• Text smaller
  • Text bigger

A newly de-classified FBI document confirms that Attorney General
Janet Reno appointed Webster Hubbell to a secret computer chip project
intended to bug America.

The document, a 1993 letter from FBI Director William Sessions to
Reno, was obtained from the Department of Justice using the Freedom of
Information Act (FOIA).

The FBI letter to Reno states: “During the June 30, 1993, meeting
with the National Security Council staff to discuss the status of the
Presidential Decision and Review Directives concerning key-escrow
encryption technology and telecommunications trends, which was attended
by Associate Attorney General Webster Hubbell, the issue of a
recommended solution to the law
enforcement access problem, or the digital telephony issue, was
discussed.”

The Department of Justice withheld many of the documents seen by
Hubbell, including a secret report from the FBI on “Requirements For the
Surveillance of Electronic Communications.”

The June 30, 1993, letter from Sessions to Reno states that the
Whitewater figure attended a secret White House briefing on U.S.
computer chip policy. In 1993, President Clinton considered mandatory
legislation for a special computer chip called “Clipper” to be
manufactured into all U.S. computers. According to a secret FBI report
from 1992, the Clipper chip contained a “exploitable feature” which
allowed the federal government to intercept and decode computer
communications.

The letter proves Reno appointed her trusted Assistant Attorney
General Hubbell to oversee the secret National Security Agency (NSA)
encryption chip project in 1993. According to documents obtained using
the Freedom of Information Act, Hubbell attended at least one other
meeting at the National Security Agency headquarters in May 1993, along
with White House lawyers Vince Foster and Bernard Nussbaum.

Reno has been heavily involved in the making of computer security
policy of interest to China since 1993. She has also supported a view to
monopolize the computer security industry under the federal government.

One 1996 CIA report noted that Reno wanted to monitor all American
domestic computer communications such as e-mail, using a technique to
secretly intercept and decode any messages. According to CIA Director
John Deutch, the government would mandate all computers be equipped with
a special “back-door” system called “key recovery.” Federal agents would
use a secret “key” to secretly enter a back door and read any computer
communication.

According to the 1996 report to Vice President Al Gore by Deutch,
Reno proposed an all out federal take-over of the computer industry. The
Justice Department, proposed “legislation that would … ban the import
and domestic manufacture, sale or distribution of encryption that does
not
have key recovery.”

Prime targets for monitoring would be foreign governments, banks,
corporations, and individuals opposing the Clinton administration. The
keys were to be held by “key recovery agents” licensed by the Commerce
Department.

According to congressional investigators, documents from Hubbell’s
personal schedule for 1993 show that the Whitewater figure met multiple
times at the White House on a top-secret computer chip project called
Clipper. Hubbell met with then-National Security Council adviser George
Tenet. Tenet is
currently the director of the CIA.

According to Tenet’s secret White House e-mail, Ron Brown insisted
that the Commerce Department be one of the key holders or be in charge
of licensing key holders.

Hubbell resigned from the Justice Department in April of 1994. In
late June 1994, Lippo boss James Riady met with John Huang and Bill
Clinton during five days of White House visits. Early the next week, a
Lippo unit paid Hubbell about $100,000.

In December 1994, Hubbell pled guilty to several felony charges
relating to illegal billing in the Whitewater affair. Webster Hubbell
also cited his Fifth Amendment rights to not testify before the Senate
hearings.

Two weeks after the Lippo money was given to Hubbell, John Huang got
his job at the Commerce Department as assistant secretary. Huang’s
position determined technology transfers that went to places such as
Indonesia and Communist China. Huang and his wife, Jane, have taken the
Fifth Amendment.

As a Commerce official, Huang, a fund-raiser for the Democratic
National Committee and employee of the Lippo Group, was briefed 37 times
on encryption communications by the CIA. Immediately after each
briefing, Huang would walk across the street to the Lippo/Stephens Group
offices and make long distance phone calls and send faxes to points
unknown.

Key recovery or key escrow is a government back door system designed
to secretly monitor computers. Key recovery has a big downside,
according to a former top Clinton official. Key recovery can be abused
by foreign powers to perform economic espionage against the U.S. or
worse, to monitor political opponents around the world.

“Can key recovery be used against dissidents and political
opponents?” questioned Admiral William McConnell, the former National
Security Agency director under President’s Bush and Clinton. “In a word,
YES.”

Admiral McConnell is considered the father of the Clipper chip.

Hubbell’s role in Clipper raises the specter of economic and military
espionage at the highest level — Orwellian computer chip technology
abused by oppressive foreign governments, targeting their citizens and
Americans around the globe.

In fact, it was the “exploitable” feature of Clipper that worried
U.S. government officials. The FBI director wrote two major papers to
Clinton NSC adviser Tenet early in February of 1993. The FBI documents
reveal that Clipper had flaws which could compromise all the computers
so equipped.

The FBI director wrote: “This design means that the list of chip keys
associated with the chip ID number provides access to all Clipper
secured devices, and thus the list must be carefully generated and
protected. Loss of the list would preclude legitimate access to the
encrypted information and compromise of the list could allow
unauthorized access.”

The Clipper flaw worried other U.S. government officials. NASA
decided to decline to use any Clipper device. In 1993, Benita A. Cooper,
NASA associate administrator for management systems and facilities,
wrote: “There is no way to prevent the NSA from routinely monitoring all
encrypted traffic. Moreover, compromise of the NSA keys, such as in the
Walker case, could
compromise the entire system.”

Cooper referred to Soviet spy John Walker, who is serving life in
prison for disclosing U.S. Navy secret codes. In 1993, Cooper did not
know of Lippo, Huang, nor Hubbell but her prophetic prediction was not
so remarkable in retrospect.

The role of Hubbell and Hillary Rodham Clinton at the Rose Law Firm
goes much deeper than the Whitewater land fraud. During the 1980s, Mrs.
Clinton and Hubbell worked on a secret NSA project for a Rose client.
This, too,
is also clearly documented by FOIA request. Mrs. Clinton, Hubbell and
Vince Foster worked on a NSA contract for Systematics of Arkansas, a
firm then owned by Riady partner Jackson Stephens.

Nor is the involvement of the Riadys, Huang, Hubbell, Foster and Mrs.
Clinton in a White House scandal a conspiracy theory. In 1993, the
Arkansas travel firm Wide World Travel was selected by Hillary Clinton
to replace the illegally fired Presidential Travel Office staff. Wide
World Travel was then owned by the Lippo Group.

The new FBI letter is clear evidence that Reno is in conflict of
interest. She is NOT investigating the penetration of Chinese military
agents inside the Clinton White House. A real investigation of the
Chinese intelligence operations involving advanced U.S. secure
communications should involve
Hubbell, Reno, Bill Clinton and the first lady.

However, no FBI agent wishing to keep his job will show up at Reno’s
door to ask questions — much less try to interview Mrs. Clinton. Reno
can only avoid charges of direct conflict by immediately appointing an
independent counsel to investigate possible treason by the president of
the United States.


  • Text smaller
  • Text bigger
Note: Read our discussion guidelines before commenting.