<description><![CDATA[<p>“All warfare is based on deception. Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.” – Sun Tzu, The Art of War Read Part One and Part Two of The Hack By Robert Young Pelton &#160; &#160; Who Hacked Who? In Part One of The Hack we learned that after...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/07/19/hack-part-tworobert_young_pelton/">The Hack &#8211; Part Three: Deception and Deceit</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="text-align: center"><em>“All warfare is based on deception. </em><em>Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.”</em></p>
<p style="text-align: center">– Sun Tzu, The Art of War <span id="quote_book_link_10534"></span></p>
<p>Read <a href="http:/http://dangerousmagazine.com/2018/07/29/2407/">Part One</a> and <a href="http://dangerousmagazine.com/2018/07/29/2407/">Part Two</a> of <strong>The Hack</strong> By Robert Young Pelton</p>
<p>&nbsp;</p>
<div id="attachment_2594" style="width: 1010px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2020/10/1000w_q95.jpg"><img class="size-full wp-image-2594" src="http://dangerousmagazine.com/wp-content/uploads/2020/10/1000w_q95.jpg" alt="Secretary of State Mrs. Hillary R. Clinton poses for a group photo with U.S. Marines stationed on Marine Corps Air Station (MCAS) Miramar, Calif., Aug 30, 2012 Photo: Cpl. Jamean R. Berry" width="1000" height="667" /></a><p class="wp-caption-text">Secretary of State Clinton returning from <a href="https://history.state.gov/departmenthistory/travels/secretary/clinton-hillary-rodham">Asia</a> stops to pose for photos on a refueling stop at Miramar California,  Aug 30, 2012 Photo: Cpl. Jamean R. Berry</p></div>
<p>&nbsp;</p>
<p><strong>Who Hacked Who?</strong></p>
<p><i>In </i><a style="font-style: italic" href="http://dangerousmagazine.com/2018/07/19/hack-part-one/">Part One</a><i> of The Hack we learned that after a Romanian cab driver reset Sydney Blumenthal&#8217;s email password and published screen shots on </i><a style="font-style: italic" href="http://www.thesmokinggun.com/documents/sidney-blumenthal-email-hack-687341">The Smoking Gun</a><i> on March 15, 2013. We also know that Hillary Clinton did not use a .gov address for her work as Secretary of State, she barely even used a computer, instead relying on her non secure Blackberry and assistant Huma Abedin to organize her life.  In 2014 when her 62,320 emails were subpoenaed Clinton&#8217;s lawyers handed over printed out copies of emails and over a professionally erased server with the explanation that Clinton was choosing &#8220;not to keep&#8221; 31,830 personal and unrelated emails. And we learned that all her electric communications during her first three weeks of her job as Secretary of State vanished when her staff switched to new, more secure server. </i></p>
<p><i>All this was discovered during and after the Benghazi hearings and triggered a hunt for the missing emails. Weaponized for the 2016 elections by the Trump campaign staff and camp followers. </i></p>
<p><i>In </i><a style="font-style: italic" href="http://dangerousmagazine.com/2018/07/29/2407/">Part Two</a><i> we went inside the search for &#8220;Clinton Dirt&#8221;. A quest by inner members and hanger-ons of the Trump campaign for the deleted emails that also seemed to attract the interest of Russians hired hackers, eager to drop sanctions and provide &#8220;dirt&#8221; on Hillary Clinton.  Those Russians seen the hunger for these missing emails slipped their tentacles fully inside and around the Trump campaign but never provided any of the missing Clinton emails. Based on the original Guccifer&#8217;s hack of Blumenthal&#8217;s AOL account, it was clear that Clinton emails existed in many other email accounts.  </i></p>
<p><i>So why was the nation shocked when on  April 18, 2016 the Democratic National Committee was hacked by a person who called themselves Guccifer 2.0.?</i></p>
<p>At first the DNC did not know how to respond to the hack. When the CEO of the Democratic National Committee Amy Dacey was told by their IT people that something odd was happening with their servers, Michael Sussman, a DNC lawyer <a href="https://www.buzzfeednews.com/article/jasonleopold/he-solved-the-dnc-hack-now-hes-telling-his-story-for-the">called the President of a company</a> called CrowdStrike. <a href="https://www.slideshare.net/CrowdStrike/bear-hunting-history-and-attribution-of-russian-intelligence-operations">Crowdstrike</a> is a cyber security company owned by Moscow-born CTO<span class="apple-converted-space"> </span><a href="http://www.esquire.com/news-politics/a49902/the-russian-emigre-leading-the-fight-to-protect-america/">Dmitri Alperovitch</a> and former<span class="apple-converted-space"> </span><a href="https://techcrunch.com/2012/02/23/former-mcafee-cto-debuts-stealthy-security-technology-startup-crowdstrike-with-26m-in-funding/">McAfee</a> anti-virus vet George Kurtz.  The investigation was led by former Marine Cyber Red Teamer Marine Robert Johnston.</p>
<p>An organization with the high profile, donor data and sensitive communications during a national election and felony level crimes being committed would normally call the FBI, but the FBI was still investigating Clinton’s use or misuse of a private server and financial irregularities in her charitable foundation&#8230;and it was an election. Worse, If the FBI froze the DNC system as evidence or if the media were to link the amateur way the Clinton handled her sensitive State Department work and threw in the childlike way the DNC was hacked, the election might be over for Clinton. For the FBI to announce an investigation and to conduct one that had sever political consequences was highly unusual.</p>
<p>The forensics of the DNC hack, as outlined in <a href="https://www.slideshare.net/ThreatConnect/guccifer-20-the-dnc-hack-and-fancy-bears-oh-my">reports</a> and a <a href="https://www.wired.com/story/dnc-lawsuit-reveals-key-details-2016-hack/">lawsuit</a> filed by the DNC, quickly showed that there appeared to be two different Russian hacking groups involved and that the recent hack was only the latest attempt.</p>
<blockquote><p>The more appropriate question would have been, had the Democrat&#8217;s data ever <em>not</em> been comprised?</p></blockquote>
<p>The DNC servers and backup servers had been <a href="https://www.buzzfeednews.com/article/jasonleopold/he-solved-the-dnc-hack-now-hes-telling-his-story-for-the">compromised</a> a full year earlier on July 27, 2015 and then again in the more well known attack on April 18, 2016 by &#8220;Fancy Bear&#8221;, a common software and hacking team used to compromise email systems.</p>
<p>The DNC <a href="https://www.washingtonpost.com/politics/democratic-party-files-lawsuit-alleging-russia-the-trump-campaign-and-wikileaks-conspired-to-disrupt-the-2016-campaign/2018/04/20/befe8364-4418-11e8-8569-26fda6b404c7_story.html?noredirect=on">would later sue the Russians, WikiLeaks and everyone they thought were linked to their hack</a>, insisting that &#8220;Russia mounted a brazen attack on American Democracy&#8221;. The DNC would complain in their suit that they were forced to &#8220;decommission more than 140 servers, remove and reinstall all software, including the operating systems, for more than 180 computers, and rebuild at least 11 servers.”</p>
<p>And that was the good news.</p>
<p>The bad news was that in addition to the two (actually three) hacks, every single email in the DNC system had been downloaded to another unknown storage device. And it wasn’t even news to the DNC IT department. In September of 2015 the FBI told the IT department that they had been hacked. And that wasn&#8217;t the worst news&#8230;the entire State Dept during Clinton&#8217;s time had been under attack and even the White House had been hacked as far back as 2014, Our government only discovered this after the Dutch AIVD intel division tipped off the NSA while watching the hack attempts&#8230;in real time.  The more appropriate question would have been, had the Democrat&#8217;s data ever <em>not</em> been comprised?</p>
<p>Fast forward to 2016 and no one should have been surprised that Clinton&#8217;s devices and communications were under attack.  Based on what the FBI had told the DNC and what Crowdstrike later discovered that a foreign government was aggressively trying to gather data about an election and perhaps find compromising information that could be used a d against them. This was linked by the media to the assumption that Trump somehow began this process of illegal hacking when famous dirty trickster Paul Manafort joined his campaign.</p>
<p>Clinton had caught Putin&#8217;s attention long before her run for President.</p>
<p>In reality the DNC and Clinton had been outed by the media for terrible security protocol and they decided to spin the hack. The DNC worked out a deal with the <i>Washington Post </i>which ran an <a href="https://www.washingtonpost.com/world/national-security/russian-government-hackers-penetrated-dnc-stole-opposition-research-on-trump/2016/06/14/cf006cb4-316e-11e6-8ff7-7b6c1998b7a0_story.html?utm_term=.b359af98fb4f">exclusive piece</a> on June 14, 2016. The headline screamed “Russian government hackers penetrated DNC, stole opposition research on Trump”.  The article made it seem like the hacker was after &#8220;Trump Dirt&#8221; and downplayed the previous disastrous data and customer data breaches. The problem was, there was no Trump Dirt hidden in the DNC servers just a massive dull &#8220;oppo&#8221; piece constructed from of published articles that an intern could easily assemble using Google or search engine LexisNexis. It wasn&#8217;t a big secret that Trump had a lifetime questionable misdeeds and associates. The only real unanswered question that insiders had was who owned Trump?</p>
<p>“It’s the job of every foreign intelligence service to collect intelligence against their adversaries”, said Shawn Henry president of CrowdStrike and assuring donors that no personal data was stolen. Which appeared to later be a fib since the among many docs that hacker Guccifer 2.0 posted on his blog <a href="http://gawker.com/contrary-to-dnc-claim-hacked-data-contains-a-ton-of-pe-1782132678">were detailed spreadsheets</a> with donor information. The WaPo article parrots the claim. “The DNC said that no financial, donor or personal information appears to have been accessed or taken suggesting that the breach was traditional espionage not the work of criminal hackers.” Again not true. Every part of the DNC email system including back up servers had been compromised, ever since Clinton <a href="https://www.nytimes.com/2015/04/13/us/politics/hillary-clinton-2016-presidential-campaign.html">announced her run for the office</a> of President on April 12<sup>th </sup>of 2015.</p>
<p>Before that there numerous clear indications that the Clintons were also targets of many hacking attempts and attacks. And Hillary Clinton as a private citizen angling for a high profile job in Obama administration had made it very easy for anyone who knew where she lived to find her email addresses, URLs and server location in her home.</p>
<p>+ + +</p>
<p>Was Hillary Clinton a tech guru who knew how to hide her comms and data, or was she naive about technology? We know that the Clinton&#8217;s transition to private life was focused on access and making money. There is plenty of evidence to show that their approach to security or tech was minimal and amateur.</p>
<p>The Clinton&#8217;s had two, very easy to find homes, a 5,152 sq ft brick mansion in <a href="https://www.zillow.com/homedetails/3067-Whitehaven-St-NW-Washington-DC-20008/68084274_zpid/">Whitehaven</a> and a 1889 built,  $1.7milion  5,232 square foot cut de sac home in <a href="https://www.zillow.com/homedetails/15-Old-House-Ln-Chappaqua-NY-10514/33065659_zpid/">Chappaqua</a>, NY. Each had an iMacs in each home office. The once <a href="https://www.apple.com/newsroom/2003/11/18Apple-Introduces-New-Dual-Processor-1-8-GHz-Power-Mac-G5/">sleek aluminum Apple G5</a> tower was introduced in 2003 and was discontinued in August of 2006. The legacy URL for the Clintons was wjcoffice.com would forward emails to husband&#8217;s &#8220;presidentclinton.com&#8221; account but Hillary didn&#8217;t use that URL for obvious, ironic reasons.  As Senator from New York, she used the Blackberry account; <a href="mailto:hr15@mycingular.blackberry.net" target="_blank">hr15@mycingular.blackberry.net</a>  which didn&#8217;t store emails on her home server, just her actual Blackberry handset.  Her other emails and texts were backed up on her server</p>
<p>It is coincidental but on December 23, 2009,  Clinton assistant and keeper of the Clinton IT network,  <a href="https://www.bloomberg.com/research/stocks/private/person.asp?personId=222852653&amp;privcapId=40152409">Justin Cooper</a> sen<a href="https://wikileaks.org/clinton-emails/emailid/30487">t an article by email </a>to Clinton staff warning them of two massive meltdowns of  Blackberry service caused by software glitches. It was of course read on everyone&#8217;s Blackberry. <a href="https://wikileaks.org/clinton-emails/emailid/33647">Hillary also asks Cooper on where her messages went</a>:</p>
<p><span class="inlinemeta">Original Message </span></p>
<p><em><span class="inlinemeta">From: H </span></em></p>
<p><em><span class="inlinemeta">To: Justin Cooper Sent: Tue Sep 29 07:16:33 2009 </span></em></p>
<p><em><span class="inlinemeta">Subject: Lost messages </span></em></p>
<p><em><span class="inlinemeta">I&#8217;ve lost all messages from 11/9 back to 2008. Anyway to recover since I had drafts saved?</span></em></p>
<p><em>Tuesday,September 29, 2009 7:28 AM </em></p>
<p><em>on behalf of Justin Cooper </em></p>
<p><em>B6 </em></p>
<p><em>Re: Lost messages </em></p>
<p><em>Yes. They are all backed up on the server the easaiest and quickest way is to log on to the webmail server and click on the drafts folder or the inbox. If you have not used the webmail happy to walk you through that or have huma help you. Your old berry has messages back to august 29 2009 and then only saved messages prior to that. The saved messages should be on your berry as well. </em></p>
<p><em>J</em></p>
<p><strong>New Gear for a New Year</strong></p>
<blockquote><p>Colin Powell that warned her that if people find out that she was using a Blackberry to do both personal and government business, then all that content including personal communications can become the official record and is subject to oversight and FOIA.</p></blockquote>
<p>&nbsp;</p>
<p>But wait, this is September of 2009, Clinton had a new server installed in her home after she became Secretary of State. Huma Abedin even set up an new URL called clintonemail.com  on January 13, 2009. It would appear that Clinton was using multiple email addresses for personal and official business with overlap between official and personal storage devices. Something not uncommon but increasingly frowned upon as governments turned to electronic communications and knowledge of hacking and data leaks grew exponentially.</p>
<p>On January 24, 2009 the State Department proposed putting together a secure communication system for her but she declined. It was actually former Secretary of State Colin Powell that warned her that if people find out that she was using a Blackberry to do both personal and government business, then all that content including personal communications can become the official record and is subject to oversight and FOIA.</p>
<p>As Secretary of State, Clinton was also surprised to discover that Blackberries were banned in sensitive communication areas or SCIFs. The standard procedure is to put all phones in a locker outside  and pick it up as you leave the secure area. Clinton&#8217;s office on the 7th floor of the State Department was a secure area and her phone was banned. Despite this she used her insecure phone backed up to her home server.</p>
<p>On March of 2009, after Clinton began her job as Secretary of State, Bryan Pagliano a Clinton aide turned State Department employee installed two new servers in the Clinton&#8217;s basement in Chappaqua New York. Delegated to her assistant Huma Abedin, Abedin turned to long time Bill Clinton assistant Justin Cooper,  &#8220;I usually called Justin. He was our go-to guy. He always was, you know, ‘I’m having a problem, can you help me fix it,’ and he always did…&#8221;</p>
<p>Cooper along with Doug Band had been around Bill Clinton since 2006 and by 2009 he pulled down <a href="https://www.washingtonexaminer.com/clinton-tech-aide-netted-six-figure-salary-from-foundation">a $127,200 annual salary</a> from the Clinton Foundation. Cooper not only helped the former President in his post Presidential career, but also helped him with his book and financials.</p>
<p>After Hillary lost the 2008,  Cooper helped Hillary Clinton with her comms and emails, Cooper turned to Bryan Pagliano who actually put the Clinton email system together. Tech savvy Cooper, watched the activity logs and made it clear to the young Pagliano that wanted to make sure that he had physical access to the server, something the more IT- sophisticated Pagliano didn&#8217;t agree with.</p>
<p><a href="https://www.reuters.com/article/us-usa-election-clinton-emails-idUSKCN11U0PG">Pagliano was smart enough to tell Clinton&#8217;s Chief of Staff Cheryl Mill</a>s of his concerns about the Clintons using a rudimentary home server and smart enough to refuse to testify in front of congress after being served with a subpoena. Pagliano, who worked for Clinton as a political appointee between May 2009 and February 2013, <a href="https://www.washingtonpost.com/world/national-security/in-clinton-email-investigation-justice-department-grants-immunity-to-former-state-department-staffer/2016/03/02/e421e39e-e0a0-11e5-9c36-e1902f6b6571_story.html?utm_term=.3e2be4b90656">was granted immunity</a> b the DoJ and also plead the fifth amendment multiple times and refused to cooperate with government investigations into Clinton&#8217;s emails. Clearly the disregard his client and boss had for secure communications was becoming criminal.</p>
<p>Clinton also had no interest in responding to the a request from the National Archives and Records Administration (NARA) as to <a href="https://abcnews.go.com/Politics/gop-accuses-state-dept-cover-protect-hillary-clinton/story?id=43050810">why Pagliano had so few emails </a>on record. The truth may simply be that Clinton used a Blackberry and kept her sensitive business off FOIA friendly .gov channels. Or perhaps Hillary Clinton was very knowledgeable about how communications can be used in politically motivated investigations.</p>
<p>As part of her job, Clinton had &#8220;SCIF&#8217;s&#8221;  (SCIF means <em>Sensitive Compartmented Information Facility)</em> installed in her northwest Washington DC home and in Chappaqua, New York, each with a secure phone and fax machine. Her favorite working tool was the lowly Blackberry cel phone, Clinton resigned herself do doing her sensitive office business with the three supplied secure phones, color coded for level of security but outside of the office Clinton and her &#8220;berry&#8221; were inseparable.</p>
<p>On March 18, 2009, Clinton&#8217;s new server set up was installed in Chappaqua, replacing what Justin Cooper would later confirm to Utah Rep Jason Chaffetz in his 2016 missing emails <a href="https://www.youtube.com/watch?v=Fy0AP7JqmaU">query</a> n 2016 an &#8220;out of the box solution.&#8221; running on one Apple G5 server and the by now ancient two iMacs, one in each Clinton home.</p>
<p>The new gear was good: a Dell PowerEdge 2900 running Windows Small Business Server and Microsoft Exchange and a Dell PowerEdge 1950 running Blackberry Enterprise Server to handle her and the staff&#8217;s Blackberry communications. A 3-terabyte hard drive was a good setup for a small to medium sized business and could handle the expected volume of emails Clinton&#8217;s team.</p>
<p>How email heavy was Hillary Clinton?  Outgoing not much but incoming was a lot. Clinton&#8217;s Chief of Staff, Cheryl Mills estimated she received an average of 500 emails a day at this time. There was no clear understanding of what was archived to where or by whom but the new server was reliable in handling the volume of traffic plus Blackberry comms. The servers automatically made daily backups and at some point an external Seagate back drive was added until September when a Cisco Network Attached Storage device was added. Servers are usually backed up to the cloud or stack of hard drives usually configured in a group of hard drives called a RAID (Redundant Array of Independent Disks) meaning if drive one goes down the others still have the data. Often these drives are swapped out in and kept in separate locations. In other words there are plenty of ways to backup data if a computer or drive goes down. The G5 server operated without encryption and even  the Clinton URLs did not have an SSL certificate until March 18, 2009 the date the new server was installed. SSL or Secure Sockets Layer allows encrypted links between a web server and a browser in an online communication.</p>
<p><strong>Gone Forever</strong></p>
<blockquote><p> It also meant that whatever Secretary of State Hillary Clinton was working on electronically as a government employee for the previous seven weeks no longer existed except in files and emails she might have sent to other people</p></blockquote>
<p>Despite all the various methods available to backup critical data and the seeming lack of basic safeguards, there was one major problem when the new server was installed, intentional or otherwise. When the new server and account <a href="mailto:hrod17@clintonemail.com" target="_blank">hrod17@clintonemail.com</a> was fired up all of Clinton&#8217;s previous emails and messages vanished. Forever. Without any any sense of suspicion this meant that when Clinton became an elected federal government official she deleted all of her emails and electronic communications. And the back ups.</p>
<p>It is important to note that the March installation/migration meltdown handled by, Cooper and Pagliano two competent IT Clinton insiders  It also meant that whatever Secretary of State Hillary Clinton was working on electronically as a government employee for the previous seven weeks no longer existed except in files and emails she might have sent to other people. In corroboration of this, Clinton did not provide any emails before March 19, 2009 to the FBI. To the casual observer, the complete and total destruction of all emails and associated attachments was a clear indication that even though Hillary was a Blackberry Luddite, she know how and when to burn the evidence.</p>
<p>The DNC hack would later show the cross over between Clinton&#8217;s personal, business and Clinton Foundations communications as Chelsea Clinton, John Podesta and members of both Clinton&#8217;s staff would cross pollinate discussions and emails. It could be expected that the missing emails could also contain that same structure. Just as Colin Powell hard warned her earlier about the need to separate personal and business. Let alone classified and Secret communications.</p>
<p>Luckily Huma Abedin was the main conduit for Clinton&#8217;s communications. She used a Dell Innova laptop that she shared with her husband Anthony Wiener. Clinton would regularly send, cc and bcc emails from her Blackberry to Abedin for print out or discussion later. It was not known what security was installed on the Innova laptop but anyone who had access to either computer would know the location and ID of everyone on the network.</p>
<p>This mundane laptop will feature prominently in Clinton&#8217;s career and not in a good way.</p>
<p>After the disappearance of the first round of personal and government emails, the previous Apple computer hard drive and we assume back ups were wiped clean and repurposed to a Clinton staff member. This type of cavalier handling of government and personal communications would be viewed by investigators as a convenient and deliberate attempt to hide communications rather than the Clinton&#8217;s technical incompetence. But without any emails or Blackberry comms surviving what evidence was there other than the act of destroying the data?</p>
<p>Clinton had very savvy tech people handling and closely guarding her data. When matched up against Clinton&#8217;s legal background and long years in public office with <a href="https://medium.com/@kfrydl/hillary-clintons-private-email-server-4e799a298eaf">full knowledge of the laws </a>that require preserving federal and Presidential records the two month missing email gap becomes suspicious and self serving.</p>
<p>If you add the reality that &#8220;Evergreen&#8221; (as Clinton was codenamed by the Secret Service) was surrounded by security staff and was constantly aware of the strict protocol for transmitting and storing classified, secret and other sensitive government communications the potential for deceit becomes more obvious. Matched up against the clear difference between a server, a backup storage devices, networks, email software, text messages, Blackberry communications and the need to use encryption, passwords, security protocols etc etc. it becomes more problematic. For a person holding one of the most important positions in the world dealing with sensitive diplomatic discussions worldwide,  not caring about the handling and whereabouts of her communications is well, criminal.</p>
<p>Let&#8217;s work the argument that  Hillary Clinton didn&#8217;t know or didn&#8217;t care about all this&#8230;</p>
<p>The FBI estimates that Clinton went through about a dozen different Blackberries while Secretary of State, Huma Abedin estimates 11and says that Hillary didn&#8217;t even know her own login information. Cooper remembers smashing a couple of Blackberries but it is not know what happened to the others. Clinton preferred the older BlackBerry Curve 8310 with the trackball and would switch handsets based on email was just a small part of her commutation stream, only about a dozen people sent emails. Most went through Abedin, who used the soon to be infamous cheap consumer laptop. There is no evidence of Clinton using a laptop or computer so it can be assumed that Clinton&#8217;s aging non secure Blackberry was the weapon of choice and Abedin&#8217;s cheap laptop that she shared with her husband were the communication node. Again with all these duplicate devices and backups. Where are the missing emails?</p>
