Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
TruthSeeker @TruthSeeker1818 Replying to @funder May 2017, Trump’s senior advisers Kushner n Bannon, in a private dinner with top leaders of Saudi Arabia and UAE, about a plan by the two US allies to impose a blockade on Qatar to solidify a foreign policy favoring SA and UAE in their conflict with Qatar
The troubling overlap between Jared Kushner's business interests and US foreign policy
Mohamad Bazzi
This article is more than 2 years old
A congressional inquiry has raised the possibility that Kushner supported a blockade of a US ally as payback because it would not fund his family’s business
https://www.theguardian.com/commentisfree/2019/jul/08/troubling-overlap-between-jared-kushner-business-interests-and-us-foreign-policy
9:15 PM · Jul 20, 2021·Twitter for iPad
THREAD
https://twitter.com/TruthSeeker1818/status/1417579028467228674
Trump World Golf Club, Dubai, the second golf project to be built by DAMAC Properties and operated by The Trump Organization, is set within the prestigious 55 million square feet community of AKOYA Oxygen.
The magnificent 18-hole Championship-standard course will be designed by the iconic golfing superstar Tiger Woods. Tiger Woods Design will bring the golfer's design expertise and worldwide playing experience to the development, and, when coupled with the Trump brand standard of excellence, will create a new luxury benchmark for golf in the Middle East. Stretching the limits of design, Trump World Golf Club will tick every box of today's avid golfer with a state-of-the-art club, world-class restaurants and a Golf Pro Shop. The course will be situated at the heart of the AKOYA Oxygen development, with some of the highest premium, residential developments in Dubai overlooking the course.
https://www.trump.com/golf/trump-world-golf-club-dubai
The Trump Estates at DAMAC Hills
Fine ready villas for sale in Dubai in a select community for those who appreciate the best in life
https://www.damacproperties.com/en/projects/the-trump-estates-at-damac-hills/
Scott Dworkin @funder ·13h Here’s video I found of Donald and Ivanka Trump doing business in the United Arab Emirates. Trump’s inaugural fund chairman Tom Barrack was just arrested for illegally lobbying for the UAE. Let’s make this viral.
VIDEO
Here’s video I found of Donald and Ivanka Trump doing business in the United Arab Emirates. Trump’s inaugural fund chairman Tom Barrack was just arrested for illegally lobbying for the UAE. Let’s make this viral.pic.twitter.com/BtJc3h4yrL
— Scott Dworkin (@funder) July 20, 2021
Here’s video I found of Donald and Ivanka Trump doing business in the United Arab Emirates. Trump’s inaugural fund chairman Tom Barrack was just arrested for illegally lobbying for the UAE. Let’s make this viral.pic.twitter.com/BtJc3h4yrL
— Scott Dworkin (@funder) July 20, 2021
David Corn @DavidCornDC It’s a good day to revisit this scoop from me that reported Tom Barrack may have testified falsely in the Trump inauguration scandal case about Allen Weisselberg’s involvement in reviewing the Trump inauguration committee’s questionable finances.
Emails Tie Top Trump Exec Allen Weisselberg to Yet Another Trump Financial Scandal
These records show he was involved with the Trump inauguration committee now under investigation for major grifting.
https://www.motherjones.com/politics/2021/05/emails-tie-trump-exec-allen-weisselberg-to-inaugural-scandal-racine/
8:20 PM · Jul 20, 2021·Twitter for iPhone
THREAD
It’s a good day to revisit this scoop from me that reported Tom Barrack may have testified falsely in the Trump inauguration scandal case about Allen Weisselberg’s involvement in reviewing the Trump inauguration committee’s questionable finances. https://t.co/rzM5ZHF5h7
— David Corn (@DavidCornDC) July 20, 2021
Thomas Barrack, Trump ally who chaired inaugural committee, indicted in foreign lobbying case
By Shayna Jacobs, Josh Dawsey and Devlin Barrett
Today at 3:00 p.m. EDT
https://www.washingtonpost.com/politics/thomas-barrack-indictment-trump/2021/07/20/d40b64f0-e985-11eb-84a2-d93bc0b50294_story.html
NEW YORK — Thomas J. Barrack, a longtime friend to former president Donald Trump and a billionaire businessman, was arrested on Tuesday for violating foreign lobbying laws, obstructing justice and making false statements, officials said Tuesday.
Barrack, whose primary residence is in Los Angeles, was taken into custody in California and indicted on foreign lobbying charges related to his dealings with the United Arab Emirates, according to an indictment unsealed Tuesday afternoon.
He and two other defendants are accused of acting and conspiring to act as agents of the UAE between April 2016 and April 2018. Officials also alleged that Barrack lied to FBI agents in 2019 during an interview about his dealings with the UAE. He did not immediately return a request for comment Tuesday.
A real estate titan who became wealthy buying out-of-favor assets, Barrack was one of Trump's closest associates during the campaign and in office, regularly speaking to the former president, visiting him and channeling him to others, including business officials and leaders in foreign countries.
He chaired Trump’s inaugural committee, which also faced federal investigation for its spending and activities, and at one point was considered as a candidate to become ambassador to Mexico.
Barrack joins a long list of friends, campaign associates and other Trump advisers who have faced criminal charges, including his former campaign chairman; the chief financial officer at his company; the former Trump Organization lawyer; Trump’s former White House strategist; and his former national security adviser.
Trump later pardoned some of those figures.
Federal prosecutors say Barrack capitalized on his friendship with and access to Trump and other high-ranking and government officials, and his relationships with U.S. journalists, to “advance the policy goals of a foreign government without disclosing their true alliances.”
On a number of occasions, the Justcie Department alleged, Barrack pushed the interests of the UAE to the Trump administration without disclosing that he was working on the country’s behalf.
Barrack helped rescue Trump's business empire decades ago and was a top fundraiser for his campaign, though he declined to enter the administration. He was also a regular adviser on the Middle East, jetting through the region and talking with royalty and leaders, and sought to make Trump more interested in the topic.
The real estate scion grew frustrated with some of Trump’s conduct in office and has told others his advice regularly went unheeded. He tried to convince Trump to agree to an orderly transition but failed, The Washington Post has reported.
This is a developing story. It will be updated.
By Shayna Jacobs
Shayna Jacobs is a federal courts and law enforcement reporter on the national security team at The Washington Post, where she covers the Southern and Eastern districts of New York. Twitter
By Josh Dawsey
Josh Dawsey is a political enterprise and investigations reporter for The Washington Post. He joined the paper in 2017 and previously covered the White House. Before that, he covered the White House for Politico, and New York City Hall and New Jersey Gov. Chris Christie for the Wall Street Journal. Twitter
By Devlin Barrett
Devlin Barrett writes about the FBI and the Justice Department, and is the author of "October Surprise: How the FBI Tried to Save Itself and Crashed an Election." He was part of a team that won a Pulitzer Prize in 2018 for National Reporting, for coverage of Russian interference in the U.S. election. Twitter
https://www.washingtonpost.com/politics/thomas-barrack-indictment-trump/2021/07/20/d40b64f0-e985-11eb-84a2-d93bc0b50294_story.html
During his deposition, Trump Jr. was asked about Winston Wolkoff: “Do you know her?” He replied, “I know of her. I think I’ve met her, but I don’t know her. If she was in this room I’m not sure I would recognize her.” He added, “I had no involvement with her.”
Which might be a reasonable answer if not for the fact that in a video obtained by Mother Jones, Don Jr. is seen at a dinner held the night before the inauguration lavishing praise on Winston Wolkoff (and inauguration committee chair Tom Barrack) for the “incredible” work they did preparing for the event.
Missed that - makes a BIG difference...
NEW YORK, July 20 (Reuters) - The three largest U.S. drug distributors agreed mid-trial to pay up to $1.18 billion to settle claims by New York state and two of its biggest countries over their role in the nationwide opioid epidemic, the state's attorney general said on Tuesday.
Reporting by Brendan Pierson in New York and Nate Raymond in Boston Editing by Tom Hals, Chizu Nomiyama, Bill Berkrot and Nick Zieminski
https://www.reuters.com/business/healthcare-pharmaceuticals/drug-distributors-pay-up-11-bln-settle-new-york-opioid-case-2021-07-20/?taid=60f7049eb881cc0001a15e68&utm_campaign=trueAnthem:+Trending+Content&utm_medium=trueAnthem&utm_source=twitter
Rand Paul is a nasty little man, who has achieved nothing of note
Fauci has contributed much of his life to the health and well-being of many people.
Bezos unveils $100 million awards to Van Jones and José Andrés
Erin Doherty
37 mins ago - Politics & Policy
https://www.axios.com/bezos-unveils-million-dollar-awards-van-jones-jose-andres-1501ca37-8c9a-4581-8f92-b1f28a9e2e4e.html
Jeff Bezos awarded CNN commentator Van Jones and chef José Andrés $100 million each on Tuesday as part of a new initiative called the "courage and civility award."
Driving the news: Jones and Andrés will be able to give the award money to a charity of their choice, Bezos said during a press conference to commemorate Blue Origin's trip to space. The Amazon founder suggested he could hand out more awards in the future.
"It's easy to be courageous, but also mean. Try being courageous and civil. Try being courageous and a unifier. That's harder and way better [and] it makes the world better," Bezos said while announcing the award.
Catch up quick: Jones is a CNN commentator and criminal justice system reform advocate. Andrés, a celebrated chef, is the founder of World Central Kitchen.
What they're saying: "You take people on frontlines and their wisdom and their genius and their creativity, and you give them a shot," Jones said.
"They're not just gonna turn around neighborhoods, they're gonna turn around in this nation. That's what's going to happen, and I appreciate you for lifting the ceiling off of people's dreams."
