The Front Page Cover
 2016             The turth is the gold of today 
Featuring:
US, Britain -- under a secret 
program called 'Anarchist' -- hacked into 
feeds from Israeli drones and fighters
Dan Lamothe
.
~~~
.
New UN Climate Czar Will Make America
Pay For Complacency
 Rick Wells
.
.
{constitutionrising.com} ~ The UN is attempting to keep the momentum going of the climate fraud summit of last December. Nobody’s been indicted, particularly the most vulnerable of criminals in the United States... They’re safe for now, the Americans and the rest of the world are asleep. The green light for the green fraud is on; put the pedal to the floor. With the success of pushing their Marxist agenda upon the unaware global population, the UN has now established a senior adviser for the climate scam. An article on the UN website quotes that person, Janos Pasztor, as declaring the “climate agreement” to already be a “decisive turning point.” In typical UN fashion, he doesn’t offer any explanation as to why that might be the case, just a proclamation that it is. UN royalty doesn’t explain themselves. They aren’t to be challenged. He said, “Much has been happening since Paris – the World Meteorological Organization (WMO) confirmed that 2015 was the hottest year on record, not just by a little but by a lot.”
.
Conservatives Oppose Mass
Criminal Release
Cliff Kincaid
.
.
{aim.org} ~ With the presidential race the focus of most of the media attention, a major division among Senate Republicans over so-called “criminal justice reform” has gotten little attention... But the liberal media are now beginning to notice that conservatives are mounting a campaign to stop a piece of legislation that has been advertised as a major part of President nObama’s left-wing legacy. The Sentencing Reform and Corrections Act (S. 2123) would release thousands of criminals back on the streets at a time of rising crime rates, in the name of reducing what liberals call “mass incarceration.” In a major story on the new developments, The New York Times noted that the effort to pass the bill “has been driven by an unusual right-left alliance that includes the conservatives Charles G. and David H. Koch and the American Civil Liberties Union,” but that Senator Tom Cotton (R-AR) has now taken a strong leadership role against the bill.        http://www.aim.org/aim-column/conservatives-oppose-mass-criminal-re...
.
22 Clinton Emails Withheld Because Release
Would Be ‘Too Damaging’ 
to National Security
Andrew McCarthy
.
.
{aim.org} ~ News outlets are reporting that the State Department is withholding 22 emails that were transmitted through and stored on Hilly Clinton’s private server because the Intelligence Community has determined that releasing any part of them – i.e., even redacted versions—could be gravely damaging to national security... Fox News’s Catherine Herridge and Pamela Brown report that the emails in question include intelligence from “special access programs” (SAP), among the most closely guarded information in the intelligence community—the kind of information whose exposure can destroy vital intelligence collection programs and reveal the identities of intel operatives, potentially putting them in grave danger. To get a sense of the level of sensitivity we are talking about here, recall that the State Department has already released, in redacted form, some 1340 Clinton emails containing classified information. With those, it was concluded that any risk could be eliminated by redacting the sensitive information whether the substance of the intelligence or the methods and sources by which it was obtained. With the 22 at issue, by contrast, the intelligence is deemed to be of such magnitude that no part of the emails could be disclosed. If this is the case, then she should be indicted no matter what she says.   http://www.aim.org/guest-column/22-clinton-emails-withheld-because-...
.
Tech-challenged Pentagon searches 
for a Silicon ally
 Mackenzie Eaglen
.
Col. Gregory Jones, commander, 129th Rescue Wing, says farewell to Secretary of Defense Ash Carter as Carter departs Moffett Field, Calif., Aug. 29, 2015, following a trip to California. Department of Defense 
.
