Middle East Strategic Issues Facing the Trump Administration

Dr. Walid Phares

Dr. Walid Phares, Trump Campaign Foreign Policy Adviser and Fox News National Security and Foreign Policy Expert.

Dr. Walid Phares was the Middle East and Foreign Affairs consultant to the Trump Campaign and national security and foreign policy expert at Fox News.  Among his extensive published noteworthy works are the acclaimed best selling 2006 book, Future Jihad: Terrorist Strategies against America and the 2014 The Lost Spring: US Policy: in the Middle East and Catastrophes to Avoid.  He is currently under consideration by the Trump Administration for a possible post at the US State Department. We were afforded an opportunity to interview him on a wide range of Middle East issues facing the Trump Administration on Northwest Florida’s Talk Radio 1330 AM WEBY.  The program aired February 20, 2017.

Among Middle East policy issues addressed by Dr. Phares during the interview were

  • The rise of a new Mid East Security alliance known as the Arab NATO composed of the Gulf Arab Emirates, Saudi Arabia, Jordan; Egypt with outreach to Israel to combat the rising regional and global hegemony of a nuclear ICBM equipped Iran.
  • Possible initiatives to contain Iran Middle East and Global geo-political objectives following the JCPOA and release of over $150 billion in sequestered funds used to acquire and develop nuclear weapons and Nuclear ICBMs threatening the Middle East, Europe and ultimately the US.
  •  Creation of  autonomous  safe zones  within the framework of a post-Assad federal  Syria for ethnic/religious groups in Syria including Kurds, Alawites, Druze and Sunni Muslims;
  • Withdrawal of all foreign forces including Iran and  proxy Hezbollah; Islamist terrorist groups, Turkey, defeat of ISIS by US –led coalition forces;
  • End of the 27 year regime of indicted war criminal Sudan President Bashir to end Jihad  genocide of indigenous populations in Darfur, Nuba Mountains, South Kordofan  a threat to the Sahel region of Africa
  • Possible Administration adoption of both domestic and international Muslim Brotherhood terrorist designations.

What follows is the transcript of the interview with Dr. Phares.

Mike Bates:                Good afternoon welcome back to Your Turn. This is Mike Bates. Middle East roundtable discussion time. With me in the studio Jerry Gordon, Senior Editor of the New English Review and its blog “The Iconoclast”, welcome Jerry.

Jerry Gordon:            Glad to be back Mike.

Bates:            You can find Jerry at www.newenglishreview.org.  Joining us by telephone is Dr. Walid Phares, Middle East and Foreign Affairs Consultant to the Trump campaign and expert foreign policy contributor to Fox News.  Dr. Phares, welcome.

Walid Phares: Thank you for having me gentlemen.

Bates:              Dr. Phares is also the author of the books The Lost Spring. U.S. Policy in the Middle East and Catastrophes to Avoid” and the bestselling book Future Jihad: Terrorist Strategies against America. You can find Dr. Phares at www.walidphares.com.

Gordon:          Walid there has been a flurry of interest in the media recently about the formation of a regional national security group that would involve the Sunni monarchies, Emirates and even possibly Israel. You have been a proponent of something like that for a while. Why don’t you give us your views and an update?

Phares:           Yes indeed. Basically the idea is about forming an Arab military alliance. I have called it seven years ago in an article on al-arabiya.com in 2010, the Arab NATO. Originally the idea before the Arab Spring erupted was to put together the resources of Arab governments’ counter-terrorism forces to fight at the time Al Qaeda. Then the Iranian regime started to become very active in Yemen and of course it has Hezbollah in Lebanon. Since the Arab Spring all these civil wars created an unstable area in the region. The idea travelled through briefings before Congress and at the European Parliament. Many quarters in the region were talking about it. It became a strong idea over the past year, especially after the U.S. election of Donald Trump as President. During the election campaign, he met with Egyptian President El-Sisi in September 2016. After the election he communicated with a number of Arab leaders including with Sheikh Mohammed of the UAE, King Salman of Saudi Arabia, the King of Bahrain, the Tunisian President, the Prime Minister of Lebanon, and after inauguration he met with King Abdallah of Jordan and with important players in the region. He will soon be meeting again with President Sisi as he already met with the Prime Minister of Israel. The idea is to build mostly an Arab alliance which means those countries described as moderates who face not just Al Qaeda and ISIS but also the Muslim Brotherhood. Three of these countries have put the Brotherhood on their list of terrorist or extremist entities. Then you have the Iranian Islamic Republic threatening Iraq, Syria, Lebanon and Yemen. The project is now being discussed among these players. There are lots of tensions with some of these countries on other issues. However, they are coming to the conclusion that they need a joint force to confront radical Islamic terror.

The question with regard to Israel is different. At this point in time and after the Iranian expansion in the region and the war against ISIS, some of these countries, Egypt, Jordan and to a certain extent the Gulf Cooperation Council members are talking to the Israelis. In certain areas of the region, such as the Sinai and Southern Syria, there is coordination between Israel, Egypt and Jordan which has been facilitated via Camp David and the other peace agreements. However, never have we seen an Arab military alliance forming; especially when Iran is progressing with development of its own missile force. Iran has fired missiles at Mecca, against United States Naval vessels. So the proposal for a regional Arab military force is building momentum to push forward. The coordination with Israel is going to come when the Trump administration will be able to reignite discussions between these countries and Israel with regard to security arrangements in the region to make sure that the threats of ISIS and the Iranian regime are dealt with.

Gordon:          There have been missile tests which are said to violate the JCPOA agreement. What is the status of Iran’s compliance with their end of the deal that was brokered with Barack Obama and the P5 Nations? What is the threat from the Iranian regime?

Phares:           There are two kinds of threats I mentioned in my 2014 book The Lost Spring and in later briefings and hearings before Congress and with European lawmakers.  Number one, it’s about non-implementing the Iran nuclear deal. They are actually not shutting down their program and there has been a lot are reporting about this.

Second they are developing long range and medium range missiles. These missiles are not designed to deliver conventional pay loads. These are missiles that would have nuclear, chemical or biological warheads. The range of some of these missiles can reach the Gulf Emirates, Saudi Arabia, Israel, Turkey and Egypt. Some of the missiles they are developing are able to reach Europe and may soon be able to reach the across the Atlantic. So this is a very serious threat.

In my writings I call this the dome. Israel has the Iron Dome to defend against rockets and missiles coming from Hamas or from Hezbollah. What the Iranians are doing is establishing a ‘superdome’ that would be equipped with anti-aircraft and very advanced missiles purchased from Russia with the Iran nuclear deal money. Under that superdome they are developing everything in their armed forces: their tanks, missiles, communications and radars. Any geopolitical expert will tell you Iran is not just involved in warfare in Iraq, although they have their militia there. The commander of the Iranian Qods Force Suleimani is always there. In Syria they are virtually in control of the Assad regime. In Lebanon they have Hezbollah. In Yemen they are basically the partners of the Houthi militia. And Iran is doing something else, basically sending threatening messages to our partners in the region. Threatening messages against Israel? All the time. However, it is sending threatening messages against the UAE, Bahrain, and the Saudis. Recently they even signified that they will be acting in the Bab-al-Mandab at the mouth of the Red Sea, which commands access to the Suez Canal.

All this was done under the Obama administration which allowed the Iranians to develop the expansion of its “superdome.” Regarding the Iranian expansion, the Trump administration is sending a signal back to Tehran that we are watching these developments. The question is how the Iranian regime would respond to Washington when it says it has had enough – these are red lines and we are not going to permit your expansion any further.

Bates:              In terms of the nuclear agreement under the Obama administration it was very front-loaded for Iran and very back loaded for the United States. Iran got all their money up front without really having to do anything. They made a promise to comply while they received all that they wanted up front. We expected them to not continue developing their nuclear weapons program, while it seems like they are really proceeding to achieve that objective anyway. Given that background I have two questions. One, is there any possibility of re-imposing sanctions and two, what would be the point since Iran has received what they wanted, already?

Phares:           That is a great question. Indeed, the fact that we have just transferred a lot of money to the Iranian regime which they have used to purchase the equipment. They are not using those funds to support the people of Iran. They are using it for the comfort of the elite of the regime and to equip themselves with a deterrent despite our having released those funds. This is the tip of the iceberg. The hundred and fifty billion dollars is only the beginning. By opening up the Iranian market, by lifting up some of the sanctions and opening the market from Europe and other parts of the world, the hope was this would have a positive effect on the Iranian regime. Because we cannot control it, can we reinforce sanctions? Yes. President Trump can cancel previous executive orders; however, he would need to have Congress pass new sanctions.

What we need in America is a new joint strategic approach towards the Iranian regime. We have an opportunity for the next two years to achieve that. This should be initiated during the next six months. We need to signify that to our allies in Europe. That is why the recent trip by Vice President Pence to the Munich Security Conference sent an important message. We need to assure that the Europeans are not doing something else while we are putting sanctions in place, while at the same time they are doing business with Iran. We need to communicate that through the foreign policy pundits here in the US and abroad. At the same time, the new Administration is working with Israelis on intelligence coordination with pro-American members of the Gulf Cooperation Council. We need to work more with Jordan and the Egyptians. I think we can reverse the Obama policy. However, we also need to send a strong message to the Russians when President Trump meets with President Putin that while we can work together on fighting the Jihadists, the Islamic State and al Qaeda. On the other hand we must tell them that we have serious problems with the Iranian regime and they need to recognize that situation.

Bates:              Assuming that President Trump was to reverse executive orders by President Obama and re-impose some U.S. sanctions on Iran, what would be the effect on US firms interested in opening the Iranian market? Other than Boeing, the United States really isn’t doing a whole lot of business with Iran, while the rest of the world is. Can’t Iran really live without us anyway?