<p><a href="https://www.politico.com/magazine/story/2016/09/hillary-clinton-emails-2016-server-state-department-fbi-214307"> Journalist Garrett M. Graff working for Politico</a> stitched together numerous interviews and documents to paint the clearest story of a group of civil servants simply not able to keep up with technology and dodging rules in the interest of getting things done. That same incompetence. That James Comey would carefully describe as “extremely careless” in an official statement July 5, 2016.  Again let&#8217;s just assume that Hillary was behind the curve on technology and security. Let&#8217;s also assume that Huma Abedin was the central hub for most of Clinton&#8217;s email traffic. It would be more likely that a smart hacker would go after an associate to get Clinton&#8217;s emails. Let&#8217;s say like, Clinton confidante <a href="https://www.politico.com/story/2013/03/report-blumenthal-email-hacked-088928">Sydney Blumenthal</a> who had his archaic AOL account hacked in March of 2013, or John Podesta who in March of 2016 was told to go ahead and click on a bad link that uploaded his password to Russian hackers.</p>
<p><strong>Everybody Must Get Hacked</strong></p>
<p>The list of outside hacks and successful breaches against Clinton staff and friends is impressive.</p>
<p>The first official time Clinton&#8217;s personal server was severely attacked was January 9, 2011 according to Clinton employee and server custodian,  Justin Cooper in an interview with the FBI. Someone was using a software program to try multiple passwords to get in. Cooper actually turned the server off. The IP address was quickly blocked. The Clinton server was set up so only a few people could access it, firewall logs and notices were sent to Cooper. Pagliano knew this was deliberate and serious. Cooper also told Abedin that someone was trying to hack into the server. What kept the email safe was the small number of users despite the vast numbers of attempts to guess the passwords.</p>
<p>By the spring of 2011 The Clinton&#8217;s email server was under full assault. A number of Clinton&#8217;s employees in the State Department employees had been phished and typed in their personal Gmail and Yahoo accounts</p>
<p>On March 11,  Eric Boswell, the State Dept security head sent an email to everyone warning of the attacks but it wasn&#8217;t until June that Pagliano trekked to Chappaqua to upgrade the two servers.  The FBI would use forensics and determine that it wasn&#8217;t u until January 2013 that someone managed to hack into the Clinton server. The trail was left by someone using the Tor browser and three times, successfully rummaged through a female aide to Bill Clinton. The official version is that this is the only successful hack into the Clinton server. Hillary Clinton would resign as Secretary of State on February 1, 2013.</p>
<p>In would be in March of 2013, that Guccifer would hack into Sydney Blumenthal&#8217;s email and Colin Powell&#8217;s AOL account, again by resetting the passwords using clues. Guccifer aka Lazar was able to get 30,000 emails, the attachments and address books. The next morning when Blumenthal realized he had been locked out he reset his password and no idea he had been hacked. Now remember the number of times that Clinton staffers were locked out or tried to log into their accounts.  By March 15, the Clinton email URL was public and the server was constantly scanned for weaknesses by Russian sources.</p>
<p>So who was hacking Clinton so hard?</p>
<p><strong>Putin Denies This</strong></p>
<blockquote><p>On December 3, 2011, Clinton <a href="https://www.youtube.com/watch?v=Lv2X3dZdeyQ">spoke out a</a>gainst Russian &#8220;elections that were neither free nor fair&#8221;</p></blockquote>
<p>Vladimir Putin was a former Lt Colonel in the KGB, a spy turned nationalist who had effectively ruled Russia since a curious string of apartment bombings launched him into to power in 1999. He was running for election as Prime Minister in 2009, after taking a time as President due to term limits letting his close friend Dmitri A. Medvedev be President.  He made a powerful outdoor speech in front of an estimated 100,000-supporters at the Luzhniki Stadium on February 23, demanding that foreign interference in Russian affairs should not be allowed.</p>
<p>Vladimir Putin didn&#8217;t like Obama&#8217;s well intentioned February 2009 &#8220;<a href="http://www.washingtonpost.com/wp-dyn/content/article/2009/02/07/AR2009020700756.html?nav=emailpage">reset</a>&#8221; of U.S./Russia relations. America had sat out Putin&#8217;s successful war to steal back Chechnya but pushed back as Russia made a grab for parts of neighboring Georgia. In July, 2009,<a href="https://www.nytimes.com/2009/07/08/world/europe/08prexy.html"> President Obama met with Putin</a> and President Medvedev. In the Moscow meeting, Putin monopolized a breakfast meeting lecturing Obama in a monologue about Russia’s perspective of global politics.</p>
<p>Putin also didn&#8217;t like Obama&#8217;s new hawkish Secretary of State, Hillary Clinton. Putin had <a href="https://www.nytimes.com/2011/12/09/world/europe/putin-accuses-clinton-of-instigating-russian-protests.html%20">accused Hillary Clinton of creating unrest</a> in Russia and manipulating the Russian elections.  Prime Minister Putin <a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/03/19/AR2010031902065.html">scolded Clinton publicly in March of 2010</a>. He was upset that sanctions on Russian companies doing business in penalties on firms doing business with Iran, Syria and <a href="http://www.washingtonpost.com/wp-srv/world/countries/korea.html?nav=el" target="">North Korea</a> was hurting business.</p>
<p>On November 27, 2010 there are a <a href="http://www.judicialwatch.org/wp-content/uploads/2016/11/JW-v-State-Pagliano-Secret-Service-01441-1.pdf">number of attempts to penetrate</a> the Clinton server as detailed in a series of emails between Clinton techs Cooper and Pagliano. Denial of Service attacks, multiple failed log in attempts from at two staffers could also have meant someone changed their passwords forcing them to reset them again to gain access after the hack.</p>
<p>On December 3, 2011, Clinton <a href="https://www.youtube.com/watch?v=Lv2X3dZdeyQ">spoke out a</a>gainst Russian &#8220;elections that were neither free nor fair&#8221; Putin later accused Clinton of disrupting Russians parliamentary elections and blamed her for sending &#8220;signals&#8221; to Russian groups to protest. There is no evidence to support a link between Putin&#8217;s anger at Clinton and the brute force attempt to hack her server but the timing is worth remembering. As 2011 developed more and more hacking attempts against State Department employees began to unnerve staff as they received more and more &#8220;spearphishing&#8221; emails.</p>
<p>Before we leave the topic of Justin Cooper as the loyal Clintonite advisor and IT soldier  it is important to note that Clinton daughter Chelsea accused Cooper of loading spyware onto Clinton related emails accounts and devices. &#8220;I know Justin reads my Dad&#8217;s emails&#8217; Chelsea would complain in a <a href="https://wikileaks.org/podesta-emails/emailid/12401">leaked</a> DNC email to John Podesta. Chelsea accuses Cooper of multiple acts of wrongdoing in a November 2011 email including loading spyware on a Clinton foundation staffer&#8217;s computer; &#8220;Ilya  (Ilya Aspis was a special assistant to Bill Clinton at the Clinton Foundation<em>) </em>physically saw/caught Justin a couple of days ago reading his bberry and loading the same spyware onto his computer that he loaded onto Bari&#8217;s (Bari Lurie, an assistant to Chelsea Clinton). computer&#8221;</p>
<p>She continues, &#8220;multiple people shared with me how upset they were at hearing how Justin referred to my father in the last week in very derogatory ways widely sadly &#8211; Oscar told my father he knows Justin reads his emails&#8221;, then Chelsea wraps up,  &#8220;As ever, on some of the above I am sure there are three sides as my grandmother would say &#8211; his, hers and the truth.&#8221;</p>
<p>Again Cooper had worked with in the White House and with the Clinton&#8217;s since 1999 and was a key part of the Clinton Foundation, Clinton Global Initiative and the Clinton Family Foundation.  The Clinton daughter&#8217;s account of Cooper not just a falling out with her father, but hacking into other Clinton devices would bring his need to have access to the Clinton server at Chappaqua into question as well.</p>
<p>Justin Cooper worked for the Clinton&#8217;s for 15 years but according to Chelsea, by late 2011 he was clearly not a happy man.</p>
<p>So four years later after Guccifer broadcast Clinton&#8217;s email and URL to the world, there was a decision to change data storage again. but they didn&#8217;t forget the email Apocalypse of March 2009. <a href="https://wikileaks.org/clinton-emails/?q=&amp;mfrom=Monica%20Hanley">Monica Hanley</a> Hillary&#8217;s &#8220;confidential assistant&#8221;, began carefully downloading all of Hillary&#8217;s emails from her email accounts onto a old MacBook borrowed from Bill Clinton&#8217;s office. The logic was that these emails would be helpful in writing Clinton&#8217;s autobiography. In April, it was <a href="https://www.washingtontimes.com/news/2013/apr/5/hillary-clintons-book-advance-hovers-14m/">announced</a> that she would be paid $14 million dollars to write &#8220;Hard Choices&#8221;, the book that was designed to begin her journey to run for President of the United States. Emails, that were not considered important enough by Clinton to be kept as official records on government servers.</p>
<p><strong>Backing Up The Past</strong></p>
<blockquote><p>It appears that Hillary Clinton put importance on retaining her electronic communications.</p></blockquote>
<p>&nbsp;</p>
<p>We know the that the Cintons used a plugged Apple. G5 server and lost months of data when they upgraded to a new Dell server at the advice of her employer while Secretary of State. We also know that on June 30 2013 in her return to private life,  Clinton physically migrated her servers and the data that was on her servers at her home to a professional data management company in New Jersey called Platte River Networks. They kept the old servers running for 60 days before migrating to a modern cloud based system backup. The &#8220;cloud&#8221; stores data across multiple networked storage systems and is better than traditional hard drive or swap out RAID back up. But when the Clinton people found out that her old server was being backed upon the cloud, they specifically terminated that feature. They went back to a traditional hard drive back system.  This is pretty convincing proof of an premeditated need to control data should it need to be quick deleted rather than to archive it. By February 2014, Clinton assistant, Monica Hanley had finished loading 5 years of Clinton&#8217;s emails on to the Mac Laptop. She shipped it to New Jersey and them them back it up to an archive email account. The hope at the time was that the emails would also be useful in writing her future memoir.</p>
<p>The exposure of the email account encouraged Clinton’s aides to change the secretary of state’s address. Abedin selected <a href="mailto:hrod17@clintonemail.com" target="_blank">hrod17@clintonemail.com</a>, but the staff feared that they’d lose her existing emails when they changed addresses, so Monica Hanley retrieved an old MacBook laptop from Bill Clinton’s Harlem office and spent several days at her apartment transferring years of Hillary’s emails from the server files into Apple’s Mail program on the laptop.</p>
<p>It appears that Hillary Clinton put importance on retaining her electronic communications.</p>
<p>To understand just how aggressive and often hackers targeted the White House, we go back to the trail of evidence from the Dutch counterespionage group who watched the emails of the White House being hacked in the summer of 2014. As the Russian state spies become emboldened, they watched the attack on the State Department in November of that year. Note that the discussion about the DNC hack narrative removes Hillary Clinton’s very real exposure to hackers and that the White House had been hacked in the summer of 2014.</p>
<p>According to<span class="apple-converted-space"> </span><a href="https://english.aivd.nl/about-aivd/the-aivd-who-we-are">AIVD</a> a unit of<span class="apple-converted-space"> </span><a href="https://www.volkskrant.nl/wetenschap/dutch-agencies-provide-crucial-intel-about-russia-s-interference-in-us-elections~b4f8111b/">Dutch intelligence</a>, the cyber team watched Russian state hackers successfully phish the White House as far up the chain until they got into President Obama&#8217;s emails. They did not get access to Obama&#8217;s secure Blackberry but by 2014 it was clear the U.S. government had been compromised at the highest levels.</p>
<p>The Dutch agency had located a building in the university complex off Red Square in Moscow where hackers using Cozy Bear tools routinely went after foreign state assets. By November of 2014, the 10 or so Russian hackers working in Moscow had enough email addresses from their White House hack to go after a State Department target. The Dutch patched in the Americans and for 24 hours a cyber battle waged between the Russians and the Americans as the Russians tried to get into State Department computer systems. As the Americans blocked access to their servers, the Russians try various techniques and hacks. None succeeded. Towards the end of 2015, the American hackers at the NSA have used new technology to force their way into mobile phones of a number of targeted Russian GRU intelligence officers. Finally, the counter hack was discovered by the Russians and they shut out the Dutch.</p>
<p>The word &#8220;watch&#8221; is used repeatedly in this description that is because the Dutch had not only managed to penetrate the Russian hacking network, they had access to the security cameras in the Moscow hacker&#8217;s building allowing them to watch in real time.</p>
<p>That evidence along with evidence that Trump insides were actively colluding with Russian intelligence agents was turned over to Robert Mueller to begin his investigation into Russian interference during the election.  An election that began with a scandal over Clinton’s missing emails and then morphed into an investigation into allegations about Trump’s links with Russians to influence the election.  Concerns about attacks on the U.S. government were not idle concerns as American went into the 2016 elections but the Democrats were compromised long before it hit the election cycle news.</p>
<p>The noise from clashing narrative drowned out a lot of the laser type forensics being done by nerds on the internet. Nerds who actually knew what they were talking about.</p>
<p><strong>Who Among You Has Not Been Hacked?</strong></p>
<blockquote><p>Clinton had ordered someone to wipe out her servers and backups between December. 5, 2014, and March 27, 2015.</p></blockquote>
<p>The stains of three narratives flow and intermingle was the DNC hack an inside job by a disgruntled employee, did the data get hacked by an unemployed Romanian cab driver or was this a sophisticated orchestrated attack by a hostile nation? Or was it all three? The answer is likely to be the latter.</p>
<p>In December 2014 after discovering that Clinton never used a .gov address,  the State Department asked for her emails, Hillary Clinton through her lawyers handed over over 30,490 separate emails but there were on 55,000 pages in 12 banker’s boxes</p>
<p>Clinton set up a new URL for her email &#8220;hrcoffice.com&#8221;</p>
<p>On March 2, 2015 the New York Times revealed Clinton had not used a .gov email address, triggering the House Select Committee on Benghazi to subpoena her emails.</p>
<p>During the Benghazi investigation, Clinton&#8217;s true mastery of her personal data was revealed. In the fall of 2014, Clinton said her lawyers had reviewed all the emails on her server, Specifically the &#8220;hdr22@clintonemail.com&#8221; account between January. 21, 2009, to February. 1, 2013. &#8220;After the review was completed to identify and provide to the Department of State all of the secretary&#8217;s work-related and potentially work-related emails, the secretary chose not to keep her non-record personal emails and asked that her account (which was no longer in active use) be set to retain only the most recent 60 days of email.&#8221;</p>
<p>&#8220;No emails from hdr22@clintonemail.com for the time period Jan. 21, 2009, through Feb. 1, 2013, reside on the server. Thus, there are no hdr22@clintonemail.com e-mails from Secretary Clinton’s tenure as secretary of state on the server for any review, even if such review were appropriate and legally authorized.&#8221;</p>
<p>Clinton had ordered someone to wipe out her servers and backups between December. 5, 2014, and March 27, 2015.  The FBI <a href="https://www.nationalreview.com/2015/08/hillary-clinton-email-server-seized-fbi/">would not seize Clinton&#8217;s servers</a> until five months after they discovered them.</p>
<p>On March 16, 2016 WikiLeaks announced that they had &#8220;dumped over 30 thousand emails &amp; email attachments sent to and from Hillary Clinton&#8217;s private email server while she was Secretary of State. The 50,547 pages of documents span from 30 June 2010 to 12 August 2014. 7,570 of the documents were sent by Hillary Clinton.&#8221;These emails were not hacked but a direct result of a Freedom of Information Act or FOIA&#8221;</p>
<p><a href="http://dangerousmagazine.com/2018/07/29/hack-part-four/%20‎">Continue to Part Four</a></p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/07/19/hack-part-tworobert_young_pelton/">The Hack &#8211; Part Three: Deception and Deceit</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2018/07/19/hack-part-tworobert_young_pelton/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Hack Part One &#8211; The Attack On America</title>
		<link>http://dangerousmagazine.com/2018/07/19/hack-part-one/</link>
		<comments>http://dangerousmagazine.com/2018/07/19/hack-part-one/#comments</comments>
		<pubDate>Thu, 19 Jul 2018 16:26:35 +0000</pubDate>
		<dc:creator><![CDATA[Lisa]]></dc:creator>
				<category><![CDATA[New Issue]]></category>
		<category><![CDATA[Clinton]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[DNC]]></category>
		<category><![CDATA[Emails]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Steele]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[Wiki]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2357</guid>
		<description><![CDATA[<p>&#8220;And then secondly, sir, does the Russian government have any compromising material on President Trump or his family? PRESIDENT PUTIN:  (As interpreted.)  (Laughs.)&#8221; Sometimes What You Think Happened Is What Someone Wants You To Think Happened. By Robert Young Pelton Note: The name of the cyber company and the owners have been changed. It’s midnight in Manhattan, Friday January 13th, 2017 and someone is hacking into Rudolph Giuliani’s server at his corporate headquarters.  A few hours earlier Giuliani, head of a...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/07/19/hack-part-one/">The Hack Part One &#8211; The Attack On America</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><em>&#8220;And then secondly, sir, does the Russian government have any compromising material on President Trump or his family?</em></p>
<p><a href="https://www.whitehouse.gov/briefings-statements/remarks-president-trump-president-putin-russian-federation-joint-press-conference/">PRESIDENT PUTIN</a>:  (As interpreted.)  (Laughs.)&#8221;</p>
<div id="attachment_2373" style="width: 1098px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/07/180221-F-SK383-0012A.jpg"><img class="size-full wp-image-2373" src="http://dangerousmagazine.com/wp-content/uploads/2018/07/180221-F-SK383-0012A.jpg" alt="Cyber-warfare specialists serving with the 175th Cyberspace Operations Group of the Maryland Air National Guard engage in weekend training at Warfield Air National Guard Base, Middle River, Md., Jun. 3, 2017. (U.S. Air Force photo by J.M. Eddins Jr." width="1088" height="784" /></a><p class="wp-caption-text">Cyber-warfare specialists serving with the 175th Cyberspace Operations Group of the Maryland Air National Guard (U.S. Air Force photo by J.M. Eddins Jr.</p></div>
<p><strong>Sometimes What You Think Happened Is What Someone Wants You To Think Happened.</strong></p>
<p>By Robert Young Pelton</p>
<p>Note: The name of the cyber company and the owners have been changed.</p>
<p>It’s midnight in Manhattan, Friday January 13<sup>th</sup>, 2017 and someone is hacking into Rudolph Giuliani’s server at his corporate headquarters.  A few hours earlier Giuliani, head of a cyber security provider and senior advisor to a <a href="http://www.gtlaw.com/People/Rudolph-W-Giuliani">law firm</a> was just announced as Trump’s guru on cyber security for the President Elect. The timing of the hack less than a few hours later is not a coincidence. Giuliani’s cyber team had knocked off for the weekend at noon.  Giuliani no stranger to the media but not known for his cyber security skills had appeared on Fox and Friends the day before to boast about his new cyber security effort.</p>
<p>I am on a conference call with the members of SybrTek (the name has been changed at the companies request), a new Texas-based cyber security and big data startup that could be described as the real world equivalent of the Cyber Expendables. Five men each with deep experience singularly and collectively inside the CIA, NSA, JSOC, NASA, SEALS and other government agencies. The “black” teams that support Special Mission Units and covert operations that go as far back as Angola and 80’s Afghanistan. Like a comic book super team, each has an unusual skill in addition to their military and intel training; hacking, jamming, disinformation, Psyops, etc, all honed in real world counter terrorism missions and now available for hire.</p>
<p>These men are not bespectacled nerds yelling “I’m in!” but they are combat vets pushing 60 with the usual assortment of paunches, bad necks, fading vision, military pension checks and about 150 combined years of experience fighting terrorists on the electronic and mud battlefields. They also know that demand for their services is high. America is losing the cyber war not because of terrorists or hackers, but because one of their main enemies was, and is, the glacial pace of their own government to adapt and change to new technology.</p>
<p>Now that they retired they are free to surf the big wave, 30 to 60-day cycle of cyber tool development. Not surprisingly their first clients were overseas. Sentiment tracking of the population for Saudi Arabia’s government to measure the impact of change was one task. Could the kingdom survive a sales tax? How far could they shift to more moderate politics without triggering an uprising? These dull questions are the lifeblood of data analytics.</p>
<p>Their new company deals with the never ending and ever changing problems of hackers; The high level and low level espionage that has been hogging the headlines every since Hillary Clinton wiped her server with a cloth. These men battle in the world of Information Operations aka Strategic Communications aka psyops aka Influence Operations aka dirty tricks. A battleground of selective and targeted information designed to create an alternative universe.</p>
<p>This might require deceiving your opponent,  hacking the enemy, black bagging a server by breaking in and physically stealing computers and hard drivers, creating rumors or fake news or even generating false documents (the OSS called them &#8220;Black Letters&#8221; in World II), use psychographic profiles to target and rile up certain &#8220;excitable&#8221;groups, create confusion by rapidly injecting conflicting evidence or statements, run &#8220;false flag&#8221; operations to fool the enemy and even distribute manufactured or real scandal that might include video of sexual activity, something the Russians call &#8220;kompromat&#8221;.</p>
<p>Most of these tactics are not actually the end result but are created by proxies to generate secondary and tertiary effects like public outrage, scandal, loss of confidence.  Ideally a population can be controlled by outside forces if they lose trust in their leaders, leaders are  less subject to accountability if the media loses the trust of the public in publishing what is true and what is false.</p>
<p>This group of battered and bruised warriors, hope their dark mastery of the full spectrum of &#8220;strategic communications&#8221; will match the government, business and public&#8217;s sudden realization that the once militarized doctrine of psyops has now become a everyday marketing weapon against civilians. The recent publicity involving Cambridge Analytica, Facebook and election marketing are just a few examples of a new deceptive assault on our senses and thought process.</p>
<p>They hope that harnessing their skills of gathering human intelligence to understanding marketing trends, to even geo-targeting individuals to within a 3 by 3-foot space will provide truth and clarity to clients. Tonight however, they are just trying to find someone to report the hack of Giuliani to. Something the SybrTek team had been doing for members of the Trump transition team since the summer of 2016.</p>
<p>+ + +</p>
<p>Finally our interview was interrupted by an urgent telephone call from the client. “Someone is trying to hacking Giuliani” repeats the former operative to the computer executive as he   watches the screen on his laptop. The hacker has logged in through a backdoor on Giuliani&#8217;s site put there by Anonymous. “Somebody didn’t put a patch on some old software and they are in” says one cyber analyst.  “You can tell Anonymous by its malware” he says matter of factly while watching the digital stranger poke around Giuliani’s New York-based server called http://giulianipartners.com.. The timing is perfect. Maybe the new government will take cyber security seriously and they might get a contract.</p>
<div id="attachment_2366" style="width: 1210px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/07/Fox-Friends.jpg"><img class="wp-image-2366 size-full" src="http://dangerousmagazine.com/wp-content/uploads/2018/07/Fox-Friends.jpg" alt="Fox-Friends" width="1200" height="614" /></a><p class="wp-caption-text">January 12, 2016 &#8211; Rudy Giuliani on Fox and Friends discussing his new role as cyber security organizer for President Trump. His server was hacked hours later.</p></div>
<p>In early January of 2016, Presidential candidate Donald Trump mentioned that he would bring in private individuals to work on cyber security. He was quickly learning that the vast machine that is the government is slow to react and even slower to adopt rapidly changing threats against computer systems. That 30 &#8211; 90 day battlefield during which hackers and counter hackers joust back and forth, generating new software and tricks.</p>
