Judge refuses to halt Trump’s new immigration order

Judge James Robart, who issued a temporary restraining order against the initial ban in February, declined to apply it to the new executive order. Perhaps he was stung by the criticism: in his first restraining order, he falsely claimed that no jihad terror attacks had been committed by migrants from the countries covered in the ban, when in reality there had been many.

Could this be an indication that the hard-Left, out-of-control judiciary is finally having to demonstrate more responsibility? Unlikely, but it’s still a good sign.

“Judge Refuses To Halt Trump’s New Immigration Order,” by Kerry Picket, Daily Caller, March 10, 2017:

A federal district court denied a request to place an emergency restraining order on President Donald Trump’s modified immigration executive order, an attorney representing states opposing the order told Reuters Friday night.

The initial executive order posted by the Trump administration — which restricted travel from seven countries with majority Muslim populations — last January was challenged by lawyers in states such as Washington and Minnesota.

Seattle U.S. District Court Judge James Robart issued a temporary restraining order against the initial policy last month.

The new order narrowed the travel restriction down to six countries and would give exception to green card holders among other changes. According to Reuters, Robart did not apply his restraining order to the new immigration order….

RELATED ARTICLE: UK: 5,500 cases of FGM in 2016 alone, not a single prosecution

The Trojan Horse of Terrorism

In a March 7, 2017 story by Dan Bilefsky, headlined “Hungary Approves Detention of Asylum Seekers in Guarded Camps,” the New York Times reported that,

“Europe’s simmering backlash against immigration came into sharp relief on Tuesday when the Hungarian Parliament approved the detention of asylum seekers in guarded and enclosed camps on the country’s southern border, in what human rights advocates called a reckless breach of international law.”

According to the Times,

“Prime Minister Viktor Orban justified the measure on the grounds that it would secure the European Union’s borders from migrants and act as a powerful deterrent against migration, which he called the ‘Trojan horse of terrorism.’ ”

The Prime Minister is quoted as saying,

“We are under siege.  The flood of migration has slowed down but has not stopped.  Laws apply to everyone.  This includes those migrants who want to cross Hungary’s border illegally.  This is the reality, which cannot be overruled by charming human rights nonsense.”

Unfortunately, it is “charming human rights nonsense” that now informs immigration policy on the political left in the United States, just as it has in most Western European nations.  While liberals and Democrats oppose any and all limitations on immigration from majority Muslim countries… in the apparent hope that American Muslims will repay the favor by becoming a reliable Democratic voting bloc… even they express concern over the potential for isolated terror attacks in the near term.  What apparently escapes their attention is the clearly stated long term goal of Muslim migration: the complete domination of Islam over all the nations of the world.

In his first speech before a joint session of Congress on February 28, President Trump paused, gazed directly into the camera, and carefully enunciated words that Barack Obama famously refused to utter. He said,

“Our obligation is to serve, protect, and defend the citizens of the United States… We are also taking strong measures to protect our nation from radical Islamic terrorism.”

However, as appealing and as essential as that resolve might be, by focusing only on the unspeakable atrocities of radical Islamists, we run the risk of overlooking or downplaying what is an even more deadly and more pervasive long term threat: the danger of what Hungarian Prime Minister Orban referred to as the “Trojan horse of terrorism,” the unfettered flow of Muslim migrants and refugees across international frontiers into the Western world.

In his book, Slavery, Terrorism, and Islam: The Historical Roots and Contemporary Threat, Dr. Peter Hammond explains something that every Christian, every Jew, and every other non-Muslim on the face of the Earth must understand… which is that Islam does not qualify as a religion in the normally accepted sense of the word.  Instead, as a complete legal, political, economic, social, and military system with a religious component, the West’s dangerous flirtation with multiculturalism can only be described as “charming human rights nonsense.”  And while most non-Muslims worry about the possibility of being murdered in an isolated “lone wolf” terror attack, they all but ignore the long term implications of Muslim expansionism.    