"This world itself cannot feed the world on its own, but this is the start of a new chapter for us," Andrés said.
https://www.axios.com/bezos-unveils-million-dollar-awards-van-jones-jose-andres-1501ca37-8c9a-4581-8f92-b1f28a9e2e4e.html
emptywheel @emptywheel ·17m Here's why the DEA officer went to Insurrection and kept flashing his badge.
The Grift is strong with this one.
https://extremism.gwu.edu/sites/g/files/zaxdzs2191/f/Mark%20Sami%20Ibrahim%20Statement%20of%20Facts.pdf
6:03 PM · Jul 20, 2021·TweetDeck
THREAD
Here's why the DEA officer went to Insurrection and kept flashing his badge.
— emptywheel (just plain blue) (@emptywheel) July 20, 2021
The Grift is strong with this one.https://t.co/j0cnuLSHs3 pic.twitter.com/mxZqS7oLwf
Fauci, Paul clash on virus origins, trade charges of lying
43 minutes ago
https://apnews.com/article/science-health-government-and-politics-coronavirus-pandemic-ec75a3b9505409e12aa6f65d3170ad26?utm_medium=AP&utm_campaign=SocialFlow&utm_source=Twitter
WASHINGTON (AP) — Dr. Anthony Fauci, the nation’s top infectious disease expert, angrily confronted Kentucky GOP Sen. Rand Paul on Tuesday in testimony on Capitol Hill, rejecting Paul’s insinuation that the U.S. helped fund research at a Chinese lab that could have sparked the COVID-19 outbreak.
Paul suggested that Fauci had lied before Congress when in May he denied that the National Institutes of Health funded so-called “gain of function” research — the practice of enhancing a virus in a lab to study its potential impact in the real world — at a Wuhan virology lab. U.S. intelligence agencies are currently exploring theories that an accidental leak from that lab could have led to the global pandemic.
“I have not lied before Congress. I have never lied. Certainly not before Congress. Case closed,” Fauci told Paul before the Senate Health, Education, Labor, and Pensions Committee, saying a study the senator mentioned referenced a different sort of virus entirely from the one responsible for the coronavirus outbreak.
“Senator Paul, you do not know what you’re talking about, quite frankly,” Fauci said. “And I want to say that officially. You do not know what you’re talking about.”
He added, “If anybody is lying here, senator, it is you.”
It was the latest in a series of clashes between Paul and Fauci over the origins of the virus that caused the global pandemic.
https://apnews.com/article/science-health-government-and-politics-coronavirus-pandemic-ec75a3b9505409e12aa6f65d3170ad26?utm_medium=AP&utm_campaign=SocialFlow&utm_source=Twitter
Seamus Hughes @SeamusHughes Welp, A DEA special agent was arrested related to Jan 6
5:47 PM · Jul 20, 2021·Twitter for iPhone
THREAD
https://twitter.com/SeamusHughes/status/1417526616838844420
Replying to
@SeamusHughes
As we do for every case, @gwupoe uploaded the charging documents here. Part of a database of 10k pages of court records.
https://extremism.gwu.edu/sites/g/files/zaxdzs2191/f/Mark%20Sami%20Ibrahim%20Statement%20of%20Facts.pdf
As detailed below, during the course of the investigation into the events of January 6,
2021, law enforcement learned that Mark Sami IBRAHIM of Orange County, California
traveled to the District of Columbia, and participated in the events at the U.S. Capitol on January
6, 2021, and was on U.S. Capitol Grounds, in restricted areas, without authority to be there.
The Biden administration is sending Afghan visa applicants to an Army base in Virginia.
By Eric Schmitt
July 19, 2021
https://www.nytimes.com/2021/07/19/us/politics/afghan-visa-applicants-army-base-virginia.html
WASHINGTON — The Biden administration plans to evacuate an initial group of Afghans who helped the United States during the 20-year war and who now face reprisals from the Taliban to an Army base in Virginia in the coming days, the State and Defense Departments said on Monday.
About 2,500 Afghan interpreters, drivers and others who worked with American forces, as well as their family members, will be sent in stages to Fort Lee, Va., south of Richmond, to await final processing for formal entry into the United States, officials said.
“This is a group who have completed that step, the security vetting process, the rigorous process that is required before we bring the applicants and their families to the United States,” Ned Price, the State Department spokesman, told reporters.
The White House announced last week that it would begin evacuating Afghans the last week of July, in an effort called Operation Allies Refuge, but officials declined to comment on many details of the rapidly evolving program, including where the initial visa applicants and their eligible relatives would go in the United States.
With the American military in the final phases of withdrawing from Afghanistan, the White House has come under heavy pressure to protect Afghan allies who helped the United States and speed up the process of providing them with special immigrant visas.
More than 18,000 Afghans who have worked as interpreters, drivers, engineers, security guards, fixers and embassy clerks for the United States during the war have been trapped in bureaucratic limbo after applying for special immigrant visas, which are available to people who face threats because of work for the U.S. government. The applicants have 53,000 family members, U.S. officials have said.
American diplomats have been scrambling to reach agreements to relocate the Afghans to third countries, including some in Central Asia and the Persian Gulf, as well as United States territories like Guam, to complete the visa application process in safety.
But with those negotiations dragging on and the security situation in Afghanistan worsening, the administration came up with a stopgap measure for applicants who had completed most, if not all, vetting: Bring them directly to the United States for final processing.
Administration officials are still working out last-minute details about sending the first group of Afghans to Fort Lee.
John F. Kirby, the Pentagon press secretary, spoke opaquely about this option last week when he told reporters that the administration might potentially house some of the Afghans at bases inside the United States on a “short-term” basis while their applications are processed. This would most likely be through humanitarian parole, a government program that allows people to apply to enter the United States for urgent humanitarian reasons.
The vast majority of Afghan applicants and their families, however, would go through the relocation process and be moved to an American base in another country.
“Clearly, we are planning for greater numbers than just this initial 2,500,” Mr. Kirby said. “But what that looks like over time, I just couldn’t be able to predict right now.”
Applicants and their families will stay in available barracks or family housing units at Fort Lee. The Pentagon also will provide “food and water, proper sustenance, appropriate medical care,” including coronavirus screening, Mr. Kirby said.
The mission is aimed at fulfilling a pledge by President Biden to not repeat the abandonment of U.S. allies during the withdrawal from Vietnam, and comes as the Taliban gain more ground throughout Afghanistan, seizing swaths of territory, displacing tens of thousands, and wounding or killing hundreds of civilians.
House members from both parties, who are expected to approve legislation this week increasing the number of State Department special immigrant visas and streamlining the application process, praised the administration’s efforts but complained they should have happened much faster.
“The ability to conduct an evacuation now is going to be different from the ability to conduct an evacuation in August, September, October, November,” Representative Jason Crow, Democrat of Colorado and a former Army Ranger who served in Iraq and Afghanistan, said on MSNBC this month. “It’s going to get worse with each passing month.”
Those seeking a special immigrant visa are required to submit identification documents, proof of their work for the U.S. government and a letter of recommendation from an American official. The applicant must also clear multiple background checks, submit fingerprints for each family member and pass an interview at a U.S. embassy.
Despite a congressional mandate that the State and Homeland Security Departments process the visas within nine months, more than 8,000 applicants had been stalled longer than that, according to the International Refugee Assistance Project, or IRAP, which filed a lawsuit against the federal government over the delays.
Zolan Kanno-Youngs contributed reporting.
https://www.nytimes.com/2021/07/19/us/politics/afghan-visa-applicants-army-base-virginia.html
Another Oath Keepers Member Set to Plead Guilty, Cooperate with Federal Prosecutors
ADAM KLASFELD Jul 20th, 2021, 11:00 am
https://lawandcrime.com/u-s-capitol-siege/another-oath-keepers-member-set-to-plead-guilty-cooperate-with-federal-prosecutors/
An Oath Keepers member who knows about the stash of firearms the extremist group stored inside a hotel just outside of Washington, D.C. plans to plead guilty to two charges related to the Jan. 6th siege of the Capitol on Tuesday, according to recently unsealed documents.
Caleb Berry joins at least three other members of the militia organization to have agreed to assist prosecutors, following the guilty plea and cooperation deal of 54-year-old Mark Grods in late June. Two other notable defections from the group, heavy metal guitarist Jon Schaffer and Florida man Graydon Young, are said to have left the Oath Keepers fractured.
The unsealing of Berry’s case on Tuesday delivers another blow to the Oath Keepers, with an alleged member whom court papers place at the center of the group’s antics on Jan. 6th.
According to unsealed documents, Berry intends to plead guilty to two counts of conspiracy and obstructing an official proceeding. Berry took part in the group’s military “stack” formation at the Capitol, joining a violent mob that assaulted law enforcement, prosecutors say.
“At the top of the steps, Berry and others known and unknown joined and then pushed forward as part of a mob that aggressively advanced towards the Rotunda Doors at the central east entrance to the Capitol, assaulted the officers guarding the doors, threw objects and sprayed chemicals towards the officers and the doors, and pulled violently on the doors,” Berry’s criminal information states.
Prosecutors say that Berry and others forced their way into the doors of the Capitol at 2:40 p.m.
They are said to have left the building some 14 minutes later.
On Jan. 7, Berry “and others known and unknown retrieved firearms from the Comfort Inn Ballston hotel in Arlington, Virginia,” according to the criminal information.
That Comfort Inn looms large in other court documents involving the Oath Keepers.
Members of the so-called “quick reaction force,” or QRF, allegedly stayed at that hotel and allegedly plotted to storm Washington, D.C. with guns by boat by way of the Potomac River. Surveillance footage from the hotel shows multiple Oath Keepers toting objects shaped like rifles, prosecutors say.
The government filed the criminal information against Berry on July 9, along with a motion to seal information about the cooperation agreement.
“Disclosure of these documents and this docket would endanger other aspects of the government’s ongoing investigation, including the destruction of evidence and the safety of potential witnesses, to include the defendant,” Assistant U.S. Attorney Alexandra Hughes wrote in a motion to seal. “Making the criminal Information public may reveal the existence of the defendant’s cooperation and potential plea, given that the filing of an information by the government typically precedes a guilty plea.”