<p>Rudolph Giuliani then went on Fox &amp; Friends on the morning of January 12, saying that he was going to &#8220;<a href="http://video.foxnews.com/v/5279565760001/?#sp=show-clips">coordinate all this</a>&#8220;. Giuliani is not known for having any experience in cyber security but he did have a consultancy and had a broad business based from his post 9/11 popularity. By that evening, his server was under assault. Keep in mind, it wasn&#8217;t the hack, there was nothing of value on the cheap web page, it was the secondary effect of being hacked, that the hackers were after.</p>
<p>Russians weren&#8217;t doing the hacking. That night on Twitter, Kansas-based cyber security expert,  <a href="https://twitter.com/fienen/status/819657572483563520">Michael Fienen</a> found himself the <a href="https://www.facebook.com/michael.fienen">star</a> of a real time <a href="https://www.sacbee.com/news/politics-government/article126490159.html">social media crowd attack</a> on Giuliani’s server as thousands of computer nerds began picking apart every aspect of the Giuliani’s servers security or lack thereof. After a long night of real time tweets and surprised at his sudden viral fame, he <a href="https://twitter.com/fienen/status/819772871455084545">posted</a>. “If I&#8217;d known this was gonna blow up like it did, I&#8217;d have given it a witty hashtag. Someone else said #RudyOnRails (a pun on Ruby On Rails <a href="https://rubyonrails.org">open source software)</a> and that made me laugh.”</p>
<p>Tech critics publicly <a href="http://www.theregister.co.uk/2017/01/13/giuliani_joomla_outdated_site/?mt=1484391320350">lambasted</a> Giuliani’s <a href="https://regmedia.co.uk/2017/01/13/5479857698456.jpg">system</a> and his simple page for being outdated and easy to penetrate. Critics pointed that the web site using doing everything wrong from running Flash to having multiple open ports to having an expired SSL certificate. It wasn’t that hard.</p>
<p>+ + +</p>
<p>“Hacking”, the criminal electronic act of breaking and entering into a computer or email system to steal or access information is little different than the 1972 Watergate break in and wiretapping of the Democratic National Headquarters hatched by ex-FBI agent, G. Gordon Libby. That analog hack was discovered by a night watchman and later exposed to be part of a much more nefarious election plan by journalists Bob Woodward and Carl Bernstein of the <em>Washington Post</em>. Although hacking is a common as physical theft, the act becomes magnified during political campaigns generating doubt in &#8220;the system&#8221;. A fictional idea that governments are somehow secure and moral.  Political hacking adds a cinematic measure of deceit and intrigue when compared to simply data or information theft from consumers.</p>
<p>In the room with the SybrTekpatched in by phone, the conversation stops as they monitor the activity going in and out of the <a title="" href="http://www.giulianipartners.com/" target="_blank">giulianipartners.com</a> server.</p>
<p>“Holy shit, they just sent Giuliani an email from his own server.</p>
<p>“Did you contact him?</p>
<p>“I just sent one of his guy’s a text”</p>
<p>“Do you want to stop it? This is going to be really fucking embarrassing tomorrow if he gets in”</p>
<p>“We can’t, it’s against the law, we could but a bot on this and send it back to the hacker”</p>
<p>This hack on Giuliani is just one of thousands of attempts every minute against high profile targets particularly against members of political parties. And they are almost impossible to stop and harder to prosecute. Again, this real life hacking scenario was designed to have what is called a &#8220;secondary effect&#8221;: Embarrassing a Trump team member with the idea that a cyber consultant got hacked within hours of the announcement. Much like the search for Clinton&#8217;s missing or deleted or classified emails became the singular scandal of the election.</p>
<p>This hack occurs just after midnight, there is no one in the office, it is when most companies back up their files and if the hacker findsanything of value the appointment of Giuliani and the media payments for scandalous dumps would make the exercise worthwhile. Luckily it is caught and reported to the government authorities by SybrTek. Again, hacking favors the criminal because counter hacking is just as illegal as hacking.</p>
<p>+ + +</p>
<p>The SybrTekcrew rattle off a list of major hacks of political figures on both election teams in the last few months.  Jim (an alias) for a former Navy SEAL says “Information is worth money. <a href="http://www.washingtonexaminer.com/wikileaks-offers-30000-bounty-for-evidence-of-obama-officials-destroying-records/article/2610930">There is a $30,000 bounty from Wikileaks</a> for anyone providing proof that Obama is deleting or dumping data. Hackers have been after Trump, his family, the foundations and major supporters forever.&#8221;</p>
<p>Jim insists that in the closing hours of the Obama administration IT techs were removing the markers from hard drivers rendering them impossible to search but maintaining the data on the drives.</p>
<p>&#8220;Trump can brag that the RNC didn’t get hacked but it was actually just easier to hack the DNC.”</p>
<p>Hacking is illegal, it’s theft, digital breaking and entry, but it is the new normal. Millions and millions of servers have been compromised with all the sensitive and exploitable data along with. Swingers sites like Ashley Madison, email accounts like Yahoo, financial sites complete with addresses, credit card numbers and even the Federal Government’s employee data all end up somewhere for sale somewhere.   It’s not personal, it is just a business.</p>
<p>Listening to the real time hack and discussion in the background, we discuss just how vulnerable our government and their employees are.</p>
<p>“The transition team’s emails are all compromised” says Ray, a former CIA Special Activities Division/Ground Branch officer and Marine, “we were helping some of the team defend against hackers on their personal and business emails but they now have to use a dot gov address. We discovered that the transition emails were hacked in 2008 and 2009 with malware that the government didn’t’ notice. Why because they didn’t’ need to use them in 2012 and it wasn’t until a few weeks ago that we ran some <a href="https://www.dhs.gov/national-cybersecurity-and-communications-integration-center">tests and found the bug. We reported it to the NCCIC National</a> Cyber Security and Communications Integration Center and a few other places. That bug has gone on to infect 140 different government departments.” Ray explains. “We could fix it quickly but then again it would be against the law” Ray says with a slice of irony. According to the 586-page report records and submissions to the NCCIC, as of January 13,2017 so far nothing has been done by the Department of Homeland Security.</p>
<p>+ + +</p>
<p style="text-align: center"><em>&#8220;I will say this: I don’t see any reason why it would be, but I really do want to see the server.  But I have — I have confidence in both parties.  I really believe that this will probably go on for a while, but I don’t think it can go on without finding out what happened to the server.  What happened to the servers of the Pakistani gentleman that worked on the DNC?  Where are those servers?  They’re missing.  Where are they?  What happened to Hillary Clinton’s emails?  Thirty-three thousand emails gone — just gone.  I think, in Russia, they wouldn’t be gone so easily.  I think it’s a disgrace that we can’t get Hillary Clinton’s 33,000 emails&#8221;</em> &#8211; <a href="https://www.whitehouse.gov/briefings-statements/remarks-president-trump-president-putin-russian-federation-joint-press-conference/">President Donald Trump</a></p>
<p>The Intelligence community insists that America is at war with hackers, specifically Russian hackers.  On January 2017, the DNI released a comprehensive <a href="https://www.dni.gov/files/documents/ICA_2017_01.pdf">report</a>, “Background to “Assessing Russian Activities and Intentions, in Recent US Elections”: The Analytic Process and Cyber Incident Attribution”. On Friday July 13, 2018 the DoJ indicted 12 Russian hackers and alleged that Russian intelligence agents were behind the hack of the Democratic National Committee and other computers. The <a href="https://www.justice.gov/file/1080281/download">indictment</a> is very focused, much of this publicity on hacking, cyber security and missing emails started with the controversy around Hillary Clinton’s use of private servers and the deletion of an estimated 31,830 of the 62,320 emails on her server.</p>
<p>The indictment was also well timed, being dropped just before President Trump was to meet with Russian President Vladimir Putin. It was clear, the Department of Justice and related agencies were painting a red bullseye on Vladimir Putin, a former Russian spy and naming names. Just before President Donald Trump was about to make a &#8220;<a href="https://www.economist.com/node/21716609/comments?page=5">grand bargain</a>&#8220;, in a private meeting and with Russia, America&#8217;s former public enemy #1</p>
<p>But let&#8217;s go back</p>
<p>The connection between President Trump and SybrTek began with Lt General Mike Flynn. Some of the men on the team worked with Flynn’s during his 33-year military career, particularly during his time in Iraq and Afghanistan. Flynn is now a civilian and in the early days of the campaign, was often seen at the side of the yellow haired, casino owner turned reality TV host. The flamboyant Trump and his grim-faced war horse advisor made for an odd couple  A lifetime Democrat, Flynn was part of an advisory group of ex-intel leaders who made themselves available to council candidates about the threats to national security. In July of 2016 Flynn had released a book penned by well-known Neocon Michael Ledeen called “The Field of Fight: How We Can Win the Global War Against Radical Islam and Its Allies Hardcover” and was quite vocal about the need to destroy ISIS.  The hatchet faced and taciturn Flynn had a calming effect on Trump during the campaign according to the SybrTekteam members.</p>
<p>Flynn became a sage advisor who provided Trump clear analysis of confusing events, his battle cred and rough style also appealed to Trump’s fans. Not surprisingly,  Flynn was Trump&#8217;s original pick for Vice President.  A few off-putting TV appearances and some over enthusiastic public speeches in which he led anti-Hillary chants to “Lock Her Up” showed that the man who worked in the shadows might not be cut out to be in the glare of the spotlight. Flynn also had enemies on home turf. In addition to his hardline view on ISIS, Flynn’s greatest sin is that he wanted to stop the revolving door black budget gravy train inside the major intelligence agencies. Money that is generously back doored to faithful intel retirees. Money that is in the billions and will never be held accountable to the public. Back i January of 2010. Flynn even suggested that spies should be <a href="http://online.wsj.com/public/resources/documents/AfghanistanMGFlynn_Jan2010.pdf">more like journalists</a> in a controversial report that surprised the intelligence community.</p>
<div id="attachment_2391" style="width: 1098px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/07/151021-A-ZZ999-999.jpg"><img class="size-full wp-image-2391" src="http://dangerousmagazine.com/wp-content/uploads/2018/07/151021-A-ZZ999-999.jpg" alt="The military has some of the most sophisticated computer tools and techniques. The problem is we fight wars in counties where the even electricity is an innovation." width="1088" height="723" /></a><p class="wp-caption-text">The military has some of the most sophisticated computer tools and techniques. The problem is we fight wars in counties where even electricity is an innovation.</p></div>
<p>Although Flynn was an Obama pick to run the DIA, Flynn’s aggressive style soon banded the career bureaucrats together into an angry cabal and he was forced out a year early. In demand as an intel pundit, he started <a href="https://www.linkedin.com/company/flynn-intel-group">Flynn Intel Group</a>. His equally aggressive efforts to woo foreign clients became the target of negative media, focusing on his unregistered <a href="http://www.huffingtonpost.com/david-l-phillips/lt-gen-michael-t-flynn-gu_b_13013248.html">lobbying</a> and foreign meetings to pitch his intel firm including his <a href="https://www.nytimes.com/2016/11/18/us/politics/michael-flynn-national-security-adviser-donald-trump.html">dinner in Russia for <em>Russia Today</em></a>. At the dinner afterwards Vladimir Putin walked about and sat next to Flynn. Suddenly he was viewed as a Russian proxy. Nobody really held up his client list to see that it also included a wide variety of Middle Eastern and other countries that we do deals with.</p>
<p>Flynn’s new media fame also led to an intensification of hacks on his platforms. In early July 2016, SybrTek told Flynn that his phone had been compromised. Nothing sensitive “I’m an open book” he told the SybrTek team but still,  someone was targeting the Trump campaign team.</p>
<p>SybrTekquickly found the sender of the phishing email that led to the hack.  The ISP, caller code, originators address, registered database was open source. Which led them to two different servers in Poland.</p>
<p>The team then traced the hacker back to yet another server located a small town of 100,000 people in the Carpathian Mountains in Romania. They hard pinged a location in a town called <a href="https://www.wired.com/2011/01/ff_hackerville_romania/all/1">Râmnicu Vâlcea</a>.</p>
<p>They quickly found a person attached to the server. A young female Romanian hacker.  Ray remembers seeing her profile picture, “She was cute. She did her homework. She was offering her services at 700 euro to target and hack anyone you wanted. It’s a business. Turned out she had emptied Flynn’s phone… and we found other things.”</p>
<p>Three weeks before the July 18<sup>th </sup>Republican convention, the SybrTek team not only found Flynn’s stolen data but stolen data (not emails) from journalist and Clinton confidante and former journalist Sidney <a href="http://dailycaller.com/2016/10/17/fbi-sidney-blumenthals-computer-files-are-found-on-a-romanian-server/">Blumenthal</a>  That wasn’t all there was embarrassing material on Hillary Clinton and Donald Trump kept on that same server.  They won’t discuss what they found. “Embarrassing” is all they will say about the files. What they found were Clinton&#8217;s medical records stolen from a visit to a doctor in Germany.</p>
<p>The team then reported to the government that they had found  sensitive information sitting on a foreign server on both parties. These files on either former candidates have not been released to the media or public. The hackers who hack the hackers are paid to keep their mouth shut and they don&#8217;t  want to get caught up in the polarized media hysteria that doesn&#8217;t understand the world of hacking.</p>
<p>They are quite vocal about the stunning lapses in simple security taken by both Clinton (who was discovered to be using a private unsecured home computer for government business) and the DNC, an organization that had security systems penciled in for installation but never actually installed them.</p>
<p>Although internal government agencies were concerned about Clinton’s use of a private emails system as early as 2009, hackers had tried numerous times to breach Clinton’s basement stored Apple server. in Chappaqua, New York.  It wasn’t until a December 2012, FOIA request from Citizens for Responsibility and Ethics in Washington came up empty that the public began to wonder where Clinton’s emails actually were. In June of 2013, Clinton hired Platte River Servers <a href="https://www.denverpost.com/2015/08/19/platte-river-networks-clinton-e-mail-server-was-never-in-denver/">who physically moved her home-based server</a> into a data service center in New Jersey.</p>
<p>+++</p>
<p>Clinton finally hired an expert to deal with data after Romanian hacker named “Guccifer”  dumped a number of emails between Clinton and insider Sidney Blumenthal in <a href="http://www.foxnews.com/politics/2016/05/04/romanian-hacker-guccifer-breached-clinton-server-it-was-easy.html">March of 2013</a>, Clinton’s private server came to light. Throughout the Benghazi investigation, the idea of Clinton not ever using a .gov email address never really took hold.  Her motivation appeared simple. She and her staff wanted to keep their communications simple away from FOIAs and government employees. Her excuse was that any emails she sent would be resident on the recipient’s government servers. There were concerns about her servers handling sensitive and classified information. These questions would lead to a July, 2016 FBI <a href="https://vault.fbi.gov/hillary-r.-clinton/Hillary%20R.%20Clinton%20Part%2001%20of%2023/view">investigation</a>.</p>
<p><em>New York Times </em><a href="https://www.nytimes.com/2015/03/03/us/politics/hillary-clintons-use-of-private-email-at-state-department-raises-flags.html">broke the story</a> in March 2, 2015 letting the world know that Clinton had been using a personal computer at home since 2009. Based on Guccifer&#8217;s boasting and Clinton&#8217;s high profile address but low profile security, by then the DNC and Clinton staffers and most likely Clinton’s computer had been under attack and most likely had been compromised. The data, movements, communications, plans and files of the former President of the United States, his family and the current Secretary of State would be of the highest interest to all foreign intelligence agencies.  Various tech experts and <a href="https://www.commentarymagazine.com/politics-ideas/hillary-clinton-email-scandal-victim/">government officials</a> pointed out that Clinton initially operated her laptop and Blackberry without encryption software making it extraordinarily easy to hack her and other people who communicated with her. In Part Two we will explore just how badly compromised the White House was.</p>
<p>It would be relevant to note that there was little to no mention of Russia in any of this initial U.S. media and political generated furor over Clinton’s lax security and mishandling of government files. There is also the given that hackers have little incentive to broadcast their break in’s. They are happy to sift and sort through compromised computers for years if needed. Had Clinton been hacked? Well her friends had. Why not her email.</p>
<p>+++</p>
<p>On January, 22, 2014, a 40-year old Romanian named Marcel Lazar Lehel was <a href="https://www.reuters.com/article/us-usa-cyber-guccifer/hacker-guccifer-extradited-from-romania-appears-in-u-s-court-idUSKCN0WY5MK">arrested</a>in Arad near his village of Sâmbăteni. Arad 337 miles west of Bucharest. Lehel was “Guccifer”. In 2013, Guccifer had hacked in a computer and found jpg&#8217;s with President George Bush’s home paintings including one of the naked Bush in his bathtub. He stole them from the former president&#8217;s sister and he <a href="https://www.inverse.com/article/14231-remember-that-bush-paintings-hacker-guccifer-used-wikipedia-to-hack-email">guessed her personal security codes </a>by using Wikipedia.</p>
<p>He had also been busy hacking “into the email and social media accounts of high-profile victims, including a family member of two former U.S. presidents, a former U.S. Cabinet member, a former member of the U.S. Joint Chiefs of Staff and a former presidential advisor” according to the nine count DoJ indictment. It was determined that Guccifer was busy hacking between December 2012 to January 2014 mostly out of boredom since he was not working his normal job as taxi driver.</p>
<p>Blumenthal’s files found on the Romanian server, <a href="https://vault.fbi.gov/hillary-r.-clinton/hillary-r.-clinton-part-04-of-05/view">according to the FBI</a> were dated from January 2012. As Hillary Clinton quite rightly predicted, her emails were on other people’s servers just not government ones. Regardless of what security protection Clinton had or didn’t have, her emails were clearly being hacked through her associate’s computers.</p>
<p>In May of 2016, <a href="http://www.foxnews.com/politics/2016/05/04/romanian-hacker-guccifer-breached-clinton-server-it-was-easy.html">Guccifer told Fox News reporter Catherine Herridge</a> that he had breached Clinton’s server in early 2013 and it was “easy” not just for Lazar but for “everybody”. In the jailhouse interview Lazar provided detailed information on how he breached the server. Lazar also hacked Clinton confidante, Sydney Blumenthal’s AOL emails in March of 2013.  The Romanian insisted that all he had to do was find Clinton’s IP, wait until the ports were open and use software to breach the data. He told Fox “As far as I remember, yes, there were … up to 10, like, IPs from other parts of the world,” referring to other hackers online at the same time. Guccifer&#8217;s favorite hack was to reset the password and then use Wikipedia and Google to find the names of pets, or schools used as security questions.</p>
<p>There is no evidence that Clinton’s servers were compromised by Lazar other than Guccifer&#8217;s statements, but Clinton&#8217;s servers were compromised as we will find out in Part Two.  Things started getting serious in the Spring of 2016&#8230;two years after Guccifer went to jail.</p>
<p>+++</p>
<p>A Wikileaks document dated March 19, 2016 details how John Podesta, Chairman of Hillary Clinton’s campaign received an email from Gmail notifying that someone had <a href="https://wikileaks.org/podesta-emails/emailid/34899">logged into</a> his personal Gmail account and to please click on the email to enter his username and password so it could be changed.  Podesta’s Chief of Staff, Sara Latham then pinged the campaign staff tech consultant Charles Delavan (both of whom were was using a hillaryclinton.com email, not the Gmail account in questions). Delvan responded:</p>
<p>“Sara, This is a legitimate email. John needs to change his password immediately and ensure that two-factor authentication is turned on his account. He can go to this link: https://myaccount.google.com/security to do both. It is absolutely imperative that this is done ASAP.”</p>
<p>The source of log in was identified by Google as:</p>
<p>Saturday, 19 March 8:34:30 UTC</p>
<p>IP Address: 134.249.139.239</p>
<p>Location: Ukraine</p>
<p>Podesta or his assistant then inexplicably used the phishing link in the email rather than the link Delavan provided. This simple act opened a back door to all of Podesta’s emails and any passwords he may have typed into those emails and more importantly the ability to fool other people on his email list into opening what looked like legitimate documents from Podesta. Again a hacker only reveals their presence once they feel they have enough data to sell. If a freelancer was to market real time access to the DNCs strategy and communications during an election, it would hard to put a price on that access.</p>
<p>Delavan later insisted he meant to type “illegitimate” rather than the word “legitimate” to describe the phishing email.</p>
<p>This is where it starts to get weird. DNC leaders were tipped to the hack in late April 2016 after some had gained entry to the DCCC and then used stolen credentials to then gain entry into the DNC system. The DNC insists that the breach was discovered the month before in April. Not coincidently a site called “DC Leaks” was registered on April 19, 2016. This hack by what was now a team calling themselves<a href="https://www.slideshare.net/ThreatConnect/guccifer-20-the-dnc-hack-and-fancy-bears-oh-my"> Guccifer 2.0 was professional and aggressive.</a> Unlike the more random Guccifer 1.0 , this 2.0 Guccifer appeared to be politically motivated. The goal appeared to get as many files into the public domain even though few of them qualified as &#8220;Clinton Dirt&#8221;  Over 300 individuals related to Clinton’s campaign and the Democratic political groups had been targeted since March but no Clinton dirt.</p>
<p>There was dirt on Trump. Not very dirty dirt, but it generated the perception that there was an embarrasing dossier on Trump .</p>
<p>Among <a href="http://gawker.com/this-looks-like-the-dncs-hacked-trump-oppo-file-1782040426">the files leaked</a> on June 15, was a massive “oppo” file on Donald Trump.  Not the more famous and rancid “golden shower” dossier published in January 2017 by <a href="https://www.documentcloud.org/documents/3259984-Trump-Intelligence-Allegations.html">Buzzfeed</a>. The first oppo file was a massive unreadable collection of open source articles.  It was the Steele dossier, which was not hacked, that began to push the Russian/Trump narrative. The Steele file was not only a work in progress but had been actively shopped around to major media outlets who found the accusations salacious and potentially libelous. The shopping <a href="https://www.pbs.org/newshour/politics/newly-leaked-dossier-trump-circulated-dc-months">began in Octobe</a>r 2016, with <em>Mother Jones</em> and that was after Steele had <a href="https://www.motherjones.com/politics/2016/10/veteran-spy-gave-fbi-info-alleging-russian-operation-cultivate-donald-trump/">handed over the report </a>in July 2016 to the FBI. The FBI initially agreed to continue to fund Steele&#8217;s work but changed their mind. The main architects were a research company called Fusion GPS who inexplicably had  clients Natalia Veselnitskaya and Rinat Akhmetshin.  According to the New York Times, Glen Simpson was not only developing dirt on Clinton via Steele, but working for a law firm, BakerHostetler, representing Prevezon Holdings, the company who had also hired Veselnitskaya and Akhmetshin to dig up dirt and attack Bill Browder, the man behind the Magnitsky Act.</p>
<p class="css-1i0edl6 e2kc3sl0">“He’s a professional smear campaigner and liar for money,” Browder lashed out at Simpson in the <em><a href="https://www.nytimes.com/2018/01/08/us/politics/fusion-gps-glenn-simpson.html">New York Times</a></em>. “The credibility of anything that he does is in question.”</p>
<p>The <a href="https://www.washingtonpost.com/graphics/2018/politics/steele-timeline/?noredirect=on&amp;utm_term=.f56ba41c691f">Steele </a>Dossier as it became known, is classic Russian <em>kompromat</em> and clearly attempts to link Trump to Russia influence via blackmail and financial dealings with dirty bits sprinkled in to catch the media&#8217;s attention. James Comey of the FBI notified President Trump on January 6, 2017 that the intelligence community believed the Russians were attempting to interfere with the election. On January 10, <em>Buzzfeed</em> published the Steele dossier. The singular document had shifted the focus from Hillary Clinton&#8217;s use of a private server to the   potential of a Russian asset running the country. A perfect secondary effect of psyops.</p>
