The Deep State’s Total Control with Beijing as the Mother of Managers

 

A Status Review

The good news is that our Mother of Managers, RED China, continues to franchise its “One World, One Dream” surveillance and control solution based on its own Golden Shield initiative which produces “Happy Populations and Consumers” that our actuarily our LRUs for predictable profit margin percentages.

Even though Hillary missed her moment again, Diane and her driver, Nancy, the FBI, DOJ, State, NSA, and “Central” have been very helpful.

On the downside, NAFTA and the TPP were exposed, however, the drug trade, human trafficking, and organ harvesting ventures are thriving. Others should implement the “Planned Parenthood” disguise.

Also, the Village Idiots have still not figured out the pretext and goal of Arab Spring, and we really cut it close with The Thing from 1890’s, SSN # 042-68-4425, fake war on Libya and used the crisis to expand our pretext of the Global War on Terror into Europe to ultimately benefit RED China’s loan sharking and total control blueprint.

Syria was never on the Arab Spring list, but we also turned it into an opportunity for “Sustainable Development Wherever the UN Goes or Doesn’t Go When It Ideally Should” with less people as we did with Bosnia, Rwanda, Somalia etc.

Trump like Reagan has interrupted the implementation of the blueprint, but we have some plans and eventually one will work to get the implementation back on track as we are so very close. The good news is Americans are getting dumber by the minute as well as being crushed with debt while thinking their “schooling” is giving them the skill sets for financial success while we have put all the roadblocks in place to prevent that from happening thanks to all our puppets in the U.S. Congress. Eventually they will succumb to the bait of free stuff and be totally dependent on us.

Eventually, with the success of RED China’s “One World, One Dream” solution, we will be able to overcome any resistance to our plan via its built in hostage taking and extortion. RED China’s partnership with NSA and “Central” has made good use of this in America. We must continue on this path and someday very soon all will wake up from The Dream and realize it is not their Dream but our Dream and they will not be able to do anything about it when it becomes their nightmare for our benefit.

Once again, election seasons are coming up again, and we must focus on placing more Emirs into our future areas of control so that we can remove all aspects of resistance. We must make Eichmann proud!

 

 

Editors Note: Farming, Mining, and Management of The Human Kind : The pretext of altruistic endeavors that just suddenly become predatory and parasitic.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

The Blueprint for RED China’s One World One Dream:

How Arab governments use cyberspace laws to shut down activism

Critical Arab voices are being silenced on Twitter, and laws across the Middle East are created to further this cause.

by Yarno Ritzen
25 Jul 2019

In this series of articles, Al Jazeera examines how Twitter in the Middle East has changed since the Arab Spring. 

Government talking points are being magnified through thousands of accounts during politically fraught times and silencing people on Twitter is only part of a large-scale effort by governments to stop human rights activists and opponents of the state from being heard. 

For human rights activists, journalists, dissidents and free speech campaigners, social media has long been a double-edged sword, representing both the positive and harmful aspects of open communication on the internet.

On the one hand, platforms such as Twitter and Facebook allow activists the opportunity to spread their message, reaching an audience they could only dream of before the internet.

But on the other, the nature of open communication raises the risk of being followed, exposed or worse, as some governments increase their digital surveillance capabilities.

As a result, governments around the world are turning social media against their citizens.

China is the country where government control of the internet is by far the most egregious, but many countries in the Middle East are not far behind when it comes to using the internet against those who fight for a more open society, the annual Freedom of the Net report by Freedom House concluded.

Mohamad Najem, executive director at Beirut-based SMEX, a digital rights organisation focusing on issues related to freedom of expression, online privacy and safety, said social media movements had taken the Middle East by surprise and governments adapted relatively quickly, using social media against protesters and civil rights activists.

Over the last decade, SMEX has tracked how the use of social media platforms like Twitter, both by activists and governments, has changed.

“In 2011, access to these tools was still kind of new and governments underestimated them,” Najem told Al Jazeera.

Meet the activists fighting the Great Chinese Firewall

Social media allowed people in the Middle East to voice their concerns and question those in power.

During the Arab Spring, protesters were able to organise on social media, a tool that connected their realities with the rest of the world.

But governments were watching, too, and continue to closely monitor.

“Between the Arab Spring and now, we have witnessed that all the countries in the region are moving more and more towards criminalising speech,” Najem told Al Jazeera.

“The online sphere we used to go to in the Middle East to express ourselves, to talk about politics, has started to close down slowly because of all these regulations,” he added.

“People were prosecuted, thrown in jail, or they had to flee the country.”

To show what laws Middle East governments have introduced in recent years, SMEX launched Cyrilla, a website listing all proposed and passed legislation aimed at curbing free speech.

The database, which offers texts in Arabic and English and covers the entire region, shows clearly how digital liberties in the Middle East have come under attack.

Between the Arab Spring and now, we have witnessed that all the countries in the region are moving more and more towards criminalising speech.

MOHAMAD NAJEM, SMEX

It also lists several countries outside of the Middle East, including RussiaVietnam and Fiji.

“Across the Middle East, there is a large number of countries that have specifically instituted anti-terrorism and cybercrime laws that contain vague prohibitions on free speech,” Jillian York told Al Jazeera.

York is the Berlin-based director for international freedom of expression at the Electronic Frontier Foundation (EFF), which aims to protect civil liberties in the digital world.

Egypt, Jordan, Saudi Arabia, Tunisia, UAE, Qatar; all these countries have instituted cybercrime laws and in most cases, the laws are vague – quite broad,” she said.

