Politics

U.S. Senate Intelligence Committee investigators request total ‘preservation of Russian-tied information or communications’ with Trump Camp.

Deep State takes another whack at Trump

(INTELLIHUB) — CNN’s Manu Raju has confirmed that the Senate Intelligence Committee is investigating the alleged ‘Russian interference of the 2016 U.S. Presidential Election’ and any potential Russian ties to Trump campaign staffers.

Chairman Richard Burr, R-North Carolina along with Sen. Mark Warner, D-Virginia, are heading up the panel which has already put out requests to a number of agencies, organizations, and individuals, 12 in total, requesting that they preserve any and all information or communications that fall within the scope of the investigation.

FBI Dir. James Comey attended the classified panel behind closed doors Friday where members decided to expand their investigation into Russia’s alleged meddling with the U.S. election system.

Reporting over the phone for CNN, Raju said that the panel is very concerned with any potential contacts or conversations Trump campaign staffers or transition team members may have had with the Russians.

Ruju also said according to reports “certain [Trump] campaign officials” had “constant contact” with “Russian operatives during the campaign.”

The Senate Intelligence Committee is doing a “deep dive,” Raju said.

“What they want are records to make sure that nothing that the Trump administration or that any federal agency has relating to Russia should be destroyed. They want to preserve these documents, review them and they have the power to subpoena those as well.”

Additionally, Raju reported that several other investigations into the matter are currently underway but are slow-going.

H/T: Tabertronic/Twitter

Featured Image: (Mark Warner/Flickr)
©2017. INTELLIHUB.COM. All Rights Reserved.

The post U.S. Senate Intelligence Committee investigators request total ‘preservation of Russian-tied information or communications’ with Trump Camp. appeared first on Intellihub.

Article source link : https://www.intellihub.com/u-s-senate-intelligence-committee-investigators-request-total-preservation-of-russian-tied-information-or-communications-with-trump-camp/

Read More...

Conspiracy

Astana Talks on Wednesday to Focus on Separation of Terrorists, Syria Opposition

The main topic of the second day of the Astana talks on Syria will become the separation of positions of terrorists and moderate opposition in the country, head of Damascus delegation to the talks Bashar Jaafari told Sputnik.

Article source link : https://sputniknews.com/politics/201703151051589230-astana-talks-syrian-opposition-terrorists/

Read More...

Science

Why Government always gets cybersecurity wrong

Otto Von Bismarck is thought to have said that if you want to respect law and sausage you should watch neither being made. Charlie Mitchell supports this view in his recent book Hacked: The Inside Story of America’s Struggle to Secure Cyberspace by providing an in-depth, comprehensive history of cybersecurity policy during the Obama administration. The chronological account explores interactions between the White House, bureaucracy, special interests, and Congress. Mitchell considers several points of view and gives the reader a thorough understanding of competing perspectives on issues such as privacy and regulation.

This is a historical work, not a theoretical one (Public Choice Theory is never mentioned), but it is of great value to Public Choice scholars because it explores issues at the heart of the discipline, such as how legislators, bureaucrats, and special interests respond to the incentives they face and how policy gets made (or not made) in light of these competing incentives.

John McCain asked for a cyber committee to be created, until he took control of a committee that dealt with it.

The Politics of Cybersecurity Legislation

The articulation of a cybersecurity policy began in earnest towards the end of the Bush administration, with the Obama White House picking up where they left off. However, after congress failed to pass legislation dealing with the issue during his first term, President Obama issued an Executive Order in February 2013 calling for (among other things) a non-regulatory approach to cybersecurity based on collaboration between the government and technology industry.

The National Institute of Standards and Technology (NIST) was tasked with developing a framework of “voluntary standards” for cybersecurity in collaboration with the tech industry.  This was done through a series of conferences where representatives from the two sides met at various college campuses across the country to hash out what such a framework might look like. During and after this process, other government agencies pursued cybersecurity within their various spheres of influence, some successfully (Federal Communications Commission), some unsuccessfully (Department of Homeland Security).