<p>Remember this is not the <a href="https://assets.documentcloud.org/documents/2861555/1.pdf">massive 211 page open source opposition report</a> that focuses mostly on Trump&#8217;s marriages and business squables using published articles.  This clear attempt to conflate one &#8220;leaked&#8221; dossier with one that created and shopped after the election began the slow spin of the media towards linking Russia with Trump. An accusation that continues to gather speed and substance as Special Prosecutor Robert Mueller continues his investigation and the FBI indicts Russians and Trump associates in numerous indictments.  But the reality was that Trump didn&#8217;t win the popular vote, Hillary Clinton did. And the victory in the election was decided by the electoral college.</p>
<p>Where did the idea that Russia had hacked the election and linked to Donald Trump come from?</p>
<p><a href="http://dangerousmagazine.com/2018/07/29/2407/">Continued in Part Two: &#8220;The Hunt for Clinton Dirt&#8221;</a></p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/07/19/hack-part-one/">The Hack Part One &#8211; The Attack On America</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2018/07/19/hack-part-one/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Story of How Robert Young Pelton Created DPx Gear</title>
		<link>http://dangerousmagazine.com/2018/04/23/story-dpx-gears-hostile-environment-survival-tools/</link>
		<comments>http://dangerousmagazine.com/2018/04/23/story-dpx-gears-hostile-environment-survival-tools/#comments</comments>
		<pubDate>Tue, 24 Apr 2018 01:56:49 +0000</pubDate>
		<dc:creator><![CDATA[Lisa]]></dc:creator>
				<category><![CDATA[New Issue]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2228</guid>
		<description><![CDATA[<p>Back in the late 90’s and early oughts, I used to bump into a well known survival expert named Jeff Randall. If you know Jeff you know he doesn&#8217;t tolerate much but he zeroed in pretty quickly on the work I was doing in war zones. We became fast friends and spend many a long night discussing the business of adventure. We would meet up at the Soldier of Fortune convention or the SHOT show back when real mercenaries, militia...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/04/23/story-dpx-gears-hostile-environment-survival-tools/">The Story of How Robert Young Pelton Created DPx Gear</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-Original-on-case.jpg"><img class="aligncenter size-full wp-image-2312" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-Original-on-case.jpg" alt="HEST-Original-on-case" width="1200" height="798" /></a></p>
<p>Back in the late 90’s and early oughts, I used to bump into a well known survival expert named Jeff Randall. If you know Jeff you know he doesn&#8217;t tolerate much but he zeroed in pretty quickly on the work I was doing in war zones. We became fast friends and spend many a long night discussing the business of adventure.</p>
<p>We would meet up at the Soldier of Fortune convention or the SHOT show back when real mercenaries, militia members and clandestine folks used to gather around the pool and tell stories.  One of the things Randall kept pestering me about was designing a knife; something I had never really thought of, despite being a product designer and marketer in my past career.</p>
<div id="attachment_2236" style="width: 810px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/DPx-HEST-ORiginal-Prototype.jpeg"><img class="size-full wp-image-2236" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/DPx-HEST-ORiginal-Prototype.jpeg" alt="The original prototype for what would launch a entire knife business. " width="800" height="533" /></a><p class="wp-caption-text">The original prototype for what would launch a entire knife business.</p></div>
<p>In my travels to conflict, I was more of a &#8220;local screwdriver in a bag&#8221; kind of self defense carry or a &#8220;cheap locally made knife that I could ditch before flying&#8221; type.  Randall is an expert on survival training and ran classes in the Peruvian jungles for pilots. Since then, he has branched out into just having fun doing ditch medicine, wilderness, rope and caving type classes. I stuck to entering conflict zones and doing missions with U.S. Special Forces in Afghanistan, accompaning South African mercenaries in Somalia fighting pirates and being on the front lines in Libya in Siirt as local militias wiped out ISIS. Each trip was an education on what worked, an what was superfluous.</p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/hest-handle-high-res.jpeg"><img class="alignleft size-large wp-image-2308" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/hest-handle-high-res-1024x642.jpeg" alt="hest-handle-high-res" width="670" height="420" /></a>By 2008, and after ten years of pestering by Jeff, I thought I would give the idea of designing a knife a shot. I knew that the first rule of survival is not to get into trouble.  The second is to make sure you actually have your survival tools with you if you need them.</p>
<p>That meant they had to be small, easy to carry and multi functional. If you really needed a survival tool, it can&#8217;t break. This meant the classic Swiss Army Knife or ten dollar gas station knife might cause you more harm than benefit if it broke under hard use.</p>
<p>A key part of all our knife designs is the concept of self confidence; that the tool you bring will perform the job when you need it the most.</p>
<p>I decided to call it the HEST, short for &#8220;Hostile Environment Survival Tool&#8221; &#8211; a knife that could be useful in the wilderness as well as for self-defense. When I was ready to show my design, Jeff was surprised at how compact the knife was. The HEST also had a number of features not found on simple knives. It was beefy, thick and indestructible. I made it out of spring steel, the kind that locals make machetes out of. I refined its finish by enlisting the skills of Shon Rowen, who had perfected a heat treat on the famous high carbon 1095 steel.</p>
<div id="attachment_2310" style="width: 376px" class="wp-caption alignright"><img class="  wp-image-2310" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/pry2.jpg" alt="pry2" width="366" height="366" /><p class="wp-caption-text">H•E•S•T stands for Hostile Environment Survival Tool. Just one minor change like the pry bar can add numerous features and benefits to a survival tool. The two hole provide lashing points and light weight while the pry bar allows the knife to be hammered, saves the tip and is an ideal non lethal self defense tool.</p></div>
<p>The DPx Gear HEST Original was only four and a half ounces, under eight inches long and was designed to be affordable. Every square millimeter of the knife was examined for usefulness, ergonomics and function. The handles could be removed revealing a hidden storage compartment. The sheath came with a washer designed to remove the scales.</p>
<p>The blade was hardened to Rockwell hardness 58, which allows for stropping or field sharpening, much like professional butchers use high carbon steel instead of exotic harder blends.</p>
<div id="attachment_2305" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/hest-high-res.jpeg"><img class="wp-image-2305 size-large" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/hest-high-res-1024x397.jpeg" alt="hest-high-res" width="670" height="260" /></a><p class="wp-caption-text">Small but tough. The best survival tool is the one you actually have on you when you need it.</p></div>
<p>There are holes integrated to both lighten and balance with the most unusual feature being the pronounced pry bar where the pommel is. This allows the HEST to be hammered like a chisel, and provides a reverse grip, a non-lethal concealed grip and quite the nasty surprise for back alleys.</p>
<p>The blade has our patented notch for opening bottles, lifting pots and lashing.  The Original continues to sell well and is a knife that has made a lot of friends from professional Bear skinners to Army EOD.</p>
<div id="attachment_2270" style="width: 1090px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/11085844_978325525525882_429371346_o.jpg"><img class="wp-image-2270 size-full" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/11085844_978325525525882_429371346_o.jpg" alt="11085844_978325525525882_429371346_o" width="1080" height="720" /></a><p class="wp-caption-text">The HEST Original has fans among the military, LEO and even big game hunters. Experts who know why a Shon Rowen heat treat on 1095 is the professionals choice.</p></div>
<p><strong>DPx Gear HEST ORIGINAL Features and Specifications</strong></p>
<p>Fixed blade survival knife in black textured powder coated, high carbon 1095 hardened and tempered steel with Rockwell hardness of 57-58</p>
<ul>
<li><em>Brass hardware</em></li>
<li><em>Pry bar</em></li>
<li><em>Lashing points</em></li>
<li><em>Wire breaker</em></li>
<li><em>Bottle opener/ Pot lifter/ thumb control point</em></li>
<li><em>Green canvas Micarta scales with hollow storage area</em></li>
<li><em>Designed to be used as a neck knife by removing scales</em></li>
<li><em>Black Kydex sheath with optional belt clip</em></li>
<li><em>Made in America by Shon Rowen in Idaho Falls</em></li>
<li><em>Lifetime warranty</em></li>
</ul>
<ul>
<li><em>Weight:  4.40 oz</em></li>
<li><em>Overall Length: 7.63&#8243;</em></li>
<li><em>Blade Length: 3.13&#8243;</em></li>
<li><em>Blade Thickness:  0.19&#8243;</em></li>
<li><em>Handle Material: Green Canvas Micarta</em></li>
</ul>
<div id="attachment_2232" style="width: 4266px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/DSC_5572.jpg"><img class="wp-image-2232 size-full" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/DSC_5572.jpg" alt="DSC_5572" width="4256" height="2832" /></a><p class="wp-caption-text">The HEST folder is simple, overbuilt without a single wasted feature or curve. It is also ergonomically designed to fit in the hand as a self defense tool.</p></div>
<p>&nbsp;</p>
<p><strong>The DPX Gear HEST/F Folder.</strong></p>
<p>In 2010, I had sold enough HEST blades to learn that folders are where the real business is. Traditional fixed knives are important tools but folders, well they are a work of art.  At this point, my neophyte entry into knife design needed help.</p>
<p>I leaned on Tom Novak, a young outdoor enthusiast and fan to enter the world of engineering and digital design. Both Tom, a self-taught expert and his talented designer twin brother Andre would later come to work as a team to take concepts to 3D drawings, to digital rendering, then 3D printouts and then finally prototypes that I would take to the rough zones to test.</p>
<div id="attachment_2314" style="width: 385px" class="wp-caption alignright"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/hest21.jpg"><img class="wp-image-2314" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/hest21-300x168.jpg" alt="hest2" width="375" height="210" /></a><p class="wp-caption-text">A three dimensional renderings of the DPx HEST/F to test with customers.</p></div>
<p>We wanted to retain the ergonomics and function of the fixed HEST in the new folding HEST. I also wanted the frame and blade over engineered and over built.</p>
<p>In my years in the bush as a lumberjack and on various expeditions, I was not a fan of folding knifes due to the horrific injuries they can create and the multiple failures.</p>
<p>The choices of materials for the frame side were easy. A thick but light slab of aviation grade Titanium was an expensive, but perfect material as the back bone of the HEST. on the other side, instead of using a liner and a scale we went with a thick slab of phenolic laminate in a rough grip.  Lighter than using all Ti but well within the requirements I set.</p>
<div id="attachment_2277" style="width: 680px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-Ti-Africa.gif"><img class="wp-image-2277 size-large" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-Ti-Africa-1024x684.gif" alt="HEST-Ti-Africa" width="670" height="448" /></a><p class="wp-caption-text">A sturdy hard use pocket knife may not be that big of a deal back home but as you slowly head towards the front lines, having a dependable tool becomes critical. This is a week before entering the fighting in South Sudan for a piece in Vice. You can see the the slogan &#8220;When Survival Is Your Life&#8221; applies. https://www.youtube.com/watch?v=lDSu8wlQG6c</p></div>
<p>&nbsp;</p>
<p>The next task was to design a blade of equal thickness, but stronger. A high carbon German D2 tool steel was chosen. The knife would hold an edge and still take a razor edge for tough tasks like skinning and dirty work. To make sure the knife could not collapse, I introduced an idea in development by Rick Hinderer called a Roto Block. Very similar to a gun safety. Once the dial was turned to “lock” it is physically impossible for the blade to close on the user’s fingers.</p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/ASM_9354.jpeg"><img class=" size-medium wp-image-2329 alignleft" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/ASM_9354-300x200.jpeg" alt="ASM_9354" width="300" height="200" /></a>I put a lot of usability into the folder design like jimping that worked with gloves and wet hands, but also functioned as wire strippers for household, automotive and thin detonation wire. I had worked in tunnels blasting and always wanted this feature.</p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/258330_201337649911781_6451614_o.jpeg"><img class=" size-medium wp-image-2325 alignleft" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/258330_201337649911781_6451614_o-300x200.jpeg" alt="258330_201337649911781_6451614_o" width="300" height="200" /></a>The most serendipitous discovery was how well the potholder/opener in the blade worked as a rapid opener. The idea that a knife must open faster than an automatic and to the rear is important in hostile encounters. After a few times opening the DPx Gear HEST/F flippers and autos seem painfully slow and awkward.</p>
<div id="attachment_2278" style="width: 1010px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/IMG_20150416_144939_1.jpg"><img class="wp-image-2278 size-full" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/IMG_20150416_144939_1.jpg" alt="IMG_20150416_144939_1" width="1000" height="1000" /></a><p class="wp-caption-text">The Milspec version of the DPx Gear HEST/F folder features Sleipner steel. A proven hard cutting tool steel formula that keeps on slicing and still can be sharpened in the field. We chose this unusual steel because it has proven itself in the meat processing industry where blade sharpness is measured to the penny.</p></div>
<p>&nbsp;</p>
<p>Simple things like converting the lanyard hole into a standard hex driver was overlooked by most, if not all, knife makers.  Designing features like a deep carry clip that fit on heavy pants or military gear that had the exact amount of tension for rapid deployment was easy.  The trick was designing the whole system to be held on by a stout enough screw that doubled as a glass breaker (complete with Tungsten Carbon insert).  More implementation of ideas that came from hard time in the field.</p>
<div id="attachment_2309" style="width: 338px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Hestinbox.jpg"><img class="  wp-image-2309" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/Hestinbox-300x200.jpg" alt="Hestinbox" width="328" height="223" /></a><p class="wp-caption-text">A folder that was designed to last a lifetime or more</p></div>
<p>&nbsp;</p>
<p>Finally, what made DPx Gear unique was not only were these knives tested in places like Borneo, Somalia, Afghanistan and other hard use environments, but that I keep tweaking them to get it exactly right.</p>
<p>Real lasting customer service is also part of that long term commitment to our customers. Paying attention and respecting customer input again helps us modify, design and built better and better products, by having constant input and feedback.</p>
<p>DPx Gear takes pride in starting everyone of our designs in the field. Only once I can fully feel comfortable that our customer gets everything they expect, do we go into production.</p>
<p>So next time you are in Syria, Somalia, Iraq, Afghanistan or any other areas where our customers work. Look for Mr DP.</p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/ODA-595-in-Iraq.jpg"><img class="aligncenter size-large wp-image-2238" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/ODA-595-in-Iraq-1024x768.jpg" alt="ODA 595 in Iraq" width="670" height="503" /></a></p>
<p><strong>DPx Gear HEST/F 2.0 Features and Specifications</strong></p>
<p>The DPx HEST/F 2.0 is a German D2 tool steel folder mated to a U.S. made Titanium alloy frame with a durable American G10 scale assembled by the craftsmen at LionSTEEL in Northern Italy.</p>
<p>The HEST/F was developed as the direct folding version of the HEST fixed blade knife and was dubbed the 2.0 because there were a number of significant modifications made to the original design of this brutal use folder. The goal was to increase strength without adding weight and to directly address concerns about ease of opening, &#8220;strength of lockup and usability.</p>
<ul>
<li><em>Blade is German D2 tool steel polished, then Milspec phosphate coated tumble finish</em></li>
<li><em>6Al4V Grade 5 titanium alloy frame and spring frame lock</em></li>
<li><em>Patented LionSTEEL RotoBlock system</em></li>
<li><em>American-made G10 handle scale</em></li>
<li><em>1/4&#8243; hex driver</em></li>
<li><em>Unique wire stripper jimping and hard lashing points</em></li>
<li><em>Thumb grip/bottle opener</em></li>
<li><em>Removable stainless steel clip and glass breaker with integrated lanyard attachment</em></li>
<li><em>Knife includes a unique, collectible Mr. DP skull adjustment tool which is used to adjust the pivot tension and remove/replace the glass breaker screw with an included flat screw. The tool may also be used as a handy EDC by itself.</em></li>
</ul>
<ul>
<li><em>Weight:  5.1 oz</em></li>
<li><em>Overall Length: 7.63</em></li>
<li><em>Blade Length:  3.15</em></li>
<li><em>Steel:  D2</em></li>
<li><em>Rockwell Hardness:  60</em></li>
<li><em>Blade Coating:  Milspec Phosphate</em></li>
<li><em>Blade Thickness:  0.19&#8243;</em></li>
<li><em>Handle Material:  OD green textured G10/6Al4v Titanium Frame lock&#8221;</em></li>
</ul>
<p><em> </em></p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/D70_9088.jpg"><img class="wp-image-2235 size-full" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/D70_9088.jpg" alt="D70_9088" width="4256" height="2832" /></a></p>
<p>The Original DPx HEST/F Urban Kickstarter Campaign Models: (T to B) Sterile, Bronze, America and Mr. DP Editions.</p>
<p>&nbsp;</p>
<p><strong>The Tougher, Younger, Smaller Brother: The DPx Gear HEST/F URBAN</strong></p>
<div id="attachment_2231" style="width: 1450px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-Original-in-vest.jpg"><img class="size-full wp-image-2231" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-Original-in-vest.jpg" alt="How do you transfer the rock solid confidence the DPx Gear Original provides in a small urban friendly folder? " width="1440" height="1920" /></a><p class="wp-caption-text">How do you transfer the rock solid confidence the DPx Gear Original provides in a small urban friendly folder? Easy make it stronger.</p></div>
<p>As you can imagine, as soon as you announce a product you insist is perfect, the requests for something different begin. I had designed the HEST series for my large hands and less than gentle use of gear. I actually built in the idea of patina into every material and finish. There are many DPx Gear HEST owners who brag on just how beat up and beautiful their blade is.</p>
<div id="attachment_2334" style="width: 1210px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/urban-moody-spine_1200.jpg"><img class="size-full wp-image-2334" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/urban-moody-spine_1200.jpg" alt="Everything you expect in a hard use knife but in a smaller tougher package" width="1200" height="685" /></a><p class="wp-caption-text">Everything you expect in a hard use knife but in a smaller tougher package</p></div>
<p>What I was missing was the trend for people who want a smaller knife, one that fits within legal carry city limits which is roughly a three-inch blade. These knife fans didn’t foresee any trips into Yemen or Syria, but wanted some of the cachet that comes with products used by U.S. Special Forces, first responders and expedition leaders.</p>
<p>With some hesitation, I set about shrinking down the DPx Gear HEST/F 2.0 into what became the DPx Gear HEST/F Urban. I refused to shrink overall strength and thickness ratios, but I did want to upgrade the materials where possible. I also wanted input from the target audience, so we went to Kickstarter in an innovative campaign to both insert consumer ideas and gauge response.</p>
<p><a href="https://www.kickstarter.com/projects/170295107/the-dpx-hest-f-urban-the-all-american-hard-use-poc"><img class="fit aligncenter" src="https://ksr-ugc.imgix.net/assets/004/915/168/79d6e6eb6595b6565cdadfa5d64bd5c9_original.jpg?w=680&amp;fit=max&amp;v=1447597243&amp;auto=format&amp;q=92&amp;s=9820204429078e56277833acf9e48cc4" alt="DPx Gear HEST/F Urban Specifications Features" width="474" height="698" /></a></p>
<p>The final product was a tougher knife than it’s big brother. At only 3.35 ounces and with marginally thinner frame and blade, the Urban was small and tough. Adding things like a caged bearing system and all American hardware and manufacturing also made the knife a hit.</p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/urban-frame-side-full-open_1200.jpg"><img class="aligncenter size-full wp-image-2336" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/urban-frame-side-full-open_1200.jpg" alt="urban-frame-side-full-open_1200" width="1200" height="773" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-URBAN-Ti-Production-side.jpg"><img class="aligncenter size-full wp-image-2337" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/HEST-URBAN-Ti-Production-side.jpg" alt="HEST-URBAN-Ti-Production-side" width="4770" height="3840" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/9-Urban-DPx-Logo-clip.jpg"><img class="aligncenter size-full wp-image-2338" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/9-Urban-DPx-Logo-clip.jpg" alt="9 Urban-DPx-Logo-clip" width="2400" height="1602" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban_Frame_Only_Rock-1200.jpg"><img class="aligncenter size-full wp-image-2339" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban_Frame_Only_Rock-1200.jpg" alt="Urban_Frame_Only_Rock-1200" width="2400" height="1165" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Screen-Shot-2017-10-04-at-12.08.46-PM.png"><img class="aligncenter size-full wp-image-2340" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/Screen-Shot-2017-10-04-at-12.08.46-PM.png" alt="Screen Shot 2017-10-04 at 12.08.46 PM" width="854" height="838" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban_BW_Framelockside.jpg"><img class="aligncenter size-full wp-image-2341" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban_BW_Framelockside.jpg" alt="Urban_BW_Framelockside" width="2400" height="1452" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-Side-one-layer.jpg"><br />
</a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/BriefcaseUrbanbanner.jpg"><br />
</a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-on-LED-Lights-.jpg"><br />
</a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/DPxUrbanbriefcasebanner.jpg"><br />
</a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/DPx-GEAR-URBAN-Ti-GRAY-CASE.jpg"><img class="aligncenter size-full wp-image-2346" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/DPx-GEAR-URBAN-Ti-GRAY-CASE.jpg" alt="DPx GEAR URBAN Ti GRAY CASE" width="1766" height="1182" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-handle-on-white.jpg"><img class="aligncenter wp-image-2347 size-medium" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-handle-on-white-300x169.jpg" alt="Urban-handle-on-white" width="300" height="169" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/8-Urban-Closed-Side-Sillhouette.jpg"><img class="aligncenter wp-image-2348 size-medium" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/8-Urban-Closed-Side-Sillhouette-202x300.jpg" alt="8 Urban-Closed-Side-Sillhouette" width="202" height="300" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-Side-on-Table-White.jpg"><img class="alignleft wp-image-2349 size-medium" src="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-Side-on-Table-White-300x200.jpg" alt="Urban-Side-on-Table-White" width="300" height="200" /></a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/URBAN-_GRAY_CASE_1200.jpg"><br />
</a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-Poster-Product-Only_1200.jpg"><br />
</a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/04/Urban-closed-Type_12001.jpg"><br />
</a>So now the DPx Gear HEST family is comprised of the Original Fixed Blade, the HEST/F 2.0 folder and the compact Urban series.</p>
<p><strong>DPx HEST/F Urban Specifications</strong></p>
<p>The DPx HEST/F Urban is the last pocket knife you&#8217;ll need for every day carry.</p>
<ul>
<li><strong>Small, Tri-gauge wire stripper jimping</strong>.  The thumb grip features three notches in the exact gauges to strip household, auto and timer wire for blasting or electronics</li>
</ul>
<ul>
<li><strong>Fully reversible, deep carry pocket clip.  </strong>A deep pocket clip means your pocket knife rides as low and unobtrusively as possible in your pocket. The angle of the clip over the frame lock adds additional support to the lock. The DPx HEST/F Urban is made from not just durable materials but stain free materials. Even the clip screws and hardware are designed to take harsh environments with ease.</li>
</ul>
<ul>
<li><strong>A U.S. invented tested and proven frame lock</strong> has become the standard locking feature for high-end custom knives. We added a stainless steel cap to reduce wear on the lock face.</li>
</ul>
<ul>
<li><em>Weight:  3.35 oz</em></li>
<li><em>Overall Length:  6.7&#8243;</em></li>
<li><em>Blade Length:  2.9&#8243;</em></li>
<li><em>Steel:  CPM S35VN</em></li>
<li><em>Rockwell Hardness:  61</em></li>
<li><em>Blade Coating:  None</em></li>
<li><em>Blade Thickness:  0.16&#8243;</em></li>
<li><em>Handle Material:  6Al4v Titanium</em></li>
</ul>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/04/23/story-dpx-gears-hostile-environment-survival-tools/">The Story of How Robert Young Pelton Created DPx Gear</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2018/04/23/story-dpx-gears-hostile-environment-survival-tools/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Erik Prince &#8211; An American Commando In Exile</title>