As an example, York cited Saudi Arabia’s counterterrorism legislation from 2014, which criminalises defamation of the state and defines calling for atheist thought as a “terrorist” action.

Recently, prominent Norway-based pro-democracy activist Iyad el-Baghdadi, a Palestinian who has been outspoken in his criticism of Saudi authority figures, made a plea for his safety after US intelligence agency CIA found a credible threat to his life from authorities in the kingdom.

El-Baghdadi is behind The Arab Tyrant Manual, which focuses on global authoritarianism and the struggle for democratic liberties in the Arab region. He is also a fellow at Civita, a leading liberal think-tank in Norway, where he sought asylum after he was forced to leave his home in the United Arab Emirates in 2015.

İyad el-Baghdadi | إياد البغدادي

@iyad_elbaghdadi

Spare a thought for all the dissidents, activists, journalists, and private citizens in the Arab world who get beaten, arrested, tortured, murdered without being passed tips and without being offered protection. They are the real heroes, and they are the real victims. Not me.

54 people are talking about this

But it is not just Saudi Arabia, as documented by organisations including Amnesty International and the Gulf Centre for Human Rights show.

Governments in the Middle East have started using platforms such as Twitter as amplifiers, using both automated bot accounts and well-known social media influencers to promote state-approved messaging, Najem said.

So, while activist voices are being drowned out by government-approved messages, sometimes amplified by fake Twitter accounts, campaigners also risk being jailed or are forced to leave the country because of newly implemented cybercrime or “antiterrorism” laws.

Last April, Saudi Arabia arrested three bloggers without giving any reasons for their arrest.

Similarly, the Turkish government cracked down hard last year on Twitter users who used the platform to voice their criticism of the Turkish military operation in northern Syria, claiming they were spreading “terrorist propaganda”.

The UAE, meanwhile, made it a criminal offence to show support for Qatar in the ongoing GCC crisis, claiming people who did so violated the federal decree on Combating Information Technology Crimes, possibly facing a jail term from three to 15 years, and a fine not less than 500,000 dirhams ($136,000).

According to both Najem and York, it is not just governments that are to blame for the crackdown on activists.

Part of the responsibility falls on social media companies for failing to address the issue of automated propaganda accounts and willingly helping governments in the region.

“One of the challenges with companies like Twitter – and most tech companies – is that they are based in Dubai. This is an issue because this is a country that has no respect for human rights, which means they have no respect for digital rights either,” Najem told Al Jazeera.

“We have a problem that all these companies that are being used for free speech, such as Twitter, are based in the Gulf. These are countries that are not signatory of the International Covenant on Civil and Political Rights, so Article 19 of The Universal Declaration of Human Rights [giving everyone a right to freedom of opinion and expression] is not part of their mandate and freedom of expression is not something they care about.”

To add, York explained, the opaque deals these companies make with governments lead to more censorship, which is often hard to notice.

I think Twitter and all these other companies are responsible for when they say ‘yes’ whenever an authoritarian country comes to them to ask to censor certain speech.

JILLIAN YORK, EFF

“Governments sort of wisened up and, due to a number of other factors, they began instead utilising these companies to do this censorship for them,” she said.

“This is a more palatable form of censorship for the people because they don’t notice what is missing. Instead of getting an error page when you visit a website like Twitter or Facebook, the content is just missing – it has disappeared,” she added.

“That has allowed these companies to continue to engage and grow in these markets while not being blamed for the censorship.”

York believes that these companies should be incredibly limited in how they regulate speech.

Another problem, she says, is that these companies consider the Middle East as a single monolithic entity and fail to look at the nuances between different countries.

“It’s very culturally ignorant to think that Lebanese people would want the same rules as the Saudis,” she said.

“To give a concrete example of this, search engine Microsoft Bing for years censored its results in the entire Middle East based on what Saudi Arabia asked them to censor.”

As a result, York explained, Bing instituted a blanket ban for certain keywords in the whole Middle East, so, for example, because Saudi Arabia wanted all mentions of the word “breast” removed from search results, people in Lebanon were not able to use Bing to search for “chicken breast”.

Meanwhile, accessing pornographic websites directly was still possible in Lebanon.

“So, I think Twitter and all these other companies are responsible for when they say ‘yes’ whenever an authoritarian country comes to them to ask to censor certain speech.”

“These days they just do it, they don’t push back on it any more.”

Wael Abbas, an Egyptian human rights activist and blogger, used to document police brutality in Egypt.

“It’s quite clear from Abbas’s case that he was being attacked by trolls on Twitter that he alleges were government paid, but we don’t know that for sure,” York said.

“More and more we see people moving towards private platforms like WhatsApp, Signal or Telegram, which all provide more privacy.”

MOHAMAD NAJEM, SMEX

“Nevertheless, he was attacked by government supporters on Twitter, he fought back and then his account was shut down by Twitter, probably because he used language that was in their rules considered hate speech.”

His account remains suspended.

“In Wael’s example, they should not have kicked him off of the platform for using harsh language,” York said.

These sustained efforts have instilled fear among activists, many of whom have largely moved away from public platforms like Twitter and Facebook to more closed systems.

“More and more we see people moving towards private platforms like WhatsApp, Signal or Telegram, which all provide more privacy,” Najem said.

While the increased privacy of closed platforms provides some more safety for activists, reaching an audience as they did during the Arab Spring seems impossible.

Saudi women’s rights activist Souad al-Shammary looks at her Twitter account on her mobile phone. She is a liberal feminist who was jailed for her views [File: AP]

Article

GO RED China! GO RED China!