A constant theme throughout the book is Congress’s struggle to pass significant cybersecurity legislation. The issue seems to constantly be before congress during Obama’s second term, but it is frequently kicked to the curb by partisan fighting, elections, government shutdowns, congressional recesses, and other legislative concerns. Cybersecurity legislation is finally passed in the house in April 2015, and in the Senate in October of the same year.

Tech industry representatives distrust government agencies and are afraid that the “voluntary” framework process will quickly devolve into harsh regulation.

As mentioned earlier, the story of cybersecurity policy during the Obama administration is ripe for Public Choice analysis because it is a story of incentives and self-interest on the part of the legislature, special interests, and bureaucracy.

Congress has very few incentives to deal efficiently with the cybersecurity problem. Doing so would most likely require the creation of a cybersecurity committee. This, however, is highly unlikely because, as retired Rep. Jane Harman says, “people in [Congress] earned their power through committee positions.” Cybersecurity is currently under the jurisdiction of several different committees, none of which will be willing to give up power or influence over such an important issue.

Mitchell shows this by mentioning that John McCain asked for a cyber committee to be created, until he took control of a committee that dealt with it. Additionally, Hacked shows how the perverse incentives of party politics and re-election push legislators to shortsighted policies. Cybersecurity legislation is repeatedly passed over because of looming elections, government shutdowns, squabbles between Republicans and Democrats, the budget, immigration, and the Iran nuclear deal. This essential element to national security that should be rather straightforward is constantly left in the hopper with little hope of floor time because politicians are busy with more “pressing” matters.

The Role of Special Interests

Special interests loom large in the discussion of any significant piece of legislation and cybersecurity is no exception. Tech industry representatives distrust government agencies and are afraid that the “voluntary” framework process will quickly devolve into harsh regulation. They and other interest groups make their voices heard throughout the legislative process. The two competing special interests seen in the book are those arguing for privacy protection such as the ACLU and the Center for Democracy and Technology and those representing the cyber industry such as the US Chamber of Commerce.

Indeed, DHS only took on cybersecurity because it “saw cyber as a potential ‘win’ area.”

To protest the Cyber Information Sharing Act (CISA) privacy advocates sent faxes to senators urging them to vote against the bill (they claimed to be using 1984 technology to protest a bill reminiscent of “Big Brother” in the George Orwell classic). On the other side of the issue, industry representatives began a “myth-versus-fact” campaign to show that CISA wasn’t a surveillance bill. Both sides end up fighting not for the best policy but for the one that benefits them the most.

The Expanding Footprint of DHS

The federal bureaucracy is an excellent example of the Public Choice principle that public actors respond to incentives the same way private ones do, namely that they are concerned with their own self-interest. The Department of Homeland Security (DHS) is seen as unwilling to cooperate with industry (it has no incentives to do so), and did little to change this reputation. DHS, which has more cybersecurity responsibilities than any other federal agency has many other concerns besides cyber, and because of this, is not incentivized to give the issue the attention it deserves.

Indeed, DHS only took on cybersecurity because it “saw cyber as a potential ‘win’ area.” The Federal Trade Commission (FTC) provides an example of a bureaucratic agency trying to enlarge its footprint. The FTC sees itself as protecting consumers from “unfair and deceptive [business] practices.” It sought to extend this power into the cyber realm and had its authority to regulate and punish companies affirmed by two 2015 court cases. Security companies took advantage of this and in a “bootleggers and Baptists” scenario created NIST framework-based products asserting that because of the FTC’s newfound powers, cybersecurity was mandatory.

However, Hacked does provide one example of public and private incentives aligning, namely, the NIST framework creation process. NIST has several institutional advantages; it is small, but well respected and “it doesn’t provoke jealousy or underhanded attacks from other government agencies because it’s not a regulator and has no interest in bureaucratic turf wars.” It was likely unable (and had few incentives) to push the private sector around.