Phares:           Yes, we have the contract with Boeing and then we have a long line of American businesses waiting to do business with Iran. We have stopped not just the contracts under consideration but also many US companies mobilized by the Iranian regime to do business there. Don’t underestimate when a U.S. decision is made public what would happen in other parts of the world. There are many Europeans who will start to calm down and are not going to do business with Tehran. I am not saying all Europeans will follow our lead. Germany under Chancellor Merkel will continue but others may not. The Arab economic and political power of the region will be strengthened by our making those decisions. Moreover, the ripple effect of such Presidential executive orders could go as far as East Asia. Iran has achieved tremendous economic openings, because of the Obama policy, with South Korea, Japan and others. These are our partners in the region who have a common problem with North Korea. Their choice will be: should they risk their relationship with the U.S. now that we have this problem with North Korea and do some business with Iran? I would not underestimate a change in U.S. policy towards Iran, even if we cannot control that change with our partners. They will understand that they would have to rearrange their policies.

Gordon:          Syria is foremost in the minds of people trying to find a resolution to nearly six and a half years of a bloody civil war hemorrhaging refugees involving Iran its proxy Hezbollah, the Russians, Turkey, Kurds and others. You have written about this. You have actually been ahead of the pack on this. What are your thoughts and suggestions about what to do?

Phares:           Let’s address Syria. What we should not see in the Syria resolution is for Assad, Hezbollah and Iran to take back all of Syria and to transform it into an anti-American, anti-Western, anti-moderate entity. On the other hand, we don’t want to see the Jihadists, Al Qaeda, ISIS or Muslim Brotherhood linked organizations take over Syria, bring down Assad and create an Emirate or Caliphate. Everything in between can be looked at as possible solutions. But these are the two “no’s.”

What has happened in Syria over the past six years is a new set of geopolitical realities. One of these realities is that there is a consensus worldwide that ISIS should disappear. Most of ISIS areas are in western Syria. Therefore the forces operating in the northwest of Syria are the Kurds and Arab Sunni in the south. The first recommendation would be to have the US-led coalition establish safe zones. To create those safe zones you are going to have to dismantle ISIS and create this coalition. With regard to the Assad regime, for now it is protected by the Russians. There needs to be a discussion between the President of the United States and President of Russia to solve that issue.

More importantly, the issue is what is going to be the future of Syria? My answer is that I cannot imagine a Syria which won’t be federal, which won’t give the Kurds autonomy. I’m not addressing who will rule that autonomy, but the principle should be having a Kurdish community with its own autonomy. Every other community in Syria may have its own version of autonomy for the Alawites, the Druze, the Christians and Sunni Arabs. They should be enabled to rule their own areas. Of course we will back the moderates across that federation. However, that seems to be the healthiest geopolitical solution for Syria.

Gordon           You have written extensively about the problems of Jihadism and the Sudan, which has been a state sponsor of terrorism. After the election of President Trump you reached out to a number of émigrés, particularly from the Nuba community here in the US. Why is the Sudan a clear and present geo-political danger under President Bashir to the Sahel region of Africa?

Phares:           Realize that Sudan has been having these problems, not just during the last six months. We are talking about nearly thirty years since 1989 while an outspoken Jihadi regime has committed genocide first against the south that established its own independent Republic in 2011 and which still has its own its own problems. Then there is genocide perpetrated by the same regime that has been sanctioned by the International Criminal Court. Bashir’s Jihadist militia ravaged Darfur, in the west the Abyei people in the east, the Nubian community in the north and the Nuba people in the south of the Islamic Republic of Sudan. It seems to me that the international community and U.S. effort should concentrate on making a change in Sudan because this regime has been backing Jihadists perpetrating these collective atrocities. There needs to be a regime change. Unfortunately, the Obama administration just before leaving office lifted some U.S. and U.S. backed UN sanctions against the Bashir regime. What Washington should do under the Trump administration with the help of Congress is to put back those sanctions but also develop a coherent Sudan policy. We don’t have one now.  We need to speak with the communities inside Sudan and figure out what is their desire for the future.

Bates:              Dr. Phares what is the current status of the Muslim Brotherhood vis-a-vis the U.S. State Department and are you expecting any changes under the Trump Administration?

Phares:           Under the Obama administration there was no change in terms of the Muslim Brotherhood. It was the opposite. The Muslim Brotherhood was seen as partners within our own homeland. Their NGO’s or fronts across the United States have participated in the activities of various departments of the U.S. Government. a number of Congressional members have denounced the Brotherhood in briefings and hearings but nothing has happened. The Brotherhood was able to have an influence at the State Department and other parts of the Obama administration in terms of our policy towards Egypt. We actually backed the Muslim Brotherhood regime in Egypt. We backed Ennahda of Tunisia which is a cousin of the Brotherhood. We backed Brotherhood factions in Libya and across the region. Now this has to change under the Trump administration. President Trump mentioned them in his speeches, as did both Secretary of State Tillerson and Secretary of Defense Mattis.

Bates:              Do you expect the President to change that?

Phares:           I expect it to change but it’s going to take longer than our current expectations.

Bates:              Dr. Walid Phares thanks for joining this discussion. You can find Dr. Phares at: www.walidphares.com.

Phares:           Thank you for inviting me.

Soviet Fascism in America: Agents of Influence

Headlines about President Trump’s connection with Russia are all over the world, 24/7. There is some truth to it—the connection of a U.S. President and Russia is reality-with a small correction to the name of the President. It is President Barack Obama, who had constant clandestine ties to Russia. I have been reporting this secret connection since 2008 in my latest two books. The recent Trump tweet about the wiretapping of his campaign by the Obama Administration is the same, a logical and monumental addition to the history of aiding the enemy. This is the moment in history for President Trump to reveal the Truth about Russia, the KGB, and the Soviet Mafia in America…

History of President Reagan and Russia

When a medical doctor treats a patient, he or she fights against a disease and its causes. As a rule, after finding the causes a doctor deals with the disease. That way the patient is cured – his body is healed. These physicians are knowledgeable professionals with the experience to make a correct diagnosis. However, unlike those specialists, the medical profession has another type of doctor—they treat the symptoms of disease. In this case the patient will never be cured and the treatment will never bring healing. This is similar to politicians on the world stage—the leaders of the Western civilization. At this time of war, while we are fighting terrorists, knowledge and the ability to arrive at the correct diagnosis, is only in identifying the enemy. Then we will have the assurance of success and victory in the War on Terror.

A history of America’s presidents shows leaders who, based on their knowledge and ability to correctly assess the world predicament, have united all citizens to rebuff the enemy. Under the leadership of such leaders the country eventually won the war and began the process of healing. Immigrating to the United States in 1981, I watched one great leader. There are no words to express my love for him, because he saved not only America, but the entire planet. His vision of the world, knowledge of the enemy, and guts to deliver the truth made him the greatest leader of the Twentieth Century. President Ronald Reagan unified all Americans; Democrats and Republicans, white, black, Latino, and Asian, by telling the truth in identifying the Soviet Union as the Evil Empire! He was right on all accounts, though many people did not know a lot of information then. It became known later. Yet, trusting the President, the country joined his motto Peace through Strength and the great leader of the twentieth century had been born!

That was written by me at the end of the 20th century. The conclusion is clear—knowledge of the enemy is a must. President Reagan knew the disease and the symptoms– the modus operandi of the KGB and its method and policy of disinformation. Today, in March 2017 we have the exact same predicament only the name of our President has changed. Yet, in addition to that, we gave Russia and Putin twenty-five years to undermine international order and develop the KGB modus operandi and the disease—the ideology of Soviet Fascism. As a result, today we are dealing with the Evil Empire of Global Terrorism and witnessing a political drama of incompetence within some media outlets in covering the world and especially Russia…

Whether President Donald J. Trump is the man of history in the 21st century and the second Ronald Reagan, only the time will tell. He correctly listed American carnage—the symptoms of the disease in his Address to Congress. But, for an unknown to me reason, he has not directly identified the disease, the way President Reagan had done it thirty-six years ago. He did not pronounce the name of the ideology, I have been writing about for the last twenty years—Soviet Fascism. By the way, I have listed some signs of Soviet Fascism on American soil in my column American Carnage, February 11, 2017.

President Trump was telling us that he “inherited a mess.” He is right, but he is not aware of the depth of the mess—the Washington DC swamp is deadly. It is the ideology of Soviet Fascism that makes it deadly. Soviet/Russian subversive activities have never ended: the recent talk on “fake news,” about an alleged Trump contact with Russia is only a part of that. Regrettably, the disinformation method of the KGB, not reported by the media, yet, the Obama holdovers are well aware of the method…

What an irony! The media was deaf and mute for the last eight years of Obama’s Administration, when a secret cooperation with Russia in many respects, including military collaboration was flourishing. I was presenting recently that exact information in details in my column American Carnage, February 11, 2017 and had been writing about it during the last eight years. If you read Socialist Lies you are familiar with the term Obama/Putin joint venture. For those who had never heard that term, here is a brief information and description.

Obama/Putin Joint Venture

Neither Benghazi nor any other of Obama’s scandals will ever be uncovered without the knowledge of Obama/Putin joint venture. Moreover, a mess, inherited by President Trump will continue undeterred by any of his actions until Obama’s holdovers are eliminated. In fact, they are the Soviet Mafia on the soil of America. When I introduced you to the Obama/Putin joint venture, I also named it–Destruction of the American Republic. It has the common ideology, a foundation in Soviet Fascism. The logic should tell you that any of Trump’s success in Making America Great Again requires authentic knowledge of Obama/Putin joint venture to fight it.

We are dealing with the same symptoms of a disease President Reagan identified and defeated. Did you know that people from former Soviet Republics are now joining ISIS? Field commanders of ISIS are known to be Saddam’s former security operatives, trained by the Soviet/Russian security forces. Did you notice a pattern of Obama being late to many of the important issues of our day: ISIS, Syria, Iraq, Iran, IRS, Benghazi, and Ukraine? In fact, those events are the components of an ideology working against the interests of America.