 

 

A Message To President Trump from MG Paul Vallely, U.S. Army (ret.) on Murder!

A Message To President Trump from MG Paul Vallely, U.S. Army (ret.) with an Update on Murder and the Benghazi Cover Up!

Maj. Gen. Paul Vallely (U.S. Army, Ret.) was recently on Conservative Commandos Radio Show to discuss new information he has on Benghazi. Was there a stand-down order while the Special Mission Compound and CIA Annex were under attack that night in 2012? Why didn’t the military send forces to attempt to help those Americans attack in Benghazi that night?

What is the DOJ, the FBI, the CIA, the Intel Community, the Department of State, and Congress hiding?

SUA has proprietary intel concerning the greatest crimes ever committed against the American people.

STEALING HOME.

Important information on “Secretary of State” Hillary Clinton and the Department of State:

 

More VIP Revealing Facts on Benghazi!
White House notified immediately! Assets available were told to stand down!

MG Paul Vallely and American patriots involved in communications during the Benghazi murders by omission and crime scene staging and the 13 hours and a Training Mission at the time are interviewed by Audrey Russo.

Audio Interview


Editor’s Note:

Diplomatic cables and much more were exposed for years prior!

 

“Cybersecurity”

EU Investigating Report of Massive Hacking on Diplomatic Cables

The European Union is investigating “a potential leak of sensitive information” following a report that hackers breached the bloc’s diplomatic communications network.

Using techniques similar to those used by an elite unit of China’s People’s Liberation Army, hackers downloaded cables over a period of three years, according to the report by the New York Times published late Tuesday.

In response, a spokeswoman for the European Council said Wednesday they were “aware of the allegations” and “actively investigating the issue.”

Article

China hacked US Army transport orgs TWENTY TIMES in ONE YEAR

FBI et al knew of nine hacks – but didn’t tell TRANSCOM

By Darren Pauli

Sophisticated Beijing-backed hackers raided civilian organisations responsible for the movements of US troops and equipment 20 times in one year of which only two were detected by the responsible agency, an audit report has found.

Contractors underneath the US Transportation Command (TRANSCOM) agency were hacked a total of 50 times, which included less sophisticated attacks made by actors not identified by the US Government as being on China’s payroll.

The audit was conducted in the 12 months to June 2013 based on information provided by the Federal Bureau of Investigations, Defense Security Services, Defense Cyber Crime Centre, and the US Air Force and 11 contractors.

TRANSCOM was responsible for tapping civil transport organisations for wartime operations described as “key” in the report Inquiry into Cyber Intrusions Affecting U.S. Transportation Command Contractors [pdf] declassified overnight.

Senate Armed Services Committee members said the intrusions were unacceptable and a sign of aggression on the part of Beijing.

“These peacetime intrusions into the networks of key defense contractors are more evidence of China’s aggressive actions in cyberspace,” committee chairman Senator Carl Levin said.

“Our findings are a warning that we must do much more to protect strategically significant systems from attack and to share information about intrusions when they do occur.”

Ranking member Senator Jim Inhofe called for a “central clearinghouse” for critical contractors to report possible hacks.

The audit found intrusions including the compromise or theft of email accounts, documents, passwords and code.

It also revealed a Civil Reserve Air Fleet contractor lost flight details, credentials and its email encryption key while systems on a TRANSCOM contractor ship were hacked multiple times.

The committee behind the report said TRANSCOM and its contractors lack a universal definition of what constituted a compromise.

It further criticised the reporting structure and said the FBI and Department of Defence knew but did not tell the Pentagon of nine separate intrusions of TRANSCOM contractors.

The committee updated its version of the National Defense Authorisation Act for Fiscal Year 2015 to direct the Secretary of Defense to designate operationally critical contractors and impose tighter reporting requirements for breaches suspected to be pulled off by nation-states.

The audit findings follow the naming by the US Government of five members of the Chinese People’s Liberation Army it claimed were behind an eight-year hacking campaign against some American companies to steal commercially sensitive information. ®

Article

“Chinese military cyber attacks revealed in the report included a contractor who was compromised between 2009 and 2010 and lost emails, documents, user accounts, passwords and source code, indicating the penetration gain broad access. ”

Article

“From June 1, 2012 to May 30, 2013, 50 successful intrusions were made into contractors’ systems, and of those, 20 were attributed to an advanced persistent threat (APT). But that wasn’t the most disconcerting finding, according to the report’s executive summary.

“Of those APT-linked intrusions, TRANSCOM was made aware of only two, a troubling finding given the potential impact of cyber intrusions on defense information and operations,” the report said.”

Article

 

Now over to Tivoli, Italy.

‘We could have been there’: Squadron member speaks out on stalled Benghazi response

By Fox News

May 12, 2016

His squadron got the alert: a “real world mission was going down.”

The team – at Aviano Air Base in northeastern Italy – raced to the field and was briefed, as planes were armed and prepared to launch. Hundreds of miles away, fellow Americans were under attack in Benghazi.

“There were people everywhere,” said the witness, who was on the ground that night but wished to remain anonymous. “That flight line was full of people, and we were all ready to go” to Benghazi.

Only they were waiting for the order. It never came.

“The whole night we were told that we are waiting on a call,” he told Fox News.

This account is from a squadron member at Aviano the night of the Sept. 11, 2012, terror attack in Benghazi. The source, the first in his squadron to speak out publicly since that attack, is going public to explain – in his view – that more could have been done to save Americans under attack that night.

He asked that his identity be protected for fear of retribution. He says others in his squadron also have wanted to talk about Benghazi from the beginning, but no others have been interviewed and all are afraid of the potential backlash from speaking out.

