Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Miles Archer

Miles Archer's Journal
Miles Archer's Journal
March 31, 2017

DOJ presses Colorado on marijuana cases

DOJ presses Colorado on marijuana cases



http://www.rawstory.com/2017/03/doj-presses-colorado-on-marijuana-cases/

President Donald Trump’s aides have publicly promised a crackdown on states that have legalized marijuana — and the new White House administration may already be taking steps to make good on that pledge, according to an email obtained by International Business Times.

The correspondence showed a Justice Department official requesting information about marijuana cases from the state Attorney General’s office in Colorado — one of five states where voters have passed ballot measures to legalize the recreational use of cannabis. The email came just after both a top White House official and U.S. Attorney General Jeff Sessions reiterated the Trump administration’s opposition to marijuana legalization at the state level.

“Are you able to provide me the state docket numbers for the following cases?” said the email from a Justice Department official to Michael Melito, a prosecutor in Colorado Attorney General Cynthia Coffman’s office. “Some of our intel people are trying to track down info regarding some of DEA’s better marijuana investigations for the new administration. Hopefully it will lead to some positive changes.”

The email, dated March 6, was obtained by IBT through an open records request. The specific identity of the sender was redacted, but the email signature appeared to be from a “group supervisor” on the “financial investigations team” of the Drug Enforcement Agency’s field office in Denver.
March 31, 2017

Ex-intel official: Theres only one person Mike Flynn could give up to get immunity - Donald Trump

Ex-intel official: There’s only one person Mike Flynn could give up to get immunity — Donald Trump



http://www.rawstory.com/2017/03/ex-intel-official-theres-only-one-person-mike-flynn-could-give-up-to-get-immunity-donald-trump/

Michael Flynn has offered to testify about possible Trump campaign ties to Russia, but a former top intelligence official said investigators would only offer the disgraced national security adviser a deal if he could deliver evidence against someone higher up the chain.

There’s only one person who fits that description — and that’s President Donald Trump, said Jeremy Bash, the former chief of staff for both the CIA and Department of Defense and former counsel to the House Intelligence Committee.

“For the Justice Department to agree to give somebody like him immunity, it means they want him to turn and testify against someone higher up in the food chain,” Bash told MSNBC. “Who is higher up in the food chain, higher than the national security adviser? There’s really only one person, and so this shows that the jeopardy of criminal liability actually extends all the way to the top.”

Federal investigators have so far have not accepted Flynn’s offer to exchange his testimony for immunity from criminal prosecution, which Bash said raised new questions.
March 30, 2017

Russian Hackers Targeted 109 Clinton Staffers in a Single Month

Russian Hackers Targeted 109 Clinton Staffers in a Single Month

They also targeted Clinton herself, but "she did not fall for the password reset trick."

AJ VICENS MAR. 30, 2017 5:31 PM

http://www.motherjones.com/politics/2017/03/clinton-email-russia

The email accounts of at least 109 Hillary Clinton staffers were targeted by Russian military hackers last year, a cybersecurity expert told lawmakers Thursday. During a Senate intelligence committee hearing on Russian meddling in the 2016 US presidential election, Thomas Rid, a professor at King's College in London, laid out the extraordinary efforts undertaken by the Russian military intelligence agency known as GRU to target the Clinton camp:

In early March, GRU began to train its well-established, semi-automated targeting tools from worldwide military and diplomatic targets to US political targets. Between 10 March and 7 April, GRU targeted at least 109 Clinton campaign staffers with 214 individual phishing emails (with eight more attempts on 12 and 13 May). [Thirty six] times Clinton staffers clicked a malicious link (the success rate of actually breaching the account after a victim clicked this link is 1-in-7). Russian intelligence targeted Jake Sullivan in at least 14 different attempts beginning on 19 March, each time with a different malicious link against two of his email addresses. GRU targeted Hillary Clinton's personal email account at least two times in March, but the available data show that she did not fall for the password reset trick. The military intelligence agency also targeted DNC staffers with 16 emails between 15 March and 11 April, and 3 DNC staffers were tricked into clicking the treacherous "reset password" button on 6 April 2016.

This is an interesting bit of information from Rid, a cybersecurity expert and researcher who has studied and written extensively about what happened to the Democrats in 2016. After the hearing, Rid told Mother Jones' David Corn that the level of detail he offered to the Senate panel Thursday was new. It was an expansion of the research performed by Dell SecureWorks in June 2016, which studied Bitly links that were sent to hundreds of people associated with the Democratic National Committee or the Clinton campaign (as well as to thousands of other Gmail accounts in Russia, former Russian states, the United States, and Europe).

Given that a typo in an email may have led to John Podesta's personal Gmail account getting compromised and years of his emails ending up on WikiLeaks, it's interesting to note that Clinton herself apparently didn't fall for the scheme. Her personal email was targeted at least two times, but, according to Rid, "the available data show that she did not fall for the password reset trick."

Profile Information

Name: Miles Archer
Gender: Male
Hometown: Hamilton Massachusetts
Home country: USA
Current location: Nevada
Member since: Wed Oct 16, 2013, 07:49 PM
Number of posts: 18,837
Latest Discussions»Miles Archer's Journal