It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
So it is extremely disconcerting. All of us have to hire people to
help us with our jobs, and most all of us need computer assistants. I
can't help but reflect back, there is a new policy last year that was
instituted that requires every employee that may have access to the
computer systems, the massive databases and emails of Members, such
confidential information, they need a background check, but at the same
time, there was the requirement that had to be certified by the Member
or the administration officer in a congressional office, you either
certify that this person has had the required background check to be
allowed to access this confidential information on computers in the
congressional offices. Some of these Members were part of the
Intelligence Committee having access to top secret information. So this
is quite serious.
There was another--there were two possibilities. One, you certify
this person had the proper background check done. And, number two--it
was an ``or in the alternative''--if this person works for more than
one person--which computer personnel often do because you don't need
them full-time, you just need them when something goes wrong or perhaps
when they're needing to break into your computer and steal your data--
you could sign and certify that this person works for more than one
Member of Congress. Therefore, I don't believe the background check is
necessary.
So I hope all of my colleagues will make note that there may be
people on the Hill that don't have the best intentions with our
computer data, including access to classified information. So no matter
who they are, even if somebody is worried, because of their background
or where they were born, that somebody might scream bias or prejudice,
we just need to have everyone who has access to classified information
to have a background check even if they work for multiple people. We
just need to do that. Lessons, apparently, are still being learned in
that regard.
The letter was asking for funding concerning security clearances for authorization to access Top Secret Sensitive Compartmented Information Security (TS/SCI). It is known that three members of the intelligence panel and five members of the House Committee of Foreign Affairs were among the dozens of members that had employed them, and signed the letter asking for the funds.
...
The SCIF Room holds highly classified information. You are never allowed to take a computer, phone, anything able to capture information into this room. The only computers allowed in this room are ones that conform to rules established by ICD 503. According to en.em.wikipedia.org: Computers operating within such a facility must conform to rules established by ICD 503. Computers and telecommunication equipment within must conform to TEMPEST emanations specification as directed by a Certified TEMPEST Technical Authority (CTTA).
Al-Attar fled the United States after the indictment to avoid arrest and imprisonment and is now considered a fugitive from justice. Late in 2012 he was observed in Beirut, Lebanon, conversing with a Hezbollah official. Al-Attar is of interest in this case because he appears to have been a friend of Imran Awan and also loaned him $100,000, which was never repaid. The FBI is currently looking into any possible espionage involving the two men as Awan and his associates clearly had access to classified information while working in the House of Representatives.
Isn't it strange how every rabbit hole digs up a Clinton eventually.
originally posted by: IAMTAT
Meet Hillary's IT 'Blackberry' phone guy Asad (Asadullah) Yousof (Red hoodie).
Is he connected to the Awans?
originally posted by: Krazysh0t
originally posted by: IAMTAT
Meet Hillary's IT 'Blackberry' phone guy Asad (Asadullah) Yousof (Red hoodie).
Is he connected to the Awans?
How about you tell us instead of asking vague and leading questions trying to spur people to jump to certain conclusions?
originally posted by: IAMTAT
originally posted by: Krazysh0t
originally posted by: IAMTAT
Meet Hillary's IT 'Blackberry' phone guy Asad (Asadullah) Yousof (Red hoodie).
Is he connected to the Awans?
How about you tell us instead of asking vague and leading questions trying to spur people to jump to certain conclusions?
How about you do some research and find out for yourself, since you're apparently interested in the answers?
originally posted by: Krazysh0t
originally posted by: IAMTAT
originally posted by: Krazysh0t
originally posted by: IAMTAT
Meet Hillary's IT 'Blackberry' phone guy Asad (Asadullah) Yousof (Red hoodie).
Is he connected to the Awans?
How about you tell us instead of asking vague and leading questions trying to spur people to jump to certain conclusions?
How about you do some research and find out for yourself, since you're apparently interested in the answers?
I did. I read the link you provided and the conclusion I reached was no. You are just muddying the waters with tabloid level reporting (ask a question with the obvious answer of no just to obfuscate the issue).
originally posted by: IAMTAT
originally posted by: Krazysh0t
originally posted by: IAMTAT
originally posted by: Krazysh0t
originally posted by: IAMTAT
Meet Hillary's IT 'Blackberry' phone guy Asad (Asadullah) Yousof (Red hoodie).
Is he connected to the Awans?
How about you tell us instead of asking vague and leading questions trying to spur people to jump to certain conclusions?
How about you do some research and find out for yourself, since you're apparently interested in the answers?
I did. I read the link you provided and the conclusion I reached was no. You are just muddying the waters with tabloid level reporting (ask a question with the obvious answer of no just to obfuscate the issue).
So just reading the link I posted is what you consider doing your own research?
Explains a lot.
originally posted by: butcherguy
a reply to: IAMTAT
Interesting.
The guy on the right side of the photo was a gamer known as Fishstickz, and he was the one that told Podesta that the phishing email was a valid email and go ahead and click on it.
She obviously vetted her staff carefully.
originally posted by: ketsuko
a reply to: IAMTAT
Brief interlude to pause and give a moment of silence for the brave couch that gave its life for her ... is that a blazer? Mandarin coat? Extremely stiff tunic?