“I’m not trying to give away any type of [information] that could ever harm the military,” the source told Fox News. “That is never my plan. I feel that some things need to come to light.”

Namely, he said, that a team was ready to go that night to help protect Americans under fire in Benghazi – an account that runs counter to multiple official reports, including from a House committee, a timeline provided by the military and the controversial State Department Accountability Review Board investigation, which concluded the interagency response to Benghazi was “timely and appropriate.”

The source said: “I definitely believe that our aircraft could have taken off and gotten there in a timely manner, maybe three hours at the most, in order to at least stop that second mortar attack … and basically save lives that day.”

Former Navy SEALs Tyrone Woods and Glen Doherty were killed in that second wave. Ambassador Chris Stevens and information officer Sean Smith were killed in the initial attack on the main compound.

“We could have been there. That’s the worst part,” the source said.

The source who spoke with Fox News challenged the military claim that a re-fueling tanker wasn’t available. He said American jets routinely refuel by using what’s called a “hot pit maneuver,” which allows the jets to land and then get fuel without shutting off the engines.

Multiple sources say there were multiple locations available the night of the attack.

He said they were waiting on the call, though, through the night. The men say they didn’t truly learn about the mission they had missed until they returned home the next day from the airfield and saw the reports about the Benghazi attack on the news.

Many still don’t talk about the subject and some insist it has hurt morale within the squadron because “people know we were stationed there and didn’t respond.”

The same frustrations have compelled Mike, a former team sergeant for a military anti-terror quick reaction force, once known as the CIF, to talk.

“For some reason they were all shut down, and I think it leads back to a policymaker somewhere because nobody in the military is going to shut down an operation,” he said. On the night of the attack, Mike was at Delta Force headquarters in the U.S. monitoring the events as they happened.

“We had hours and hours and hours to do something … and we did nothing,” he said.

Despite the claim by former Secretary of State Hillary Clinton and the State Department that nothing more could have been done, a Freedom of Information Act lawsuit recently revealed that Department of Defense Chief of Staff Jeremy Bash immediately offered assistance to the State Department on the night of Sept. 11, saying forces could move to Benghazi and “they are spinning up as we speak.”

Mike echoed that: “I know everything was spun up and nothing was done.”

He added: “At our level, we were doing everything we were supposed to be doing. At everybody else’s level above us, it was political.”

In June 2014, Delta Forces captured Abu Khattala, a man now charged in the attack.

Mike, though, said Khattala is a low-level operative and not one of the terror cell leaders. He said the U.S. could have collected intelligence leading to “bigger fish” had the U.S. acted sooner following the attack.

Meanwhile, while Democrats have called the House investigation into the Benghazi attacks a waste of time and money, committee Chairman Trey Gowdy, R-S.C., says his committee has uncovered new facts – but does admit they still are having issues finding witnesses.

“It’s been very frustrating,” Gowdy told Fox News.

In response to Fox News’ reporting, he also issued a statement saying it is “deeply troubling there are individuals who would like to share their stories, but have not because they are afraid of retaliation from their superiors.”

The two men who spoke with Fox News have not spoken with the committee.

Article

Crime Scene Staging 101 : LYONS: Benghazi was a planned tragedy

Editor’s Note: From our great friend Adm. James “Ace” Lyons, USN (ret) and our friends at WND.com (from 2014). With special thanks to The Citizens Committee on Benghazi and The Legacy National Security Group.

James A. Lyons, U.S. Navy retired Admiral, was commander-in-chief of the U.S. Pacific Fleet and senior U.S. military representative to the United Nations.

Travel Advisory:


The road to Benghazi = time and distance. En route. What to wear when visiting each city.

LYONS: Benghazi was a planned tragedy

The event was no surprise, and the massive cover-up appalls

By James A. Lyons – – Monday, March 3, 2014

ANALYSIS/OPINION:

The recent reports by the bipartisan Senate Intelligence Committee and the House Armed Services Committee make clear that no organization in the chain of command, including the White House, should have been surprised by the tragic events that occurred at our Benghazi Special Mission Compound (SMC) on Sept. 11, 2012.

Clearly, there was both strategic and tactical warnings.

The security situation in eastern Libya, particularly Benghazi, was out of control. Trying to explain our failure to protect the SMC as a lack of appreciation of the seriousness of the deteriorating security situation or incompetence does not pass muster. This was a planned event and explains the massive cover-up.

There were numerous hostile acts leading up to the attack on the compound. For example, on April 6, 2012, an attack with improvised explosive devices was conducted on the outer wall of the compound.

On May 22, the Benghazi International Red Cross office was hit by two rocket-propelled grenades. On June 1, a car bomb exploded outside the Benghazi hotel where the British ambassador was staying. On June 6, an IED blew a hole in the compound’s perimeter wall. On June 7, Ambassador J. Christopher Stevens requested two mobile security teams for his protection but was denied by the State Department.

On June 11, the British ambassador’s convoy was hit by RPGs. On June 17, the U.K. closes its Benghazi consulate, and the International Red Cross closes its office. On June 19, the Tunisian Consulate is stormed by the rebel group Ansar al Shariah.

Then on July 9, the U.S. Embassy in Tripoli requests continued security support for an additional 60 days, but receives no answer from the State Department.

On Aug. 2, Stevens requests 11 additional personal-security bodyguards. He calls the security situation unpredictable and violent, but his requests are turned down by State. Stevens sent a cable to State on Aug, 16 stating that the compound cannot withstand a coordinated attack.