		<link>http://dangerousmagazine.com/2018/02/13/erik-prince-american-commando-exile/</link>
		<comments>http://dangerousmagazine.com/2018/02/13/erik-prince-american-commando-exile/#comments</comments>
		<pubDate>Tue, 13 Feb 2018 19:46:56 +0000</pubDate>
		<dc:creator><![CDATA[Lisa]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Blackwater]]></category>
		<category><![CDATA[Dangerous Magazine]]></category>
		<category><![CDATA[Erik Prince]]></category>
		<category><![CDATA[Robert Young Pelton. Iraq. Mercenaries]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2213</guid>
		<description><![CDATA[<p>by Robert Young Pelton In a humid, 88-degree summer swelter, Erik Prince pulls up on his Cannondale mountain bike drenched in sweat but unwinded. Dressed in a cheap white polo shirt, the 41-year-old ex–Navy SEAL, ex–CIA assassination point man, and avid adventure racer has just pedaled over to meet me from his self-described redneck mansion, a low-key brick affair a few miles away in North Virginia horse country, where he has been raising his seven school-age children. The next day,...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/02/13/erik-prince-american-commando-exile/">Erik Prince &#8211; An American Commando In Exile</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/02/m199prihhome.jpg"><img class="alignleft size-medium wp-image-2215" src="http://dangerousmagazine.com/wp-content/uploads/2018/02/m199prihhome-300x230.jpg" alt="m199prihhome" width="300" height="230" /></a></p>
<p><strong>by Robert Young Pelton</strong></p>
<p>In a humid, 88-degree summer swelter, Erik Prince pulls up on his Cannondale mountain bike drenched in sweat but unwinded. Dressed in a cheap white polo shirt, the 41-year-old ex–Navy SEAL, ex–CIA assassination point man, and avid adventure racer has just pedaled over to meet me from his self-described redneck mansion, a low-key brick affair a few miles away in North Virginia horse country, where he has been raising his seven school-age children. The next day, Prince will board a flight from Dulles International Airport, heading off to begin a new life in Abu Dhabi, the capital of the United Arab Emirates — a nation, some have been quick to note, that lacks an extradition policy with the United States.</p>
<p>Today he needs to pack, and he wants to be with his kids, but he also needs to talk. He has some things he needs to get off his chest, some things he wants everyone to know. He greets me politely, takes a seat, and proceeds to remove the batteries from his cell phone — “It’s too easy to eavesdrop these days,” he says. Then he checks his Breitling watch and shoots me the impatient look his business associates know only too well: Let’s get on with it.</p>
<p>In phone calls leading up to our meeting, Prince was angry — furious, even — that he and Blackwater, the company he built from a ramshackle shooting range into a $1.5 billion one-stop shop for war-zone services to the Pentagon, U.S. State Department, and the CIA, continue to endure what he views as a ceaseless and politically motivated “proctological exam.” The company will go on (it recently won a fresh $100 million contract from the CIA), but Prince, seething with betrayal, has had enough: “I’m done. It’s all sold or shut down. I’m getting out of the government contracting business.”</p>
<p>Since the clumsy February 2009 rebranding effort in which Blackwater was renamed Xe (pronounced “zee”), both current and former executives, Prince says, get deposed regularly by investigators from at least six federal agencies, including Congress, the Pentagon, the U.S. Bureau of Alcohol, Tobacco, Firearms, and Explosives, and even the Department of Agriculture. They’re looking for dirt to support what Prince dismisses as “baseless” accusations that run the gamut from negligence, racial discrimination, prostitution, wrongful death, murder, and the smuggling of weapons into Iraq in dog-food containers. One witness, Howard Lowry, who traveled to Iraq frequently between 2003 and 2009, testified on September 10 that Blackwater contractors had him procure steroids and other drugs for them, and that he was invited to weekly all-night parties in Baghdad’s al-Hamra hotel.</p>
<p>“One of the suites would be absolutely packed with gentlemen running around with either no clothes on, no shirt on,” he said in a court document that was leaked to the media almost instantly. “It was like a frat party gone wild. There was cocaine all on the tables. There were blocks of hash, and you could smell it in the air.” Lowry gave his testimony as part of a 2008 lawsuit brought by two former Blackwater employees, who allege that Blackwater sent the bill for hookers and strippers to Uncle Sam and that Prince benefited from this fraud. Prince says there’s no merit to the charges: “When we found knucklehead behavior, we fired them.”</p>
<p>Though Prince stepped down as CEO of Xe on March 2, 2009, the IRS, he claims, is auditing his personal income taxes, all while press reports and blogs call him a “war profiteer,” “right-wing crusader,” and “mercenary” (a term he despises), and imply that he is fleeing the country to escape justice.</p>
<p>But if he is on the run, his evasion skills need help. Xe/Blackwater recently agreed to pay the Feds a $42 million fine for a series of niggling violations; when we meet, Prince is one week away from a seven-hour deposition (with an attorney who followed him to Abu Dhabi) for a lawsuit financed by the New York–based Center for Constitutional Rights. It’s a matter of public record that he’s sold off or closed many of the 30-plus companies that he created to handle discreet contracts from the government between 2004 and 2009. Meanwhile, he still fumes that he was outed as a covert CIA operative in August 2009, a leak he blames on his Democratic enemies in Congress and newly appointed CIA director Leon Panetta’s incompetence.</p>
<p>“Look at the stink they raised when a low-level agent like Valerie Plame was revealed,” he says. “What happened to me was worse,” he adds, going on to call the leak criminal. His cover blown, he tells me he has nothing left to hide.</p>
<p>If there is a short version to where it all went wrong, Prince’s curt response sums it up: “Nisour happened.” On September 16, 2007, Blackwater guards were sent to clear the way for a U.S. State Department convoy and ended up opening fire on a busy traffic circle, killing 17 Iraqis. Because of a special order established in 2004 that exempted Blackwater contractors from Iraqi law, the five Blackwater employees who shot up the square were indicted in the U.S. for voluntary manslaughter; Prince, looking like Ollie North’s boyish nephew, appeared before Congress soon after the bloodbath to explain the expanding and deadly role of private contractors in Iraq. (On December 31, 2009, a U.S. district judge dismissed all the manslaughter charges because the case against the Blackwater guards had been improperly built on testimony given in exchange for immunity.) Many of the victims of Nisour Square and their families accepted State Department–approved payouts for their silence, but Prince says a suit may be refiled in North Carolina. “It won’t go anywhere,” he adds.</p>
<p>At the time of Nisour, Prince and Blackwater had already been engaged in a legal battle for nearly three years with the families of four men who were brutally murdered in Fallujah in 2004 while in Blackwater’s employ. The attorneys for the families undertook a negative PR campaign against Blackwater. Because he is wealthy and held sole propriety of the company, Prince himself made an ideal target for their smears.</p>
<p>Although Prince says he’s saddened by the deaths of the 33 Blackwater men killed on the job (he teared up about it at a private going-away reception the previous day), he chalks up the loss of life not to his or Blackwater’s hubris, but simply to war, and men doing dangerous work in dangerous places. At every turn, he points out, Blackwater followed the orders of its client — U.S. government officials — who, he says, often put his men in harm’s way. His one regret? “I wish we had never worked for the Department of State. They’re not worth it.”</p>
<p>Prince is not a chatty fella, and as he downs a second bottle of spring water, I have to ask him the same question multiple times to get him to answer — like starting a car with a dead battery. You can tell by his manner and the length of his replies what he wants to talk about (his dad) and what he doesn’t (the sensational accusations against him that speculate on his plans).</p>
<p>While he allows that taking up residence in Abu Dhabi will “make it harder for the jackals to get my money,” he tells me that his move to the Persian Gulf isn’t about avoiding the courts, but rather about being home for dinner with his kids. No, he’s serious: His real motive for leaving the country, he assures me, is that he can get to Abu Dhabi quickly from his undisclosed new work in “the energy field” — a future that has his detractors wondering what’s scarier: Erik Prince running security for the State Department and spying for the CIA or Erik Prince freelancing in the Middle East.</p>
<p>If Prince seems like a man in a perpetual hurry, it’s because he is. For one thing, the men in the Prince family have a genetic predisposition to early death from heart disease. Prince’s grandfather Peter died of a heart attack at age 36, his uncle at 60, and his own father nearly died of one when Erik was three. “My dad was scared, but focused,” he recalls. “He was a tugboat that pulled a lot of boats behind him.”</p>
<p>Born in 1969 to Edgar and Elsa Prince, Erik was their only son (he has three sisters) and grew up in Holland, Michigan, a conservative Dutch-immigrant enclave that could be the setting for a Norman Rockwell painting. Like many in business and politics, Prince wears his family’s hard climb to success like a badge of honor. Edgar started his own company in 1965, and during Erik’s early childhood, the family of six lived in a heavily mortgaged house about a third the size of his mother’s current estate on Michigan’s Lake Macatawa.</p>
<p>At the time of Edgar’s near-fatal heart attack, he and his business partners had just developed their breakthrough product: a lighted sun visor with a mirror, first introduced in the 1973 Cadillac. More innovations followed, including a built-in garage-door opener, digital compass, and thermometer, which made Edgar Prince rich. What impressed Detroit the most was that Prince Industries invested its own money in R&amp;D and often successfully predicted the little things that made the difference to the car-buying public.</p>
<p>Prince soaked up his dad’s business philosophy around the dinner table. He also absorbed his father’s focus on family. “My dad insisted on being home for all of my sporting events,” he says. “He even kept a fleet of aircraft so his sales guys could be home from meetings in time for dinner.”</p>
<p>From an early age, Erik liked to push his luck. As early as 12, he tested himself by sailing alone on Lake Michigan, and he ran a trap line in the cold Michigan winters. As a teen he was a cold-water diver for the sheriff’s department (to find drowned snowmobilers) and a volunteer firefighter while attending Hillsdale College, a privately funded libertarian school in southern Michigan.</p>
<p>As he built his fortune, Prince’s father became a prime mover in the Christian evangelical movement, his mother overseeing donations to James Dobson’s Focus on the Family and other conservative political action groups. The relationships his father developed through his philanthropy not only informed Erik’s worldview but also became important to his business prospects later. In 1990 Edgar secured Erik a low-level internship in the White House, but Prince soon quit for a much more exciting opportunity to intern for California Congressman Dana Rohrabacher, Reagan’s former speechwriter and an ex–freedom fighter against the Soviets in Afghanistan.</p>
<p>Rohrabacher recalls that Prince, a “bright, driven young man,” volunteered to search for a mass grave in Nicaragua to expose Marxist-turned-president Daniel Ortega as a killer. “I went down there with this other guy from Dana’s office,” Prince says. “It was the first time I had to shake a surveillance tail, from the Sandinistas.” He was 21, eight days shy of his first wedding, and thrilling to his first taste of international intrigue. “We found a mass grave: bones sticking out of the ground, hands tied with wire at the wrists.”<br />
More adventure awaited him. Prince’s initial goal was to become a Navy carrier pilot, but in the era of Tailhook, he was turned off by the frat-house antics at the naval academy. Switching to the Navy SEALs, he found his calling. But first he had to pass Basic Underwater Demolition School — one of the toughest selections in the military.</p>
<p>“The cool thing about the SEAL teams is that the only difference between enlisted men and officers is that the officer has a white stripe on his helmet,” Prince says. He found in the SEALs both an outlet for his intensity and a credo for his entrepreneurial drive. “The sea is the most difficult environment to operate in — on land you have a few hours to sort out your problem, but if you have problems in the water, you’re not going to live unless you sort them out in seconds.”</p>
<p>In 1993 Prince joined SEAL Team 8, based out of Norfolk, Virginia. “I figured I would be a SEAL for the next 10 to 12 years. There wasn’t much going on then. The invasion of Haiti was a non-event. It was mostly training, training, and more training. Had I stayed longer, I would have seen action, but things changed at home.”</p>
<p>On March 2, 1995, Edgar Prince collapsed from another heart attack and died. Later that same year, Prince’s wife, pregnant with their second child, received a cancer diagnosis. Prince finished out his fifth year as a SEAL but returned to civilian life sooner than he’d planned. “You roll with the punches,” he says stoically.<br />
For the next eight years, his wife struggled with cancer, until she passed away in 2003. He refuses to elaborate but allows that “the saddest moment of my life was her funeral.” He was 34.</p>
<p>When the Prince Group sold in 1996, one year after Edgar’s death, it garnered $1.35 billion. Though split between several of his dad’s business partners, numerous employee stockholders, his mother, three siblings, and him, the windfall still set Prince up for life. “My SEAL friend suggested that maybe I should invest the money, kick back, and live off the interest,” Prince says, in a rare moment of reflection. “In hindsight that wasn’t such bad advice.” Instead, he created the ultimate boys club in a North Carolina swamp.</p>
<p>Prince’s original plan, created with help from veteran Navy SEAL Al Clark, was to build the dream training facility — a place all his buddies from Norfolk could use. “We needed 3,000 acres to make it safe,” Prince recalls. After searching for a location for six months, he ended up paying $900,000 for 3,100 acres (or about $300 an acre) in Moyock, North Carolina. The swampy, tannin-stained “black water” and the bears on the property inspired both the name and the famous bear-paw logo. By the time the Blackwater Lodge and Training Center officially opened on May 15, 1998, the footprint had doubled in size, to 6,000 acres, and Prince was into it for $6.5 million. Over the next few years, he would invite a number of influential members of the military, FBI, local law enforcement, and even the CIA to visit and play “Blackwater.”</p>
<p>At first, locals didn’t pay the range or Prince much notice. “To the degree that [Prince] was thought of, it was as this patriotic guy who had built this Hail Mary facility to help the SEALs, and who probably hoped to break even,” recalls Jay Price, staff writer for Raleigh’s <em>The News &amp; Observer</em>, who tracked Blackwater’s rise to prominence. “The big contracts weren’t on the horizon, not even a glimmer, and I don’t think anyone in their right mind was thinking of him as a greedy military-industrial profiteer.… Maybe as a kid from money who was looking around to see what his role in life would be.” Prince could have spent the next few decades in eternal adolescence, impressing and entertaining his shooting friends at the “Lodge” and staying out of the limelight, but 9/11 would change that.</p>
<p>Before 2001 the term contractors referred to retired agency and special operations vets who knew each other by reputation or service. The small pool of retired “Tier One” operators, usually middle-aged men with smeared tattoos and worn SF or SEAL rings, were discreetly hired and signed up for overseas gigs with few questions asked and little to no public divulgence.</p>
<p>Shortly after 9/11, Cofer Black, the former CIA head of Counter Terrorism, put out the word to hire more than a hundred “shooters” for Afghanistan. The CIA would “sheep dip” (reassign under false cover) active operators and activate “green badgers” (cleared agency contractors) for the CIA Special Activities Division. Once the agency moved from using small mobile paramilitary operations in Afghanistan to larger, fixed installations, it quickly realized that it needed a more robust type of protection: The tiny old boy’s network was soon tapped out. That’s when the CIA turned to Prince and his clubhouse.</p>
<p>In the spring of 2002, Buzzy Krongard, the number three at the agency, presented Prince with Blackwater’s first “mission”: Could Prince provide 20 men with top-secret clearances and have them on a plane to Kabul within a few days? Their job in Afghanistan would be to protect the CIA headquarters and one remote OGA base, in Shkin, supporting the hunt for Bin Laden. Friends were called, and Prince quickly had his team. A six-month, $5.4 million contract was rushed through as “sole source, urgent and compelling need.” What’s more, Prince assigned himself to be part of the group so he could make sure his customer was being well served.</p>
<p>Once in Afghanistan, Prince couldn’t wait to get back to the States: He realized right away that he could make millions more providing security teams than he could running a shooting range. His new “private military company” would be to the Pentagon as FedEx was to the Postal Service. And his sales pitch to CIA bureaucrats was about as sophisticated as his $17 haircut. “We did it cheaper and better,” he boasts. Blackwater was paying each man $550 a day and billing the agency $1,500 all in. It was hard for Prince to lose money.</p>
<p>Then came Iraq. By spring of 2003, an old-fashioned land war had given way to a robust State Department and CIA political mission. Hundreds of young U.S. diplomats and case officers, many of them straight out of college, were posted to Iraq to shape a new nation. The Bush administration initially expected the same jubilant response from liberated Iraqis that they had seen in Afghanistan, but they would be proved wrong. Newly assigned viceroy Paul Bremer, tasked by President Bush with creating a transitional government (the Coalition Provisional Authority), needed a dramatically different form of protection, and so did all the<br />
diplomats. Normally, the government is responsible for its own security, but it simply didn’t have the staff for such a high-risk personal-protection detail overseas. From the government’s point of view, contracting for this protection also outsourced the political risk in the event of a screwup or fatality. The contractor, not the client, would take the heat — and the bullets.</p>
<p>In the fall of 2003, Blackwater was awarded the $27.7 million “Bremer Detail,” a Department of Defense contract that essentially created a Frankenstein brigade of highly visible hired guns. Blackwater provided the security to the Iraq Survey Group (the ISG was the CIA group looking for proof of weapons of mass destruction), allowing the ISG to travel anywhere in the country with the guarantee of safety.</p>
<p>By the time I first visited Blackwater, in July 2004, to lead a course on how to think like a terrorist for a bunch of special-forces types who were about to be deployed to Afghanistan, the Lodge was well on its way to becoming a networking center for U.S. and foreign special operations and anyone else hoping to be recruited for security work in Iraq and Afghanistan. The place reeked of Prince’s weakness for Boy’s Own derring-do — from the hunting lodge/summer camp/club house–type decor to the main office, which featured trophy animals and gun-enthusiast magazines.</p>
<p>Outside on the many shooting ranges, brass glittered in the gravel; the popping of bullets was ever present, as were the sounds of screeching tires and explosions from the driving track. Fifty-caliber rounds fired from the sniper range echoed off the portable buildings with a metallic shriek. Well-muscled men in tan T-shirts and crushed ball caps methodically cleaned their M4s and pistols outside the chow hall. Inside, a long line of plaques and mementos from police and special operations groups decorated the entry to the offices. Off in the distance were aircraft fuselages, Navy ship towers, and a village built from Conex containers. Longtime Blackwater president Gary Jackson even had a desk made out of armored steel. Jackson and Prince were proud of the tactics they had developed to operate in Iraq — Prince still is.</p>
<p>“We were using low-profile, armored indigenous vehicles with teams of two and four,” Prince says, explaining that he chose the “low profile” look to protect the ISG. That look consisted of operators wearing local dress moving in beat-up yet armored taxis, with weapons held below the windows. “You can’t shoot at what you can’t see,” he says. Blackwater was suddenly guarding arguably the most hated man in the most violent country on Earth — and Prince rose to the challenge. “Not one State Department employee was killed while we were protecting them,” he says.</p>
<p>While Prince’s success may have been partly the result of his aggressive approach, it made some of his own executives nervous. “Erik decided to become a lightning rod and then [attach it] to his ass,” says Mike Rush, another ex–Navy SEAL and former Blackwater vice-president, of Prince’s business manner. “Erik would walk up and down the corridors of Langley and the Pentagon telling everyone how fucked up they were and how they should run the war,” he continues. “That’s nice…but we had to do business with those people.”</p>
<p>Prince’s “sell first, figure it out later” style injected massive stress into his rapidly expanding venture. Everyone remembers him as impatient. Prince’s own stance on those early days: “You hire people, they don’t work out, you move on.” In the scramble to keep contracts manned, Blackwater trained, hired, and rotated thousands of men. The men generally had little time for their bureaucratic State Department counterparts, and the natural tension between them became fertile ground for payback when the media and lawyers came looking for sources with a score to settle with Prince. But between 2003 and 2007, Prince had his own agenda and didn’t focus on petty squabbles.</p>
<p>In 2002, a few short months after 9/11, the CIA had turned him down for a job when he applied to be part of its Clandestine Services, specifically the Special Activities Division of the agency. The CIA, he says, told him he didn’t have enough “hard skills.” So, two years later, in December 2004, he hired the CIA — bringing in Cofer Black following 28 years of service with the agency. Prince installed the former CIA exec as Blackwater’s “chief breacher” — the man who blows in doors on a SEAL team.</p>
<p>As Blackwater grew, so did Prince’s ambitions. Indulging his lifelong love of aviation, he began assembling a small air force of smaller cargo planes, helicopters, and even large transports (including a Boeing 767) for either a Dulles-to-Baghdad run or the rendition of terror suspects, depending on whom you believe.<br />
He also hatched a plan to vertically integrate all these assets to form a self-sufficient army of 1,740 men — an “army in a box” complete with air support, medical and construction outfits, and high-tech weapons that could deploy instead of, say, a United Nations peacekeeping brigade. Registered in Barbados under the name Greystone, this new company was designed to hire foreign employees and operate outside U.S. legal restrictions. “It is more difficult than ever for your country to successfully protect its interests against diverse and complicated threats in today’s grey world,” Greystone’s brochure stated. Prince even pitched then Secretary of State Colin Powell a version of this: a battalion-size humanitarian force that could provide “relief with teeth” in the Darfur region of Sudan. To Powell and his advisors, Prince’s gunned-up proposal was as politically acceptable as calling a nuclear strike on an orphanage.</p>
<p>Meanwhile, as if Prince didn’t have enough going on, the CIA finally accepted him for its NOC program. As a “non-official cover operative,” he was given a polygraph and an operational code name, and only his handler knew his true identity from his “201” personnel file. Prince volunteered to find terrorist targets for “capture or kill.” Twice he was able to come through, but authorities in Washington never gave the green light.<br />
Blackwater was supposed to be the grease in the wheels of regime change in Iraq, but there was soon serious friction. Numerous troubling events that had been buried in action reports came to light: Blackwater was suffering from its success and spreading itself too thin.</p>
<p>In the violent fall of 2004, I spent an unrestricted month covering Blackwater teams running the charred route between the Green Zone and Baghdad International Airport. The daily 15-minute thrill ride often included close calls, angry Iraqis, sniper attacks, car bombs — enough near-death experiences to last a lifetime. I was able to see the service that our government was buying, and while I also took taxis and private cars without incident, I found Blackwater’s teams aggressive but professional.</p>
<p>But when I returned to Baghdad in 2006, at least one contractor complained that Blackwater had become a “flat-out sloppy fucking operation,” and the men I knew apologized to me for the “roid-rager” who told me to “get the fuck out of here” when he heard I was media.</p>
<p>The press soon brought Blackwater’s most egregious acts to the attention of the public: dead Iraqis, a crashed plane, crushed vehicles, a drunken shooting of a vice-president’s security man, media guards gunned down, and much more. On the CIA side, “big-boy rules” were in effect. These rules are a tacit code among covert operatives that states that there are no rules until you break one — by, say, appearing before Congress on every television on Earth. Prince’s mission to find terrorists fizzled and then died under the new administration. Finally, with Secretary of State Hillary Clinton in power (as a senator, she had introduced legislation to put the kibosh on private contractors), Blackwater ran out of oxygen. So Prince, ever the SEAL, quickly assessed, adjusted, and moved on.</p>