{aei.org} ~ Silicon Valley is a popular destination for the feds lately. President nObama’s intelligence team trekked there last month to ask for help defeating Islamic State’s propaganda on social media... Less noticed has been the steady parade of Pentagon leaders heading west. Last summer the Pentagon leased 12,000-square feet of Class A real estate in Sunnyvale for a new office: the Defense Innovation Unit-Experimental. Why? Commanders are worried about the accelerating erosion of the American military’s technological superiority. They believe Silicon Valley’s talent and tech can restore agility and innovation. But Defense Secretary Ash Carter faces two challenges. The first is getting Americans and their elected representatives to recognize the technological stagnation. Today almost none of the new military equipment coming online is revolutionary in design or technology; most is merely an upgraded version of something from the Cold War. A half-century ago, the Pentagon had more than a dozen combat aircraft in development. Last year it had only the late and overbudget F-35 and a new bomber. The American public believes its military is No. 1, but its commanders and its enemies increasingly know differently.        http://www.aei.org/publication/tech-challenged-pentagon-searches-fo...
.
Clinton Had Plans to Use 
Hidden IT Network to Bypass 
State Department Rules
Kemberlee Kaye
.
.
{legalinsurrection.com} ~ Judicial Watch obtained records that could implicate State Department officials in Hilly Clinton’s ongoing email scandal... According to those records, State Department officials planned to provide Clinton with a non-DOS computer. In the email chain, Lewis Lukens, former deputy assistant secretary of state and executive director of the secretariat, responds to a request from Mills by informing her, top Clinton aide Huma Abedin, and Kennedy that the new personal computer “in the secretary’s office” would be “connected to the internet but not through our system.” Abedin responds, “We are hoping for that if possible.” The email exchange discussing plans to provide Clinton a separate computer to skirt the internal State Department computer network begins with a message from Mills to Lukens in which she requests Clinton being able to access her emails through “a non-DOS computer.” The email discusses how the stand-alone computer can be set up and why it is “a great idea’ and “the best solution:”
.
Hamas: The "Merchants of War" Who 
Seek to Destroy Israel
Khaled Abu Toameh
.
In the words of Hamas leader Ismail Haniyeh (left), the tunnels Hamas digs from Gaza into Israel (right) are not only to "defend the Gaza Strip, but to serve as a launching pad to reach all of Palestine."
.
{gatestoneinstitute.org} ~ The myth that Hamas uses tunnels to smuggle food and other necessities to the "besieged" Gaza Strip has been buried under the rubble of the tunnel that collapsed last week east of Gaza City... The incident, in which seven members of Hamas's armed wing, Ezaddin Al-Qassam, were killed when the tunnel they were working in collapsed, provides further proof that the Islamist movement has stayed true to its charter, which calls for the total destruction of Israel. The Hamas men who were killed in the tunnel collapse belonged to the movement's elite "Tunnel Unit." According to Ezaddin Al-Qassam, the men were busy repairing one of the tunnels damaged during the 2014 war with Israel when it collapsed due to severe weather conditions. Contrary to popular belief, the tunnel was not being renovated to allow Palestinians to smuggle basic goods from Egypt to the Gaza Strip. This was one of many tunnels that Hamas has dug over the past few years to infiltrate Israel and carry out terror attacks.      http://www.gatestoneinstitute.org/7352/hamas-tunnels-war
.
‘I Take Classified Information Seriously,’ Boasts Hilly Clinton, Despite Evidence
 JOHN HAYWARD
.
.
{breitbart.com} ~ “I take classified information seriously,” Hilly Clinton declared on CNN. “People are selectively leaking and making comments that have no basis in anything I’m aware of.”... Doubling down on this is shrewd politics, because Clinton’s guilt has been laid bare by the latest round of email revelations. Her hope now is for pure political immunity, making herself too big to prosecute by sewing up the Democratic presidential nomination. Her highest priority is to reassure nervous Democrat voters and power brokers that she’ll survive the email scandal. There is no real question that she violated security protocols, repeatedly, and a strong case to be made that she put lives in danger by doing so.  
.
Mystery Surrounds Muslim Cleric
in U.S.Mountain Compound
.
.