The State Department’s reaction was to withdraw the three Quick Reaction Units at our embassy in Tripoli under the command of Col. Andy Wood over the objection of the embassy and Col. Wood.

At this point, AFRICOM offers to provide additional security, but Stevens feels compelled to turn down the offer owing to State denying all his requests for increased security.

The State Department turning down all of Stevens‘ requests for increased security as well as drawing down security assets in country is more than puzzling, particularly since an internal State Department analysis completed two months after the compound opened stated that unless security was increased, the compound should be closed. This assessment is buried in the Accountability Review Board (ARB) report.

The question that needs to be answered is, with the out-of-control security situation in eastern Libya, why were there no contingency plans or forces pre-positioned ready to respond to potential attacks on the anniversary of 9/11?

According to one report, the administration was focused on Tunisia, not Libya. Mind-boggling. Nonetheless, if that were the case, where were the forces positioned to respond to an attack on Tunisia?

On the day of the attack, according to a report in The Guardian, the readiness of the ambassador’s five-member security detail raises questions. Three of the four agents with Stevens, according to the report, left their rifles, helmets and body armor in another area under orders by Secretary of State Hillary Rodham Clinton, which was confirmed by the ARB report.

This makes no sense, given that standard operating procedures in a hostile environment require that weapon be kept at the ready all times. Another question that needs to be answered: Why would the secretary of state give such an order?

Based on numerous reports, the Obama administration and every organization in the chain of command knew almost instantly that this was a terrorist attack on the SMC.

Within hours, it was known that the attack was executed by Ansar al Shariah, which is a coalition of Islamic and Salafist rebel groups linked to al Qaeda, al Qaeda in the Islamic Maghreb, Libyan Islamic Fighting Group and the February 17th Martyrs Brigade.

It should not be overlooked that the February 17th Martyrs Brigade was tasked with supporting the U.K.-based Blue Mountain Security Group that had the contract from our State Department to provide security for the compound.

According to my source, who is a confidential informant for the FBI, the Blue Mountain Security Group is a cover company for MI-6. My source also told me that the February 17 Martyrs Brigade contract personnel were positioned near the compound the day of the attack and were ready to respond but never received orders to execute. Interesting.

My FBI confidential informant has also confirmed my assessment on the Lou Dobbs TV show in October 2012; namely, that this was an operation that went terribly wrong.

According to my source’s in-country contacts, there never was any intention to kill Stevens. He was supposed to be kidnapped and held as a hostage in exchange for the release of the blind sheik, Omar Abdel Rahman. It should be recalled that this was the No. 1 objective of then-Egyptian President Mohammed Morsi in his Washington visit in 2012.

All the unanswered questions and the truth of what actually took place at our Benghazi compound that cost the lives of four Americans can only be resolved by the formation of a special committee with subpoena powers.

House Speaker John A. Boehner, appoint such a committee as called for by Resolution 36 put forth by Rep. Frank R. Wolf, Virginia Republican, and restore integrity to the office of the speaker.

James A. Lyons, U.S. Navy retired Admiral, was commander-in-chief of the U.S. Pacific Fleet and senior U.S. military representative to the United Nations.

Editor’s Note: For a reason…

Article

 

Editor’s Note: Weapons to the wrong groups, ISIS and Al-Qaeda, fore a reason…to keep it going…and…

China to deploy troops to fight alongside Assad in Syria

By: The Middle East Monitor

 

China is planning to send troops to Syria to aid President Bashar Al-Assad’s forces, according to the New Khaleej.

According to informed sources, the move comes as China becomes increasingly concerned with the presence of Islamic militants in the East Turkestan region, who have been sighted aiding opposition groups in Syria.

Last week, during a meeting with Syrian Presidential Advisor Bouthaina Shaaban, Chinese Foreign Minister Wang Yi praised the regime’s efforts at tackling the fighters from the Islamic East Turkistan Movement.

The Syrian regime has also claimed that some 5,000 fighters of Uyghur origin, an ethnic Muslim minority that Chinese authorities regularly accuse of terrorism, have arrived in Syria, illegally passing through Southeast Asia and Turkey.

The sources said that the Chinese Ministry of Defence intends to send two units known as the “Tigers of Siberia” and the “Night Tigers” from the Special Operations Forces to aid Syrian government troops.

Read: Russia to reduce forces in Syria by end of the year

This is not the first time Chinese troops have crossed into Syria; in 2015 the Syrian regime permitted some 5,000 soldiers to enter its territory as allied forces and stationed them in the Western region of Latakia. Chinese military advisors were also among the deployment, as well as naval and aerial assets.

China is one of the five veto-wielding powers of the UN Security Council and, along with Russia, has used its power on more than one occasion to protect the interests of the Syrian regime.

Russian support has given the government an upper hand in the six year-long civil war, especially as the battle against Daesh comes to an end.

More than half a million people are believed to have been killed since 2011, the vast majority by the Assad government and allied forces. The regime has also used chemical weapons against civilians and prevented aid from reaching those affected on the ground. UN officials further estimate that some ten million people have been displaced as a result of the fighting.

Article

Hillary Calls on RED China to Rescue her!
And Torqued Hillary makes another mistake! OOOPS!

Article

 

How many hours…

All along the rooftop. And the writing is on the…

 


Christmas, Benghazi Document Dump

Editor’s Note – Not surprising the Obama Administration choose to release this information on Christmas Eve. In a Politico article, they report;

Thursday’s document dump, put out by the Office of the Director of National Intelligence in compliance with a Freedom of Information request, includes correspondence sent from American intelligence officials in 2011 and 2012.

benghazi car burning

The emails — edited to conceal what is considered to be sensitive information — provide few new details about the lethal September 2012 terrorist attack on the diplomatic mission in Libya or American-born Al Qaeda recruiter Anwar al-Awlaki.