And again as you can see in all of Obama actions or non-actions connected to Russia; Putin is up, and America is down. Watching Obama for the last eight years and knowing the ideology of Soviet fascism, I have invented the term Obama/Putin Joint Venture. In fact, it means—Obama/KGB joint venture. I don’t believe one word Obama eloquently speaks—eloquence used by him to hide his real thoughts in the best traditions of Stalin’s political correctness. You should know the Soviet Mafia to understand Obama’s behavior. By the way, the Russian ambassador Kislyk visited the White House twenty-two times and had personal meetings with Obama four times. Obama was not lazy, stupid or incompetent, as some suggested, on the contrary he was very successful in his joint venture to expand the implementation of political correctness and Soviet Fascism in America. Regrettably, NATO had missed it. Look at what I had written in 2014:

Fortunately, there are signs that NATO is beginning to grasp some truth about the Russia that emerged after the fall of the Soviet Union, the truth, I have been writing about for the last twenty-five years. “NATO has struggled to counter Moscow’s tactics in a conflict where traditional military force is only one part of the fight…” NATO underestimated the role of political correctness–that insidious evil of the world… Financial Times, Friday August 29, 2014: Russia’s new art of war. Unfortunately, NATO had not realized the help provided by Obama to Russia then in 2014. NATO also has not been familiar with the ideology that united Obama and Putin, NATO had not realized that we have the Evil Empire of Global Terrorism in the 21st century.

As you can see President Trump has inherited a very complicated and dangerous world. To solve those monumental domestic and overseas problems requires presentation of the whole truth and only the truth. This is the major task before President Donald J Trump. Unfortunately, some Republicans still do not understand whom they are dealing with. Do you remember a woman-voter who complained to John McCain about her fear of an Obama presidency before the 2008 election? Senator McCain assured her that Obama is “an honest and decent man.” It was enough for me to vote for Romney in the next 2012 election. I was shocked, when Republicans confirmed Loretta Lynch as Attorney General. They forgot or even did not know her connection to Bill Clinton…

Politicized Media and Intel

To derail a positive public response to a very successful Trump presentation before Congress, the Democrats sent an army of surrogates to exacerbate the Trump alleged collusion with Russia. The collective choruses of loud voices prevailed in the media: radio, internet, and TV. And Trump’s tweet about Obama’s wiretapping of Trump Tower was a timely and essential response. To understand the symptoms and the political disease, I purposely gave you a paragraph from the Soviet Decision of 1955, introducing the term “agents of influence” in my column February 11, 2017.

There are two types of “agents of Influence”—the enemies trained to subversive activities and those ill-informed Americans in both political parties. Let me give you an example of an enemy in the media. The correspondent of the New York Times, Walter Durante in the 1930s was the KGB agent of influence. Find him in Wikipedia and you will see how he helped Stalin during the Purges and Show Trails to kill thousands of innocent people. Stalin paid him very well for deceiving and fooling the West.

Stalin died March 5, 1953, but his Doctrine is alive and well. Look at what happened March 5, 2017 on CNN. The State of the Union had a show named “crises of public trust.” They were accusing Trump of lying and misleading. They were the convenient toys of the KGB due to their total ignorance. None of the participants knew that they were discussing Russia in the day of Stalin’s death, let alone that their knowledge of the KGB or the Soviet Mafia was ZERO. The CNN show, GPS, has repeated the same main motive– Trump is wrong in all accounts on the same exact day, no word about Stalin. Those people are the second type of the “agents of influence” due to their political ignorance. They are spreading “fake news” and helping the KGB to create confusion and chaos in America…

The same picture is a politicized Intelligence Community, all seventeen of them. I don’t know whether any of the seventeen had vetted a “community organizer,” named Barack Obama. If you read any of my books, you know that I didn’t trust American Intel, for a very simple reason—any country’s Intel is a primary target for the KGB and GRU. I was surprised when none of the seventeen agencies of our Intel stopped a massive transfer of American high technology to the Russian military by the Clinton Mafia, or stopped Iran Nuclear Deal beneficiary for Putin. By the way, why do we need seventeen agencies? Russia has only three and very successfully runs half of the world. They are the FSB (a former KGB), GRU, and Investigative Committee. Stalinist Doctrine has prevailed over all three.

My explanation of two types of “agents of influence,” can be applied to our Intel as well. Today they constitute a Shadow Government run by Obama. He operates through his accomplices—they together ran America and the world for the last eight years. They are the soldiers of the Democrat Party, who hate Trump and will fight his administration to the last drop of their blood. Some of them have no idea of Obama/KGB joint venture, having been fooled and deceived by Obama.

There is another reason for me to discuss our Intel—I am a victim of their ignorance. Bill Clinton eliminated all research of Russia, he also tried to silent myself, as the author and researcher of Russian history and the KGB. A FISA court under Bill Clinton has launched multiple surveillances against me: my computer and phone were wiretapped, my mail arrested, and I was fired from my teaching position in a University. I had been a conservative, teaching the truth about Soviet Russia to Americans. Despite that, I continued writing my books and columns, but since then the information about them has been blocked by our Intel. Due to those activities by Intel, Americans were prevented from learning the Truth about Soviets/Russia. You can see the result of that today, in March 2017—nobody understands the predicament in America and the world. Look at our incompetent media and tell me why a FISA court made me a “foreign agent.” What an overwhelming confusion and chaos…

My friend, a former CIA officer, knowing my research of Soviet Fascism, sent me this e-mail: Video / Mark Levin: Lays out evidence supporting accusation that Obama’s Authorized Spying Is Police State Tactics.

“The republic is in great danger. The trusted assessment several months ago was that there many in the intelligence community were waging war against Trump. Unfortunately Mark Levin who is held in high regard presents evidence here (short outtake from TV interview):

I agree with my friend. The American Republic is in great danger! Due to the civil war against ignorance and “agents of influence”, America is on the threshold of Watergate No.2. Please, read my two latest books—better late than never!

To be continued www.simonapipko1.com

U.S. Catholic Bishops promise to ‘disrupt’ President Trump

In January 2016 The Vortex reported on Communists infiltrating the Catholic Church. The Church Militant’s Michael Voris reported:

During the early years of Communism in the 1920s and 30s, the evil was being spread worldwide as the Blessed Mother had predicted at Fatima in 1917. Communist parties were being formed in various European countries and in American cities as well. They were already attempting to upset the political and cultural order.

alice_von_hildebrand-255x362

Alice von Hildebrand

But what only a very small number of people knew was that the top dogs of Communism had already released the hounds on the Church. The carefully organized plan was to recruit young men who were loyal Communists and get them placed in seminaries. This was carried out by various agents during the 1920s and 30s.

Fast forward 30 years to the 1960s, and the fruits were beginning to be seen. Learned, dedicated, faithful men and women in the Church were looking around and fretting, not sure from what framework they should understand the demolition of the Faith they were witnessing. At one point, Pope Paul VI even said that it appeared the Church was in auto-demolition.

One of those deeply distressed was a refugee from Hitler’s Germany, the brilliant theologian Dietrich von Hildebrand. He and his wife Alice were sitting down one day with a friend, a woman by the name of Bella Dodd. Bella Dodd had been received back into the Catholic Church by Abp. Fulton Sheen in April of 1952.

Read more.

VIDEO: The Vortex—Trump and Catholics

In the Life Site News article “These US Catholic bishops promise to ‘disrupt’ Trump” John Zmirak reports:

…Cardinal Peter Turkson and twenty-four American Catholic bishops have recently endorsed a political program that is dangerous, unbiblical, un-Catholic and uncharitable. In fact it is soaked in ideological rage, and explicitly aligns itself with the anti-Trump movements to “disrupt” the president’s enforcement of U.S. law. At least one of the bishops present, Robert McElroy of San Diego, has promised that the church he controls will actively help flout U.S. immigration laws.

This program was laid out at the First U.S. Regional Meeting of Popular Movements, which happened two weeks ago, and summed up in a manifesto called “Message from Modesto.” That “Meeting” included not just the cardinal and the bishops, but staff from the Vatican department for the Promotion of Integral Human Development and the Catholic Campaign for Human Development [CCHD].

The CCHD is the organization that radical Saul Alinsky personally helped left-wing Catholics to design, as the exposé A Wolf in Sheep’s Clothing documents. The Chicago branch of the CCHD, with the approval of then Cardinal Joseph Bernardin, cut the check that sent the young Barack Obama to his first Saul Alinsky “community organizing” school.

Another group that took part in the “Meeting”  was PICO, the Latin American far-left organization that used George Soros’ money  to spin Pope Francis’ 2015 U.S. visit as a boost to Democrats in the 2016 election.

Read more…

Zmirak lists five proposals made by these 25 Catholic bishops, the first being, “We urge every faith community, including every Catholic parish, to declare themselves a sanctuary for people facing deportation …. All cities, counties and states should adopt policies that get ICE out of our schools, courts and jails, stop handing over people to ICE…”

The Holy Bible says:

Matthew 22:21 Jesus said “Render to Caesar the things that are Caesar’s; and to God the things that are God’s.”

Romans 13:1 “Let every person be in subjection to the governing authorities. For there is no authority except from God and those which exist are established by God.”

These bishops are welcome to their personal views on President Trump and the federal laws dealing with immigration and refugee resettlement. But they are not ordained to deny the word of God.

Please watch this excerpt of the interview with Dr. Alice von Hildebrand:

RELATED ARTICLES:

The Coup Against Trump

Politics and Pope Francis: What is the role of the Catholic Church and the State?

VIDEO: President Trump vindicated by Wikileaks CIA dump

ZeroHedge in a column “Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential CIA Documents“; Another Snowden Emerges” reports,

A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

RELATED ARTICLES:

NSA Whistleblower Backs Trump Up on Wiretap Claims -US News & World Report

Wikileaks Exposes ‘Vault 7’ — The CIA’s ‘Zero Day’ Weapon

Trump Tower: Wikileaks ‘dumps’ files revealing out-of-control intelligence operations

Wikileaks Exposes ‘Vault 7’ — The CIA’s ‘Zero Day’ Weapon

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’sEmbedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf),describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.

CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products,Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

A Mother’s Plea for Her Son: The travesty of Derrick Miller

As a retired U.S. Army Lieutenant Colonel I stand with those soldiers who are put in harms way and are doing what they have been trained to do, close with and destroy the enemy using all means available.

I have written about the rules of engagement under the previous administration. In a column “President Obama killing our soldiers softly with his Rules of Engagement” Billy & Karen Vaughn wrote:

US soldiers in Afghanistan are now forced to fight a two-fronted war. Before each deployment, these soldiers understand fully that day after day they will do battle against relentless terrorists with shifting loyalties and unspeakable hatred. But what none of them could have foreseen was the killing field that would open from their rear…the Continental United States.

Our government’s incessant tightening of already restrictive ROE (Rules of Engagement), compounded by the failed COIN (Counterinsurgency) strategy—also known as “winning hearts and minds,” has made an otherwise primitive enemy formidable.

Our best and brightest come home in body bags as politicians and lawyers dine over white linen tablecloths; writing, modifying, and re-modifying these lethal rules…rules that favor the enemy rather than the American soldier. Rules so absurd they’re difficult to believe until you hear the same stories over and again from those returning from battle.

Billy and Karen Vaughn lost their son Navy SEAL Arron due to the rules of engagement, which benefit the enemy and harm, and kill, our men and women in uniform.

Sgt Derrick Miller

U.S. Army Sergeant Derrick Miller

I received this pleas for the mother of U.S. Army Sergeant Derrick Miller,

I am so thankful that Major Donahue asked me to send this e-mail to you today…

My name is Renee Myers and my son is Sgt. Derrick Miller of the Maryland National Guard.

Derrick is the kind of man every mother wants her son to grow up to be – strong, kind and loyal. He’s a proud daddy who adores his two daughters – this photo is one of my favorites of him holding his oldest daughter, Karina.

But what I love the most about my son is that he felt it was his duty as an American to join the National Guard. In fact, he volunteered for two of his three deployments to Iraq and Afghanistan.

Now, I wish I could go back in time and tell him not to…

Because for volunteering to defend our nation, Derrick has been sentenced to life in prison for doing exactly what the Army trained him to do!

You see, while on a combat mission in September of 2010, Derrick watched an Afghani national walk through his unit’s defense perimeter. The same man had been detained the day before under suspicion of driving insurgents to a nearby combat firefight.

So to be safe, Derrick and another U.S. soldier took him into custody for questioning with an Afghani interpreter.

Derrick asked the man why he was within the American defense perimeter. First, the man claimed to be an electrician responding to a downed power line. Then he claimed to be there to fix a water pump. Either way, he had no tools with him.

The Afghani grew more and more agitated as Derrick continued asking questions. Suddenly, he grabbed for Derrick’s weapon.

Derrick reacted immediately – firing and killing the suspect.

Richard, just days after the incident, Derrick was arrested and charged with “premeditated murder” of the Afghani insurgent!

For eight terrible months, we waited for the trial that would finally set the record straight and bring Derrick home to us. After all, there were witnesses who saw the whole incident and would testify on his behalf.

But instead, our government turned its back on Derrick – a decorated U.S. soldier – to appease Afghanistan officials.

Remember, another soldier had witnessed the interrogation and confirmed Derrick’s account. But he changed his story after the government threatened to charge him with accessory to murder.

The other witness was the Afghani translator. And in exchange for testifying against Derrick, he was granted U.S. citizenship.

Yes, our government brought him here to the U.S. and paid for him to live in an on-base hotel for six months with food, a personal van, and a $630 per month allowance – all provided at taxpayer expense!

Worst of all, the Army destroyed every bit of forensic evidence that could have proved Derrick was acting in self-defense. There were no photos. No autopsy. Nothing.

But I still believed the government would do the right thing. Instead, I held hands with my husband and Derrick’s wife, Katherine, and listened in shock as Derrick was convicted and sentenced to life in prison.

His feet were shackled, his hands cuffed to a leather belt around his waist, and, just like that, my only child was taken from me.

Since then, the world has simply fallen apart for his precious family.

The military immediately stopped Derrick’s paychecks. Derrick’s wife and my husband and I had pooled together all our money to hire a civilian attorney to represent Derrick. It cost $50,000 – every cent we had.

Now, with no money in the bank, his wife couldn’t pay their mortgage, utilities, car payment, or Derrick’s student loans.

Derrick had always worked two jobs so his wife could stay home after their babies were born. Now she can’t. The girls are so little and they don’t understand. They ask her over and over again, Why can’t Daddy come home?”

They wake up at night and cry for him. And honestly, sometimes so do I.

Richard, I can’t bear the thought of the girls growing up without their dad. Or Derrick not being able to scoop them up in his arms before they’re grown. But we have only one hope left now…

You see, Major Donahue heard about Derrick’s case and contacted me immediately.

As you know, Major Donahue knows firsthand from combat tours of Vietnam that you can’t send U.S. soldiers into terrorist combat zones and second-guess their actions from a desk in Washington. And now UAP is ready to help Derrick.

But first, they have to raise money for an appeal, which will require hours of legal research, expert witnesses, and legal motions. Remember, UAP is a non-profit organization, which means they don’t receive any funding from the federal government – only private donations from patriotic Americans.

It also means that I’m going to take a deep breath and ask you one of the hardest questions I’ve ever asked another person:

Can you help me fight to free my son by sending a check for any amount to UAP?

Your gift is tax-deductible. And it will help us pay for Derrick’s appeal – and help other innocent soldiers who have been unfairly charged, too.

The federal government has already spent hundreds of thousands of taxpayer dollars to convict Derrick and grant U.S. citizenship to the Afghani who testified against him.

But I must rely on the generous hearts of people like you to save my son.

That’s why I’m writing you today – to do what I can as the mother of a U.S. soldier to find good-hearted people out there who care about defending our nation’s troops.

Our attorney is going above and beyond the call of duty to fight for Derrick. But mounting his defense will cost us at least $30,000. It’s money we simply don’t have.

Can you please help UAP fund this legal battle and bring Derrick home to us?

Your $35 contribution could be the difference between letting my son rot in prison for the rest of his life for a “crime” he didn’t commit… or bringing him home to me and his girls where he belongs!

Thank you from the bottom of my heart for any help you can send to UAP today.

Yours truly,

Mrs. Renee Myers

P.S. As a member of the National Guard who volunteered for two of his three tours of duty, my son has sacrificed so much for our country. Yet in return, our government has taken away his family and his freedom! Right now Derrick desperately needs to know that he hasn’t been forgotten! Thank you for whatever amount you can send today to give him hope and to help bring him home!

The Truth about Christians Amoung the Refugees

Executive summary

A female interpreter of Eritrean origin, who lives in Germany and of whom neither the Muslim migrants nor the locally hired Muslims know that she is a Christian, revealed what she experienced in refugee shelters in Germany:

  • Adult Muslim migrants threaten and physically attack Christian and Yazidi refugees.
  • Muslim migrant kids do not play with Christian refugee kids, then they explain that they hate them, just like their parents do.
  • Locally hired Muslim interpreters and security men seem integrated on the outside, they grew up in Germany, went to German schools and have jobs, but when they are among themselves, they reveal their true colors by stating that Germany must be Islamized, and that they disdain Germany and its values.
  • In mosques in Germany, pure hate is preached against people of other religions.
  • Muslim migrant women want to out breed Christians, because they want to annihilate them.

German aid organizations and Christian politicians have confirmed her words with their own experience. They also added that Muslim interpreters intentionally mistranslate the words of Christian refugees to make them unable to obtain asylum, cover up Muslim mobbing on Christians, and arbitrarily move Christians to the end of the charity recipients’ list.


Incognito in refugee shelters: Everything Christians live through

What a Christian female interpreter hears in shelters, is terrifying. An article by idea editor-in-chief Daniela Städter.

Wetzlar (kath.net/idea)

Only 14 per cent of refugees who filed for asylum in Germany in 2015 were Christians – over 73 per cent are Muslims. Recently, there have been aggravated reports by Christians about discrimination by Muslims in refugee accommodations. Even some Muslim interpreters and security duty coworkers would put pressure on Christians. A Christian female interpreter observes this, but she is not detected as a Christian. What she hears in the shelters, is terrifying. An article by idea editor-in-chief Daniela Städter.

In September 2016, the call of a long-standing German top female politician reaches the Evangelical News Agency idea (in Wetzlar). She has contact to a female Christian engaged in refugee assistance, who could tell controversial things about the situation in German refugee shelters. Nevertheless, the name of the woman shall not be mentioned. Subsequently, a discussion takes place in Wetzlar among the female politician, an expert in the field of refugee issues, and the 39-year-old Christian female interpreter originating from Eritrea. She speaks Arabic fluently and has already worked in various refugee shelters as an interpreter – mostly only with Muslim colleagues.

The woman acts “undercover” at it. Nobody suspects that she is Christian. The native-born Eritrean fled for Germany in 1991 on her own. She is thankful that she was taken in openly in her new homeland and was supported in many ways. Later she wants to give something back and begins to help in refugee shelters five years ago or so in an honorary capacity. She has been active mainly as an interpreter since the summer of 2016. That she is Christian, she has not mentioned it in the accommodations since the beginning. Because of her knowledge of the Arabic language, she notices quickly: “Christians are getting subjugated, intimidated and harassed by Muslim refugees. That is usual.” Often nobody realizes the mobbing, by which Yazidis and homosexual refugees are affected, too.

 “Germany must be Islamized”

Security duty coworkers and interpreters are, according to her data, almost always Muslims. They make, says the 39-year-old, a very nice impression at the first glance: “Most of them grew up here, often studied, have esteemed occupations, and they behave open-mindedly.” However, that changes as soon as they are “among themselves”: “Then they show their true colors and say sentences like ‘Germany must be Islamized’. They disdain our country and our values.” The young woman is appalled, and for a long time she does not want to take this for real. She still withholds that she is Christian in order to learn more. Among other things, she visits the Quran courses of various mosques: “There, pure hate is preached against people of other religions. The kids get that here, in Germany, taught to them from an early age.” It is similar in the refugee shelters. She notices how Muslim boys refuse to play with Christians. The female interpreter tries to mediate: “You are Muslim, he is Christian. What difference does it make?” The five-year-olds answer her:

“With the Christians, I do not play. My parents hate them, too.” The female interpreter becomes frightened: “They fled from the war to Germany and should be happy after all, that a Christian country takes them in.”