The prosecutor noted that premature disclosure could compromise the investigation in other alarming ways.
“If alerted to this information, investigation targets against whom the defendant may be providing information about could be immediately prompted to flee from prosecution, destroy or conceal incriminating evidence, alter their operational tactics to avoid future detection, attempt to influence or intimidate potential witnesses, and otherwise take steps to undermine the investigation and avoid future prosecution,” the motion states.
Berry’s arraignment and plea hearing is scheduled for 3 p.m. Eastern Time.
Read the criminal information below:
https://s3.documentcloud.org/documents/21012882/caleb-berry-info.pdf
https://lawandcrime.com/u-s-capitol-siege/another-oath-keepers-member-set-to-plead-guilty-cooperate-with-federal-prosecutors/
@PhilipRucker When @CarolLeonnig and I asked Trump why he repeatedly told the public things that were not true, he said, “Are you talking about disinformation or are you talking about lies? There is a more beautiful word called disinformation.”
THREAD
When @CarolLeonnig and I asked Trump why he repeatedly told the public things that were not true, he said, “Are you talking about disinformation or are you talking about lies? There is a more beautiful word called disinformation.”
— Philip Rucker (@PhilipRucker) July 19, 2021
A more beautiful word.https://t.co/B5ynf79rli
Orlando Sentinel @orlandosentinel We’re begging you, Gov. DeSantis, stop messing in Texas and save Florida from COVID |
Editorial https://bit.ly/3wLT116
11:12 AM · Jul 20, 2021·SocialFlow app
THREAD
We’re begging you, Gov. DeSantis, stop messing in Texas and save Florida from COVID | Editorial https://t.co/MwnnWHDc86 pic.twitter.com/DcVKiOqrTY
— Orlando Sentinel (@orlandosentinel) July 20, 2021
The first person sentenced for a felony in the mob attack on the Capitol was sentenced to eight months in prison on Monday. Still waiting for the others to be brought to justice.
Opinion by Ann Telnaes
Editorial cartoonist
Today at 9:03 p.m. EDT
https://www.washingtonpost.com/opinions/2021/07/19/find-guy-who-was-held-accountable/
Glenn Kirschner @glennkirschner2 32m Judge imposes 8 months in prison.
Judge imposes 8 months in prison.
— Glenn Kirschner (@glennkirschner2) July 19, 2021
20m Judge is taking a 10- minute break and then will announce the sentence.
Glenn Kirschner
@glennkirschner2
·
24m
Defense attorney just agued, “this man lives in the poorest section of Florida.” It’s “like Southeast, DC.” He should stop talking. This is offensive.
Justice Department limits efforts to seize reporters’ phone, email records
By Devlin Barrett
July 19, 2021|Updated today at 11:53 a.m. EDT
https://www.washingtonpost.com/national-security/reporters-emails-leaks-justice-trump-biden/2021/07/19/64b4ddcc-de66-11eb-b507-697762d090dd_story.html
Attorney General Merrick Garland issued new rules Monday limiting how and when prosecutors can secretly obtain reporters’ phone and email records, formalizing a Biden administration decree that the government would stop using secret orders and subpoenas for journalists’ data to hunt for leakers.
The two-and-a-half page memo says the department “will no longer use compulsory legal process for the purpose of obtaining information from or records of members of the news media acting within the scope of newsgathering activities.”
The previous Justice Department rules for using reporters’ data to pursue unauthorized disclosures of classified information were widely criticized by First Amendment advocates and members of Congress, who said they gave free rein to prosecutors to secretly pursue such records if they thought telling the news organization in question might harm the investigation.
The new version of the rules does away with that exception, saying that the only times the Justice Department may seek reporters’ records is if the reporter is the subject or target of an investigation outside their work as a reporter, if they are suspected of working as an agent of a foreign power or with a foreign terrorist group, or if there is an imminent risk of bodily harm or death.
Garland’s memo declares “a free and independent press is vital to the functioning of our democracy,” and at the same time, the United States has “an important national interest in protecting national security information against unauthorized disclosure.”
“But a balancing test may fail to properly weigh the important national interest in protecting journalists from compelled disclosure of information revealing their sources, sources they need to apprise the American people of the workings of their government,” the memo states.
The memo offers formal written rules for a policy change announced in early June, after an outcry from news organizations and First Amendment advocates about the use of secret subpoenas to try to identify sources for 2017 stories published by The Washington Post, CNN, and the New York Times.
Controversies over the Justice Department’s use of subpoenas to get phone and email records of reporters have flared up over the years, pitting the desire of government officials to find and punish those who disclose classified information against the constitutional protections of a free press.
The memo issued Monday modifies regulations put in place in 2013 in an attempt to quell a similar controversy surrounding the Obama administration’s expansion of leak-hunting efforts. Press advocates say those policies chill newsgathering by discouraging officials from speaking to reporters who are seeking to reveal important information about government activity.
The batch of media subpoenas currently at issue were approved by Justice Department leadership in the waning days of the Trump administration. Officials have said they followed the policies put in place during the Obama years.
The Justice Department first notified reporters in May about the secretly issued subpoenas for the records of three Washington Post reporters, reigniting the controversy. At first, the Justice Department sought to defend the practice as rare but necessary to prevent disclosures of classified information. But on May 21, President Biden said it was “simply wrong” to go after reporter records, and his administration began rewriting the policy.
One of the concerns raised by First Amendment advocates in recent weeks was a move by the Justice Department to prohibit Times lawyers and executives from disclosing the government’s efforts to seize the email records of four reporters from the news organization.
In that case, a magistrate judge had prohibited the paper’s top lawyers and others from revealing the existence of a court order to turn over email records. The first such gag order dated to the Trump administration. But career prosecutors and supervisors in the Biden administration declined to immediately lift it or abandon efforts to get those records.
During the Biden administration, a Times lawyer was first notified of the effort to get the records, and also commanded not to disclose it — a move that legal experts called unprecedented.
The department revealed in early May that it had, during the Trump administration, secretly obtained the phone records of three current and former Washington Post journalists and had tried to obtain their email records. Later that month, the department made a similar disclosure to CNN, reporting that it had, also during the Trump administration, secretly obtained the phone and email records of the news outlet’s Pentagon correspondent. In June, the department told the Times it had secretly obtained the phone records of four Times reporters before Trump left office.
In each instance, the department did not seek actual content of phone calls or emails but wanted information such as who called or emailed whom, and when.
The department has not publicly revealed the particular stories at issue. But the eight reporters targeted and the time period in question, 2017, suggest a broad crackdown.
The Post reporters — Greg Miller, Ellen Nakashima and Adam Entous — wrote a story about classified U.S. intelligence intercepts indicating that in 2016, Sen. Jeff Sessions (R-Ala.) had discussed the Trump campaign with Sergey Kislyak, who was Russia’s ambassador to the United States. Trump later picked Sessions to be his attorney general.
CNN’s Pentagon correspondent, Barbara Starr, reported on options the military had prepared to present to Trump on North Korea, U.S. action on a possible planned chemical attack in Syria and a military policy change to suspend the public release of information about American combat deaths in Afghanistan.
The Times asserted that the article at issue for its targeted reporters — Matt Apuzzo, Adam Goldman, Eric Lichtblau and Michael S. Schmidt — seemed to be a piece about how James B. Comey, then the FBI director, handled politically charged investigations during the 2016 presidential election.
According to court documents, a U.S. magistrate judge approved a request for Times reporters’ email records on Jan. 5 and barred Google, which provides email services to the newspaper, from revealing the request to anyone, setting off months of legal wrangling in which a small number of Times officials were told, but barred from telling others.
By Devlin Barrett
Devlin Barrett writes about the FBI and the Justice Department, and is the author of "October Surprise: How the FBI Tried to Save Itself and Crashed an Election." He was part of a team that won a Pulitzer Prize in 2018 for National Reporting, for coverage of Russian interference in the U.S. election. Twitter
https://www.washingtonpost.com/national-security/reporters-emails-leaks-justice-trump-biden/2021/07/19/64b4ddcc-de66-11eb-b507-697762d090dd_story.html
·2m The defense attorney is now calling his client “Paul” and, when being corrected by the judge on some facts, he shoots back, “well, that’s my best guess.” This is poor lawyering.
29s The judge is pushing back on the defense attorney’s obvious, transparent and offensive mischaracterizations of what happened on 1/6.
Glenn Kirschner
@glennkirschner2
·
1m To put it bluntly, defendant Hodgkins behaved like the lawyer and the lawyer ranted like an out-of-control client. Strange choice by the lawyer.
Defendant Hodgkins made an effective statement to the judge (IMO). However, his attorney is undercutting it by attacking the notion the this was domestic terrorism. He said people calling 1/6 “domestic terrorism” are “gaslighting” country. Not effective lawyering (IMO).
Defendant Hodgkins, “I do not blame any politician or journalist” for my conduct.
Glenn Kirschner
@glennkirschner2
·
7m
Defendant Hodgkins, “Joseph R. Biden is rightfully and respectfully the president of the United States.”
Defendant Hodgkins, “I do not blame any politician or journalist” for my conduct.
— Glenn Kirschner (@glennkirschner2) July 19, 2021
Glenn Kirschner @glennkirschner2 Prosecutor emphasizes 3 disturbing factors: 1. goal was to subvert the election results; 2. methods included intimidation, force, violence and destruction and waiting for the 3 . . .
3:33 PM · Jul 19, 2021·Twitter for iPhone
Prosecutor emphasizes 3 disturbing factors: 1. goal was to subvert the election results; 2. methods included intimidation, force, violence and destruction and waiting for the 3 . . .