In the first email, only two of 17 lines of text were not blacked out.

Another email consists of the text “Attached it the final draft; we need comment/coordination by 1000, Friday (tomorrow) 19 October 2012,” followed completely by blacked-out text.

Other emails consist of the text of news clippings from Reuters, the Washington Post and other organizations.

We at SUA must ask, ‘At this point, what difference does it make?’  Answer; it makes a lot of difference, we want to know what is being hidden?

Obama Administration Delivers Benghazi Document Dump for Christmas

By Sandy Fitzgerald – Newsmax 

The Obama administration dumped 16 pages of emails related to Benghazi on Christmas Eve, but the documents are heavily edited to conceal what was considered as sensitive information, so few new details have been revealed about the Benghazi attacks or al-Qaida recruiter Anwar al-Awlaki.

Anwar al-Awlaki
Anwar al-Awlaki

The documents were released by the Office of the Director of National Intelligence in response to a Freedom of Information Act request, reports Politico, and include intelligence officials’ communications from 2011 and 2012.

But only a few lines are visible in some of the emails. In one, just two of 17 lines of text were not redacted and in another, just the text “Attached it the final draft; we need comment/coordination by 1000, Friday (tomorrow) 19 October 2012,” is visible.

Further emails share news clippings, one February email in 2011 was sent to respond to a State Department in regard to al-Awlaki’s passport being revoked.

Al-Awlaki was killed later that year, in September, during a drone strike in Yemen.

It wasn’t until the next year that it was reported that the State Department reported revoking his passport. There were also memos in Thursday’s dump that include details about using existing protocol to protect intelligence.

The Obama administration has also released such information during the holidays including in May, when it released a trove of 296 emails sent from Hillary Clinton’s private server.

Left Now Calls For Hillary to Come Clean or Get Out

Editor’s Note – Last night we heard that the FBI was able to recover emails from Hillary Clinton’s server and now some on the left are calling for her head and noted columnist and talking head Ron Fournier lists the reason below.

In addition, even the State Department is challenging Hillary’s many excuses, most notably on the chain of events leading to her turning over the so-called non-private ones. Her story is so frought with lies and distractions it makes the head spin:

Hillary Rodham Clinton has described her decision last year to turn over thousands of work-related e-mails as a response to a routine-sounding records request.

“When we were asked to help the State Department make sure they had everything from other secretaries of state, not just me, I’m the one who said, ‘Okay, great, I will go through them again,’ ” Clinton said Sunday on CBS’s “Face the Nation.” “And we provided all of them.”

But State Department officials provided new information Tuesday that undercuts Clinton’s characterization. They said the request was not simply about general rec­ord-keeping but was prompted entirely by the discovery that Clinton had exclusively used a private e-mail system. They also said they first contacted her in the summer of 2014, at least three months before the agency asked Clinton and three of her predecessors to provide their e-mails.

It’s not just why and when they were turned over, it is also how. Remember, she had them printed out, thus hiding the meta-data and slowing down the search process. In any other criminal case, that is clearly obstruction of justice – 30,000 times. But we want to take Ron Fournier’s article one step further, like prison further.

Please read on as the left is learning and be sure to check on Ron’s 19 question for Hillary from September 9th, and then read here:

Hillary Clinton: Come Clean or Get Out

The email scandal is a distraction from the important work of the Democratic Party.

By Ron Fournier – National Journal

If the Demo­crat­ic Party cares to sal­vage a sliv­er of mor­al au­thor­ity, its lead­ers and early state voters need to send Hil­lary Rod­ham Clin­ton an ur­gent mes­sage: Come clean or get out. Stop ly­ing and de­flect­ing about how and why you stashed State De­part­ment email on a secret serv­er—or stop run­ning.email-scandal-ron-fournier-has-19-questions-for-hillary_1

Tell her: We can’t have an­oth­er day like this:

Story 1: The State De­part­ment con­firmed that Clin­ton turned over her email only after Con­gress dis­covered that she had ex­clus­ively used a private email sys­tem. Ac­cord­ing to The Wash­ing­ton Post, the de­part­ment first con­tac­ted her in the sum­mer of 2014, at least three months be­fore the agency asked Clin­ton and three of her pre­de­cessors to provide their emails.

The story un­der­cuts Clin­ton’s claim that her de­cision to turn over self-se­lec­ted email was a re­sponse to a routine-sound­ing re­cords re­quest. She hasn’t been telling the truth.

Story 2: A fed­er­al court has helped un­cov­er more emails re­lated to the Benghazi raid that were with­held from con­gres­sion­al in­vest­ig­at­ors. Clin­ton has in­sisted she turned over all her work-re­lated email and com­plied with con­gres­sion­al sub­poen­as.

Again, she hasn’t been telling the truth.

Story 3: The FBI has re­covered per­son­al and work-re­lated e-mails from her private serv­er, rais­ing the pos­sib­il­ity that the de­leted in­form­a­tion be­comes pub­lic. “The FBI is in­vest­ig­at­ing how and why clas­si­fied in­form­a­tion ended up on Clin­ton’s serv­er,” Bloomberg re­por­ted.