We, Muslims must get more kids than the Christians

She also tries to establish contact with the Muslim women. Many of them, despite their young age, have already had multiple kids. She cautiously wants to enlighten them about contraception methods. “After that, some women told me: We want to multiply. We must get more kids than the Christians. Only this way can we annihilate them.” As she objects and says that it is, after all, the Christians who help them, she bumps into rejection. Helping the Christians is a sin.

The might of the interpreters

The European Mission Community (in Penkun, Vorpommern) has lived through the might of the Muslim interpreters, too. Its chairman, Frank Seidler reports that at the hearings at the Federal Office for Migration and Refugees, they sometimes falsely rendered the testimonies of Christian refugees within the asylum process. That is why now, a Persian-speaking coworker is accompanying the refugees to the interviews, so that he can directly intervene in an emergency: “Since then it has been running better.” Seidler tells further about an Afghan having converted to Christianity, who was beaten up in his collective accommodations and was injured very severely. After he was helped to press charges, there were immediately countercharges by multiple Muslim refugees. The process is still running, although he counts with cessation, because testimony stands against testimony: “Unfortunately, we have already gone through this lapse often.” But where this leads is that the attackers think that they could allow themselves everything in Germany and would never be held accountable, so says Seidler.

A permanent pressure burdens Christians

The Christian aid organization Open Doors (in Kelkheim at Frankfurt am Main) makes similar observations. It is often hard to prove incidents. “With the incidents, it is not always about violence”, says the coordinator of public relations, Ado Greve, “but rather about forms of discrimination, for example at food distribution, or about threats. A permanent pressure burdens the Christians – especially the converted ones.” When a Christian is being threatened in his mother tongue in the corridor, “We cut through your neck!”, or “We will rape your wife!”, then it triggers great fear. Greve:

“The religious features imprinted by Islam in their homeland are often brought with by the perpetrators. However, to prove that, it is hard in most cases.”

But it should not lead to that the incidents are not taken seriously:

“It is important to give credit to the reports of the affected Christians.”

When Muslims translate falsely

Also from the point of view of the leader of the refugee-related work group within the Central Council of Oriental Christians in Germany, Paulus Kurt (in Munich), false translations by Muslim interpreters are a problem. From the refugees whom he advises, he makes them hand over the filled hearing questionnaires after the interview date at the Federal Office for Migration and Refugees in order to verify them together with the Christian asylum seekers. Sometimes the data of religion are false there – from an Aramean Christian, for example, becomes an Arabic Muslim. The flight reasons, too, are rendered partially inaccurately and to the disadvantage of the questioned Christians. If they notice this, they file an objection within the legal deadline of two weeks. Nevertheless, many refugees did not even know the expiration date at all, and thus passed the deadlines.

Christians often have no knowledge of their rights

According to Kurt, asylum seekers also have the right for a retranslation of the questionnaire filled in German to their mother tongue. However, some interpreters did not inform the Christians about that at all. By contrast, the interpreters communicated to the coworkers of the Federal Office that the questioned one has waived the retranslation. “By that, the chance of Christians to get a long-term recognition for asylum here drops.” In the accommodations, too, the language barrier is a problem: “There, a Christian gets beaten by a Muslim, because he is eating pork in the communal kitchen – and the interpreter relays to the leadership afterwards that there was merely a general altercation about the use of the kitchen.”

What nobody realizes

According to the data by two Hessian female refugee helpers of the Central Council of Oriental Christians in Germany, it is also often about forms of discrimination in the accommodations, which go on in the background without being noticed. They name, for example, the issuance of articles of clothing. The maintainer of the accommodations provides a list with refugees who should get clothes. The slip of paper is passed to the interpreters who organize the issuance in the respective languages. At the readout, the list gets changed by them. Whoever has a Christian name, will be called at the end, and must take potluck with the rest, they say: “Nobody realizes that.”

The state assumes false preconditions

From the point of view of auditor Thomas Günster (in Fulda) engaged in refugee-related work, it is about a system error. The state assumes integration in the case of Muslim interpreters, most of them having grown up in Germany, toward the local value system, but that has not happened at all. Günster, who stands in close contact with Hessian refugee helpers and supports them at their work, says: “A sort of independence is assumed here, which is not there at all.” Rethinking must happen here.

There are positive developments in Hessen

Meanwhile, there have been positive developments, too, means Günster, who is also the chairman of the Diocesan Group Fulda of the Association of Catholic Entrepreneurs (BKU). Thus the Hessian Ministry of the Interior strives to protect religious minorities from abuses. In addition, too, the teams in the scope of security duty and interpreters should be staffed in the future with coworkers of different religious affiliations: “Minorities among the refugees must be protected and their complaints taken seriously. We must pay attention that the Christian refugees in Germany do not go to the dogs anymore.”

It looks worse in Bremen

The situation in Bremen is worse. There, the City Senate adopted a new Protection Against Violent Acts concept for refugee facilities at the end of October [2016]. In it, however, they did not go into the situation of Christian refugees. The target group of the Protection Against Violence Acts concept is girls, women, and persons who, due to their sexual or gender identity, are particularly threatened by violence. The alderwoman in the Bremen City Assembly, Sigrid Grönert (CDU) [Christian-Democratic Union, a German political party] basically welcomes the concept indeed, but already pointed out in May that beyond that, Christians also feel mobbed by Muslims over and over again.

By contrast, the Bremen City Senate stated in February that “no abuses” on religious minorities are known. Grönert: “That, unfortunately, does not correspond to reality.” According to their own data for the time frame between January 2015 and June 2016, nine cases of bodily abuses in Bremen were reported to Open Doors.

Christians do not press charges out of fear

None of the affected Syrian Christians has pressed charges – out of fear, that the situation could get worse. That abuses are not known to the authorities, simply does not mean that they do not exist, emphasizes Grönert, who is also the assistant chairman of the Evangelical Workgroup of the CDU in Bremen: “It is a pity that the issue is not being taken up over here at us, while a Federal Province like Hessen has recognized the problems. I wish that the issue were taken seriously by politics across the Federation [i.e. Germany].” She is not alone with this wish. Professor Heiner Bielefeldt, UN special rapporteur for freedom of religion and world view, incumbent till the end of October [2016], demanded at the beginning of November an honest discussion about the hints of abuses against Christian refugees in asylum accommodations.

It would be a big mistake of politics to spread the cloak of silence over it, said Professor Bielefeldt.

La fin justifie t-elle les moyens? [Does the end justify the means?]

By Wallace Bruschweiler and William Palumbo…

Political sabotage will continue to threaten President Trump until he finally acts decisively.

Another week passes, another slew of devious political attacks on President Donald J. Trump by political operatives inside the government.  Regardless of legalities, politically motivated leaks are being routinely and systematically fed to the hostile news media.  The illegal leaking of damaging and/or embarrassing information puts President Trump’s administration perpetually on the defensive, therefore unable to really focus on their agenda and enacting the policies that were promised on the campaign trail.

This behavior by government insiders (saboteurs) demonstrates the attitude of those who served in the Obama administration: the end justifies the means.  Niccolo Machiavelli would be very proud.

The latest leak emanates from the Department of Homeland Security.  A source within DHS passed an intelligence assessment memo to MSNBC’s Rachel Maddow.  In it, the memo claims that citizenship is not a determining factor in likelihood of radicalization.  Implied from this memo is that the administration’s travel ban, which Maddow erroneously calls a “Muslim ban,” is an ineffective strategy to prevent further terrorist attacks.

Furthermore, this weekend we learned that the Obama administration ordered the wiretapping of Trump Tower and Donald Trump’s cell phone.  In order to wiretap a U.S. citizen, such a request requires authorization from the Foreign Intelligence Surveillance (i.e., FISA) court.  Indeed, the permission was seemingly granted on the second request by the FISA court, likely under the pretense of monitoring communication between the Trump campaign staff and certain Russian nationals.  While news continues to break with respect to this developing story, Trump’s former campaign manager Corey Lewandowski alleged that then-Senator Jeff Sessions was also wiretapped by the Obama administration.

You don’t need a doctorate in European history to recognize that politically motivated eavesdropping is a tactic of totalitarian states.

In light of the latest revelations, we would like to submit a few pointed questions to the Trump administration:

  • If the surveillance was in place to detect interference by the Russian government in our election, and no evidence as yet has been presented to the public, can the public then assume that the wiretapping was strictly to gain a political advantage for Hillary Clinton’s camp?
  • Who ordered the wiretapping? A spokesman for former President Obama categorically denied it was issued by Obama’s White House.  Could it have been ordered by then-Attorney General Loretta Lynch?  Or, possibly, by Valerie Jarrett, who is reportedly moving in with the Obama couple in their new Washington, D.C. home?
  • Why are there still any Obama-era political appointees in key positions? What level of damage would finally convince the new administration to thoroughly “clean house?”
  • What is preventing the Trump administration from going on the offensive against the previous administration and its corrupt officials?

It is evident, plainly, that the former administration – including Barack Hussein Obama, Valerie Jarrett, Loretta Lynch, George Soros, etc. – hold Machiavelli’s dictum in high regard.  The end justifies the means.  By providing the media with fodder that militates public opinion against Trump and his cabinet, they are in effect paralyzing him as President.

The Ends Justify the Means

  • President, you and your administration have the power and the prerogative to dispense with all political appointees. The American people gave you this power when they elected you.
  • Why not sit down with your advisers and produce a list of all political appointees in the following agencies: the White House, Department of State, CIA, Justice Department, FBI, Department of Homeland Security, and more.
  • Then, fire them all in one fell swoop. “Everybody, out of the pool!”  Remove their credentials overnight and revoke their security clearances.  Send them packing, far away from our government and the halls of power.
  • Finally, for good measure and as a vital insurance policy, direct Attorney General Jeff Sessions to investigate malfeasance and corruption of the previous administration, e.g. the Clinton Foundation, etc. Let the other side scramble and “lawyer up.”

