Elder Patriot – In the information age, protecting and managing information is critical.
That’s the reason why corporations have put in place, highly paid information technology managers and elevated then to the level of Vice President of Information Technology.
Unfortunately, with reports that a second IT aide to Senator Maggie Hassan (D-NH), we now have evidence that, at every level of government, Democrats didn’t properly effort to secure sensitive data.
Thanks to investigative reporter Luke Rosiak, who broke the story on Sen. Hassan’s former IT staffer Jackson Cosko, we now know that every branch of our government has been breached either by improperly vetted employees or directly by the Democrat themselves.
Rosiak wrote for the Daily Caller:
Jackson Cosko, admitted he stole tens of thousands of documents, credit card numbers, Social Security numbers and the contents of the entire network drive from the New Hampshire Democrat.
A second former aide to Sen. Maggie Hassan is implicated in former IT staffer Jackson Cosko’s massive data-theft scheme that was ultimately used to “intimidate” Republican senators by “doxxing” them during a confirmation hearing for Supreme Court Justice Brett Kavanaugh, prosecutors said.
Samantha G. DeForest-Davis, at the time a staff assistant to Hassan, was the aide who allegedly helped Cosko conduct his scheme, a source with knowledge of the situation told The Daily Caller News Foundation. Court records show a case naming her has been opened, and the source confirmed it relates to her alleged role in the data theft.
You’d think that Cosko’s career, working for anyone in information technology management would be over. Not so for Democrats. Rosiak tells us what happened after Sen. Hassan fired Cosko:
Court documents said Cosko feared his “termination” by Hassan in May 2018 would stymie his career, but Democratic Texas Rep. Sheila Jackson Lee hired him soon after. Her office has declined to explain whether it received a reference from Hassan’s office.
Add Hassan and Lee’s names to the list of Democrats, across every elected branch (and almost elected brach) that have chosen to ignore the need to properly secure sensitive information.
Rosiak first reported the case of Imran Awan who, along with four of his family members, were hired by House Democrats to manage their IT needs.
Democratic representatives Andre Carson, Luis Gutierrez, Jim Himes, Terri Sewell, Jackie Speier, Mike Quigley, Eric Swalwell and Patrick Murphy joined as signatories to a letter requesting that their staffers be granted to top secret classified information.
It’s believed that background checks were never conducted. If those checks had been made, then it’s likely that the money the Awans owed to Ali Al-Attar, connected to Hezbollah, would have been discovered.
Then there’s this interesting tidbit that was never covered by the mainstream media:
Pat Sowers, an IT manager for other House Democrats was performing the necessary services for a quarter of the price that the Awan brothers were being paid. His offer to supply the same services to the 44 other Democrats was declined.
“There’s no question about it: If I was accused of a tenth of what these guys are accused of, they’d take me out in handcuffs that same day, and I’d never work again.
Even after the Awan brothers had been exposed, Clinton sycophant kept paying Imran Awan.
“I don’t know what they have, but they have something on someone. It’s been months at this point.” Something is rotten in Denmark.”
In early February of 2017, Rosiak had revealed:
The Daily Caller News Foundation Investigative Group has reported that while working for Congress, the Pakistani brothers controlled a limited liability corporation called Cars International A (CIA), a car dealership with odd finances, which took–and was unable to repay–a $100,000 loan from Dr. Ali Al-Attar.
Philip Giraldi, a former CIA officer, wrote that Attar “was observed in Beirut, Lebanon conversing with a Hezbollah official” in 2012–shortly after the loan was made. Attar has also been accused of helping provoke the 2003 U.S. invasion of Iraq as a leader of Iraqi dissidents opposed to Saddam Hussein.
Were reports of tens of millions of dollars flowing from foreign entities into the effort to elect Hillary Clinton true? If so, did Wasserman Schultz deliberately avoid maintaining cyber defenses on DNC servers so that those foreign entities could keep an eye on things?
Side note: Politico reported that Obama ordered the DEA to shut down a years long investigation into Hezbollah’s billion dollar a year cocaine trafficking and money laundering scheme within the United States that was poisoning Americans and using the money for terrorist operations.
The Manchurian president’s reason was to help ensure the Iran nuclear deal would stay on track. I’m sure the Mullahs appreciated that considering how freely they spend on Hezbollah’s terrorist operations.
It does make one wonder, though, what else Obama and his fellow Democrats were doing to curry favor with Iranian-backed terror organizations.
Then there’s the unsecure serve their chosen successor to “the chosen one” himself, Hillary Clinton maintained while she was Secretary of State and of which FBI Director James Comey admitted during his exoneration statement, was likely hacked by multiple hostile foreign countries.
With respect to potential computer intrusion by hostile actors, we did not find direct evidence that Secretary Clinton’s personal email domain, in its various configurations since 2009, was successfully hacked. But, given the nature of the system and of the actors potentially involved, we assess that we would be unlikely to see such direct evidence. We do assess that hostile actors gained access to the private commercial e-mail accounts of people with whom Secretary Clinton was in regular contact from her personal account. We also assess that Secretary Clinton’s use of a personal email domain was both known by a large number of people and readily apparent. She also used her personal email extensively while outside the United States, including sending and receiving work-related emails in the territory of sophisticated adversaries. Given that combination of factors, we assess it is possible that hostile actors gained access to Secretary Clinton’s personal email account.
It’s up to the reader, after having reviewed the entirety of that paragraph, whether the term hacked or the word shared would be more appropriate.
Then there’s former President Obama who has tried to remain detached from all of these scandals. That, however, doesn’t pass even basic logic.
There’s been no evidence that his Secretary of State, Hillary Clinton used an official State Department email. If that’s true, which email account did Obama use to communicate with his Secretary of State?
Unless they never communicated by email – the did – why didn’t anyone on the president’s cyber security team, or even President Obama himself, question the Secretary of State’s use of the unsecure private server system?
That raises another question. Was President Obama using Hillary’s unsecure server to conduct his own unsecured communications with hostile foreign entities?
Attorney General William Barr has loosely promised to reopen the Clinton email investigation.
Let’s hope he keeps his word and determines whether these are all isolated incidents or part of a larger conspiracy on the part of Democrats to aid our enemies.