While the Demo­crat­ic front-run­ner still in­sists there was no clas­si­fied in­form­a­tion on the un­se­cured serv­er, the FBI has moved bey­ond wheth­er U.S. secrets were in­volved to how and why. In the lan­guage of law en­force­ment, the FBI is in­vest­ig­at­ing her motive.

ron-fournier-360x220On Sunday, Clin­ton told Face the Na­tion host John Dick­er­son: “What I did was al­lowed. It was fully above board,” and “I tried to be fully trans­par­ent.” Both claims are ob­ject­ively and in­dis­put­ably false.

From the mo­ment this story broke in March, seni­or Demo­crats told me they were wor­ried about where the ques­tions would lead. Sev­er­al said they feared what the emails might show about the in­ter­sec­tion of Clin­ton’s work at the State De­part­ment and the fam­ily’s private found­a­tion.

One Clin­ton loy­al­ist, a cred­ible source who I’ve known for years, told me, “The emails are a re­lated but sec­ond­ary scan­dal. Fol­low the found­a­tion money.”

That is still spec­u­la­tion. But months of dis­hon­esty and de­cep­tion took their toll: A ma­jor­ity of Amer­ic­ans don’t trust her, and the Demo­crat­ic nom­in­a­tion fight has shif­ted from a coron­a­tion to a com­pet­i­tion. A poll re­leased today by Bloomberg shows Clin­ton barely lead­ing so­cial­ist Bernie Sanders and Vice Pres­id­ent Joe Biden, who’s not even in the race.

For Demo­crats, this is an op­por­tun­ity wasted. A crowded GOP field has been taken host­age by a celebrity bil­lion­aire with a his­tory of bank­ruptcies, sex­ist be­ha­vi­or, and ra­cially of­fens­ive state­ments. Lack­ing a firm grip on policy or the truth, Don­ald Trump is the GOP front-run­ner.

His closest com­pet­i­tion, Dr. Ben Car­son, said Sunday he didn’t think a Muslim should be pres­id­ent, and his ef­forts to clean up the con­tro­versy have been as ham-handed as they are dis­hon­est.

Which brings me back to Clin­ton. Loy­al­ists ar­gue that her policy agenda speaks to Amer­ica’s new demo­graphy and ad­dresses 21st-cen­tury chal­lenges. Even if they’re right, the Clin­ton team has un­der­es­tim­ated the value that voters place on a can­did­ate’s char­ac­ter. One top Clin­ton ad­viser told me in the spring, “Trust doesn’t mat­ter.”

Hillary.Fournier

 

Oft-burned Amer­ic­ans un­der­stand that a policy agenda is a col­lec­tion of prom­ises. If they can’t count on Clin­ton to be hon­est, they can’t count on her to keep her word about in­come in­equal­ity, jobs, health care, and the en­vir­on­ment.

She an­nounced a plan Tues­day to re­duce pre­scrip­tion-drug costs, prom­ising to cap monthly out-of-pock­et ex­penses at $250 without curb­ing profits that fund re­search in­to life-sav­ing drugs. Can you be­lieve her?

Over­shad­ow­ing that news was her long-awaited de­cision on the Key­stone pipeline: Clin­ton now op­poses a pro­ject she was once in­clined to sup­port at the State De­part­ment, a flip-flop that she jus­ti­fied with a rhet­or­ic­al wave of the hand. “I think it is im­per­at­ive that we look at the Key­stone pipeline as what I be­lieve it is—a dis­trac­tion from the im­port­ant work we have to do to com­bat cli­mate change.”

A dis­trac­tion from the im­port­ant work. That could be her cam­paign slo­gan.

Emails, Distractions, and Details Muddle the Clinton Picture

We Must Remain Focused on the Macro-Hillary Picture

By Scott W. Winchell, SUA Editor

On Friday, the second tranche of court ordered releases of Clinton emails occurred and included 41 messages that reviewers determined contained classified material. There were a few Benghazi related emails in this a chronological release that pre-dated the attack, with at least one referring to security concerns.

But remember what she said at the UN; “there is no classified material… I’m certainly well-aware of the classification requirements and did not send classified material.”  Oh, the sheer volume of the moving parts…that thumb drive!

Original Image By REUTERS/Kevin Lamarque/Files
Original Image By REUTERS/Kevin Lamarque/Files

Several sites have shown the content and how much information can be gleaned, but we are getting lost in the noise; we are not looking at the totality of all of her actions over a very long period. Once again, this is all done in a purposeful manner to keep people confused, like turning over print versions instead of electronic certainly see to that end.

She lied, broke the rules repeatedly, stalled, obfuscated, and the story changes almost daily while the State Department barely meets the court ordered release requirements.

“It says the process is slower because of intense scrutiny by U.S. intelligence agencies to ensure that emails from her private server don’t contain any sensitive or classified government secrets…2,206 pages of emails, roughly 12 percent of the 55,000 pages” were released.

Maybe if they had the electronic version it would be a wee bit faster. Again, a lot of noise, a lot of shiny objects, all piece meal, but definitely at a classified level or it wouldn’t take so long.

However, if we look at this from a 40,000 foot macro perspective, we can clearly see that Clinton should be the subject of an investigation either by the FBI or a Select Committee from Congress at a minimum, and for more than just the email scandal.

Hoping another shiny object would distract us, her campaign released tax records at almost the same moment, timed to do just that and today they released more medical records. With so many moving parts in this saga, it is easy to get lost in the details; look, a squirrel.

hillary-clinton-foundation-money-cashSo let’s begin with a macro question; at what time is any communication transmitted by the Secretary of State of the United States of America not of interest to foreign powers?

For that matter, what about political adversaries, or even the proverbial hacker in his basement on a joy ride to see what he can get into on the net? The answer of course is never, ask Sydney Blumenthal.