{cbn.com} ~ The influential Muslim cleric lives quietly on a gated 26-acre compound in the Pocono Mountains, where he prays, works, meets admirers and watches from afar as terrorism accusations that have landed him on Turkey's most-wanted list unfold in court... Rarely seen in public, Fethullah Gulen has long been one of Turkey's most important scholars, with multitudes of followers in his native country and around the world. More recently, Turkey's increasingly autocratic president, Recip Erdogan, has accused Gulen of plotting to overthrow the officially secular government from his Pennsylvania idyll some 5,000 miles away. Gulen's supporters call the charge baseless and, so far, the U.S. has shown little inclination to send him back to Turkey to face a trial that began without him Jan. 6 and is expected to last several months. A second trial, involving accusations that his movement took part in espionage, opened Monday. If the reclusive leader worries about the possibility of deportation, he hasn't shared it with confidants, they say.        http://www1.cbn.com/cbnnews/us/2016/February/Mystery-Surrounds-Musl...
.
Intelligence Official Confirms, 
Hilly Emails Put Live at Risk
Jeff Dunetz
.
.
{lidblog.com} ~ Fox News’ Catherine Herridge who has been at the forefront of exposing the severity of the security risks from Hilly Clinton’s use of a private non-secure server while secretary of state, has done it again... Herridge is now reporting that those emails deemed to damaging to release even on a redacted basis, which she revealed on Friday, “contain ‘operational intelligence’ – and their presence on the unsecure, personal email system jeopardized “sources, methods and lives,” a U.S. government official who has reviewed the documents told Fox News.” The official could not discuss the specific contents of the emails but confirmed the description given to Herridge referred to the 22 top secret emails that the State Department announced Friday could not be released in any form, even with entire sections cut out. The U.S. government official’s description provides confirmation that the emails contained closely held government secrets. “Operational intelligence” can be real-time information about intelligence collection, sources and the movement of assets.
.
Clinton’s Technological Ignorance 
is a Problem
{fixthisnation.com} ~ According to a newly-released email from 2009, incoming Secretary of State Hilly Clinton did “not know how to use a computer to do email” at the time. The email, which originated from State Department official Lewis Lukens, appeared to be in response to Clinton’s chief of staff, Cheryl Mills... Mills had earlier worried that Clinton’s inability to use anything other than her Blackberry might be a “problem.” In the email, though, Lukens seems unconcerned. He wrote that it “would not take much training to get her up to speed.” Of course, as The Hill points out, there’s no evidence that Clinton ever did figure out how to use her computer to “do email.” She has said that she never had a computer in her State Department office, apparently content to use her mobile devices as her sole method of electronic communication. Now, the Clinton staff will probably use this story as a way of reinforcing their claim that the former secretary rarely used email at all. Or they will use it as a way of showing Clinton as being technologically incompetent, as though that’s an excuse for her wanton disregard for informational security. It’s a little like her “wipe the server” comment a few months ago, where no one could quite figure out whether or not she was joking. Increasingly, it looks like she really thought “with a cloth?” was a relevant answer.
.
.
US, Britain -- under a secret 
program called 'Anarchist' -- hacked into 
feeds from Israeli drones and fighters
Dan Lamothe
.
.
{jewishworldreview.com} ~ The United States and Great Britain combined to hack into Israeli drone and fighter jet surveillance feeds as part of secret program that in part watched for a potential Israeli military strike against Iran, according to a new report published along with corresponding photos.
.
The Intercept reported that the secret program was called "Anarchist." It was carried out by Britain's Government Communications Headquarters, or GCHQ, and the National Security Agency from a mountaintop Royal Air Force base in Cyprus, according to report.
.
"GCHQ files provided by former NSA contractor Edward Snowden include a series of 'Anarchist snapshots' - thumbnail images from videos recorded by drone cameras," The Intercept reported. "The files also show location data mapping the flight paths of the aircraft. In essence, U.S. and British agencies stole a bird's-eye view from the drones."
.
An Israeli official downplayed the significance of the report on Friday, telling the Israeli news service Haaretz the revelations weren't "very dramatic." Israeli military operations were not harmed in the process, the source told Haaretz, adding that "it goes without saying that foreign intelligence elements in the Middle East detect our operations, just like we detect the operations of other states in the region."
.
Officials at the NSA couldn't immediately be reached for comment, and have historically declined to comment on classified programs.