— Glenn Kirschner (@glennkirschner2) July 19, 2021
Glenn Kirschner @glennkirschner2 At 10 am, defendant Paul Hodgkins will be sentenced. You can bet the more than 500 other insurrections currently pending trial will be watching to see what Judge Moss does at this hearing. I’ll be live-tweeting during the hearing & posting a #JusticeMatters video later today.
2:15 PM · Jul 19, 2021·Twitter for iPhone
THREAD
At 10 am, defendant Paul Hodgkins will be sentenced. You can bet the more than 500 other insurrections currently pending trial will be watching to see what Judge Moss does at this hearing. I’ll be live-tweeting during the hearing & posting a #JusticeMatters video later today. pic.twitter.com/ezXJVYD6Nr
— Glenn Kirschner (@glennkirschner2) July 19, 2021
Microsoft Exchange hack caused by China, US and allies say
By ERIC TUCKER
17 minutes ago
https://apnews.com/article/microsoft-exchange-hack-biden-china-d533f5361cbc3374fdea58d3fb059f35
WASHINGTON (AP) — The Biden administration and Western allies formally blamed China on Monday for a massive hack of Microsoft Exchange email server software and accused Beijing of working with criminal hackers in ransomware attacks and other cyber operations.
The announcements, though not accompanied by sanctions against the Chinese government, were intended as a forceful condemnation of activities a senior Biden administration official described as part of a “pattern of irresponsible behavior in cyberspace.” They highlighted the ongoing threat from Chinese government hackers even as the administration remains consumed with trying to curb ransomware attacks from Russia-based syndicates that have targeted critical infrastructure.
The broad range of cyberthreats from Beijing disclosed on Monday included ransomware attacks from government-affiliated hackers that have targeted victims — including in the U.S. — with demands for millions of dollars. U.S officials allege that China’s Ministry of State Security has been using criminal contract hackers who have engaged in cyber extortion schemes and theft for their own profit, officials said.
Meanwhile, the Justice Department on Monday announced charges against four Chinese nationals who prosecutors said were working with the Ministry of State Security in a hacking campaign that targeted dozens of computer systems, including companies, universities and government entities. The defendants are accused of stealing trade secrets and confidential business information.
most damaging and high-profile recent ransomware attacks have involved Russian criminal gangs. Though the U.S. has sometimes seen connections between Russian intelligence agencies and individual hackers, the use of criminal contract hackers by the Chinese government “to conduct unsanctioned cyber operations globally is distinct,” the official said.
The Microsoft Exchange hack that months ago compromised tens of thousands of computers around the world was swiftly attributed to Chinese cyber spies by private sector groups. An administration official said the government’s attribution to hackers affiliated with China’s Ministry of State Security took until now in part because of the discovery of the ransomware and for-profit hacking operations and because the administration wanted to pair the announcement with guidance for businesses about tactics that the Chinese have been using.
An advisory Monday from the FBI, the National Security Agency and the Cybersecurity and Infrastructure Security Agency laid out specific techniques and ways that government agencies and businesses can protect themselves.
A spokesperson for the Chinese Embassy in Washington did not immediately return an email seeking comment Monday. But a Chinese Foreign Ministry spokesperson has previously deflected blame for the Microsoft Exchange hack, saying that China “firmly opposes and combats cyber attacks and cyber theft in all forms” and cautioned that attribution of cyberattacks should be based on evidence and not “groundless accusations.”
___
Kelvin Chan in London contributed to this report.
___
Follow Eric Tucker on Twitter at http://www.twitter.com/etuckerAP.
https://apnews.com/article/microsoft-exchange-hack-biden-china-d533f5361cbc3374fdea58d3fb059f35
Meghan Bobrowsky @MeghanBobrowsky American kids watched so much Peppa Pig during the pandemic that they developed British accents and started regularly using British words like “holiday” instead of “vacation,” confusing their parents.
6:05 PM · Jul 18, 2021·Twitter for iPhone
THREAD
American kids watched so much Peppa Pig during the pandemic that they developed British accents and started regularly using British words like “holiday” instead of “vacation,” confusing their parents. 🐷🐽
— Meghan Bobrowsky (@MeghanBobrowsky) July 18, 2021
My first A-Hed for @WSJ with @Preetika_Rana:https://t.co/6rnW4NKKyQ
Low-Tech Method Restores Eroded Lands
https://tellus.ars.usda.gov/stories/articles/low-tech-method-restores-eroded-lands/?utm_medium=email&utm_source=govdelivery
Before and after photos of Watershed 6 Check Dam 30 in November 2009 and December 2020. Watershed 6 Check Dam 30, November 2009 (left) and December 2020 (right). Photo courtesy of Southwest Watershed Research Center.
“A picture is worth a thousand words,” so the saying goes. Scientists with the Agricultural Research Service (ARS) Southwest Watershed Research Center in Tucson, AZ, took that saying to heart when they embarked on a project a decade ago to photograph the effectiveness of an ancient erosion-control technique.
“Check dams” are low barricades built of loosely piled rocks spanning modest-sized channels. The dams slow the rush of rainwater from sporadic downpours that carve deep gullies in the Southwest’s sandy soil. A check dam’s loose build lets water pass through slowly, but it also allows the dam to come apart in the event of excessive rainfall, to reduce the risk of flooding.
Conventional wisdom and centuries of use told the scientists that check dams worked in controlling erosion, but they wanted to demonstrate how well they worked. So they built check dams at 37 sites in two watersheds in the Santa Rita Mountains and photographed each site annually to document changes in the landscape over time.
The results are visually remarkable. In the study’s 10-year span, soil slowly refilled the eroded channels and plants grew back, providing food and habitat for wildlife and grazing animals. Ranchers who want to improve vegetation can couple this technique with seeding and runoff-water capture to encourage grass to grow in the areas between channels.
“Increased drought cycles like the Southwest has been experiencing are hard on grasses, and monsoon rain events have become more severe in the last decade, making the damage in the landscape even worse,” said ARS research hydraulic engineer Mary Nichols, who led the study. “Check dams are a low-tech, effective tool that can repair or at least limit some erosion damage and help build resiliency into landscapes.” She stresses that properly maintaining the check dams is essential to their effectiveness.
Check out the before-and-after photographs of the study sites and learn about the team’s research.—By Sue Kendall, ARS Office of Communications.
https://tellus.ars.usda.gov/stories/articles/low-tech-method-restores-eroded-lands/?utm_medium=email&utm_source=govdelivery
Peppa Pig, a Pandemic Favorite, Has American Children Acting British
Youngsters across the U.S. are surprising their parents with talk of petrol stations and mince pies
By Preetika Rana and Meghan Bobrowsky
July 18, 2021 12:54 pm ET
https://www.wsj.com/articles/peppa-pig-a-pandemic-favorite-has-american-children-acting-british-11626627266?st=4ckob4ms2b6l5ab&reflink=article_copyURL_share
California kindergartner Dani stunned her parents in May when she addressed her mom, who said she was going to the eye doctor, in a polished British accent: “Mummy, are you going to the optician?”
“And we were like, ‘the what?’ ” says Dani’s father, Matias Cavallin. “That’s like a college-level word,” he says. “At least, I wasn’t using it.”
The culprit? A wildly popular English cartoon about a preschooler pig named Peppa.
Like 5-year-old Dani, children across the U.S. have binge-watched “Peppa Pig” over the past year. They are emerging from the pandemic with an unusual vocabulary and a British accent just like the show’s namesake character.
The Peppa Effect, as some parents call it, already had some children snorting like pigs and using cheeky Britishisms before the pandemic. Then lockdowns sent screen-time limits out the door, and children gorged on the cartoon in a silo away from their usual social interactions, amplifying the effect.
Mr. Cavallin, a public-relations manager in El Cerrito, Calif., stumbled upon the cartoon at the start of the pandemic. He concluded that it was a sweet family show that would keep Dani busy as his wife went to the office and he juggled working from home.
“It was almost like a happy accident at a time when I was trying to find a pseudo babysitter during Zoom meetings,” he says. “It was either Peppa Pig or no work.”
As a result, Mr. Cavallin says, he went from papa to “Daddy,” said in the British way. His daughter calls the gas station the “petrol station” and cookies “biscuits,” and when he’s holding a cup of coffee, Dani asks him, “Are you having tea now?” He says that Dani’s grandparents—immigrants from Argentina who mostly speak Spanish—quip, “We don’t understand her to begin with, and now she’s speaking British?”
Parrot Analytics Ltd., an entertainment consulting firm that tracks demand for TV shows based on factors such as how frequently they are streamed and discussed online, said “Peppa Pig” retained its spot as the world’s second-most in-demand children’s cartoon for the 12 months ending February, after “SpongeBob SquarePants.” Overall, it jumped to the world’s 50th most in-demand show of any kind, from the 103rd the previous year. The show was first released in 2004.
“Young Peppa fans see her as a friend…and, as we do with friends that we admire, pick up some of their characteristics,” Peppa Pig owner Entertainment One Ltd. said in a written statement. “Imitation is the sincerest form of flattery,” it added.
Some parents say the show made their children more accepting of younger brothers because Peppa has one, too. Many used the show’s differences as teaching points.
In December, 6-year-old Aurelia insisted on the British holiday traditions of wearing a crown and baking mince pies for “Father Christmas,” says her mother, Lauren Ouellette, in North Scituate, R.I. “It gave us room to explore something new. Is Father Christmas the same guy as Santa? And why is he called that?” she says.
Aurelia throws around phrases like, “Can we turn the telly on?” A reference to the water closet instead of the bathroom initially threw off Ms. Ouellette. “I was like, ‘Where did she learn that from? Was she on the Titanic in a past life?’ ” she says. All became clear when they watched the show together a week later.
Boston-based Tess Darci says that her 4-year-old daughter, Cecilie, sounds like “a little lady” thanks to the show. “She says ‘lovely’ and ‘please’ and ‘thank you’ all the time,” says Ms. Darci, who runs a communications agency.