In this case, the end rightly justifies the means.

RELATED ARTICLES:

NSA Whistleblower Backs Trump Up on Wiretap Claims -US News & World Report

No One Mentions That The Russian Trail Leads To Democratic Lobbyists

Did Obama spy on Trump? Glenn Reynolds

TOWERGATE: Obama uses secret court and FBI to spy on Trump Campaign

‘The LIES and DECEPTION of the media for WEEKS!’ Mark Levin comes roaring back Monday evening

So Stelter wants me to independently corroborate what multiple media outlets reported about FISA applications?

The 6 Most Destructive Myths About Ebola

While fears and concerns mount in the face of the worst Ebola outbreak history, potentially dangerous myths and rumors are also being spread. Ranging from simple misunderstandings to deliberate misinformation.

burning of ebola victims source

Burning of Ebola victims.

The current West African Ebola outbreak has claimed more than 4,000 lives, but recent media coverage has also ignited a firestorm of panic and misinformation regarding the virus. In some cases, the myths surrounding Ebola make it more difficult for health workers to combat and contain it, and even harmless rumors can create unnecessary paranoia. Below are some of the most common and persistent myths about the Ebola virus.

It is Highly Contagious:

Ebola is highly infectious, but it is not very contagious. In humans, the virus spreads through close contact with infected bodily fluids such as sweat, saliva, blood, fecal matter, and semen. Ebola is not considered an airborne virus, since it cannot survive in the open air or travel long distances. Casual contact with an infected person is considered to bear a low risk of infection, which is why the majority of cases are reported amongst health care workers in constant close contact with infected patients. As viruses go, Ebola spreads at a much slower rate than most. Smallpox, which was successfully eliminated by a targeted vaccine program, was more than twice as contagious, while measles is a staggering nine times more contagious than Ebola.

Outside Assistance is Making it Worse:

One of the more dangerous myths about Ebola is that international aid efforts are making the outbreak worse. In some regions, there are even rumors that the virus was introduced by international healthworkers, creating distrust and hindering relief efforts. Some people also worry that sending health workers increases the odds of the disease spreading in other parts of the world, but current evidence suggests that this fear is unfounded.

There is No Hope for a Cure:

While there are currently no cures or vaccines for Ebola, that doesn’t mean that one won’t be developed. There are a number of promising treatments and vaccines that are being tested by the World HealthOrganization to ensure that they are effective and free of harmful side-effects. Many experts predict that a vaccine may even be developed and approved within a matter of months.

All Ebola Victims Die:

While Ebola is undoubtedly a dangerous and often-fatal virus, it is important to understand the data relating to its mortality rate in the proper context. There are several strains of Ebola, each with different reported mortality rates, ranging from 20% to 90%, making it difficult to pin down an accurate figure. Moreover, experts argue that many of the deaths attributed to Ebola could be prevented if patients were treated in facilities with better access to treatment and stricter adherence to safety protocols. With state of the art medical care, the mortality rate of Ebola may even be as low as 10-20%, making it roughly as fatal as SARS.

Travel and Immigration Pose a Serious Risk:

One of the most persistent myths about Ebola is that immigrants and foreign travelers pose a major risk of spreading the virus. The simple fact is that immigrants and travelers from anywhere in the world besides West Africa are not a threat. In countries facing the Ebola epidemic, air travel has become much more restricted, and screening processes have improved for both incoming and outgoing passengers. Since a person who does not display symptoms of the virus is not contagious, it is unlikely, though not impossible, that a serious epidemic could result from air travel.

The U.S. Isn’t Prepared to Deal with Ebola:

Much of the hysteria stemming from this Ebola outbreak is based around the idea that the United States wouldn’t be able to contain the virus. However, it is important to realize that the reason Ebola poses such a threat in West Africa is due to the lack of adequate healthcare in affected countries. Ebola is no more deadly or contagious than many other diseases, but the lack of training, clean medical supplies, and personnel in West African hospitals has created a situation where the disease is able to run rampant. In a country with strong healthcare infrastructure and state of the art facilities, the Ebola virus would be much easier to contain.

Ebola is certainly a major public health priority in West Africa, but the truth is that for most of the world, it is far from the apocalyptic threat that many people claim it to be. The persistent myths and rumors above have fueled widespread paranoia and public fear about the virus, but it is vitally important to understand the facts in order to better facilitate efforts to contain and eliminate the outbreak at its source.

source

IMMIGRATION: President Trump’s Revised EO is Constitutional, Legal, and Common Sense

President Trump has signed a revised Executive Order (EO) on immigration and refugee resettlement. Democrats are already calling it a “Muslim ban.” A question that Democrats should ask themselves: What if former President Clinton had banned the 9/11/2001 hijackers from entering the United States, would we be better off today?

Secretary of Homeland Security John Kelly released the following statement about the EO:

“The Executive Order signed today by President Trump will make America safer, and address long-overdue concerns about the security of our immigration system. We must undertake a rigorous review of our visa and refugee vetting programs to increase our confidence in the entry decisions we make for visitors and immigrants to the United States. We cannot risk the prospect of malevolent actors using our immigration system to take American lives.

The Executive Order signed today is prospective in nature—applying only to foreign nationals outside of the United States who do not have a valid visa. It is important to note that nothing in this executive order affects current lawful permanent residents or persons with current authorization to enter our country. If you have a current valid visa to travel, we welcome you. But unregulated, unvetted travel is not a universal privilege, especially when national security is at stake.

“The Department of Homeland Security has worked closely with the Department of Justice, the Department of State, and the White House to create an executive order that addresses our information concerns while protecting the homeland and our citizens.”

Hans von Spakovsky in his The Daily Signal article “Why Trump’s Revised Executive Order Is Constitutional, Legal, and Common Sense” writes:

President Donald Trump’s revised executive order restricting travel from terrorist safe havens is just as constitutional and legal as his original order, despite what some courts such as the 9th U.S. Circuit Court of Appeals said about the original order.

But the revisions he has made, which clarify that the executive order does not apply to any foreigners who already hold visas to enter the U.S., will make it tougher for activist judges to justify any injunction orders they might be inclined to issue against it. Yet there is little doubt that progressive groups will seek such orders.

The executive order, “Protecting the Nation from Foreign Terrorist Entry into the United States,” confirms what the administration had previously announced, which is that the temporary, 90-day suspension of entry into the U.S. from certain designated countries will not apply to:

  • Lawful permanent residents as well as diplomatic, NATO, and U.N. personnel.
  • Foreign nationals admitted after the effective date of the executive order.
  • Individuals with a visa valid on the date of the executive order.
  • Dual nationals travelling on a passport issued by a non-designated country.
  • Individuals already granted asylum or refugee status before the effective date of the executive order.

This is an important revision because it voids the due process concerns that the 9th Circuit expressed—namely, that individuals who had already received approval to enter or reside in the United States might have that right taken away from them without a review and appeal process.

Read more…

Spakovsky concludes, “This executive order is clearly within the president’s authority under 8 U.S.C. § 1182 (f), in which Congress clearly delegated to the president the authority to suspend the entry of any aliens into the U.S. when he believes it would be ‘detrimental to the interests of the United States’.”

ABOUT HANS VON SPAKOWSKY

Portrait of Hans von Spakovsky

Hans von Spakovsky is an authority on a wide range of issues—including civil rights, civil justice, the First Amendment, immigration, the rule of law and government reform—as a senior legal fellow in The Heritage Foundation’s Edwin Meese III Center for Legal and Judicial Studies and manager of the think tank’s Election Law Reform Initiative. Read his research. Twitter: @HvonSpakovsky

RELATED ARTICLES: 

Tennessee Files Lawsuit Challenging Constitutionality of the Fed Refugee Resettlement Program

Who’s paying for the DACA program? | TheHill

Trump makes key changes to travel ban

Five takeaways from Trump’s new travel ban

Iraq’s lobbyists mobilized after travel ban, documents reveal

Politico: Fight will now focus on 120-day refugee moratorium

No One Mentions That The Russian Trail Leads To Democratic Lobbyists

Obama’s Denial of Trump Wiretaps Not Credible!

Here’s the list of proven victims of Obama’s many wiretaps according to WikiLeaks, who released the list on February 23rd (see link here) of Obama administration wire taps:

  1. The US National Security Agency bugged a private climate change strategy meeting; between UN Secretary General Ban Ki-Moon and German Chancellor Angela Merkel in Berlin;
  2. Obama bugged Chief of Staff of UN High Commissioner for Refugees (UNHCR) for long term interception targetting his Swiss phone;
  3. Obama singled out the Director of the Rules Division of the World Trade Organisation (WTO), Johann Human, and targetted his Swiss phone for long term interception;
  4. Obama stole sensitive Italian diplomatic cables detailing how Israel’s Prime Minister Benjamin Netanyahu implored Italy’s Prime Minister Silvio Berlusconi to help patch up his relationship with US President Barack Obama, who was refusing to talk to Netanyahu;
  5. Obama intercepted top EU and Japanese trade ministers discussing their secret strategy and red lines to stop the US “extort[ing]” them at the WTO Doha arounds (the talks subsequently collapsed);
  6. Obama explicitly targeted five other top EU economic officials for long term interception, including their French, Austrian and Belgium phone numbers;
  7. Obama explicitly targetted the phones of Italy’s ambassador to NATO and other top Italian officials for long term interception; and
  8. Obama intercepted details of a critical private meeting between then French president Nicolas Sarkozy, Merkel and Berluscon, where the latter was told the Italian banking system was ready to “pop like a cork”.