.
Anarchist was first started in 1998, according to The Intercept. It occasionally hacked into the feeds of drones operated by Syria and Hezbollah, but the bulk of the effort was focused on Israel, which has long had a complicated relationship with the United States when it comes to spying and intelligence collection. A summary of the CIA's budget, also released by Snowden, notes that Israel is a "priority" target for U.S. counterintelligence operations. Although allies, the United States and Israel have a history of spying on one another.
.
Photographs from the program appear to show Israeli drones equipped with missiles. Israel has long declined to discuss the arming of any of its unmanned aircraft, saying they are used for surveillance and to mark targets so that fighter jets and others manned aircraft can carry out airstrikes.
.
A 2008 British military document quoted by The Intercept suggested the Anarchist program was "indispensable" for maintaining an understanding of Israeli military operations and gaining insight into possible future developments in the region.
.
"In times of crisis," it said, "this access is critical and one of the only avenues to provide up to the minute information and support to U.S. and Allied operations in the area."
.
Military technology experts do not consider hacking into a video feed from a manned jet or drone to be difficult. In 2009, for example, U.S. defense officials acknowledged in media reports that Iranian-backed militants in Iraq had used off-the-shelf software costing about $26 to hack the video feeds of Predator drones.
.
Air Force officials said that year that they were working toward encrypting all feeds by 2014. It is not clear if that has occurred.
.

Views: 24

Comment

You need to be a member of Tea Party Command Center to add comments!

Join Tea Party Command Center

LIGHTER SIDE

 

Political Cartoons by AF BrancoPolitical Cartoons by Tom Stiglich

Political Cartoons by AF Branco

ALERT ALERT

Angry Dem Impeachment ‘Witness’: Pam Karlan Donated Thousands To Hillary And Was On Clinton’s List For Potential SCOTUS Nomination

Image result for Pam Karlan

The House Judiciary Committee, chaired by Rep. Jerrold Nadler, kicked off its first impeachment circus Wednesday morning.

The four ‘witnesses’ testifying have never actually witnessed any of Trump’s dealings with Ukraine firsthand — the four witnesses are law professors offering legal analysis.

One of the witnesses the Dems rolled out is an angry Hillary Clinton donor who was on Crooked’s list for a potential Supreme Court nomination.

No wonder why this unhinged, dowdy woman is so pissed off!

“Professor Pam Karlan donated thousands of dollars to Democrats and was on Hillary Clinton’s list for a potential Supreme Court nomination. So she certainly has no vendetta against President Trump,” GOP Rep. Mark Walker said.

Congressman Walker also pointed out that Noah Feldman, the Dems first partisan witness in Wednesday’s hearing tweeted about impeaching Trump right after he was sworn in.

Rep. Mark Walker   RepMarkWalker

Meet Noah Feldman, House Democrats first partisan witness.

Look at the date of this tweet. He has been trying to get @realDonaldTrump impeached since 46 days into his presidency.

His reason? Trump criticized President Obama.

This is a sham impeachment with sham witnesses. https://twitter.com/NoahRFeldman/status/839185127494254592 

Noah Feldman @NoahRFeldman

Trump's wiretap tweets raise risk of impeachment http://bv.ms/2mY1ueX  via @BV

Rep. Mark Walker   RepMarkWalker
 

The next witness, Karlan, has donated thousands to Democrats and was on Hillary Clinton’s list for a potential Supreme Court nomination.

So she certainly has no vendetta against @realDonaldTrump.

These witnesses are as serious as House Democrats impeachment case: not at all.

The entire sham show trial is stacked with partisan hacks who have wanted to impeach Trump from the moment he won in November of 2016.

Norm Eisen, the Democrats’ counsel who is blasting Trump and questioning witnesses in Wednesday’s show trial, tweeted about impeaching Trump before Donald Trump was even sworn into office!

Infantilization of Popular Culture

© 2019   Created by Steve - Ning Creator.   Powered by

Badges  |  Report an Issue  |  Terms of Service