It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Education
University of Maryland - Robert H. Smith School of Business
University of Maryland - Robert H. Smith School of Business
Masters in Business Administration, Finance and Technology
2004 – 2007
Emory University
Emory University
BA, Political Science
1994 – 1998
Activities and Societies: "No Strings Attached" A cappella ensemble, Beta Theta Pi Fraternity - President
...
IT Director
Hillary Clinton for President
2006 – 2009 (3 years)
Advanced from providing technical engineering and support to directing the efforts of the campaign’s IT operations and logistics team. Headed the design and build of the campaign headquarters’ data center and orchestrated the continuous movement of technical equipment and staff among nationwide field offices in response to ever-changing organizational needs. Collaborated closely with the campaign’s chief financial and information officers to establish and manage IT budgets. Negotiated and provided oversight for contractor service agreements. Responsible for all aspects of core centralized and branch office IT infrastructure.
Let's leave the liar Guccifer out of the discussion. There is zero to back up his claimes and he's a braggart.
Phil Houston is CEO of QVerity, a training and consulting company specializing in detecting deception by employing a model he developed while at the Central Intelligence Agency. He has conducted thousands of interviews and interrogations for the CIA and other federal agencies. His colleague Don Tennant contributed to this report.
When Romanian hacker Marcel Lehel Lazar, also known as Guccifer, told NBC News senior investigative correspondent Cynthia McFadden that he had gained access to Hillary Clinton’s private email server, viewers worldwide were left to wonder whether his claim was true. Our analysis of Guccifer’s behavior in the interview left little doubt in our minds that—unfortunately—it was.
Let us be clear that in this case, the behavior available for analysis is quite minimal. Having said that, based on the lack of deceptive indicators exhibited by Guccifer in response to McFadden’s questions, we have concluded with a high degree of confidence that Guccifer was very likely successful in penetrating Clinton’s email server, as he claimed.
What remains unclear, however, is exactly what information resident in the server might have been compromised.
Guccifer told McFadden that Clinton had lied when she claimed her email server was absolutely safe—he stated categorically, “It’s not safe at all.” While we have concluded that that statement is likely truthful, and that Guccifer likely ascertained that himself, what we are unable to assess is whether or not he was able to access any classified information on the server. It’s equally unclear whether Guccifer was capable of identifying classified information, vs. unclassified information.
Our sense, based on Guccifer’s responses, is that there were some limitations to the access he was able to gain. We expect that as this story unfolds, and the investigation into Guccifer’s claims intensifies, U.S. authorities will identify those limitations—and exactly what vulnerabilities in the security of Clinton’s email server were identified by the Romanian hacker.
He would have kept copies of what he accessed. He would have waved that flag for everyone to see. He's a look what I did kind of guy.
Nothing to see there.
My qualifications? You've got to be kidding me right?
What the # are your qualifications? You can read?
Look at Guccifers modus operandi. He hacks he brags he shows. He hacks he brags he shows.
"It was not what I was looking for," he sniffed. "It was boring stuff."
QVerity’s training operation is staffed by former U.S. intelligence officers who are recognized worldwide for their experience in providing training in information-collection methodologies for government agencies, law enforcement entities and private corporations. Our core training program consists of the following modules, which are applicable to any industry, and have proven to be of significant benefit to a wide variety of corporate and public-sector enterprises.
Detection of Deception
The Detection of Deception course is a proprietary, interactive module based on proven intelligence-gathering techniques, and is designed to teach participants to detect deception in all forms of communication. All behaviors that participants are taught to recognize are cross-cultural and gender-neutral, so these techniques are effective in all parts of the world. Participants learn to identify verbal and non-verbal behaviors indicative of deception or lack of confidence, enabling them to focus on areas of concern during their interviews. Participants also learn how to incorporate their detection of deception skills into their existing interviewing and information-collection styles and methods.
What's really important is I'm right and you are wrong.