Now Ms. Darci teaches new things in Peppa lingo. She described Boston’s recent power outage as a “power cut,” which Cecilie knew because of an episode that referenced it during a thunderstorm.
Ms. Darci liked that the series exposed her daughter to a new culture, particularly during a year in which global travel cratered. “At least with Peppa they go to Italy, she’s learning about London, she knows about the queen.”
Seattle-based Dominique Parr took her daughter Hazel, now 3, to a speech therapist last year because she wasn’t forming her own unique sentences. Hazel’s first word was “George,” Peppa’s brother from the show, and everything she said was a direct quote from the cartoon. Ms Parr learned that she was autistic, and because Hazel loved the show so much, her therapist used the show to work on her language skills—role playing with Peppa toys and oinking like a pig to keep her engaged.
Ms. Parr struck a chord with parents in August when she posted a TikTok video of Hazel parroting lines from the show, like “How clever!” It went viral, garnering almost 10 million views and commentary from parents around the world who said their children had adopted the accent, too. When she was “peak obsessed” with Peppa, Ms. Parr says, Hazel called her Mummy Pig.
Hazel now speaks in her own sentences and speaks in an American accent. She also has a new favorite show: “Bluey,” a cartoon about a family of dogs with Australian accents.
Ms. Darci, Cecilie’s mother, thinks she hasn’t heard the last of Peppa. She caught her 16-month-old son, Arthur, eyeballing the show alongside his big sister.
“I was like, ‘Uh oh, here we go again,’ ” she says.
Write to Preetika Rana at preetika.rana@wsj.com and Meghan Bobrowsky at meghan.bobrowsky@wsj.com
Copyright ©2021 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8
Appeared in the July 19, 2021, print edition as 'Binge-Watching ‘Peppa Pig’ Has Preschoolers Speaking Colourfully.'
https://www.wsj.com/articles/peppa-pig-a-pandemic-favorite-has-american-children-acting-british-11626627266?st=4ckob4ms2b6l5ab&reflink=article_copyURL_share
“I’M GETTING THE WORD OUT”: INSIDE THE FEVERISH MIND OF DONALD TRUMP TWO MONTHS AFTER LEAVING THE WHITE HOUSE
In an hours-long interview with Carol Leonnig and Philip Rucker from his Mar-a-Lago throne, the former president repeated his election lies, bashed Mitch McConnell (“he’s a stupid person”), and teased a triumphant comeback.
BY CAROL LEONNIG AND PHILIP RUCKER
JULY 19, 2021
https://www.vanityfair.com/news/2021/07/the-feverish-mind-of-trump-after-leaving-the-white-house
Replying to @ericgeller The FBI and CISA have also released a report about the tactics and techniques of the prolific Chinese hacker group (APT40) whose members were just indicted:
https://us-cert.cisa.gov/sites/default/files/publications/CSA_TTPs-of-Indicted-APT40-Actors-Associated-with-China-MSS-Hainan-State-Security-Department.pdf
THREAD
The FBI and CISA have also released a report about the tactics and techniques of the prolific Chinese hacker group (APT40) whose members were just indicted: https://t.co/kPOAGcc7gV pic.twitter.com/k0nhnI6KVg
— Eric Geller (@ericgeller) July 19, 2021
Eric Geller @ericgeller Replying to @ericgeller DOJ this morning also unsealed an indictment charging four Chinese nationals with IP theft hacks against dozens of companies, universities, and govt agencies in U.S., Germany, Norway, & elsewhere.
Govt agents directed criminal hacker at front company.
https://justice.gov/opa/pr/four-chinese-nationals-working-ministry-state-security-charged-global-computer-intrusion
12:52 PM · Jul 19, 2021·TweetDeck
THREAD
DOJ this morning also unsealed an indictment charging four Chinese nationals with IP theft hacks against dozens of companies, universities, and govt agencies in U.S., Germany, Norway, & elsewhere.
— Eric Geller (@ericgeller) July 19, 2021
Govt agents directed criminal hacker at front company.
https://t.co/bgvlNSxIjF pic.twitter.com/U9SbDSUEm6
Despite the hype, iPhone security no match for NSO spyware
International investigation finds 23 Apple devices that were successfully hacked
By Craig Timberg, Reed Albergotti and Elodie Guéguen
July 19, 2021|Updated today at 7:17 a.m. EDT
https://www.washingtonpost.com/technology/2021/07/19/apple-iphone-nso/
The text delivered last month to the iPhone 11 of Claude Mangin, the French wife of a political activist jailed in Morocco, made no sound. It produced no image. It offered no warning of any kind as an iMessage from somebody she didn’t know delivered malware directly onto her phone — and past Apple’s security systems.
Once inside, the spyware, produced by Israel’s NSO Group and licensed to one of its government clients, went to work, according to a forensic examination of her device by Amnesty International’s Security Lab. It found that between October and June, her phone was hacked multiple times with Pegasus, NSO’s signature surveillance tool, during a time when she was in France.
The examination was unable to reveal what was collected. But the potential was vast: Pegasus can collect emails, call records, social media posts, user passwords, contact lists, pictures, videos, sound recordings and browsing histories, according to security researchers and NSO marketing materials. The spyware can activate cameras or microphones to capture fresh images and recordings. It can listen to calls and voice mails. It can collect location logs of where a user has been and also determine where that user is now, along with data indicating whether the person is stationary or, if moving, in which direction.
And all of this can happen without a user even touching her phone or knowing she has received a mysterious message from an unfamiliar person — in Mangin’s case, a Gmail user going by the name “linakeller2203.”
These kinds of “zero-click” attacks, as they are called within the surveillance industry, can work on even the newest generations of iPhones, after years of effort in which Apple attempted to close the door against unauthorized surveillance — and built marketing campaigns on assertions that it offers better privacy and security than rivals.
Mangin’s number was on a list of more than 50,000 phone numbers from more than 50 countries that The Post and 16 other organizations reviewed. Forbidden Stories, a Paris-based journalism nonprofit, and the human rights group Amnesty International had access to the numbers and shared them with The Post and its partners, in an effort to identify who the numbers belonged to and persuade them to allow the data from their phones to be examined forensically.
For years, Mangin has been waging an international campaign to win freedom for her husband, activist Naama Asfari, a member of the Sahrawi ethnic group and advocate of independence for the Western Sahara who was jailed in 2010 and allegedly tortured by Moroccan police, drawing an international outcry and condemnation from the United Nations.
“When I was in Morocco, I knew policemen were following me everywhere,” Mangin said in a video interview conducted in early July from her home in suburban Paris. “I never imagined this could be possible in France.”
Especially not through the Apple products that she believed would make her safe from spying, she said. The same week she sat for an interview about the hacking of her iPhone 11, a second smartphone she had borrowed — an iPhone 6s — also was infected with Pegasus, a later examination showed.
Researchers have documented iPhone infections with Pegasus dozens of times in recent years, challenging Apple’s reputation for superior security when compared with its leading rivals, which run Android operating systems by Google.
The months-long investigation by The Post and its partners found more evidence to fuel that debate. Amnesty’s Security Lab examined 67 smartphones whose numbers were on the Forbidden Stories list and found forensic evidence of Pegasus infections or attempts at infections in 37. Of those, 34 were iPhones — 23 that showed signs of a successful Pegasus infection and 11 that showed signs of attempted infection.
Only three of the 15 Android phones examined showed evidence of a hacking attempt, but that was probably because Android’s logs are not comprehensive enough to store the information needed for conclusive results, Amnesty’s investigators said.
Still, the number of times Pegasus was successfully implanted on an iPhone underscores the vulnerability of even its latest models. The hacked phones included an iPhone 12 with the latest of Apple’s software updates.
In a separate assessment published Sunday, the University of Toronto’s Citizen Lab endorsed Amnesty’s methodology. Citizen Lab also noted that its previous research had found Pegasus infections on an iPhone 12 Pro Max and two iPhone SE2s, all running 14.0 or more recent versions of the iOS operating system, first released last year.
How Pegasus works
Target: Someone sends what’s known as a trap link to a smartphone that persuades the victim to tap and activate — or activates itself without any input, as in the most sophisticated “zero-click” hacks.
Infect: The spyware captures and copies the phone’s most basic functions, NSO marketing materials show, recording from the cameras and microphone and collecting location data, call logs and contacts.
Track: The implant secretly reports that information to an operative who can use it to map out sensitive details of the victim’s life.
Ivan Krstic, head of Apple Security Engineering and Architecture, defended his company’s security efforts.
“Apple unequivocally condemns cyberattacks against journalists, human rights activists, and others seeking to make the world a better place. For over a decade, Apple has led the industry in security innovation and, as a result, security researchers agree iPhone is the safest, most secure consumer mobile device on the market,” he said in a statement. “Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals. While that means they are not a threat to the overwhelming majority of our users, we continue to work tirelessly to defend all our customers, and we are constantly adding new protections for their devices and data.”
Apple burnished its reputation for guarding user privacy during its high-profile legal fight with the FBI in 2016 over whether the company could be forced to unlock an iPhone used by one of the attackers in a San Bernardino, Calif., mass shooting the previous year. The FBI ultimately withdrew from the legal clash when it found an Australian cybersecurity firm, Azimuth Security, that could unlock the iPhone 5c without any help from Apple.
Outside researchers praise Apple for its stand — and for continuing to improve its technology with each new generation of iPhones. The company last year quietly introduced BlastDoor, a feature that seeks to block iMessages from delivering malware, to make Pegasus-style attacks more difficult.
The investigation’s conclusions also are likely to fuel a debate about whether tech companies have done enough to shield their customers from unwanted intrusions. The vulnerability of smartphones, and their widespread adoption by journalists, diplomats, human rights activists and businesspeople around the world — as well as criminals and terrorists — has given rise to a robust industry offering commercially available hacking tools to those willing to pay.
