INTEL TODAY DIARY — JUNE 18 2018

Trump’s personal lawyer, Michael Cohen, hires his own lawyer in Russia probe — London attack: UK was warned about third attacker — Advanced CIA firmware has been infecting Wi-Fi routers for years — Iran 1953 Covert History Quietly Released

Michael Cohen — Trump’s personal lawyer

Trump’s personal lawyer, Michael Cohen, hires his own lawyer in Russia probe — WaPo

MIAMI — Michael Cohen, who for years has served as President Trump’s personal attorney, has hired a lawyer of his own to help him navigate the expanding Russia investigation.

Cohen confirmed Friday to The Washington Post that he has retained Stephen M. Ryan, a Washington-based lawyer from the law firm McDermott, Will & Emery who has experience prosecuting criminal cases as an assistant U.S. attorney.

Cohen’s hiring of Ryan as his personal lawyer was first reported by Katy Tur of NBC News.

Cohen’s decision is the latest indication that the Russia probe overseen by special counsel Robert S. Mueller III is intensifying and could end up focusing on a number of Trump associates, both inside and outside the White House.

Michael Caputo, a New York-based political operative and radio commentator who served as a senior communications adviser on Trump’s campaign, also has hired a lawyer of his own to navigate the Russia probe.

Caputo has retained Dennis C. Vacco, a former New York state attorney general and a partner at the law firm Lippes Mathias Wexler Friedman. His hiring also was first reported by NBC’s Tur.

London attack: UK was warned about third attacker — BBC

One of the London Bridge attackers was able to enter the UK, despite being placed on an EU-wide watch list.

Youssef Zaghba, a 22-year-old Moroccan-Italian man who lived in east London, was named as the third attacker.

He was stopped at an Italian airport on his way to Syria last year and was put on an EU-wide database but was not prosecuted, reports say.

Zaghba, Khuram Butt and Rachid Redouane killed seven people and injured 48 others during the attack (…)

An Italian police source has confirmed to the BBC that Zaghba had been placed on a watch list, which is shared with many countries, including the UK.

In March 2016, Italian officers stopped Zaghba at Bologna airport and found IS-related materials on his mobile phone.

He was then stopped from continuing his journey to Istanbul.

The BBC understands he was not prosecuted but was listed on the Schengen Information System, an EU-wide database which includes details of potential suspects.

When Zaghba entered Britain, staff at passport control should automatically have been alerted by the Schengen system, BBC home affairs correspondent Danny Shaw said.

“One unconfirmed report suggests that did happen, apparently when Zaghba arrived at Stansted Airport in January – but that border staff still let him in,” he said.

When asked if this was the case, Work and Pensions Secretary Damien Green, a former Home Office minister, told BBC Radio 4’s Today programme that if someone’s passport comes up on the Schengen system the person should be stopped at the border.

“I obviously don’t know what happened in this case,” he said.

“It would be wrong to comment on an individual case while there is a very serious continuing police investigation going on.”

Advanced CIA firmware has been infecting Wi-Fi routers for years — ars Technica

Home routers from 10 manufacturers, including Linksys, DLink, and Belkin, can be turned into covert listening posts that allow the Central Intelligence Agency to monitor and manipulate incoming and outgoing traffic and infect connected devices. That’s according to secret documents posted Thursday by WikiLeaks.

CherryBlossom, as the implant is code-named, can be especially effective against targets using some D-Link-made DIR-130 and Linksys-manufactured WRT300N models because they can be remotely infected even when they use a strong administrative password. An exploit code-named Tomato can extract their passwords as long as a default feature known as universal plug and play remains on.

Routers that are protected by a default or easily-guessed administrative password are, of course, trivial to infect. In all, documents say CherryBlossom runs on 25 router models, although it’s likely modifications would allow the implant to run on at least 100 more.

Iran 1953 Covert History Quietly Released — Secrecy News

The Department of State yesterday released a long-suppressed volume of historical records documenting the role of the United States in the 1953 coup against the Iranian government of Mohammad Mosadeq.

“This retrospective volume focuses on the evolution of U.S. thinking on Iran as well as the U.S. Government covert operation that resulted in Mosadeq’s overthrow on August 19, 1953,” the Preface says. See Foreign Relations of the United States (FRUS), 1952-1954, Iran, 1951-1954.

“This volume includes National Security Council and Presidential materials that document the U.S. decision to proceed with the operation against Mosadeq, and the operational files within the Central Intelligence Agency (CIA) that document the implementation of the operation, codenamed TPAJAX.”

Some of the relevant records were destroyed long ago.

“The original CIA cables relating to the implementation of the covert action TPAJAX no longer exist. The original TPAJAX operational cables appear to have been destroyed as part of an office purge undertaken in 1961 or 1962, in anticipation of Near East (NE) Division’s move to the Central Intelligence Agency’s new headquarters.”

However, “Department of State historians obtained hand-typed transcriptions of microfilmed copies of these cables” and “twenty-one are published in this volume and an additional seven are referenced in footnotes.”

A small portion of the 1,000-page collection remains classified.

=

INTEL TODAY DIARY — JUNE 18 2018

This entry was posted in INTEL DIARY and tagged , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s