This, as well as the fact that the framework it created was to be voluntary and the result of a collaborative process helped to create a system where the government and the private sector worked together. The non-regulatory nature of the program also meant that the threat of government regulation could incentivize companies to use the framework.

Mitchell closes the book with musings on the future of cybersecurity in the United States. Restructuring the bureaucracy or congress would better equip the government to deal with the problem and questions still remain about how to encourage companies to invest in cybersecurity and whether the government or the private sector will drive innovation. He states that policy cannot be reactionary, it must be adaptable to changing circumstances and it must be made with the goal of threat reduction because this problem is not going to disappear. His closing comments provide needed insight into a complicated field, and his book helps scholars see Public Choice Theory in action.

Via FEE

The post Why Government always gets cybersecurity wrong appeared first on Intellihub.

Article source link : https://www.intellihub.com/why-government-always-gets-cybersecurity-wrong/

Read More...

Politics

Michael Moore launches resistance website promoting daily anti-Trump actions

 An anti-Trump “coalition” actually exists

(INTELLIHUB) — In an effort to create more political friction for the White House than there already is, liberal, filmmaker and activist, Michael Moore launched The Resistance Calender, a website aimed at empowering liberals by pairing them with daily anti-Trump actions in which they can attend.

To the untrained eye, Moore’s website, ResistanceCalendar.org, looks decent. It boasts an early-90’s color scheme and is rather simple to navigate. It’s basically, an online bulletin board which caters to leftists looking to take action by mobilizing against Trump.

michael moore
Brave News Films/Flickr

The website allows users to “submit” or “add” an event by simply filling out an online form which asks users for their name, their email, the link they wish to promote and a description of the event. Under the “Monthly” tab I counted 55 different events taking place on Today alone with Saturday the 25th looking busy also.

While searching for events on the site, under the “Monthly” tab, I counted 55 different events taking place on Today alone with Saturday the 25th looking busy also.

Early Wednesday morning, Moore took to Twitter to point out the “incredible turnouts at Congressional Town Hall meetings across the country” which he feels his new site is contributing to.

Michael Moore, Organizing for Action, and Indivisible — all Soros-backed?

What Moore didn’t point out is the fact that the left-leaning Obama-tied group Organizing for Action (OFA) is also promoting the Town Hall Project

Both agendas, the one promoted on Moore’s new website and OFA’s are nearly interchangeable and both Moore and OFA are making a major push until Feb. 26 to thwart GOP legislators.

Currently, OFA empowers over 30,000 activists and has over 400 rallies scheduled for 2017.

OFA works with Indivisible, which according to Breitbart “is a part of a coalition.” According to the Capitol Research CenterIndivisible has “loose ties” to the billionaire Hillary Clinton and sanctuary city backer and George Soros.

OFA has literally issued a practical guide for resisting the Trump agenda.

Shepard Ambellas is an opinion journalist and the founder and editor-in-chief of Intellihub News & Politics (Intellihub.com). Shepard is also known for producing Shade: The Motion Picture (2013) and appearing on Travel Channel’s America Declassified (2013). Shepard is a regular contributor to Infowars. Read more from Shep’s World. Get the Podcast. Follow Shep on Facebook and Twitter.
©2017. INTELLIHUB.COM. All Rights Reserved.

The post Michael Moore launches resistance website promoting daily anti-Trump actions appeared first on Intellihub.

Article source link : https://www.intellihub.com/michael-moore-launches-resistance-website-promoting-daily-anti-trump-actions/

Read More...

Conspiracy

Bombs rock Damascus as war enters seventh year

Two suicide bombings hit Damascus Wednesday including an attack at a central courthouse that killed at least 32 people, as Syria’s war entered its seventh year with the government now claiming the upper hand.

Article source link : http://www.dailystar.com.lb/News/Middle-East/2017/Mar-15/397626-suicide-bomber-targets-damascus-court-building-initial-reports-of-dozens-of-casualties-state.ashx?utm_medium=email&utm_source=transactional&utm_campaign=Newsletter

Read More...