Dr. Hammond explains the process of “stealth jihadism” carried out by muhajirs, or Muslim immigrants.  He tells us that “Islamization begins when there are sufficient Muslims in a country to agitate for their religious privileges.  When politically correct, tolerant, and culturally diverse societies agree to Muslim demands for their religious privileges, some of the other components tend to creep in as well.”

In his May 8, 2015 treatise, titled, Islam, Interreligious Dialogue, and Evangelization, Andre Villeneuve, Ph.D. of Saint John Vianney Seminary, describes the ecumenical schizophrenia displayed by the Catholic Church in their approach to Islam in just the past two decades.  He quotes Pope Benedict XVI in his Regensburg Lecture of September 12, 2006.  Benedict quoted the 14th century Byzantine emperor Manuel II Paleologus, who said,

“Show me just what Mohammed brought that was new, and there you will find things only evil and inhuman, such as his command to spread by the sword the faith he preached.”

However, Villeneuve goes on to describe a contrary view held by the current prelate, Pope Francis.  He writes,

“After praising the commitment to prayer, faith, devotion, and ethical values of many Muslims, (Pope) Francis encourages Christians to adopt a welcoming attitude towards the increasing number of Muslim immigrants in traditionally Christian countries, while asking for a reciprocal freedom of worship for Christians living in Muslim countries.”

Reciprocal freedom of worship?  It is, at best, a naive pipe-dream.  While a few majority Muslim nations have tolerated Christian congregations in their midst, many of those Christians are now victims of genocide.  To expect that those attitudes will ever change is worse than naïve… it is dangerous and it is suicidal.

Christians are taught from early childhood to heed the words of Jesus in Matthew 5:39.  In his Sermon on the Mount, Jesus said,

“But I say unto you, that ye resist not evil: but whosoever shall smite thee on thy right cheek, turn to him the other also.”

As the leader of the world’s 1.2 billion Roman Catholics, Pope Francis is obliged to instruct his flock to “turn the other cheek.”  However, while that counter-intuitive advice may be valuable to me in a one-on-one relationship with my next door neighbor or a co-worker, just how far does it go?  In other words, how are we to react when all of western civilization hangs in the balance?

On September 3, 2011, Swiss parliamentarian Oskar Freysinger, of the Christian Democratic People’s Party addressed some very important thoughts to a Berlin audience… thoughts that the American people would do well to hear and heed in 2017.  He said, in part, “My dear Berlin friends, I come to you today as a neighbor and as a concerned friend…”

Referring to the rules imposed on non-Muslims living in majority Muslim nations, Freysinger said, “The dhimmi attitude of Europeans sustained a wound which must not heal over if the millennia-old European civilization is to survive, for Europe is more than a plot of land, more than a continent, more than the sum of its countries.  Europe is an idea, a cultural landscape, an intellectual space shaped by history.  Europe is the cradle of the modern constitutional state, the treasure house of human rights, of freedom of opinion and expression.

“This is ever more strongly endangered by the possibility that our political elite will bend their necks before (an Islamic) religious dogma that is alien to our intellectual history, our values, and our constitutional state.  This dogma is gnawing away at the pillars of our system of laws, wherever it is allowed some space.  This dogma demands total obedience from its followers.

“They are in no case to integrate into our value system.  That would be like treason and can even be punished with death.  They are expected to conquer our intellectual home, make the Western world subject.  Not with tanks, rockets, or riflemen.  Not through brutal revolution.  No, Islam is in no hurry.  It has an eternity.  A long process of softening up and leisurely occupation of our child-poor society is foreseen.  The Islamic doctrine is expected to gradually creep into everyday life and Fortress Europe will crumble from within.