NSO, for example, reported $240 million in revenue last year, and there are many other companies that offer similar spyware.
On Sunday, NSO’s chief executive, Shalev Hulio, told The Post that he was upset by the investigation’s reports that phones belonging to journalists, human rights activists and public officials had been targeted with his company’s software, even though he disputed other allegations reported by The Post and it partner news organizations. He promised an investigation. “Every allegation about misuse of the system is concerning to me,” Hulio said. “It violates the trust we are giving the customer.”
Apple is not alone in dealing with potential intrusions. The other major target of Pegasus is Google’s Android operating system, which powers smartphones by Samsung, LG and other manufacturers.
Google spokeswoman Kaylin Trychon said that Google has a threat analysis team that tracks NSO Group and other threat actors and that the company sent more than 4,000 warnings to users each month of attempted infiltrations by attackers, including government-backed ones.
She said the lack of logs that help researchers determine whether an Android device has been attacked was also a security decision.
“While we understand that persistent logs would be more helpful for forensic uses such as the ones described by Amnesty International’s researchers, they also would be helpful to attackers. We continually balance these different needs,” she said.
Advocates say the inability to prevent the hacking of smartphones threatens democracy in scores of nations by undermining newsgathering, political activity and campaigns against human rights abuses. Most nations have little or no effective regulation of the spyware industry or how its tools are used.
“If we’re not protecting them and not providing them with tools to do this dangerous work, then our societies are not going to get better,” said Adrian Shahbaz, director of technology and democracy for Freedom House, a Washington-based pro-democracy think tank. “If everyone is afraid of taking on the powerful because they fear the consequences of it, then that would be disastrous to the state of democracy.”
Hatice Cengiz, the fiancee of slain Washington Post contributing columnist Jamal Khashoggi, said she used an iPhone because she thought it would offer robust protection against hackers.
“Why did they say the iPhone is more safe?” Cengiz said in a June interview in Turkey, where she lives. Her iPhone was among the 23 found to have forensic evidence of successful Pegasus intrusion. The infiltration happened in the days after Khashoggi was killed in October 2018, the examination of her phone found.
NSO said in a statement that it had found no evidence that Cengiz’s phone had been targeted by Pegasus. “Our technology was not associated in any way with the heinous murder of Jamal Khashoggi,” the company said.
A head-to-head comparison of the security of Apple’s and Google’s operating systems and the devices that run them is not possible, but reports of hacks to iPhones have grown in recent years as security researchers have discovered evidence that attackers had found vulnerabilities in such widely used iPhone apps as iMessage, Apple Music, Apple Photos, FaceTime and the Safari browser.
The investigation found that iMessage — the built-in messaging app that allows seamless chatting among iPhone users — played a role in 13 of the 23 successful infiltrations of iPhones. IMessage was also the mode of attack in six of the 11 failed attempts Amnesty’s Security Lab identified through its forensic examinations.
One reason that iMessage has become a vector for attack, security researchers say, is that the app has gradually added features, which inevitably creates more potential vulnerabilities.
“They can’t make iMessage safe,” said Matthew Green, a security and cryptology professor at Johns Hopkins University. “I’m not saying it can’t be fixed, but it’s pretty bad.”
One key issue: IMessage lets strangers send iPhone users messages without any warning to or approval from the recipient, a feature that makes it easier for hackers to take the first steps toward infection without detection. Security researchers have warned about this weakness for years.
“Your iPhone, and a billion other Apple devices out-of-the-box, automatically run famously insecure software to preview iMessages, whether you trust the sender or not,” said security researcher Bill Marczak, a fellow at Citizen Lab, a research institute based at the University of Toronto’s Munk School of Global Affairs & Public Policy. “Any Computer Security 101 student could spot the flaw here.”
Google’s Project Zero, which searches for exploitable bugs across a range of technology offerings and publishes its findings publicly, reported in a series of blog posts last year on vulnerabilities to iMessage.
The encrypted chat app Signal adopted new protections last year requiring user approval when an unfamiliar user attempts to initiate a call or text — a protection Apple has not implemented with iMessage. Users of iPhones can choose to filter unfamiliar users by activating a feature in their devices’ settings, though research for many years has shown that ordinary users of devices or apps rarely take advantage of such granular controls.
In a 2,800-word email responding to questions from The Post that Apple said could not be quoted directly, the company said that iPhones severely restrict the code that an iMessage can run on a device and that it has protections against malware arriving in this way. It said BlastDoor examines Web previews and photos for suspicious content before users can view them but did not elaborate on that process. It did not respond to a question about whether it would consider restricting messages from senders not in a person’s address book.
The Amnesty technical analysis also found evidence that NSO’s clients use commercial Internet service companies, including Amazon Web Services, to deliver Pegasus malware to targeted phones. (Amazon’s executive chairman, Jeff Bezos, owns The Post.)
Kristin Brown, a spokeswoman for Amazon Web Services, said, “When we learned of this activity, we acted quickly to shut down the relevant infrastructure and accounts.”
Hard lessons
The infiltration of Mangin’s iPhones underscores hard lessons about privacy in the age of smartphones: Nothing held on any device is entirely safe. Spending more for a premium smartphone does not change that fact, especially if some nation’s intelligence or law enforcement agencies want to break in. NSO reported last month that it has 60 government customers in 40 countries, meaning some nations have more than one agency with a contract.
New security measures often exert costs to consumers in terms of ease of use, speed of apps and battery life, prompting internal struggles in many technology companies over whether such performance trade-offs are worth the improved resistance to hacking that such measures provide.
One former Apple employee, who spoke on the condition of anonymity because Apple requires its employees to sign agreements prohibiting them from commenting on nearly all aspects of the company, even after they leave, said it was difficult to communicate with security researchers who reported bugs in Apple products because the company’s marketing department got in the way.
“Marketing could veto everything,” the person said. “We had a whole bunch of canned replies we would use over and over again. It was incredibly annoying and slowed everything down.”
Apple also restricts the access outside researchers have to iOS, the mobile operating system used by iPhones and iPads, in a way that makes investigation of the code more difficult and limits the ability of consumers to discover when they’ve been hacked, researchers say.
In its email response to questions from The Post, Apple said its product marketing team has a say only in some interactions between Apple employees and outside security researchers and only to ensure the company’s messaging about new products is consistent. It said it is committed to giving tools to outside security researchers and touted its Security Research Device Program, in which the company sells iPhones with special software that researchers can use to analyze iOS.
Critics — both inside and outside the company — say Apple also should be more focused on tracking the work of its most sophisticated adversaries, including NSO, to better understand the cutting-edge exploits attackers are developing. These critics say the company’s security team tends to focus more on overall security, by deploying features that thwart most attacks but may fail to stop attacks on people subject to government surveillance — a group that often includes journalists, politicians and human rights activists such as Mangin.
“It’s a situation where you’re always working with an information deficit. You don’t know a whole lot about what’s out there,” said a former Apple engineer, speaking on the condition of anonymity because Apple does not permit former employees to speak publicly without company permission. “When you have a well-resourced adversary, different things are on the table.”
In its email to The Post, Apple said that in recent years it has significantly expanded its security team focused on tracking sophisticated adversaries. Apple said in the email that it is different from its competitors in that it elects not to discuss these efforts publicly, instead focusing on building new protections for its software. Overall, its security team has grown fourfold over the past five years, Apple said.
Apple’s business model relies on the annual release of new iPhones, its flagship product that generates half of its revenue. Each new device, which typically arrives with an updated operating system available to users of older devices, includes many new features — along with what security researchers call new “attack surfaces.”
Current and former Apple employees and people who work with the company say the product release schedule is harrowing, and, because there is little time to vet new products for security flaws, it leads to a proliferation of new bugs that offensive security researchers at companies like NSO Group can use to break into even the newest devices.
In its email to The Post, Apple said it uses automated tools and in-house researchers to catch the vast majority of bugs before they’re released and that it is the best in the industry.
Apple also was a relative latecomer to “bug bounties,” where companies pay independent researchers for finding and disclosing software flaws that could be used by hackers in attacks.
Krstic, Apple’s top security official, pushed for a bug bounty program that was added in 2016, but some independent researchers say they have stopped submitting bugs through the program because Apple tends to pay small rewards and the process can take months or years.
Last week, Nicolas Brunner, an iOS engineer for Swiss Federal Railways, detailed in a blog post how he submitted a bug to Apple that allowed someone to permanently track an iPhone user’s location without their knowledge. He said Apple was uncommunicative, slow to fix the bug and ultimately did not pay him.
Asked about the blog post, an Apple spokesman referred to Apple’s email in which it said its bug bounty program is the best in the industry and that it pays higher rewards than any other company. In 2021 alone, it has paid out millions of dollars to security researchers, the email said.
People familiar with Apple’s security operations say Krstic has improved the situation, but Apple’s security team remains known for keeping a low public profile, declining to make presentations at conferences such as the heavily attended Black Hat cybersecurity conference in Las Vegas each summer, where other tech companies have become fixtures.
Once a bug is reported to Apple, it’s given a color code, said former employees familiar with the process. Red means the bug is being actively exploited by attackers. Orange, the next level down, means the bug is serious but that there is no evidence it has been exploited yet. Orange bugs can take months to fix, and the engineering team, not security, decides when that happens.
Former Apple employees recounted several instances in which bugs that were not believed to be serious were exploited against customers between the time they were reported to Apple and when they were patched.
Apple said in its email that no system is perfect but that it rapidly fixes serious security vulnerabilities and continues to invest in improving its system for assessing the seriousness of bugs.
But outside security researchers say they cannot be sure how many iOS users are exploited because Apple makes it difficult for researchers to analyze the information that would point to exploits.
“I think we’re seeing the tip of the iceberg at the moment,” said Costin Raiu, director of the global research and analysis team at cybersecurity firm Kaspersky Lab. “If you open it up and give people the tools and ability to inspect phones, you have to be ready for the news cycle which will be mostly negative. It takes courage.”