All members of a President’s cabinet are by definition some of the most powerful people in the world; all are targets, all the time. That is why we have rules and laws in place to preserve the safety of the information each deals with 24/7; it is called national security.

When it comes to the Secretary of State, the most important cabinet level position and the number four slot for Presidential succession, it is clear that all communications he or she engages in are de facto important and sensitive in nature, even if it’s just about what she wants to eat that day. When does something actually get classified? Is it not often after the fact anyway as we now see?hillary-clinton-what-difference-does-it-make-benghazi-dead-americans-9111

When considering whether or not a coded stamp is placed on any transmission designating it to be classified at some level is beside the point, and it is folly to split hairs about whether or not Hillary Clinton knew they were or were not.

All her correspondence is important to some enemy. Any responsible person, especially somebody who once resided in the White House knows this and is required to act accordingly, that is, unless you are a Clinton. Her denials are an insult to our intelligence.

What is worse, and we have to keep repeating this point, at no time ever, did Hillary Clinton have any right of ownership of her email as Secretary of State. None, not even “personal” ones! Each and every transmission she made after swearing an oath to uphold and defend the Constitution were automatically the property of the people – case closed!

The proof in just how important her communications are or were, is in the data dump we received yesterday where large portions of her transmissions were heavily redacted and many were classified after the fact as too sensitive to be released to the public. Not only is it a fact that she did not own them, she also harbored them outside the purview of federal security, a crime. Who cares what was in the headline at the NY Times.

Then there is the case of the personal lawyer and others with whom she gave access to view all of her transmissions, and that pesky thumb drive. When did she become the arbiter of who had clearance to view what is now confirmed to be sensitive intelligence? And, what about all those gaps?

ClintonEmailGap

The Clinton camp assures us that her personal attorney holds proper clearance, but he is not a State Department employee and has no right to harbor sensitive material let alone even seeing it, especially in a private setting, ask David Petraeus. And why has no one from the State Department sent security agents to secure that thumb drive from David Kendall?

“This raises very serious questions and concerns if a private citizen is somehow retaining classified information,” Grassley’s said in a letter sent late last week. He asked for more information on Kendall’s clearance and whether the lawyer was authorized to “be the custodian of classified national security information.” The FBI has not yet responded. (Politico)

Then there is the curious case of Huma Abedin, another Grassley letter to State:

“The letter sought the status of an inquiry into whether Abedin had violated conflict-of-interest laws related to her special employment situation, which allowed her to work simultaneously for the State Department, the Clinton Foundation and a private firm with close ties to the Clintons.”

Huma-Abedin-and-Hillary-ClintonHow was it that Abedin was given such status, apparently over paid at that, and once again clearly brings the Clinton Foundation and all its moving parts back into the picture?

Everything the Clintons touch is part of a racket, pure and simple, and a personal ATM. From 40,000 feet it all forms a clear picture – Hillary Clinton is not only a dismal campaigner and speaker, she is as corrupt and untrustworthy as any has ever been.

The Clinton campaign worries about the damage that cannot be “unwound” that the NY Times caused in their opinion, but maybe they should worry more about the law and Judge Sullivan who on Friday turned up the heat a bit more:

A federal judge has ordered the State Department to ask Democratic presidential candidate Hillary Clinton to certify under penalty of perjury that she has turned over some of the work-related emails she kept on a private server during the four years she served as secretary of state.

U.S. District Court Judge Emmet Sullivan issued the order Friday in connection with a Freedom of Information Act lawsuit the conservative group Judicial Watch filed in 2013 seeking records about the employment status of Clinton aide Huma Abedin, who worked as Clinton’s deputy chief of staff but later transferred to a part-time job as a so-called “special government employee.”

At such a hearing on Friday, Sullivan—a Bill Clinton appointee—told State to seek certifications from Hillary Clinton, Abedin and former Deputy Secretary of State Cheryl Mills that they’ve produced all records related to Abedin’s employment, even if they kept those records outside official State Department systems.

“As related to Judicial Watch’s FOIA requests in this case, the Government is HEREBY ORDERED to: (1) identify any and all servers, accounts, hard drives, or other devices currently in the possession or control of the State Department or otherwise that may contain responsive information; (2) request that the above named individuals confirm, under penalty of perjury, that they have produced all responsive information that was or is in their possession as a result of their employment at the State Department,” Sullivan wrote in an order issued Friday afternoon.

“If all such information has not yet been produced, the Government shall request the above named individuals produce the information forthwith; and (3) request that the above named individuals describe, under penalty of perjury, the extent to which Ms. Abedin and Ms. Mills used Mrs. Clinton’s email server to conduct official government business.” (Read the rest here at Politico.)

We should turn up the heat as well, and avoid being sucked into the maelstrom they want us to focus upon instead. Our attention must be maintained and we should read more about the “law and the Secretary of State”:

“…four sections of the law: the Federal Records Act, the Freedom of Information Act (FOIA), the National Archives and Records Administration‘s (NARA) regulations and Section 1924 of Title 18 of the U.S. Crimes and Criminal Procedure Code.” (Read more at the NPR article written on this last April. Also see Title 44 here, and a time line on the creation of these laws.)

Wait for it though, rumors of another “bimbo eruption” will be sure to confuse and distract us from what we believe makes Hillary Clinton a criminal and unfit to hold any office in America… other than one in a prison cell.


A reprise of the following is warranted here:

THE CRIMINAL ARROGANCE OF HILLARY CLINTON – Bill Whittle

%CODE%