<p>America won’t get an apology from Prince, because in his view, he did what he had to do and, crucially, what his government asked him to do. Yes, Blackwater has paid off victims of its violence, but only under the direct advice of its client, the U.S. State Department. When Prince had to get equipment in-country to keep his clients and his people safe, he did. When his staff racked up 300 counts of violations while following client orders, he simply ate the fine. It’s like another popular slogan SEALs use during training: Pain is just weakness leaving the body. Now Prince is leaving the pain and taking himself out of range.</p>
<p>Financially, Prince may yet come out ahead. His quick estimates are that his failed self-<br />
financed ventures, like armored trucks and airships, burned about $100 million. Toss in another $50 to $60 million in legal fees (last year alone he spent $24 million) and another $42 million in government fines, and then subtract the net-after-tax income from the billion and a half in estimated government contract revenue: How much did he make? “The rule of thumb is that you plan for 15 percent and are happy if you make 10,” he explains. “I have enough to live comfortably. I’m a multimillionaire, but with way less now. I am almost embarrassed I didn’t make more money.”</p>
<p>Prince won’t provide details on his future other than that he won’t be accepting government customers. “The media tends to screw up my plans,” he says. Still, it’s no secret Blackwater’s up for grabs. As of press time, a letter of intent had been drafted regarding its imminent sale. Reconciled but not pleased with this outcome, he pauses for a moment, searching awkwardly for a way to sum up his payback. He thinks he has it: “Atlas Shrugged.” He means Ayn Rand’s novel in which defiant engineer John Galt protests stifling bureaucracy by convincing other leaders to bring society and government to the brink of collapse. It’s clear that Prince identifies with Galt. It’s also clear that he will not abandon his dreams.</p>
<p>Sitting inside Prince’s toy-cluttered Suburban hours before his flight to Abu Dhabi, I press him once more to define himself against the caricature many have of him — somewhere closer to evil than Iron Man’s Tony Stark. At first he is reluctant, even embarrassed by the question. Then he tells me, “I try to live by the Parable of the Talents” — Matthew’s story in the Bible about the chastising of a timid servant who buries his master’s money out of fear, and the praising of an industrious servant who increases his master’s money tenfold. But he shifts again; Talents isn’t exactly right.</p>
<p>“I don’t plan to meet my maker tanned, fit, and rested,” Prince says, at last. “I intend to be tired, battered, and bruised.”</p>
<p>&nbsp;</p>
<p>—</p>
<p><strong>The Golden Age for Contractors &amp; Mercenaries</strong></p>
<p>Blackwater/Xe may have been dropped from the State Department’s Worldwide Personal Protective Services contract, but Xe founder Erik Prince’s vision for his industry is being realized on a scale that even he could not have imagined — with firms such as DynCorp International and Triple Canopy (both now located in Virginia) racing to fill the contracts denied Xe. How big are we talking? Despite being an outspoken critic of private contractors during her 2008 campaign for president, Secretary of State Hillary Clinton will soon preside over a private army in Iraq that dwarfs that of the Bush era. Here is a look at the current Obama administration’s security plans for Iraq.</p>
<p>7,000 HIRED GUNS</p>
<p>On August 2, 2010, President Obama announced: “Our commitment in Iraq is changing from a military effort led by our troops to a civilian effort led by our diplomats.” To keep those diplomats safe, however, the State Department plans on doubling — to roughly 7,000 — the number of private security guards and low-paid foreign mercenaries assigned to U.S. personnel and locations.</p>
<p>WORLD’s LARGEST EMBASSY<br />
Approximately the size of Vatican City and costing $592 million, the U.S. Embassy in Baghdad is among the largest and most expensive in the world, even though it was built with cheap, imported labor. A bunkerlike complex of 21 buildings, it spreads over 104 acres and houses 835 employees. Private guards maintain the complex and other facilities in Basra, Erbil, Hillah, Kirkuk, and Tallil.</p>
<p>2,500 ARMORED SUVs and 50 MRAPS<br />
To enable our diplomats and nation-builders to move safely around Iraq, the U.S. Embassy has ordered up a fleet of between 2,500 and 3,200 armored sport utility vehicles at a cost of approximately $150,000 each and has asked the departing U.S. military forces to leave it 50 MRAPs — 28,000- to 42,000-pound trucks built to withstand massive roadside IED explosions.</p>
<p>PRIVATE AIR FORCE<br />
Twenty-five Black Hawk helicopters and a small number of fixed-wing aircraft and air-support crews will also be used to transport embassy staff between locations. Blackwater pioneered the concept of using “Little Birds” with two snipers to protect SUV convoys (and as rescue or escape vehicles). DynCorp International will replace Blackwater in providing this air support.</p>
<p><em>This article was originally published on Tuesday, November 30, 2010 in Men&#8217;s Journal. </em></p>
<p><em> </em></p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/02/13/erik-prince-american-commando-exile/">Erik Prince &#8211; An American Commando In Exile</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2018/02/13/erik-prince-american-commando-exile/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>General Dostum and 12 Strong: THE LEGEND OF HEAVY D AND THE BOYS</title>
		<link>http://dangerousmagazine.com/2018/01/20/general-dostum-12-strong-legend-heavy-d-boys/</link>
		<comments>http://dangerousmagazine.com/2018/01/20/general-dostum-12-strong-legend-heavy-d-boys/#comments</comments>
		<pubDate>Sat, 20 Jan 2018 18:09:25 +0000</pubDate>
		<dc:creator><![CDATA[Lisa]]></dc:creator>
				<category><![CDATA[New Issue]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[12 Strong]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Dostum]]></category>
		<category><![CDATA[Special Forces]]></category>

		<guid isPermaLink="false">http://dangerousmagazine.com/?p=2077</guid>
		<description><![CDATA[<p>This article on ODA 595, General Dostum, John Walker Lindh and the battle at Qali-i-Jangi was originally published in the March 2002 edition of National Geographic Adventure THE LEGEND OF HEAVY AND THE BOYS  By Robert Young Pelton The Regulators flew in from Uzbekistan at night on a blacked-out Chinook helicopter. They landed near a mud-walled compound in the remote Darra-e Suf valley in northern Afghanistan. As they began unloading their gear, they were met by Afghans in turbans, their faces...</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/01/20/general-dostum-12-strong-legend-heavy-d-boys/">General Dostum and 12 Strong: THE LEGEND OF HEAVY D AND THE BOYS</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/HeavyDTitle.jpg"><img class="aligncenter size-full wp-image-2188" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/HeavyDTitle.jpg" alt="HeavyDTitle" width="1200" height="820" /></a></p>
<p><em>This article on ODA 595, General Dostum, John Walker Lindh and the battle at Qali-i-Jangi was originally published in the March 2002 edition of National Geographic Adventure</em></p>
<p><em><strong>THE LEGEND OF HEAVY AND THE BOYS  </strong>By Robert Young Pelton</em></p>
<p>The Regulators flew in from Uzbekistan at night on a blacked-out Chinook helicopter. They landed near a mud-walled compound in the remote Darra-e Suf valley in northern Afghanistan. As they began unloading their gear, they were met by Afghans in turbans, their faces wrapped. “It was like that scene in Close Encounters where the aliens meet humans for the first time,” one soldier says later. “Or maybe that scene in Star Wars: These sand people started jabbering in a language we had never heard.” The Americans shouldered their hundred-pound rucksacks while the Afghans hefted the rest of the equipment. The gear seemed to float from the landing site under a procession of brown blankets and turbans.</p>
<p>The next morning, about 60 Afghan cavalry came thundering into the compound. Ten minutes later, another 40 riders galloped up. General Abdul Rashid Dostum had arrived.</p>
<p>“Our mission was simple,” another soldier says. “Support Dostum. They told us, ‘If Dostum wants to go to Kabul, you are going with him. If he wants to take over the whole country, do it. If he goes off the deep end and starts whacking people, advise higher up and maybe pull out.’ This was the most incredibly open mission we have ever done.”</p>
<p>Before heading in-country, the soldiers had been briefed only vaguely about Dostum. They’d heard rumors that he was 80 years old, that he didn’t have use of his right arm. And they’d been told that he was the most powerful anti-Taliban leader in northern Afghanistan. “I thought the guy was this ruthless warlord,” one soldier says. “I assumed he was fricking mean, hard. You know: You better not show any weakness. Then he rides up on horseback with one pant leg untucked, looking like Bluto.”</p>
<p>Dostum dismounted and shook everyone’s hand, then sat on a mound covered with carpets. He talked for half an hour. Dostum’s strategy was now their strategy: to ride roughshod over Taliban positions up the Darra-e Suf Valley, roll north over the Tingi Pass in the Alborz Range, then sweep north across the plains and liberate Mazar-e Sharif, Afghanistan’s second largest city. When the council broke up, Dostum stood and motioned toward the horses. America’s finest were about to fight their first war on horseback in more than a hundred years.</p>
<p>The rocket howls over the roof of General Dostum’s house in Khoda Barq at about 10 p.m. It’s November 26, my second day in Afghanistan, and already I’m in the middle of a hellacious firefight. Although nighttime gunfire is normal in Afghanistan, there is an urgency to the sound of the deep explosions that come from the 19th-century fortress of Qala Jangi, just over a mile east from Khoda Barq, a Soviet-era apartment complex west of Mazar. The heavy shooting, the worried soldiers, the rapid radio chatter—all signal that something ugly is going on over there.</p>
<div id="attachment_2198" style="width: 680px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_dead-at-qala_small.jpg"><img class="size-large wp-image-2198" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_dead-at-qala_small-769x1024.jpg" alt="Airstrikes, AC130's and Hazara guards had killed all but 86 al Qaeda and Taliban fighters  © Robert Young Pelton, all rights reserved" width="670" height="892" /></a><p class="wp-caption-text">Airstrikes, AC130&#8217;s and Hazara guards had killed all but 86 al Qaeda and Taliban fighters<br />© Robert Young Pelton, all rights reserved</p></div>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-154.jpeg"><br />
</a> <a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_DSCF0031.jpeg"><br />
</a><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_JW2.jpeg"><br />
</a>Meanwhile, I’m hunkered down, waiting for Dostum. I’ve arranged through intermediaries to spend a month with the general, but for the past week, he has been a hundred miles east, trying to subdue Taliban forces that control the city of Kunduz. General Abdul Rashid Dostum is a man who has rarely been interviewed but has often been typecast as a brutal warlord—usually because of his reputation for winning. He is a kingmaker who works the ethnic minority to choose who will rule and who will fail. A man who is said by some journalists to define violence and treachery. (In his book &#8220;Taliban&#8221;, author Ahmed Rashid reports a tale he heard that Dostum once ordered his men to drag a thief behind a tank until all that was left was a bloody pulp of gore. Rashid later admitted that not only did he not witness it but it the event was fictional.  Beyond that, all I know is that Dostum, born a poor peasant, grew up to be a brilliant commander, a general, and a warlord—one of the many regional leaders across Afghanistan whose power derives both from ethnic loyalties and from military strength. That he is known to be a deft alliance maker—and breaker. And that he became the first Afghan commander to take over a major city when he entered Mazar-e Sharif on November 10. It’s an irresistible story, made all the more so by a convincing rumor I’ve been hearing since my arrival: that Dostum triumphed with a little help from his friends—specifically, the Green Berets.</p>
<p>As I wait for Dostum to return, though, the constant chatter of machine guns and the badoom badoom of cannons from an American gunship bombarding the fort—Dostum’s military headquarters—suggest that I might be a bit premature in offering any congratulations on winning the war. I soon learn that yesterday some 400 foreign Taliban prisoners overpowered their guards, broke into arsenals, and took over part of the fortress. Right next to where I am staying. I had first tried to meet the General in May of 1997. At the same moment he was trying to flee Mazar from the Taliban assault. I had jumped a train in Tajikistan, snuck into Uzbekistan and remained holed up in a dusty border town. My attempts to convince the Afghans took place in a building in which men with dark beards sat in from of Tony Montana style palm tree sunset wall paper murals. Finally after two weeks they admitted they could not smuggle me across. This time I had less worries with just a few hours waiting for Uzbek guards to look the other way while we hustled our kit over the blockade Friendship Bridge at night.</p>
<p>At 3:30 a.m., I go to bed. Three hours later, I am awakened by a massive explosion a few yards from the house—another near miss by a rocket fired from inside the fort. The sound of canon fire continues without a break but at a slower pace. In the morning Villagers come out in the crisp, golden light of morning, shivering and tired. Some huddle together to watch the gray pillars of smoke from the bombing runs. Others begin the work of the day without even paying attention to the nearby fighting.</p>
<p>In the afternoon, when I visit the 1985 fort called &#8220;Qala i Jangi&#8221; or Fort of the Soldiers,  bullets sing over my head. Up on the parapets, Dostum’s troops stream toward a gap in the ramparts created yesterday by an errant American 2000 lb bomb. Soldiers run up to the bite in the wall, shoot into the fort, and then scurry back down. I watch a fighter go up to the top, then crumple into a black pile of rags. Astoundingly, after two days of bombardment, the prisoners still control the fort.</p>
<div id="attachment_2161" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-026.jpeg"><img class="size-large wp-image-2161" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-026-1024x541.jpeg" alt="ODA 595 Prepares to retrieve the body of Mike Spann from Qala-i-Jangi  ©Robert Young Pelton, all rights reserved" width="670" height="354" /></a><p class="wp-caption-text">ODA 595 Prepares to retrieve the body of Mike Spann from Qala-i-Jangi ©Robert Young Pelton, all rights reserved</p></div>
<p>Late in the afternoon, a convoy of mud-spattered off-road vehicles pulls up, and a dozen dusty Americans in tan chocolate chip camo climb out. They have Beretta pistols strapped to their thighs like gunslingers and short M-4 rifles slung across their chests. They’re polite but wary about having their pictures taken as they set up their night-vision scopes. After a final check of their gear, they head into the fortress. Later, I find out that they’ve come hoping to retrieve the body of Central Intelligence Agency officer Johnny Micheal Spann, who was killed by Taliban prisoners—the first American combat casualty in Afghanistan.</p>
<p>Dostum arrives that night, ducking to avoid banging his head as he strides through the guest-house door. He takes my hand in a meaty grip and apologizes for being dirty and tired; he has just driven eight hours on a shattered road from Kunduz. He has two weeks of beard, beetling eyebrows, and a graying brush cut. When Dostum frowns, his features gather into a dark, Stalin-like scowl—his usual expression for formal portraits. But when he smiles, he looks like a naughty 12-year-old.</p>
<p>He sits and makes small talk, then excuses himself to take a shower. When he returns, the dark weariness has lifted. Over chai (tea), he announces good news. He has ended the bloody battle for Kunduz by negotiating with Mullah Faizal and Mullah Nuri, the two most senior Taliban leaders in the north. It seems that the “brutal warlord” has engineered the biggest peaceful surrender in recent Afghan history—more than 5,000 Afghan Taliban fighters and foreign volunteers laid down their arms. He waves the accomplishment aside with a shy smile even as he promises to introduce me to his new trophies—the mullahs. It turns out they’re staying next door, guests in Dostum’s house.</p>
<div id="attachment_2098" style="width: 235px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-032.jpeg"><img class="size-medium wp-image-2098" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-032-225x300.jpeg" alt="Mullah Faizel, commander of the Taliban Army in the North. © Robert Young Pelton, all rights reserved" width="225" height="300" /></a><p class="wp-caption-text">Mullah Faizel, commander of the Taliban Army in the North. © Robert Young Pelton, all rights reserved</p></div>
<p>Dostum proves to be significantly more expansive in conversation than his scant press clippings would suggest, and he’s happy to fill me in on his background. Over the next few weeks I privately coin for him a nickname based on the media&#8217;s fear and his in person good humor: I call him Heavy D, after the 1980s rapper.  &#8220;Dostum&#8221; is actually a nickname that means &#8220;my friend&#8221; was born Abdul Rashid in 1954 in the desolate village of Khvajeh Do Kuh, about 90 miles west of Mazar. Headstrong and known to get into fights,  was adept at the game of <em>buzkashi</em>, in which horsemen attempt to toss the headless carcass of a calf into a circle. Dating at least to the days of Genghis Khan, the violent game is not so much about scoring as it is about using every dirty trick possible—beating, whipping, kicking—to prevent the opposing team from scoring. Buzkashi is the way Afghan boys learn to ride—and it’s the way Afghan politics is played: There are few rules and the toughest, meanest, and most brutal player takes the prize.</p>
<p>After the seventh grade, Dostum left school to help his father on the family farm. At 16, he started working as a laborer in the government-owned gas refinery in nearby Sheberghan, where he dabbled in union politics.</p>
<p>The people of Dostum’s village were so impressed with his leadership that they recruited 600 men for him to command. It was about this time that Abdul Rashid became “Dostum.” In Uzbek, <em>dost</em> means “friend”; <em>dostum</em> means “my friend.” It was a nickname that the young soldier was given for his habitual way of addressing people. When a local singer wrote a song about “Dostum,” the name stuck. He was quick to defend the weak and if negotiations failed he had no shortage of armed men that would stand beside him.</p>
<p>When a Marxist government came to power in a bloody coup in 1978, the new regime’s radical reforms ignited a guerrilla war with the mujahidin who based themselves in the country’s remote mountain ranges.</p>
<div id="attachment_2208" style="width: 310px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/Screen-Shot-2018-01-21-at-7.35.31-AM.png"><img class="wp-image-2208 size-medium" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/Screen-Shot-2018-01-21-at-7.35.31-AM-300x207.png" alt="Screen Shot 2018-01-21 at 7.35.31 AM" width="300" height="207" /></a><p class="wp-caption-text">The young commando Abdul Rashid, quickly rose through the ranks.</p></div>
<p>Dostum enlisted in the Afghan military—one of the few ways for poor men to escape lives of labor and hardship in rural Afghanistan. He rose through the ranks quickly becoming a paratrooper in 1973, an armored unit in 1978 and Battalion 734 KhAD by 1983. Dostum&#8217;s real success was in negotiating enemy commanders to lay down their arms and to join him. He was authorized to transform his Jowyzjani militia into the 53rd Infantry Division in 1988 and ultimately under the Soviet backed regime of Najibullah, he became commander of the 7th Army Corps in charge of all of Northern Afghanistan. Again he began integrating mujahideen into the political military ranks among them his number two against the Taliban Lal Kamadan. At the end of the Soviet period Dostum had 45,000 troops with about half of them as village reserves. If one was to look for the roots of Dostum&#8217;s &#8220;warlord&#8221; reputation it began when he was the direct and most successful enemy of the CIA-backed insurgency of fundamentalist warlords based out of Pakistan. The idea that that Dostum would actually save the day for an embattled America is an irony that has not fully played out.</p>
<p>In the bewildering matrix of Afghan politics, Dostum has frequently—and nimbly—switched allegiances. In the 1980s, as a young army officer in the Soviet-backed government, he fought against the mujahidin. When the regime fell in 1992, three years after the Soviets departed, Dostum fought alongside the mujahidin and helped the Northern Alliance’s legendary Ahmad Shah Massoud battle the fundamentalist Pashtun forces of Gulbuddin Hekmatyar and gain control of the capital. The shelling, raping, pillaging, looting, and house-to-house fighting that then befell Kabul stained the name of every mujahidin commander, including Dostum’s, and fueled his reputation for brutality. Today the government of President Ghani has welcomed the fighters of Hekmatyar from exile in Pakistan and is looking to bring the Taliban into the government. All the while ostracizing the now First Vice President Dostum who is currently in exile in Ankara plotting his next move.</p>
<p><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/HeavyDpainting.jpg"><img class="aligncenter size-large wp-image-2201" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/HeavyDpainting-1024x350.jpg" alt="HeavyDpainting" width="670" height="229" /></a></p>
<p>But back in 2001, &#8220;Warlord&#8221; Dostum who was head of the Jumbesh political party had simpler but identical goals: Align with the U.S. to return from exile in Turkey and bring the Taliban into the new government.  show Dostum the chapter in Rashid’s book that includes the account of the gruesome execution of the thief. Dostum chuckles and denies the allegation. He freely admits that in two decades of war, abuses have been committed by the troops of every commander. “What else do you expect my enemies to say?” he asks. “That I am kind and gentle? I will let what you see be the truth.”</p>
<p>In 1996, when the Taliban rolled into Kabul, Dostum was forced to retreat to his stronghold in Mazar as the mullahs instituted their version of a pure Islamic state. “At first I thought, Why not let them rule?” he says. “Power is not given to anyone forever. If the Taliban can rule successfully, let them.” A year later, betrayed by his second in command, who had defected to the Taliban, Dostum fled to Turkey. The U.S. refused to work with Dostum until former UN envoy Charlie Santos pointed out to the CIA that the only functioning fighting group besides the Panjshiris of Massoud were Dostum&#8217;s Uzbeks. Based on history and dossiers full of Pakistani provided intelligence, the Agency wanted nothing to do with Dostum. Santos pointed out that with Massoud dead, and no Pashtun resistance, Dostum was America&#8217;s only hope.</p>
<div id="attachment_2085" style="width: 310px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/CrJ1elDWgAE3s6Q.jpg"><img class="wp-image-2085 size-medium" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/CrJ1elDWgAE3s6Q-300x225.jpg" alt="CrJ1elDWgAE3s6Q" width="300" height="225" /></a><p class="wp-caption-text">The Uzbeks and Hazara took to the mountains to escape the mechanized columns of the Taliban</p></div>
<p>Those among Dostum’s men who had remained in Afghanistan now became guerrilla fighters, moving on horseback holed up in the mountains under the command of his former number two La. Staying off the roads and in the wilds, they could swoop down and attack the Taliban but could not hold the ground. Dostum’s lieutenants would call him in Turkey and tell him how difficult life had become. They had to kill their horses for food. They didn’t have enough cloth for shrouds, so they had to bury dead comrades in burqas. “People demanded that I do something,” says Dostum. “Commanders, clergymen, women—they would all tell me very bitter stories. I was full of emotions. My friends were struggling against the Taliban, and I was sitting there.”</p>
<p>Dostum says that to help him get back into the fray, the former president of Afghanistan, Burhanuddin Rabbani, sliced off about $40,000 from the CIA funds. The CIA had begun to work with Massoud&#8217;s people in October of 1999 hoping to pay him to kill Osama bin Laden.  The Turks, long staunch enemies of Islamic extremism, contributed a small sum as well, and, on April 22, 2001, General Dostum and 30 men were ferried into northern Afghanistan on Massoud’s aging Soviet helicopters. “That,” says Dostum, “was when the war against terror began.”</p>
<p>Living in caves and raiding Taliban positions, Dostum’s men slowly began to harass the well-entrenched Taliban along the Darra-e Suf. They moved and attacked mostly at night, riding small, wiry Afghan horses that are well suited to steep slopes and long desert walks. “The money was hardly enough for feeding my horses,” Dostum says. “They had tanks, air force, and artillery. We fought with nothing but hope.”</p>
<p>Then came September 11. Despite actively fighting the Taliban, it was not until Santos introduced Dostum to JSOC that the United States might want to give him some help. Even the CIA was reticent to land paramilitaries and officers to set up the conditions for an Special Forces ODA to be inserted. At the last minute the Agency was told by the SF ground commander that his men were going in with or without the Agency. A small group of CIA that included Mike Spann, flew in to the Darra-e Suf the day before ODA 595 would land.</p>