In addition to the above list we also know now that Obama wire tapped various individuals in the US media that were reporting information not flattering to the Obama Administration.  It is widely known that Obama’s Justice Department targeted journalists with wiretaps in 2013:

  1. In 2013 the liberal Washington Post expressed outrage after the revelation that the Justice Department had investigated the newsgathering activities of a Fox News reporter as a potential crime in a probe of classified leaks.  The reporter, Fox News’ James Rosen and his family, were part of an investigation into government officials anonymously leaking information to journalists. Rosen was not charged but his movements and actions were tracked.
  2. Also in 2013, members of the Associated Press were also a target of the surveillance.  The ultra liberal New Yorker even noted that “In moderate and liberal circles, at least, the phone-records scandal, partly because it involves the dear old A.P. and partly because it raises anew the specter of Big Brother, may well present the most serious threat to Obama’s reputation.”
  3. Reporter Sharyl Attkisson said in 2014 that her personal computer and CBS laptop were hacked after she began filing stories about Benghazi that were unflattering to the Obama administration.  A source who checked her laptop said the hacker used spyware “proprietary to a government agency,” according to an article in the New York Post.
Larry Klayman, Chairman and General Counsel of Freedom Watch published a column on the wiretaps of the Trump campaign. Klayman wrote:

The newest revelations that the Obama administration wiretapped, that is “bugged,” the president and all of his men in the lead up and after the November 8, 2016, elections are not surprising. In this regard, for over 2 years the highest levels of the Federal Bureau of Investigation (FBI) have been secretly investigating the “harvesting” of highly confidential information including financial records of the chief justice of the Supreme Court, other justices, over 156 judges, prominent businessmen like Donald Trump, and public activists like me.

In this regard, a whistleblower named Dennis Montgomery, a former NSA/CIA contractor, came forward to FBI Director Comey with 47 hard drives and over 600 million pages of largely classified information, under grants of use and derivative use immunity, which I obtained for him with the U.S Attorney for the District of Columbia. Later, Montgomery, who suffers from a potentially fatal brain aneurism, testified under oath, for over 2 1/2 hours before FBI Special Agents Walter Giardina and William Barnett in a secure room at the FBI’s field office in Washington, D.C. The testimony was under oath and videotaped and I have reminded the FBI recently to preserve this evidence.

I have also met on several occasions with the staff of Chairman Bob Goodlatte of the House Judiciary Committee, since judges have been illegally surveilled, and asked them to inquire of FBI Director Comey and his General Counsel James Baker why their Montgomery investigation has appeared to have been “buried” for the last few years. They have done so, but as yet have not received, to the best of my knowledge, a clear response.

[ … ]

Judge Leon, in the course of my cases before him (see www.freedomwatchusa.org), has already issued two preliminary injunction rulings ordering that the illegal mass surveillance cease and desist. He termed this unconstitutional violation of our Fourth Amendment, “almost Orwellian,” a reference to George Orwell’s prophetic book “1984” about “Big Brother.” Judge Leon’s rulings then prompted Congress to amend the Patriot Act and call them the USA Freedom Act, which sought to leave telephonic metadata in the hands of the telephone providers, like Verizon, Sprint, and AT&T, until a warrant was obtained showing probable cause that a target or subjects communications with terrorists or a crime was being committed.

It now appears that the Obama intelligence agencies, as I predicted to Judge Leon, have again ignored and flouted the law, and at the direction of the former president Obama and/or his men like Clapper illegally spied on targets or subjects like Mr. Trump and his associates, including Gen. Michael Flynn, the former national security adviser.

Read more…

In an article titled “TOWERGATE: Trump Accuses Obama Of Wiretapping Him. Here’s Everything You Need To Know” Ben Shapiro points out:

This [Trump] tweetstorm raises a few questions: first, did the Obama administration have Trump’s wires tapped in Trump Tower? Second, did President Obama himself have Donald Trump’s wires tapped in Trump Tower? Third, does Trump know what the hell he’s talking about? Fourth, if not, does it matter? Finally, how will this little conflagration play out politically?

1. The Obama Administration Did Monitor Communications Of People/Sources Surrounding Trump.The New York Timesreported months ago that the intelligence community had recordings of several of Trump’s associates; the Times speculated that such recordings could have been gathered because the Obama intelligence apparatus was wiretapping Russians and caught Trump officials on the other end.

[ … ]

2. There’s No Evidence Obama Himself Had Trump’s Wires Tapped. But It’s Not Impossible. Figures in the Obama administration immediately denied there were any direct orders to the DOJ to pursue a Trump wiretap. “A cardinal rule of the Obama administration was that no White House official ever interfered with any independent investigation led by the Department of Justice,” said Obama spokesman Kevin Lewis. “As part of that practice, neither President Obama nor any White House official ever ordered surveillance on any US citizen.

[ … ]

3. Trump Hasn’t Presented Any New Evidence. Trump hasn’t presented any evidence for his claims.

[ … ]

4. Yes, It Matters That Trump Tweets His Theories Without Evidence. But This Problem Doesn’t Start With Trump. This will raise serious questions about the behavior of the Obama administration in the run-up to the election. It will also raise questions about whether the Obama administration’s FISA requests were legitimate or political hits.

[ … ]

5. Trump’s Supporters Will Point To Obama’s Malfeasance, Obama’s Supporters Will Point To Trump’s Twitter Diarrhea, Both Will Be Right. So, how will this shake out?

Read more…

President Trump is great about speaking directly to the people. When he does the media goes into overload mode. Rather than investigating the facts behind Towergate, the media takes sides.

This is the most interesting administration in my lifetime. Can’t wait to see what President Trump does next.

RELATED ARTICLE: No One Mentions That The Russian Trail Leads To Democratic Lobbyists

Sweden’s Integration Minister admits to lying when she claimed rape rate was ‘going down’

The European political and media elites are doing everything they can to conceal the devastating effects of their suicidal immigration policies. But the truth can’t be covered up forever.

“FAKE NEWS: Sweden’s Integration Minister Admits Lying to BBC About Rape Stats,” by Liam Deacon, Breitbart, March 4, 2017:

Sweden’s ruling liberal party Integration Minister has been forced into an embarrassing U-turn after she falsely told BBC the number of reported rapes in the country was falling.

Ylva Johansson was giving an interview on the BBC News channel when she said there was no connection between crime and immigration and the level of rape in Sweden is “going down, and going  down, and going down.”

“The level of rapes is not actually high in Sweden”, she also said, after attacking former UKIP leader Nigel Farage – who recently said Malmo was the “rape capital of Europe” – claiming he “doesn’t really know what he is talking about.”

However, it appears Ms. Johansson isn’t so well informed herself. The latest figures show a 13 per cent increase in reported sex crimes in Sweden in 2016, and there has been a general increase over the past ten years.

The misleading claims drew sharp criticism from MPs, economists, and criminologists.

“We don’t need more fake news,” Tweeted the Moderate party’s labour policy spokesperson Elisabeth Svantesson. She called on the Ms. Johansson to explain herself, adding: “In what way is the number of sex crimes decreasing?”

The minister was forced to correct herself on Saturday. “I based my answer on information that I had at the time, that the number of reports of rapes went down in 2015,” she told the Dagens Nyheter newspaper.

“It was wrong of me to speak of a development that was only based on one year. The preliminary figures for 2016 unfortunately show that the figures are on the rise. It’s important to be correct, of course,” she added.

According to the Swedish National Council for Crime Prevention (Brå) stats, reported by Aftonbladet, there was indeed a dip in the number of rapes in 2015 (down 12 per cent), before rising sharply once more by 13 per cent in 2016.

Over the past decade, meanwhile, the increase has been steady, with the number of reported rapes rising from 4,208 in 2006 to 6,560 in 2016….

RELATED ARTICLES:

“The leader of the SPLC is aware the Council on American Islamic Relations (CAIR) is a Hamas organization”

UK supermarket clerk converts to Islam, gets bomb-making instructions, tries to join jihadis, blames Brexit

EDITORS NOTE: This column originally appeared on Jihad Watch.

Oklahoma lawmaker gives questionnaire to Muslims, Islamic Supremacists Outraged

Bennett-John-200x300

Rep. John Bennett. Photo: Oklahoma House of Representatives Legislature’s website.

Hamas-linked CAIR’s Adam Soltani asks: “The question that comes to mind is, does he do this to others? Does he ask question to his Christian constituents? His Jewish constituents? If the answer is no, that’s discrimination. There’s no other way to call it.”

All right. However, there have been 30,000 murderous jihad attacks worldwide since 9/11 carried out by Muslims who found impetus and justification for them in the Qur’an and Sunnah. Christians and Jews, meanwhile, are not committing acts of violence and pointing to their holy book to justify it and make recruits among peaceful Christians and Jews. Is John Bennett not allowed to notice that, and decry it?

Soltani also said: “Nobody should be vetted with stupid, Islamophobic, hateful, bigoted questions before they can meet with their representative.”

Well, in reality, if my representative asked me to fill out a questionnaire before he or she would meet with me, I would just fill it out. Soltani says that the questions are “stupid, Islamophobic, hateful, bigoted,” but he doesn’t explain why (and of course “journalist” Mary Ann Georgantopoulos of the establishment propaganda media organ BuzzFeed doesn’t ask him to). There is an important reason for this: Soltani knows full well that the Qur’an tells Muslim men to beat women from whom they fear disobedience (4:34), and that multiple hadiths record that Muhammad married a 6-year-old girl (Aisha) when he was 51 (or thereabouts), and that Bennett’s other questions also have a foundation in actual Islamic teaching and practice.

If Soltani and Hamas-linked CAIR were operating in good faith, they would admit that the Qur’an sanctions wife-beating and that spousal abuse is not just rampant but taken for granted in many areas of the Islamic world, and would detail a genuine program for reform and a determination that women not be beaten. Instead, Soltani dismisses the questions as “Islamophobic” and claims victim status. This is typical, but it doesn’t make the questions go away.

Bennett-questions

“This Lawmaker Asked Muslims If They Beat Their Wives Before He Would Allow A Meeting,” by Mary Ann Georgantopoulos, BuzzFeed News, March 3, 2017:

Muslims hoping to meet with a Oklahoma lawmaker during a special event had to first fill out a controversial questionnaire about Islam that included inquiries such as “Do you beat your wife?”