Dana Priest contributed to this report.
The Pegasus Project is a collaborative investigation that involves more than 80 journalists from 17 news organizations coordinated by Forbidden Stories with the technical support of Amnesty International’s Security Lab. Read more about this project.
By Craig Timberg
Craig Timberg is a national technology reporter for The Washington Post. Since joining The Post in 1998, he has been a reporter, editor and foreign correspondent, and he contributed to The Post’s Pulitzer Prize-winning coverage of the National Security Agency. Twitter
By Reed Albergotti
Reed Albergotti is The Washington Post's consumer electronics reporter, taking readers inside powerful and secretive companies such as Apple and shedding light on the murky and global industry responsible for building the myriad devices that touch every aspect of our lives. He spent 12 years at the Wall Street Journal and four at the Information. Twitter
https://www.washingtonpost.com/technology/2021/07/19/apple-iphone-nso/
Post Office Horizon scandal: More subpostmasters cleared
Published 16 minutes ago
https://www.bbc.com/news/business-57888146
The Court of Appeal has cleared 12 more former subpostmasters who were wrongly convicted of offences during the Post Office Horizon scandal.
It brings the total of judgements overturned to 57, but hundreds more are hoping for similar decisions.
Between 1999 and 2015, they were sacked or prosecuted after money appeared to vanish from accounts at their branches.
The problems were caused by the Horizon computer system in Post Office branches which turned out to be flawed.
Some subpostmasters were imprisoned after being convicted of stealing money.
In April, 39 people had verdicts against them overturned, following on from the overturning of six other convictions in December.
More people have been affected by this than in any other miscarriage of justice in the UK.
https://www.bbc.com/news/business-57888146
U.S. and key allies accuse China of Microsoft Exchange cyberattacks
Ina Fried, author of Login
https://www.axios.com/china-cyberattacks-nato-181e71d2-7414-45f3-9463-c8b1d46392c1.html
The U.S., NATO and other allies are collectively calling out China for malicious cyberattacks, including a March attack that exploited a flaw in Microsoft's Exchange Server.
Why it matters: It's the first time that NATO, a military alliance founded in 1949 to confront the Soviet Union, has signed onto a formal condemnation of China's cyber activities.
Zoom in: Authorities are detailing more than 50 different techniques that Chinese state-sponsored actors used, and offering up recommended mitigations that businesses and organizations can take.
* The U.S. says that China's Ministry of State Security is using contract hackers to conduct the attacks, many of which are being done for profit, including via ransomware.
* The U.S., NATO, European Union, U.K., Australia, Canada, New Zealand and Japan say they can now, "with high confidence," attribute the March attack using the Exchange flaw to cyberattackers affiliated with China's state security ministry. That attack crippled thousands of computers around the world.
As part of Monday's announcement, the Justice Department unveiled criminal charges against four Ministry of State Security hackers for a "multiyear campaign targeting foreign governments and entities in key sectors, including maritime, aviation, defense, education, and healthcare in a least a dozen countries."
Between the lines: There are a number of countries that have been blamed for past cyberattacks, including China, Iran, Russia and North Korea.
The U.S. says Russian government hackers have been known to sometimes also "moonlight" in for-profit attacks, but in this case it was the Chinese military working directly with the attackers.
What's next: The U.S. says it has raised the concerns with Chinese authorities and said it hasn't ruled out a further response, but also cautioned that no one action is likely to deter China.
Rather, the administration is pointing to a number of recent steps taken on cybersecurity including executive orders, work with the EU and G7 and new rules for pipeline and other critical infrastructure providers.
The big picture: NATO leaders last month took their strongest position yet on the threat from China, releasing a communique that characterized Beijing's growing influence, military prowess and assertive behavior as "systemic challenges to the rules-based international order."
https://www.axios.com/china-cyberattacks-nato-181e71d2-7414-45f3-9463-c8b1d46392c1.html
CARMAT announces the first commercial implant of its Aeson artificial heart
By Reuters Staff
HEALTHCARE & PHARMA
JULY 19, 20216:15 AMUPDATED 4 HOURS AGO
1 MIN READ
https://www.reuters.com/article/us-carmat-outlook-idUSKBN2EP0AX
French firm makes first sale of artificial heart
JULY 19, 2021
https://medicalxpress.com/news/2021-07-french-firm-sale-artificial-heart.html
French prosthetics maker Carmat said Monday it had sold one of its artificial hearts for the first time since its 2008 founding, for implantation into an Italian patient awaiting a transplant.
The operation "was performed by the team headed by heart surgeon Dr. Ciro Maiello at the Azienda Ospedaliera dei Colli hospital in Naples, one of the centres with the greatest experience in the field of artificial hearts in Italy," Carmat said in a statement.
The company secured a European CE marking in December 2020 for sale of the Aeson prosthetic heart as a "bridge to transplant".
That certification was based on results from a study known as PIVOTAL, launched in 2016 and still under way.
In November 2019, results from the first 11 patients in the study showed that 73 percent survived for six months with the prosthetic or made it to a successful transplant within the same period.
Carmat said that the first commercial sale of its artificial heart marked "a major milestone that opens up a new chapter in the company's development", adding that it hoped to find more customers in France and Germany by the end of the year.
A spokeswoman told AFP that it was the first time one of the hearts had been used outside of a clinical trial.
Costs for the operation—more than 150,000 euros ($177,000)—were paid by the regional health system, as Italy's national system will not cover the treatment until it has been in use for several years.
On July 15, Carmat had announced the first implantation of an Aeson heart into a patient in the US, in a clinical study at Duke University Hospital in Durham, North Carolina.
It is searching for 10 suitable patients to take part in a study approved by the US Food and Drug Administration.
https://medicalxpress.com/news/2021-07-french-firm-sale-artificial-heart.html
Revealed: murdered journalist’s number selected by Mexican NSO client
Nina Lakhani in Ciudad Altamirano
Sun 18 Jul 2021 12.28 EDT
https://www.theguardian.com/news/2021/jul/18/revealed-murdered-journalist-number-selected-mexico-nso-client-cecilio-pineda-birto
On 2 March 2017, Cecilio Pineda Birto made a broadcast about alleged corruption. Hours later he was dead
The hitmen came for Cecilio Pineda Birto as he swung in a hammock at a carwash, waiting for his pickup to be cleaned.
The 38-year-old freelance reporter was shot dead on 2 March 2017 in Ciudad Altamirano, a town in the southern Mexican region of Tierra Caliente – a battleground for rival organised crime factions.
A few hours earlier, Pineda had in a broadcast on Facebook Live accused state police and local politicians of colluding with a violent local capo known as El Tequilero.
In previous weeks, Pineda had received a string of anonymous death threats. At about the same time, his mobile phone number was selected as a possible target for surveillance by a Mexican client of the spyware company NSO Group.
A successful infection enables an NSO client to access everything on the device, including contacts, chat messages – and precise location. Pineda’s phone disappeared from the scene of his murder, so a forensic examination to determine if it was targeted or infected with spyware was not possible.
The gunmen who murdered him could have learned of his location at a public carwash through means not related to NSO’s technologies, or its clients. But his attackers knew exactly where to find him, even though the hammock where he lay was not visible from the street.
“People with power can do whatever they want to anyone,” said his widow, Marisol Toledo, when told Pineda had been selected for potential targeting. “If they succeeded [in infecting his phone], they would have known where he was at all times.”
...
MUCH MORE
https://www.theguardian.com/news/2021/jul/18/revealed-murdered-journalist-number-selected-mexico-nso-client-cecilio-pineda-birto
The consortium’s findings build on extensive work by cybersecurity researchers, primarily from the University of Toronto-based watchdog Citizen Lab. NSO targets identified by researchers beginning in 2016 include dozens of Al-Jazeera journalists and executives, New York Times Beirut bureau chief Ben Hubbard, Moroccan journalist and activist Omar Radi and prominent Mexican anti-corruption reporter Carmen Aristegui. Her phone number was on the list, the Post reported. The Times said Hubbard and its former Mexico City bureau chief, Azam Ahmed, were on the list.
https://www.digitalviolence.org/#/platform
The consortium’s findings build on extensive work by cybersecurity researchers, primarily from the University of Toronto-based watchdog Citizen Lab. NSO targets identified by researchers beginning in 2016 include dozens of Al-Jazeera journalists and executives, New York Times Beirut bureau chief Ben Hubbard, Moroccan journalist and activist Omar Radi and prominent Mexican anti-corruption reporter Carmen Aristegui. Her phone number was on the list, the Post reported. The Times said Hubbard and its former Mexico City bureau chief, Azam Ahmed, were on the list.
https://www.digitalviolence.org/#/platform
Probe: Journalists, activists among firm’s spyware targets
By FRANK BAJAK
today
https://apnews.com/article/technology-middle-east-business-journalists-jamal-khashoggi-00a3fb4349b04504d3d7c481eae233d3
BOSTON (AP) — An investigation by a global media consortium based on leaked targeting data provides further evidence that military-grade malware from Israel-based NSO Group, the world’s most infamous hacker-for-hire outfit, is being used to spy on journalists, human rights activists and political dissidents.
From a list of more than 50,000 cellphone numbers obtained by the Paris-based journalism nonprofit Forbidden Stories and the human rights group Amnesty International and shared with 16 news organizations, journalists were able to identify more than 1,000 individuals in 50 countries who were allegedly selected by NSO clients for potential surveillance.
They include 189 journalists, more than 600 politicians and government officials, at least 65 business executives, 85 human rights activists and several heads of state, according to The Washington Post, a consortium member. The journalists work for organizations including The Associated Press, Reuters, CNN, The Wall Street Journal, Le Monde and The Financial Times.