<p>Now three weeks later the war was supposed to be over. The Taliban had surrendered at Qali i Jangi to CIA officer JR and Dostum and surrenders were under way in Kunduz. The B-Team had already set up shop at the Turkish School in Mazar and was getting ready for the push to Tora Bora. Until a group of 480 al Qaeda and talibs showed up at the gates of Mazar. Dostum and the Green Berets drove by them as they headed for Kunduz.</p>
<p>&nbsp;</p>
<div id="attachment_2092" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-013.jpeg"><img class="size-large wp-image-2092" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-013-769x1024.jpeg" alt="General Abul Rashid &quot;Dostum&quot;   © Robert Young Pelton, all rights reserved" width="670" height="892" /></a><p class="wp-caption-text">General Abul Rashid &#8220;Dostum&#8221;<br />© Robert Young Pelton, all rights reserved</p></div>
<p>The morning after Heavy D’s return from Kunduz, he greets me with a deep, booming “Howareyou?” Today, he tells me, he is eager for me to meet his trophy mullahs.</p>
<p>Next door, in Dostum’s pink house, Mullah Faizal and Mullah Nuri sit on pillows in a small room. These are two of the Taliban who chased Dostum out of Mazar in May 1997, but still he treats them more like honored guests than prisoners of war. Faizal has his prosthetic leg off. He is a thick man with a pug nose, bad skin, tiny teeth, and a cruel stare. Nuri has the black look of a Pashtun who has endured a lifetime of war. Wrapped in blankets, members of the mullahs’ entourage fix me with soulless stares. Nuri is chatty, although he often looks to the silent Faizal before answering my questions. During the Taliban’s reign, thousands of Hazara Shias were murdered in northern Afghanistan; the mullahs are unrepentant. “We fought for an idea,” says Nuri. “We did all that we could. Now we hope that America will not be cruel to the Afghan people.”</p>
<p>That afternoon, Dostum and I set off for the fort, where the uprising has been all but quelled. He brings the mullahs along, to show them the havoc incited by their foreign volunteers. Perhaps they’ll convince any surviving prisoners to surrender.</p>
<p>After four days of bombardment, the interior of the fort is a scene of utter devastation. Blackened, twisted vehicles are perforated with thousands of jagged holes. The crumpled bodies of prisoners, frozen in agony, are scattered everywhere. Most of the fallen look as if they were killed instantly. Some are in pieces; others have been flattened by tank treads. More than 400 prisoners are said to have died;</p>
<p>I count only about 50 bodies in the courtyard. The estimated 30 Alliance soldiers who died have already been taken away by their friends. When an American team finally recovered Spann’s body, they discovered it had been booby-trapped with a live grenade (which they removed without incident).</p>
<p>It is also rumored that there are many dead and at least two live prisoners holed up in the subterranean bomb shelter. The entrance to the bunker was pierced by cannon shots and is blackened from explosions. Dostum’s men have been throwing down grenades and pouring in gasoline and lighting it, but the foreign Taliban refuse to come up. Dostum implores the mullahs to call down to the bunker and tell the remaining men to surrender. Mullah Faizal and Mullah Nuri refuse: They claim they don’t know these people.</p>
<div id="attachment_2158" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-022.jpeg"><img class="size-large wp-image-2158" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-022-1024x769.jpeg" alt="There are 86 al Qaeda fighter in the basement, including John Walker Lindh. Mullah Nuri insists he doesn't know them and they refuse to come up.  © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">There are 86 al Qaeda fighter in the basement, including John Walker Lindh. Mullah Nuri insists he doesn&#8217;t know them and they refuse to come up.<br />© Robert Young Pelton, all rights reserved</p></div>
<p>The trapped Taliban volunteers, it seems, remain hungry for martyrdom. A day later—Thursday, five days since the uprising broke out—they are still firing sporadically at soldiers removing bodies from the courtyard of the fortress. At least two Red Cross workers who descend into the bunker are shot and wounded.</p>
<p>Later that week, Dostum casually mentions that 3,000 other foreign fighters from the surrender at Kunduz are in a Soviet-era prison in the city of Sheberghan, 80 miles west. Anticipating more fireworks, I head there with him and move into another of his residences, a huge, high-walled compound that includes a mosque and, improbably, an unfinished health-club complex.</p>
<div id="attachment_2187" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-094.jpeg"><img class="size-large wp-image-2187" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-094-1024x769.jpeg" alt="By the time the team had arrived in Qali-i-Jangi they were gaunt, sick but eager to keep up the fight. Over 5000 Taliban remained hidden in surrounding villages. © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">By the time the team had arrived in Qali-i-Jangi they were gaunt, sick but eager to keep up the fight. Over 5000 Taliban remained hidden in surrounding villages. © Robert Young Pelton, all rights reserved</p></div>
<p>Some American soldiers are billeted upstairs in the guest houses; men in camo pants run up and down the stairs. Their rooms are filled with green Army cots, dirty brown packs, and green flight bags. Rifles, night-vision gear, and boots are strewn everywhere. I head downstairs and discover a group of soldiers bantering cheerfully, mostly in southern accents. They’ve just finished installing a satellite TV. When the television begins to blare, the men stare at the screen. “We haven’t seen a TV or news in two months,” one soldier says apologetically. Transfixed, they watch the Christmas tree being lit in Rockefeller Center.</p>
<p>These are the soldiers I saw back at Qala Jangi preparing to go in and retrieve the body of the dead CIA agent, Mike Spann. “Don’t I know you?” one of them says. “Aren’t you the guy who goes to all those dangerous places?”</p>
<p>It feels more than a bit odd to be recognized for my books and TV show—as someone who specializes in traveling to the world’s hot spots—while poking around a war in Afghanistan. It feels even more odd when I discover that these are Green Berets—soldiers who truly specialize in the world’s hot spots. But I never travel without a few “Mr. DP” hats, so I dig them out of my bag and pass them around.</p>
<p>Over the ensuing days, I take every opportunity to spend time in these makeshift barracks, particularly once I discover that this is the very unit of Green Berets that I’d been hearing rumors about—this is Dostum’s covert support team. At night we sit around talking over stainless steel cups of coffee. Some details of their mission they can’t discuss. Some are provided by Dostum and others. But the story gradually emerges.</p>
<p>There are twelve Green Berets here and two Air Force forward air controllers. Green Berets work in secrecy, so only their first names can be used: There’s Andy, the slow-talking weapons expert who is never without his grenade launcher; back home, he keeps the guns in his collections loaded “so they are ready when I am.” Both he and Paul, a quiet, bespectacled warrant officer, have been in the unit 11 years. Then there’s Steve, a well-mannered southern medic; Pete, the burly chaw spitter; Mark, their blond, midwestern captain; and so on. It’s like a casting call for The Dirty Dozen. Their motto is “To Free the Oppressed”—something they have done so far in this war with no civilian casualties, no blowback, and no regrets.</p>
<div id="attachment_2051" style="width: 680px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2017/10/a_Afghanistan-2001-058.jpeg"><img class="size-large wp-image-2051" src="http://dangerousmagazine.com/wp-content/uploads/2017/10/a_Afghanistan-2001-058-1024x769.jpeg" alt="In between conflict there was time to celebrate.  A typical meal at Dostum's guesthouse.  © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">In between conflict there was time to celebrate. A typical meal at Dostum&#8217;s guesthouse.<br />© Robert Young Pelton, all rights reserved</p></div>
<p>These soldiers, I soon realize, come from much the same background as Dostum’s: sons of miners, farmers, and factory workers; some are men whose only way out of poverty is the military. They range in age from mid-20s to early 40&#8217;s. They are men with wives, children, mortgages, bills. Men who are the Army’s elite, who are college educated and fluent in several languages, yet who are paid little more than a manager at McDonald’s. They spend every day training for war, teaching other armies about war, and waiting for the call to fight in the next war.</p>
<p>They are direct military descendants of the Devil’s Brigade, a joint Canadian-American unit that fought in Italy during the Second World War. That group was disbanded and then re-formed in the early 1950s as Special Forces, which John F. Kennedy later nicknamed the Green Berets. The men I’m staying with have dubbed their unit the Regulators, after the 19th-century cowboys who were hired by cattle barons to guard their herds from rustlers. The Regulators have served in the gulf war, Somalia, Saudi Arabia, the United Arab Emirates, and in other places they can’t talk about. Their home base is Fort Campbell, Kentucky, but they spend only a few months of the year there. The rest of the time they travel.</p>
<p>On the morning of September 11, the team was returning to base after an all-night training exercise. “The post was in an uproar,” says Paul. No one knew just when or where the team would be sent. They cleaned and stowed their gear and awaited the order. And waited. There was talk that the team might be split up—rumors of differences with a commanding officer who didn’t appreciate the traditional independence of the Green Berets. They were all quitting demanding to be sent to other units rather than put up with new commander ideas on what soldiering was. But 9/11 changed all that. Toward the end of September, the word came down: “Pack your shit.”</p>
<p>Fifteen days later, the team boarded a C-5 Galaxy with a secret flight plan. The Regulators’ final destination turned out to be Uzbekistan, where they spent a week building a tent city and waiting for a mission. “We were at the right place at the right time,” says Steve. “Fifty tents later, they told us to pack our shit again.”</p>
<div id="attachment_2190" style="width: 310px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/168036-dostumMarkN.png"><img class="size-medium wp-image-2190" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/168036-dostumMarkN-300x196.png" alt="First arrival on the Observation Post. Now the tiny group of Americans need to show General Dostum what they can do. " width="300" height="196" /></a><p class="wp-caption-text">First arrival on the Observation Post. Now the tiny group of Americans need to show General Dostum what they can do.</p></div>
<p>“We had two days to plan,” another Regulator says. “The CIA gave us a briefing.” Although the Regulators were among the first, other small teams of U.S. forces would soon be airlifted in for similar missions, a response to Dostum’s request for American assistance to be sent to other Northern Alliance commanders. In an effort to trim Dostum&#8217;s control the CIA would insist that rival commander Ustad Atta Mohammed get his own Green Beret escort several weeks later as he raced Dostum to claim Mazar. Surprisingly Dostum agreed. Once they hit the ground, the Regulators would be writing their own game plan. “Our commanders said they didn’t know what to expect, but at least they were honest enough to admit it,” the Green Beret continues. “They said, ‘You guys will be on the ground; you figure it out.’ ”</p>
<p>Within half an hour of meeting Dostum at the mud-walled compound in the Darra-e Suf, the Regulators swung into action. Some stayed behind to handle logistics and supplies. The rest mounted up and rode north. “It was pretty painful,” Paul says. “They use simple wooden saddles covered with a piece of carpet, and short stirrups that put our knees up by our heads. The first words I wanted to learn in Dari were, ‘How do you make him stop?”</p>
<p>Their most important immediate order of business was to establish themselves in Dostum’s eyes. “The first thing we wanted to do was to say to Dostum, ‘The Americans are here,’ ” Paul explains, “and to make it a fearsome prospect to mess with us.” The Americans set up their gear at Dostum’s command post—which overlooked Taliban positions about six miles away—and immediately began the process of calling in close air support, or CAS. “You see the village; you see the bunkers,” says a second Steve, one of the two Air Force men attached to the team to help coordinate air strikes. “You call in an airplane; you say, ‘Can you see that place? There are tanks. You see this grid? Drop a bomb on that grid.’ Pretty straightforward stuff.”</p>
<p>It took a few hours for bombers to arrive from their carriers. At first, the planes wouldn’t fly below 15,000 feet—the brass was worried about surface-to-air missiles—so targeting was sketchy. But coordination soon improved, and the improbable allies fell into a rhythm: The Americans would bomb; Dostum’s men would attack.</p>
<p>A crude videotape made by one of Dostum’s men shows a battle in the rolling hills of the Darra-e Suf, where the yellow grass contrasts with the deep blue sky. The Americans, up on the ridge, are using GPS units to finalize coordinates. Down below, small Afghan horses are nipping the dry grass on the safe side of the hill, their riders chatting while awaiting the order to charge. The horses cast long shadows in the late afternoon. The only sign that something is about to happen is a white contrail high in the sky. The radio crackles with call signs and traffic broadcast between bombardiers and the American soldiers. First, a soft gray cloud of smoke rises in a lazy ring. Then the concussion: ka-RUMPH!</p>
<p>The tape now shows Dostum, leaning against a mud wall, watching through large binoculars. The dirty gray mushroom cloud slowly bends in the wind. Dostum stays in contact with the Americans by radio, working to help focus the bombing: a man with a seventh-grade education directing the fire of the world’s most powerful military.</p>
<p>Ka-RUMPH! More hits: Tall, fat smoke plumes cast moving shadows on the grass. The riders mount their horses, check their weapons, and begin the one-kilometer sprint to the Taliban front lines. There’s the erratic chatter of AK-47s and the deep dut dut dut dut of Taliban machine guns. Then the radios are jammed with Dostum’s men shouting and celebrating. The Taliban are running.</p>
<p>The videotape cuts to the next morning. Dostum’s men are touring the battle scene. The twisted rag doll bodies of dead Taliban fighters lie heads back, fingers clutched, legs sprawled as if they fell running. Dostum’s men kick the corpses into the trenches and cover them with the tan dirt, not bothering to count the dead.</p>
<p>The Regulators were joined by at least three CIA officers kitted in full combat gear, including a 32-year-old ex-Marine named Mike Spann. “We were surprised at how good they were,” says Captain Mark. “What we are doing now has not occurred since Vietnam. Up until now the CIA has been hog-tied. Now the CIA and spec ops have been let loose.”</p>
<div id="attachment_2087" style="width: 729px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/CrJ1hDhWIAAC4Da.jpg"><img class="size-full wp-image-2087" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/CrJ1hDhWIAAC4Da.jpg" alt="Dostum's men were a loose alliance that grew with every victory against the Taliban" width="719" height="475" /></a><p class="wp-caption-text">Dostum&#8217;s men were a loose alliance that grew with every victory against the Taliban</p></div>
<p>Each night, Dostum would sit down with the Americans and lay out the battle plan for the next day. “He would say he is going to attack at about 2 p.m.,” says Air Force Steve. “So we would put in for priority for the planes.” The team’s primary weapons were not pistols or rifles; they were the most fearsome tools in the American arsenal: F-18s, F-16s, F-14s, and B-52s. They chose not bullets or grenades but ordnance that ranged from Maverick missiles to laser-guided bombs.</p>
<p>In contrast to the Americans’ high-tech warfare, some of Dostum’s tactics would have seemed familiar to the British troops who tried and failed to pacify this region in the 19th century. Before the arrival of the Americans, Dostum fought mostly at night. “He couldn’t expose his small force to Taliban missile strikes,” explains Captain Mark, “so they would hit and retreat. He never sacrificed his men. He would take a village by getting the mounted guys up close. When it looked like they would break the back of the position, he would ride through as fast as he could and keep the Taliban on the run.”</p>
<p>With their knowledge of military history, the Regulators appreciated the ironies of this strange war: “The Taliban had gone from the ‘muj’ style of fighting—in the mountains, on horseback—to working in mechanized columns,” says Will, another member of 595. That heavy reliance on tanks and trucks meant the Taliban wound up fighting a defensive, Russian-style war. “Then, here is Dostum,” says Will, “a guy trained in tanks who’s using tactics developed in Genghis Khan’s time.”</p>
<p>The Regulators’ job was to invent a new form of warfare: coordinating lightly armed horseback attacks with massive applications of American air power—all without hitting civilians or friendly forces. “In an air attack,” says Air Force Steve, “you do one of two things. You can bomb it until there is no resistance, or you bomb and, as soon as the bomb goes off, you charge. By the time they come up and look, you are on them.” The latter approach was well suited to Dostum’s style of attack. “A cavalry charge is an amazing thing,” Will says. “At a full gallop, it’s a smooth ride. The Afghans shoot from horseback, but there is no aiming in this country. It’s more like, ‘I am coming to get you—whether I hit you is another story.’ It’s Old World combat at its finest.</p>
<p>“There’s one time I’ll never forget,” he says. “The Taliban had dug-in, trench-line bunkers shooting machine guns, heavy ma-chine guns, and RPGs [rocket-propelled grenades]. We had an entire 250-man cavalry ready to charge.” The Regulators wanted Dostum’s right-hand man, Commander Lal, to hold off while they got their aircraft in position, but Lal had already given the order. In seconds, 250 men on horseback were thundering toward the Taliban position a mere 1,500 meters away.</p>
<p>“We only had the time it takes 250 horses to travel 1,500 meters, so I told the pilot to step on it,” Will says. “I looked at Lahl and said, ‘Bombs away.’ We had 30 seconds till impact; meanwhile, the Afghan horde is screaming down this ridgeline. It was right at dark. You could see machine gun fire from both positions. You could see horses falling.” An outcrop obscured views of the last 250 meters to the target. The lead horsemen disappeared behind the rocks, and the Regulators all held their breath, praying the bombs would reach the bunkers before the cavalry did. “Three or four bombs hit right in the middle of the enemy position,” says Will. “Almost immediately after the bombs exploded, the horses swept across the objective—the enemy was so shell-shocked. I could see the horses blasting out the other side. It was the finest sight I ever saw. The men were thrilled; they were so happy. It wasn’t done perfectly, but it will never be forgotten.”</p>
<p>&nbsp;</p>
<div id="attachment_2171" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-049.jpeg"><img class="size-large wp-image-2171" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-049-1024x769.jpeg" alt="Over 3200 prisoners were kept in Sheberghan © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">Over 3200 prisoners were kept in Sheberghan © Robert Young Pelton, all rights reserved</p></div>
<p>Around eight o’clock on Saturday night, while I’m talking with the Green Berets, one of Dostum’s men comes into the house and asks us to follow him outside. Beyond the high steel gates is a confusion of trucks, headlights, and guns, and the sound of men moaning in pain. Lined up against a wall is the most pathetic display of humanity I have ever seen: the survivors of the bunker at Qala Jangi fortress. Dostum’s men had finally flooded them out by sluicing frigid water into the subterranean room. Instead of the expected handful of holdouts, no fewer than 86 foreign Taliban emerged after a week in the agonizing dark and cold—starved, deaf, hypothermic, wounded, and exhausted. Their captors brought them here en route to the Sheberghan prison.</p>
<p>They send off steam in the cold night, their brown skin white with dust. Some hide their faces, others convulse and shiver. I talk to an Iraqi, as well as to Pakistanis and Saudis—all of whom speak English. On another truck are the seriously wounded. Some cry out in pain, some are weeping, and others lie still, their faces frozen in deathly grimaces.</p>
<p>They put the prisoners back on the truck. A few minutes later, one of Dostum’s men runs up breathlessly, saying there is an American in the hospital. I grab my cameras and ask Bill, a pensive Green Beret medic, to come with me.</p>
<div id="attachment_2202" style="width: 680px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-105.jpeg"><img class="size-large wp-image-2202" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-105-1024x769.jpeg" alt="The soldiers stay well away from the al Qaeda prisoners as I interview them. They have been blowing themselves up with grenades. © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">The soldiers stay well away from the al Qaeda prisoners as I interview them. They have been blowing themselves up with grenades. © Robert Young Pelton, all rights reserved</p></div>
<p>The scene at the hospital is ugly. The warm smell of gangrene and human waste hits me as I open the door to the triage room. Shattered, bearded men lie everywhere on stretchers, covered by thin blue sheets. The doctors huddle around a steel-drum stove, smiling and talking, oblivious to the pain and suffering around them. In the back, a doctor leans over a man with a smoke-blackened face, wild black hair, and an unkempt beard. He lies staring at the ceiling. The doctor yells in halting English, “What your name?” He jabs at the half-conscious man’s face. “Open your eyes! What your name? Where you from?” The man finally answers. “John,” he says. “Washington, D.C.”</p>
<p>The man is terribly thin and severely hypothermic. At first he is hostile, like a kitten baring its claws. He won’t tell me who to contact, or provide any information that would get him out of the crudely equipped hospital. I convince the staff to move him to an upstairs bed, where Bill inserts an IV of Hespan into the man’s dehydrated body to increase blood circulation. As Bill checks for wounds, he talks to the young man briefly in Arabic. I tell the prisoner where he is and who he’s talking to. Bill finds a shrapnel wound in the emaciated man’s right upper thigh and wounds from grenade shrapnel in his back; he also finds that part of the second toe on his left foot has been shot away.</p>
<div id="attachment_2057" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2017/10/a_walker.jpeg"><img class="size-large wp-image-2057" src="http://dangerousmagazine.com/wp-content/uploads/2017/10/a_walker-1024x769.jpeg" alt="John Walker Lindh was the second Irish American jihadi who was trained in Bin Laden's camps. He refused to talk to his parents and we took him back to our guesthouse for his protection. © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">John Walker Lindh was the second Irish American jihadi  I had met who was trained in Bin Laden&#8217;s camps. He refused to talk to his parents and he was taken back to our guesthouse for his protection. © Robert Young Pelton, all rights reserved</p></div>
<p>As the Hespan drips into his veins, I fire up the video camera, and the man begins to tell his story. His name, he says, is John Walker. He studied Arabic in Yemen and then enrolled in a madrasah, or religious school, in northern Pakistan. He says it was an area sympathetic to the Taliban and that his heart went out to them.</p>
<p>Six months ago, he traveled to Kabul with some Pakistanis to join the Taliban. Since he can’t speak Urdu, he was assigned to the Arab-speaking branch of Ansar (“the helpers”), a faction that Walker claims is sponsored by Osama bin Laden—whom Walker says he saw many times in the training camps and on the front lines.</p>
<p>He ended up in the Takhar Province, in the northeastern part of the country. Then the war began. After the American bombing campaign decimated their forces, Walker and members of his unit fled on foot nearly a hundred miles west to Kunduz—all for nothing, as it turned out. Mullah Faizal and Mullah Nuri soon surrendered Kunduz to Dostum, and Walker was imprisoned with the other foreign volunteers in the bunker at Qala Jangi.</p>
<p>When I look at the terrible conditions and the predicament that Walker is in, I have to ask him if this is what he expected.</p>
<p>“Definitely.”</p>
<p>Was his goal to become martyred?</p>
<p>“It is the goal of every Muslim.”</p>
<p>Then the morphine begins to kick in. I suggest to Bill that we remove Walker from the hospital, where he might be killed by other patients, many of whom were fighting against him at the fortress. We transfer him to Dostum’s house, and the next day he’s spirited away at the same time that his story is being broadcast around the world.</p>
<p>When the videotape of my interview with Walker hits the airwaves back in the U.S., the country focuses its white-hot anger on him, and some of that anger spills over onto me. In the conservative press I am criticized for being too gentle in my questioning of an obvious traitor, on the left for cold-bloodedly tricking a helpless boy into incriminating himself.</p>
<p>&nbsp;</p>
<div id="attachment_2089" style="width: 862px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/Regulators-RObin-Moore-.jpg"><img class="size-full wp-image-2089" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/Regulators-RObin-Moore-.jpg" alt="The team was ordered to exile to meet Donald Rumsfeld and be interviewed by Robin Moore. What happened next was the first of many distortions and fictional retelling of their story. " width="852" height="316" /></a><p class="wp-caption-text">The team was ordered to exile to meet Donald Rumsfeld and be interviewed by Robin Moore. What happened next was the first of many distortions and fictional retelling of their story. This is the back jacket of The Hunt for Bin Laden ghostwritten by the late Jack Idema and published as non fiction by Random House editor Bob Loomis. The book was quietly taken out of print.</p></div>