Oklahoma Rep. John Bennett asked his constituents taking part in the state’s third annual Muslim Day on Thursday — in which Muslims have the opportunity to interact with state legislators at the capitol — to fill out the questionnaire.

Adam Soltani, executive director of Council on American–Islamic Relations (CAIR) Oklahoma, told BuzzFeed News that high school students from Tulsa’s Peace Academy visited Bennett’s office to either meet with him or schedule a meeting.

The students were met by a legislative assistant, Soltani said, who gave the students a questionnaire, telling them it must be filled out in writing.

The nine-part questionnaire includes questions such as, “The Koran, the sunna of Mohammed and Sharia Law of all schools says that the husband can beat his wife. Do you beat your wife?”

Another question is, “I have heard that, according to accepted Islamic sources, Mohammed, at age of 49, married a 6-year-old girl, and that he had sex with her when he was 52 and she was only 9 years old. Is that really true?”

“I was distraught when [the students] showed me the questionnaire,” Soltani told BuzzFeed News. “I wasn’t completely surprised by it because obviously we have been challenging Bennett’s hate rhetoric for many years.”…

Soltani said he does not know how many people got the questionnaire because more than 200 people attended Muslim Day at the Capitol, adding that all the other legislators were very supportive and welcoming.The questionnaire was written up by anti-Islam group ACT for America — the group’s logo and email address are on the sheet of paper.

“The question that comes to mind is, does he do this to others?” Soltani said. “Does he ask question [sic] to his Christian constituents? His Jewish constituents? If the answer is no, that’s discrimination. There’s no other way to call it.”

Soltani said there shouldn’t be somebody working for the state of Oklahoma who doesn’t represent all citizens.

“Nobody should be vetted with stupid, Islamophobic, hateful, bigoted questions before they can meet with their representative,” Soltani said in a video posted to Facebook Thursday.

RELATED ARTICLES:

‘Explanatory Memorandum’ Detractors Ignore Evidence About MB in America by John Rossomando – IPT News

Toronto anti-Islamophobia rally opposes war against the Islamic State

“The leader of the SPLC is aware the Council on American Islamic Relations (CAIR) is a Hamas organization”

FULL TEXT OF THE QUESTIONNAIRE:

CENTRAL OKLAHOMA

Questions About Islam

  • The sunna of Mohammed says that Muslims must be punished for leaving Islam. Do you agree with this?
  • Mohammed was a killer of pagans, Christians and Jews that did not agree with him. Do you agree with this example?
  • Mohammed repeatedly advised Muslims to deceive kafirs to advance Islam. The Koran has over 90 versus that say Mohammed is the perfect example for Muslims to follow. Do you follow the perfect example of Mohammed? Have you deceived a kafir?
  • The Koran, the sunna of Mohammed and Shariah Law of all schools say that the husband can beat his wife. Do you beat your wife?
  • Shariah law says that if must rule over the kafirs, the non-Muslims. Do you agree with this?
  • I have heard that, according to accepted Islamic sources, Mohammed, at the age of 49, married a 6-year old girl, and that he had sex with her when he was 52 and she was only 9 years old. Is that really true?
  • In December 1948, the United Nations passed the Universal Declaration of Human Rights which enshrines the most important values of Western Civilization such as freedom of religion, freedom from religion, freedom of conscience, equality of religions, and equality of men and women. It is a fact that not a single one of the 57 Muslim countries has accepted the Universal Declaration of Human Rights. Instead, all of the Muslim countries signed the Cairo Declaration of Human Rights in Islam which makes Islam superior to all other religions, and which explicitly makes shariah Law, the only source of human rights. What, exactly, is it about the Universal Declaration of Human Rights which shariah law finds unacceptable?
  • The Koran says: The unbelievers are your inveterate enemy. (4:101). The Koran also says that unbelievers are the “vilest of all creatures” (96:8) and “worst of animals” (8:55). What hope is there of coexistence when Mohammed teaches practicing Muslim to have this attitude toward non-Muslims?
  • A fundamental principle of Christianity and Judaism is the “Golden Rule” which says “Do unto others as you would have them do unto you.” Yet, the Koran says: “Mohammed is God’s apostle. Those who follow him are ruthless to the unbelievers but merciful to one another.” (48:29) With this attitude, how can orthodox followers of Mohammed possibly co-exist with non-Muslims?

actcentralok@gmail.com

The Crimes of Qassem: The U.S. should shut down Iran’s top terrorist

He might not be a household name in America — at least, not yet. But throughout the Middle East, Qassem Suleymani makes the righteous and the innocent tremble.

To the righteous — meaning, from his perspective, the Shiite zealots who believe the Islamic state of Iran should establish the caliphate and dominate the world — he is an awe-inspiring figure.

He is powerful. He is brash. He brazenly shows up on the battlefield to encourage his troops. In Iraq, he has become the maker of prime ministers and governments, and commands a militia of 100,000 men.

To his innocent victims, he is the face of Terror, Inc. As head of the Islamic Revolutionary Guards Corps – Quds Force (IRGC-QF), Qassem Suleymani is Iran’s top terrorist.

The Quds Force is euphemistically in charge of “extraterritorial” operations for the IRGC. I call it their expeditionary overseas terrorist wing.

In the early days, they were the ones who sent terror trainers to Lebanon to teach Hezbollah how to build better car bombs. Later, they knocked off a Lebanese prime minister and launched an all-out war on Israel in the summer of 2006, firing thousands of rockets at Israeli schools, hospitals and towns.

When Iran’s leaders decided in the early 1990s to forge an alliance in terror with a Saudi dissident named Osama bin Laden, they turned the file over to the Quds Force for action.

The Quds Force has been implicated in terror plots all around the world, including a failed 2011 attempt to blow up the Saudi ambassador at a Washington, D.C. restaurant. Suleymani and his operatives were also implicated in the September 11 plot, helping 10 to 12 of the Saudi “muscle” hijackers travel clandestinely through Iran to Afghanistan and providing logistical and other support.

In February 2007, Pentagon officials briefed reporters in Baghdad on Quds Force assistance to insurgents in Iraq.

The briefing included information and documents seized from Quds Force operatives detained by U.S. forces in Iraq, and photographic evidence of Iranian-made roadside bombs, known as Explosively Formed Projectiles, or EFPs.

The introduction of EFPs onto the battlefields of Iraq and Afghanistan by Suleymani and his men changed the scope and scale of U.S. casualties, ultimately accounting for as many as 1,500 U.S. battlefield dead.

I spoke recently to medically retired U.S. Army Sgt. Robert Bartlett about his encounter with an Iranian EFP. The force of the projectile “cut me in half from the left corner of my temple down to my jaw, and took my gunner’s legs off. Because of this Iranian bomb, I died three times in five days.

“Only my faith kept me alive,” he said.

The U.S. Army told Samantha Balsely that her 23-year old husband Michael had been killed in Iraq by an Improvised Explosive Device. Later, it became apparent that he, too, had been killed by an Iranian EFP.

“When I found out the government had given Iran billions of dollars, it was the biggest slap in the face,” Samantha told me. “How can you say you respect what our men and women do when you order them over there and then you pay their killers. It’s not right.”

Samantha Balsley is right. It’s just not right for the U.S. government to continue rewarding the Iranian regime, when they continue to kill Americans.

We know who these killers are. They have names. And they work for an organization: the Islamic Revolutionary Guards Corps and its “expeditionary” Quds Force.

As an immediate step, the Trump administration should follow through on hints that it is contemplating designating the IRGC and the Quds Force as international terrorist organizations.

The United States should take additional steps against Suleymani personally, blocking his assets, punishing businesses that transact with him or his Quds Force killers, and seeking an international travel ban.

Beyond that, the U.S. intelligence community should investigate reports from officials and media in Iraqi Kurdistan that Suleymani and the Quds Force facilitated the ISIS takeover of Mosul and the Nineveh Plain in June 2014, acts that could qualify as war crimes.

The crimes of Qassem Suleymani are many. After Osama bin Laden, he has more American blood on his hand than any terrorist. It’s time we shut him down for good.

Pending Civil War in America

I have written about this issue a few times and believe we are now closer to this happening in America between the liberal nation of America and the conservative nation. There is a smell in the air that our beautiful country is about to erupt. No longer do liberals and conservatives march on and work with one another.

Obama set us on this course and it is my belief he did it intentionally to advance the Islamic ideology throughout the world. It is no secret he was pro Islam to the millionth degree. A little story from behind the scenes. So much is going on about whether the Republican aides had contact with Russia. Now when Obama was running for President he had meetings with terrorists like Bill Ayers. In 2008 my team had infiltrated the Muslim Brotherhood known as CAIR. I had several people working from inside CAIR. Guess who showed up at CAIR before Obama was elected in 2008. You guessed it, it was Obama’s entourage. They were working with the Muslim Brotherhood leaders. Why no investigation. You guess why.

There is so much hate in the air between liberals and Muslims against the American patriots (conservatives). The liberals are like a pack of rabid wolves. This type atmosphere can not last forever. It is my analysis that war (physical) will erupt in America before ten years go by. The Islamic leaders are pushing this agenda and have been doing so for decades.

The vast majority of colleges are liberal and the professors are brainwashing our children. The liberal children have become zombies with hate in their eyes and actions. It reminds me of the years I spent in South Korea. The students were protesting more than they were in school. They were violent.

Now the most important question. What can we do?

America is like a car on inches of thick solid ice. We are cruising at 100 miles per hour and out of control. We have crossed the line of no return. There will be a war in America and there is absolutely nothing that can be done at this point except to prepare for it.

I encourage all families to begin preparing for a long battle. Have at least a years supply of food and water stored. Keep your 2nd Amendment rights alive. You do not want to wake up one day when hell breaks out and have to tell your children or grandchildren that there is no food. Then you look out your window and savage people are coming to your door to steal what you have and willing to kill for it. A kitchen knife is just not going to do it.

Prepare now or your children will suffer.