Amnesty also reported that its forensic researchers had determined that NSO Group’s flagship Pegasus spyware was successfully installed on the phone of Post journalist Jamal Khashoggi’s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018. The company had previously been implicated in other spying on Khashoggi.
NSO Group denied in an emailed response to AP questions that it has ever maintained “a list of potential, past or existing targets.” In a separate statement, it called the Forbidden Stories report “full of wrong assumptions and uncorroborated theories.”
The company reiterated its claims that it only sells to “vetted government agencies” for use against terrorists and major criminals and that it has no visibility into its customers’ data. Critics call those claims dishonest — and have provided evidence that NSO directly manages the high-tech spying. They say the repeated abuse of Pegasus spyware highlights the nearly complete lack of regulation of the private global surveillance industry.
The source of the leak — and how it was authenticated -- was not disclosed. While a phone number’s presence in the data does not mean an attempt was made to hack a device, the consortium said it believed the data indicated potential targets of NSO’s government clients. The Post said it identified 37 hacked smartphones on the list. The Guardian, another consortium member, reported that Amnesty had found traces of Pegasus infections on the cellphones of 15 journalists who let their phones be examined after discovering their number was in the leaked data.
The most numbers on the list, 15,000, were for Mexican phones, with a large share in the Middle East. NSO Group’s spyware has been implicated in targeted surveillance chiefly in the Middle East and Mexico. Saudi Arabia is reported to be among NSO clients. Also on the lists were phones in countries including France, Hungary, India, Azerbaijan, Kazakhstan and Pakistan.
“The number of journalists identified as targets vividly illustrates how Pegasus is used as a tool to intimidate critical media. It is about controlling public narrative, resisting scrutiny, and suppressing any dissenting voice,” Amnesty quoted its secretary-general, Agnes Callamard, as saying.
In one case highlighted by the Guardian, Mexican reporter Cecilio Pineda Birto was assassinated in 2017 a few weeks after his cell phone number appeared on the leaked list.
AP’s director of media relations, Lauren Easton, said the company is “deeply troubled to learn that two AP journalists, along with journalists from many news organizations” are on the list of the 1,000 potential targets for Pegasus infection. She said the AP was investigating to try to determine if its two staffers’ devices were compromised by the spyware.
The consortium’s findings build on extensive work by cybersecurity researchers, primarily from the University of Toronto-based watchdog Citizen Lab. NSO targets identified by researchers beginning in 2016 include dozens of Al-Jazeera journalists and executives, New York Times Beirut bureau chief Ben Hubbard, Moroccan journalist and activist Omar Radi and prominent Mexican anti-corruption reporter Carmen Aristegui. Her phone number was on the list, the Post reported. The Times said Hubbard and its former Mexico City bureau chief, Azam Ahmed, were on the list.
Two Hungarian investigative journalists, Andras Szabo and Szabolcs Panyi, were among journalists on the list whose phones were successfully infected with Pegasus, the Guardian reported.
Among more than two dozen previously documented Mexican targets are proponents of a soda tax, opposition politicians, human rights activists investigating a mass disappearance and the widow of a slain journalist. In the Middle East, the victims have mostly been journalists and dissidents, allegedly targeted by the Saudi and United Arab Emirates governments.
The consortium’s “Pegasus Project” reporting bolsters accusations that not just autocratic regimes but democratic governments, including India and Mexico, have used NSO Group’s Pegasus spyware for political ends. Its members, who include Le Monde and Sueddeutsche Zeitung of Germany, are promising a series of stories based on the leak.
Pegasus infiltrates phones to vacuum up personal and location data and surreptitiously control the smartphone’s microphones and cameras. In the case of journalists, that lets hackers spy on reporters’ communications with sources.
The program is designed to bypass detection and mask its activity. NSO Group’s methods to infect its victims have grown so sophisticated that researchers say it can now do so without any user interaction, the so-called “zero-click” option.
In 2019, WhatsApp and its parent company Facebook sued NSO Group in U.S. federal court in San Francisco, accusing it of exploiting a flaw in the popular encrypted messaging service to target — with missed calls alone — some 1,400 users. NSO Group denies the accusations.
The Israeli company was sued the previous year in Israel and Cyprus, both countries from which it exports products. The plaintiffs include Al-Jazeera journalists, as well as other Qatari, Mexican and Saudi journalists and activists who say the company’s spyware was used to hack them.
Several of the suits draw heavily on leaked material provided to Abdullah Al-Athbah, editor of the Qatari newspaper Al-Arab and one of the alleged victims. The material appears to show officials in the United Arab Emirates discussing whether to hack into the phones of senior figures in Saudi Arabia and Qatar, including members of the Qatari royal family.
NSO Group does not disclose its clients and says it sells its technology to Israeli-approved governments to help them target terrorists and break up pedophile rings and sex- and drug-trafficking rings. It claims its software has helped save thousands of lives and denies its technology was in any way associated with Khashoggi’s murder.
NSO Group also denies involvement in elaborate undercover operations uncovered by The AP in 2019 in which shadowy operatives targeted NSO critics including a Citizen Lab researcher to try to discredit them.
Last year, an Israeli court dismissed an Amnesty International lawsuit seeking to strip NSO of its export license, citing insufficient evidence.
NSO Group is far from the only merchant of commercial spyware. But its behavior has drawn the most attention, and critics say that is with good reason.
Last month, it published its first transparency report, in which it says it has rejected “more than $300 million in sales opportunities as a result of its human rights review processes.” Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation and a strident critic, tweeted: “If this report was printed, it would not be worth the paper it was printed on.”
A new, interactive online data platform created by the group Forensic Architecture with support from Citizen Lab and Amnesty International catalogs NSO Group’s activities by country and target. The group partnered with filmmaker Laura Poitras, best known for her 2014 documentary “Citzenfour” about NSA whistleblower Edward Snowden, who offers video narrations. https://www.digitalviolence.org/#/platform
“Stop what you’re doing and read this,” Snowden tweeted Sunday, referencing the consortium’s findings. “This leak is going to be the story of the year.”
Since 2019, the U.K. private equity firm Novalpina Capital has controlled a majority stake in NSO Group. Earlier this year, Israeli media reported the company was considering an initial public offering, most likely on the Tel Aviv Stock Exchange.
https://apnews.com/article/technology-middle-east-business-journalists-jamal-khashoggi-00a3fb4349b04504d3d7c481eae233d3
Man faces 1st sentencing for felony in riot at US Capitol
By MICHAEL TARM
today
https://apnews.com/article/joe-biden-government-and-politics-capitol-siege-sentencing-785d865e0be2bc912614821768cf95b5
CHICAGO (AP) — A Florida man who breached the U.S. Senate chamber carrying a Trump campaign flag is scheduled to become the first Jan. 6 rioter sentenced for a felony, in a hearing that will help set a benchmark for punishment in similar cases.
Prosecutors want Paul Allard Hodgkins to serve 18 months behind bars, saying in a recent filing that he, “like each rioter, contributed to the collective threat to democracy” by forcing lawmakers to temporarily abandon their certification of Joe Biden’s election victory and to scramble for shelter from incoming mobs.
Video footage shows Hodgkins, 38, wearing a Trump 2020 T-shirt, the flag flung over his shoulder and eye goggles around his neck inside the Senate. He took a selfie with a self-described shaman in a horned helmet and other rioters on the dais behind him.
His sentencing Monday in Washington could set the bar for punishments of hundreds of other defendants as they decide whether to accept plea deals or go to trial. Hodgkins and others are accused of serious crimes but were not indicted, as other were, for roles in larger conspiracies.
A lawyer for Hodgkins, who pleaded guilty last month to one count of obstructing an official proceeding, asked U.S. District Judge Randolph Moss not to impose a prison sentence, saying the shame that will attach to Hodgkins for the rest of his life should be factored in as punishment.
“Whatever punishment this court may provide will pale in comparison to the scarlet letter Mr. Hodgkins will wear for the rest of his life,” Patrick N. Leduc wrote in a recent filing, citing a Nathaniel Hawthorne novel in which a woman accused of adultery is forced to wear a letter “A.”
The filing argues that Hodgkins’ actions weren’t markedly different from those of Anna Morgan Lloyd — other than Hodgkins stepping onto the Senate floor. The 49-year-old from Indiana was the first of roughly 500 arrested to be sentenced. She pleaded guilty to misdemeanor disorderly conduct and last month was sentenced to three years of probation.
Hodgkins was never accused of assaulting anyone or damaging property. And prosecutors said he deserves some leniency for taking responsibility almost immediately and pleading guilty to the obstruction charge, which carries a maximum 20-years prison sentence.
But they also noted how he boarded a bus in his hometown of Tampa bound for a Jan. 6 Trump rally carrying rope, protective goggles and latex gloves in a backpack — saying that demonstrated he came to Washington prepared for violence.
On the day, he walked through grounds already littered with smashed police barriers and broken windows, evening passing police officers and others injured as the crowd surged toward the Capitol, prosecutors said.
“Time and time again, rather than turn around and retreat, Hodgkins pressed forward,” the government filing said.
Leduc described his client as an otherwise law-abiding American who, despite living in a poorer part of Tampa, regularly volunteered at a food bank. He noted that Hodgkins had been an Eagle Scout.
His actions on Jan. 6 “is the story of a man who for just one hour on one day lost his bearings ... who made a fateful decision to follow the crowd,” the attorney said.
Leduc’s 33-page presentencing filing devotes several pages to the Civil War, highlighting Abraham Lincoln’s calls for reconciliation weeks before his assassination.
“The court has a chance to emulate Lincoln,” he wrote.
___
Follow Michael Tarm on Twitter at http://twitter.com/mtarm
https://apnews.com/article/joe-biden-government-and-politics-capitol-siege-sentencing-785d865e0be2bc912614821768cf95b5
The Pegasus project
A special investigation into NSO Group, which sells hacking spyware to governments
https://www.theguardian.com/news/series/pegasus-project