<p>If you drive west from Mazar, past Qala Jangi, past Khoda Barq, past the ancient, crumbling city of Balkh, and head south toward a ridge of snow-dusted mountains called the Alborz Range, you will see a gap—the Tingi Pass. This is where the Taliban made their last stand. The Green Berets call it the Gap of Doom.</p>
<p>Two of the Green Berets I’ve been chatting with—Andy and Paul, the pair with the longest tenure in the company—have decided that I need to see this place for myself, or maybe simply that they need to go see it again one last time. We jump in a Toyota off-road vehicle and set off. Soon we’re winding past an ancient brick bridge that crosses a roaring gorge; on the west side are large caves that shepherds have scooped out of the soft rock over the centuries.</p>
<p>As we drive, Paul tells me that, back in the U.S., even the Regulators are subject to a military culture of rules and red tape. Planning a one-day live-ammo training exercise can require six months of paperwork. “If there is no enemy, then bureaucracy is the enemy,” he says. But on the ground in Afghanistan, they’re on their own. The greatest restrictions they face have been placed on them by Dostum himself. “Dostum was very concerned about us getting too close to the battlefield,” Captain Mark had told me back at the barracks. “In the last two semi-wars we have been in, every time American soldiers get killed we pull out. That is one of the premises Osama bin Laden operates under.” Dostum wasn’t about to let an American casualty put a premature end to his battle plan.</p>
<p>Their closest call came toward the end of the campaign, before they’d reached the Tingi Pass; I’d gotten an account of it last night from Mike, a big, bearded, soft-spoken soldier. The conflict began with several hundred Taliban troops moving into positions on an adjacent hill. Outmanned, the Green Berets decided to move out on horseback. They had gone only about 600 meters when they started taking fire. “I figured I could whip my horse and run across an open area,” Mike said. “I whip my horse, it takes three steps, and stops. The rounds are zinging over my head. Somehow I make it across the open area. I get off the horse and say, ‘Screw this; I’m walking.’</p>
<p>“We set up in a bomb crater and used it as our bunker. We were receiving more fire. It was somewhere between harassing and accurate—enough to keep our heads down. We called in a couple of bomb strikes. We could see a bunch of Taliban come out of another bunker complex off to the south and disappear behind a hill. It took about an hour to get the aircraft. All the while, we could see troops moving and disappearing. I’m looking through the optics while rounds are zinging all around us.” At this point in the tale, Mike nodded toward Paul, who was sitting next to him on the couch at Dostum’s guest house. “Paul here is busy shooting at guys. What we didn’t realize was that the Taliban who we saw coming out of the bunker had gone into the low ground and were sprinting up the hills at us in a flanking maneuver.</p>
<p>“Our Afghans are running out of ammo. Their subcommander has told us at least six times over the radio to get out of there. You have to understand: Dostum had told them, ‘If an American gets hurt . . . you die.’ We were focused on calling in an air strike to take out this truck that had rumbled into view, and now RPG rounds are flying over our heads. We’re not about to stand up and watch what’s going on. The pilot asked us, ‘What’s the effect [of the bomb attack on the truck]?’ We yell over the radio, ‘We don’t know! We’re not lifting our heads up!’</p>
<p>“When we turn around and notice what’s going on, we see our Afghans have split.”</p>
<p>The team decided to call in a B-52 strike practically on their own position—a drastic move considering the planes were flying above 15,000 feet. The enemy was 700 meters out and moving quickly. “Matt yelled, ‘Duck your head and get down!’ And that pilot dropped a shitload of bombs,” Mike said. “You felt the air leave. After the bombs hit, I peeked over the side of the bunker; our horses were gone. We grabbed our stuff and ran.”</p>
<p>&nbsp;</p>
<div id="attachment_2185" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-088.jpeg"><img class="size-large wp-image-2185" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-088-1024x769.jpeg" alt="The team knew that their story would be stolen, rewritten and misused as Rumsfeld and others seized the moment. © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">The team knew that their story would be stolen, rewritten and misused as Rumsfeld and others seized the moment. © Robert Young Pelton, all rights reserved</p></div>
<p>Paul, Andy, and I drive past villages of round, domed huts, past a checkpoint manned by Dostum’s men, and up along the winding road to the Tingi Pass. Three years of drought have broken: A cold rain pours down in gray sheets. We pass the twisted, stripped wrecks of trucks and Toyotas. Afghans in a blue truck are scavenging for parts. The two Green Berets are solemn; they insist on driving through the gap so they can tell their story from the right perspective.</p>
<p>We wind through the tight pass alongside a swollen mountain river, go over the pass, then head a kilometer down the south side of the divide and stop at a freshly mudded house. We get out of the jeep and stand in the rain and slick mud. Paul picks up the story, raindrops dotting his gold-rimmed, government-issue glasses.</p>
<p>“We kept moving north on horseback, but at that point, no one could tell where the front line was anymore. Once we hit Keshendeh-ye Bala, we picked up a road and followed it north in a truck Dostum’s men had captured from the Taliban. At eight that night, we pulled in to Shulgareh, which is the biggest town in the valley. We were ready to throw down the mattress and settle in for the night when one of the security guards came up with a radio and said that Dostum needed someone to go up to the front to call in aircraft. We jumped in the back of a truck and drove up to Dostum’s HQ here in this house.”</p>
<p>In the courtyard, a soft-eyed cow tries to eat spilled oats just beyond its reach. A hundred yards away, villagers stand against a long compound. They huddle in brown blankets, trying to avoid the soaking rain. Paul points to a misty, triangular peak that forms one side of the gap. It served as Paul’s command post.</p>
<p>“When we climbed up to the top of that hill, we could see the Taliban on the other side, regrouping for the final attempt to stop us. They were setting up fixed positions—bunkers with Y-shaped fighting trenches—on the northern side of the gap. It works against tanks, but it’s plain stupid in this terrain. We had unrestricted movement into the gap, which gave us the high ground.”</p>
<p>Andy chimes in. “Whoever gets the high ground first wins the wars here.” From their perch on the east side of the gorge, the Green Berets could shoot directly into the trenches of the Taliban.</p>
<p>“Once the plane got there, it circled about six times,” Paul says. “Every time the plane would circle, the Taliban would run behind their bunker. After four times or so, they didn’t get bombed, so they just stayed there.</p>
<p>I targeted a spot right next to this guy’s head. I was sick of this guy running back and forth getting ammo. Then the bombs are dropped, and I look through the scope and see body parts flying everywhere. We moved our targeting up along the ridgeline to the second bunker. Same thing: We identity it and boom! No more Taliban. I target the third bunker. They just can’t figure it out. The bomb lands and hits and bam! After that hit, all of them took off on foot to Mazar. And that ended the resistance.” As the three of us climb back into our vehicle, I glance at the battlefield. All I see is grass growing beside abandoned trenches. Only Paul and Andy are able to appreciate what happened here.</p>
<p>Early in the afternoon on November 10, Dostum reached Mazar. His men rounded up vehicles that the Taliban had left behind, and Heavy D entered the city as a conquering hero, standing through the sunroof of a Toyota Land Cruiser. The crowds quickly grew; people threw money in the air for good luck. Dostum’s first stop was the blue mosque at the tomb of Hazrat Ali, the revered son-in-law of the Prophet. Men wept as the imam prayed and thanked Dostum for deliverance.</p>
<div id="attachment_2104" style="width: 680px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-043.jpeg"><img class="size-large wp-image-2104" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-043-1024x769.jpeg" alt="A local mullah sings a prayer of deliverance and thanks to Dostum. © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">A local mullah sings a prayer of deliverance and thanks to Dostum. © Robert Young Pelton, all rights reserved</p></div>
<p>The joy was short-lived. It turned out that 900 Pakistani Taliban had been left behind in a madrasah in the center of a compound about the size of a city block, and they were ready to fight to the death. Dostum and his commanders wanted to negotiate, but the foreign Taliban shot and killed their peace envoys, which left Al-liance leaders with little choice. “We had hardened fighters holed up in the middle of an urban area who wanted to die,” says Will. “And we were going to oblige them.”</p>
<p>The team set up on the roof of a building about 400 meters from the madrasah and called in a strike. When the two aircraft were on location, the Green Berets radioed Alliance commanders to evacuate civilians from the area. The pilots, however, could not lock in on the laser-sighting device that the team was using to identify the target. The madrasah was surrounded for about a mile on each side by identical buildings, which made it difficult for the pilots to pick out the school. “Finally, the pilot says he has the target in sight. I asked him to describe it, just to be sure,” says Will. “He described the building we were sitting on to a T.” Finally, Air Force Steve guided the pilot to the correct building, and he dropped the ordnance: direct hit.</p>
<p>The team cleared him for immediate re-attack, but the pilot radioed back that he had “hung a bomb”—a bomb had not released. When the pilot radioed that he needed to return to base, the other pilot swung into action. On the next pass, three more bombs went through the hole in the roof made by the first bomb, killing most of the holdouts inside.</p>
<p>Under intense pressure, the Regulators had called in a perfect surgical strike—a bomb drop in a crowded urban area without a single civilian casualty. “This is the first close-air-support strike in years in an urban area,” says Air Force Steve. “It was old-fashioned professionalism. The whole team jelled.”</p>
<p>&nbsp;</p>
<p>The steel gate to the guest house opens, and Dostum strolls out, hands in pockets, and is ushered into a black Audi Quattro with tinted windows. Dozens of dark-eyed men in turbans scramble into battered Toyota pickup trucks and assorted four-wheel-drive vehicles. Armored personnel carriers jerk to life in clouds of black diesel exhaust. It’s three weeks after the madrasah bombing, and word has come down that 3,000 Taliban are still occupying the city and environs of Balkh, Alexander the Great’s old walled capital, a few miles west of Mazar. Dostum has decided to clean up the region’s last remaining pocket of Taliban himself.</p>
<p>I ride in the warlord’s communications truck, a white Land Cruiser. The Regulators rush to catch up in two mud-covered cars. We roll past weathered villages unchanged in two millennia. Abandoned Soviet-era tanks are scattered about the flat countryside like dinosaur skeletons.</p>
<div id="attachment_2055" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2017/10/a_Afghanistan-2001-120.jpeg"><img class="size-large wp-image-2055" src="http://dangerousmagazine.com/wp-content/uploads/2017/10/a_Afghanistan-2001-120-1024x769.jpeg" alt="Not everything goes to plan during a raid on a village  © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">Not everything goes to plan during a raid on a village<br />© Robert Young Pelton, all rights reserved</p></div>
<p>This part of Afghanistan is ancient, arid, windblown—and is the real cradle of its history and wealth. This is where Alexander ruled, where Zoroaster was born, where Buddhists came on pilgrimages, a center of art, poetry, and study where lions were hunted and where Genghis Khan came to conquer. Now, in a scene that has been repeated over and over for the past 2,000 years, a warlord is arriving.</p>
<p>In a village on the outskirts of Balkh, the convoy rumbles to a halt near an ancient castle that is now a rounded mound of tan mud. The truck-mounted ZU antiaircraft guns are cranked down to eye level. Twenty Urgan missiles point toward the village. Dostum’s men load RPGs and check their ammo drums. About 200 men have taken up positions around the village, eyeing ragged locals, who stare back from a careful distance. It feels like a scene out of a bad Mexican movie.</p>
<p>After a cinematic pause to allow the implications of his arrival to sink in, Dostum phones the village leadership from the Audi: Send out your weapons and any fighters or we’re going in. The deadline is noon.</p>
<p>The general climbs out of the tiny black car and tucks his hands into his belt. He rolls in a John Wayne walk to Commander Lal, who’s in charge of the standoff. The two Afghan leaders study a map with Captain Mark, just in case air strikes are needed. When noon comes and goes, I expect the order to fire. I am surprised, then, to see Dostum wrap his blue turban around his head and chin and stride into the village . . . to talk.</p>
<p>Ironically, it was this sort of diplomatic triumph—the surrender at Kunduz just before my arrival—and not a battle that gave the Regulators their most bitter experience of the war. “We thought Kunduz was [going to be] a full-scale attack,” says Captain Mark. “When we got there, we were sitting on our asses.” It was while they watched the drawn-out surrender that Mike Spann was attacked at Qala Jangi and the uprising began. “This was a guy we considered part of our unit,” says Mark. “If we had been there, Mike’s death would not have happened.”</p>
<p>When they got word of the incident, the unit desperately wanted to get back to the prison. “The info I had was that he was MIA,” Mark says. “We thought he was wounded. The old creed is that we never leave a guy behind.” The Regulators wanted to find the prisoners who had killed Spann and attacked a second CIA man who was questioning the Taliban. “We begged,” Mark says, “but we were told to stay away.” (In the end, the Regulators wouldn’t get clearance to enter Qala Jangi until the uprising was over.)</p>
<p>Commander Abdul Karim Fakir, who was in charge of the fortress while Dostum was in Kunduz, had worked with the Green Berets since they landed in Afghanistan. “I saw this look in Fakir’s eyes,” says Mark, “like, Why didn’t you help?”</p>
<div id="attachment_2134" style="width: 650px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-130.jpeg"><img class="size-full wp-image-2134" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-130.jpeg" alt="Dostum, triumphant on a return to the simple village of his brith. © Robert Young Pelton, all rights reserved" width="640" height="480" /></a><p class="wp-caption-text">Dostum, triumphant on a return to the simple village of his brith. © Robert Young Pelton, all rights reserved</p></div>
<p>Dostum has not been home in five years to the village of Khvajeh Do Kuh. His father is old. Two weeks after Dostum descended on Balkh, things have calmed down, so the warlord climbs into the front passenger seat of a Nissan, and we head across a sandstorm-blasted desert. This time there is no convoy; just a son paying his respects to his father. As we drive through a drought-ravaged wasteland, he points out battlefields and the sites of ambushes and skirmishes. Dostum tells me that he has fought on every inch of Afghan soil and can recite the names of his men who have died, describe each battle in detail, and tell you what he has learned from every encounter. He says it sadly.</p>
<p>A few yards before the turnoff to Khvajeh Do Kuh, he gestures to a place where 180 of his men died fighting the Taliban. All I see is brown dirt and men on donkeys leading camels along the road. Nothing of the war, death, exile, and victory that have shaped the man sitting in the front seat. There is an emotional landscape here I cannot see.</p>
<p>As we approach the village, the men and boys are lined up in a perfect row a hundred yards long, waiting to greet Dostum. The general gets out of the car and goes down the line, trying to embrace and talk to each person, but it is getting dark. The crowd of men follows Dostum into his father’s compound.</p>
<p>In a tiny, sparse room are his father, Dostum’s former teacher, and a village elder. The old men are frail, with deeply lined faces. The teacher giggles, his white beard shaking with joy. Dostum’s father talks to his son as though he were a child, telling him that he and the teacher have been praying for his success. They reach out to shake his hand, to embrace him. The men in the room try to act formally, but as Dostum starts to leave, some begin to cry. An old man yells, “God bless you. We are alive thanks to you.” As Dostum stands on the porch, looking at the place of his birth, he chokes up.</p>
<p>He takes me to the hilltop above the village. It’s a high, lonely place. When war first came to Afghanistan, two decades ago, he built his first stronghold here to guard the village. Dostum points to the fresh dirt of new graves in the cemetery. “The men who first defended this post with me are all dead now. The new graves belong to those who were fighting terrorists.” He is silhouetted against the slate-blue sky, the long tails of his silver turban whipping in the wind.</p>
<p>For a brief moment, the general stands triumphant, the conquering hero, the bring-er of peace, the warlord who has ended war in the north—and, therefore, perhaps eliminated his own reason for being. As he leans into the Afghan wind, the light falls, and a moment in history fades.</p>
<div id="attachment_2203" style="width: 630px" class="wp-caption aligncenter"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/image320504x.jpg"><img class="size-full wp-image-2203" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/image320504x.jpg" alt="The first monument to CIA officer Mike Spann, the first casualty in the war on terror was erected by General Dostum. Here Spann interviews Lindh but Lindh remains silent. Moments later Mike would be murdered by prisoners. " width="620" height="350" /></a><p class="wp-caption-text">The first monument to CIA officer Mike Spann, the first casualty in the war on terror was erected by General Dostum. Here Spann interviews Lindh but Lindh remains silent. Moments later Mike would be murdered by prisoners.</p></div>
<p>Dostum must now change his focus from fighting to rebuilding his country. (Within a week, he will be named deputy minister of defense for the new interim government of Afghanistan.) Now, on most mornings, Dostum emerges from his house, squinting into a crowd of turbaned men waiting for an audience. They sit patiently for hours, clutching tiny pieces of paper, seeking his aid. Dostum’s meetings do not end until well after midnight.</p>
<p>Not long before I’m to leave, Dostum asks for help with a letter of condolence to the widow of Mike Spann. The task inspires him to try to express his feelings about the past two months. He confesses that he had worried at first how the Americans would handle Afghan warfare: “It was cold; the food was bad. The bread we ate was half-mixed with dirt. I wondered if they could adapt to these circumstances. I have been to America and know the quality of life they enjoy. To my surprise, these men felt at home.”</p>
<p>And more than that: The Afghan warlord and his tiny band of American soldiers had clearly formed a bond that only men who have been through combat can understand. “I now have a friend named Mark,” Dostum says, referring to the Green Beret captain. “I feel he is my brother. He is so sincere; whenever I see him, I feel joy.” He pauses for a moment, lost in reflection. “I asked for a few Americans,” he says finally. “They brought with them the courage of a whole army.”</p>
<p>Down the road at the Regulators’ make-shift barracks, a call comes over the Motorola: “Pack your shit.” The men quickly gather their gear, as they have so many times before. Within hours, they are gone.</p>
<p>&nbsp;</p>
<p><strong>Afterword.</strong></p>
<div id="attachment_2135" style="width: 680px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-132.jpeg"><img class="size-large wp-image-2135" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_AFG-2001-132-1024x769.jpeg" alt="SFC Bill Bennet  © Robert Young Pelton, all rights reserved" width="670" height="503" /></a><p class="wp-caption-text">SFC Bill Bennett RIP<br />© Robert Young Pelton, all rights reserved</p></div>
<p>The team was under orders not to talk to journalists. Since I was a guest of General Dostum it was a little difficult for the men to avoid me. After a while we soon got along. There were some deep unresolved internal conflicts because of the death of Mike Spann and why they over their protests had been sent to Kunduz. After our time in country, I became friends with the men and defended them when they were accused of war crimes by the media. A bizarre story called &#8220;The Convoy of Death&#8221; surfaced and painted Dostum and the team in a negative light. After days of killing as many Taliban as they could they were accused of murdering prisoners in shipping containers. Newsweek, The New York Times and other outlets insisted that eyewitness had seen American soldiers laughing and shooting into containers. Prisoners were so hot that they had to lick the sweat off each other one man said. An NGO insisted that thousands of corpses were dumped at a graveyard called Dasht-i-Leili outside of Shiberghan but refused to actual exhume them.  It didn&#8217;t seem to matter that there was no actual evidence. An odd case of a lack of evidence being brought forward as the evidence. This scandal would tarnish General Dostum&#8217;s very real accomplishment of being America&#8217;s most aggressive and stalwart ally against the Taliban and al Qaeda.</p>
<div id="attachment_2178" style="width: 310px" class="wp-caption alignleft"><a href="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-070.jpeg"><img class="size-medium wp-image-2178" src="http://dangerousmagazine.com/wp-content/uploads/2018/01/a_Afghanistan-2001-070-300x225.jpeg" alt="The mystery of missing prisoners was never matched up to the careful medical records kept of each al Qaeda and Taliban detainee kept by doctors and local NGO's. ©Robert Young Pelton, all rights reserved" width="300" height="225" /></a><p class="wp-caption-text">The mystery of missing prisoners was never matched up to the careful medical records kept of each al Qaeda and Taliban detainee kept by doctors and local NGO&#8217;s. ©Robert Young Pelton, all rights reserved</p></div>
<p>The problem is that the the Convoy of Death story is false. I was at the prison in Sheberghan when they unloaded the trucks and watched the Red Cross medics count the dead and note the wounded. The wholesale conversion of talibs to the government side during the Kunduz surrender had created confusion in how many Taliban existed in the North. Was it ten thousand, five thousand,  The actual number was around 3,500 who surrendered, another 460 al Qaeda showed up at the gates of Mazar and around 250 &#8211; 300 died of their wounds, disease or suffocation during transport in the frigid weather. I know because I counted the dead bodies. The only mystery was the lack of interest in the NGO, governments and media in investigating the facts.</p>
<p>Although I spoke out on behalf of the team the media, didn&#8217;t publish my eyewitness photos and testimony because it would go against a narrative that a Pashtun backed by a European-backed central government must rule Kabul, not a coalition of regional leaders.We did not want the Taliban voting themselves back into power, yet we restrained the grass roots power of the ethnic minorities. Sidelined, and in exile in Turkey, In 2009, Dostum was begged by President Karzai to come back from exile to reelect him and again in 2014 Dostum engineered the victory of President Ghani&#8230;.only to go back into exile.  To this day the war continues and Dostum as First Vice President remains a staunch ally of America.</p>
<p>Back in 2002 and 2003 the film and book industry were not interested in books or movies about Afghanistan. Our war had been big footed by Iraq. When SFC Bill Bennett invited me over to join the team SCUD hunting before the war he did not like that war. Later on he had a dark  premonition. &#8220;I don&#8217;t think I will make it through this one&#8221; he wrote me in an email just hours before he was gunned down on a raid in Ramadi. It was September 12, 2003. Bill and the team were wearing  armor decorated with my logo when he died. I was asked to sit on the same row as the team during his funeral. An event and a man I will never forget. There is a need to never forget the sacrifices men make in war. We must honor their truth not the fiction that creates more wars.</p>
<p>In Hollywood I was asked to join meetings during which actors and producers pitched the story, read half a dozen books in which the idea of John Wayne like cavalry charges and Dostum&#8217;s ogre like cruelty were fictionalized into cartoons. The men know their story and I wrote it down. Some were angry then, some had been through enough wars to see what was coming.</p>
<p>They are currently enjoying some well earned recognition now that the film 12 Strong has been released but again, the film is not anywhere close to the truth. We will never end wars if we don&#8217;t understand how to win them. A story of how 12 Americans and a Afghan warlord won the war on terror, if only for a brief time still remains to be told.</p>
<p>© 2018 Robert Young Pelton, all rights reserved</p>
<p>&nbsp;</p>
<p>ryp@comebackalive.com</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://dangerousmagazine.com/2018/01/20/general-dostum-12-strong-legend-heavy-d-boys/">General Dostum and 12 Strong: THE LEGEND OF HEAVY D AND THE BOYS</a> appeared first on <a rel="nofollow" href="http://dangerousmagazine.com">Dangerous Magazine</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://dangerousmagazine.com/2018/01/20/general-dostum-12-strong-legend-heavy-d-boys/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