“And what are we doing?  We are allowing this violent doctrine, unhindered in cultural ghettos, to strain at toppling the nation of laws…  When women are beaten and whole city districts are taken over, we look the other way.  We believe we can soften the power hunger of the holy warriors with welfare money.  We believe we can buy peace! What lunacy!  No one fingers the Prophet’s beard.  Fanatics cannot be bought.  Germany should know that better than any country in the world…”

He concluded by saying, “If we lose this battle there will be no second chance, for Islam does not give back what it has conquered.  So I summon all the humanists of this continent not to keep their heads in the sand and to resist the Islamic dogma’s drive to conquest.  Let us stand together and uncompromisingly insist upon the primacy of our civil law over any religious dogma.  Let us find our way back to our precious intellectual heritage.  Islam is only as strong as we are weak”

It is estimated that, by the end of this century, in the absence of some unforeseen divine intervention, Muslims will exceed 50 percent of the world’s population.  But long before that time, it is reasonable to assume that most of 21st century Western civilization will have become unraveled and our descendants will find themselves facing a squalid 7th century lifestyle. As Prime Minister Orban so aptly describes it, the current level of Muslim immigration into the West can best be described as the “Trojan horse of terrorism.”  Left unfettered, it can have no good end.  As matters now stand, we cannot assume that the Europe we have known and loved for many centuries, and from which our forbears emerged, will continue to exist beyond ten or twenty more years.

While Europe may be the “cradle of the modern constitutional state, the treasure house of human rights, of freedom of opinion and expression,” the United States is the laboratory in which those concepts were tested and proven.  That fact, alone, gives Islamists all the justification they need to see us wiped from the face of the Earth.  There is far too much at stake to be gambled away in some “charming human rights” experiment, in a contest we cannot win.  And if we are so unwise as to invite the forces of Islam to coexist with us, on our own soil, then we too, like Europe, will crumble from within.

RELATED ARTICLE: Trump reportedly considering Mideast peace conference

The Case for a ‘Religious Test’ in America

There has been a narrative that there cannot be a “religious test” for public office. This is based upon Article VI of the U.S. Constitution which reads:

The Senators and Representatives before mentioned, and the members of the several state legislatures, and all executive and judicial officers, both of the United States and of the several states, shall be bound by oath or affirmation, to support this Constitution; but no religious test shall ever be required as a qualification to any office or public trust under the United States.

Note that Article IV says “required as a qualification to any office or public trust.” Article VI does not say that citizens cannot establish a personal “religious test” when voting for anyone running for or currently holding public office. Voters do vote their values. This raises the question:

Should there be a religious test, and if so, who should be tested?

Recently Oklahoma State Representative John Bennett ask those visiting his office who are Mohammedans, followers of Mohammad, to fill out a questionnaire. The Council on American Islamic Relations (CAIR) Adam Soltani asked: “The question that comes to mind is, does he do this to others? Does he ask question to his Christian constituents? His Jewish constituents? If the answer is no, that’s discrimination. There’s no other way to call it.”

Mr. Soltani has a valid point, which raises two fundamental questions:

  1. Do elected officials have the right to ask their constituents to take a “religious test” questionnaire before meeting with them?
  2. Do citizens have the same right to present a “religious test” questionnaire to their elected officials?

In the United States there are voters who cast their ballots based upon their beliefs. These beliefs can be political, social and religious. Many argue that these three are inextricably linked. Whether you are an atheist, agnostic, Christian, Jew, Mohammedan, Democrat, Republican, Independent or other, you will vote your values.

So, where do values come from? Answer: Religious beliefs!

The First Amendment gives everyone the right to freedom of speech and to petition their elected representatives.

Religious beliefs are a measure of ones character as Dr. Martin Luther King noted in his “I have a dream” speech. Therefore a religious test is really a test of one’s character and is not only necessary but fundamental to our Constitutional republican form of government.

As John Adams said, “Our Constitution was made only for a moral and religious people. It is wholly inadequate to the government of any other.”

To help determine the character of citizens and elected officials alike, we have modified the questionnaire used by Representative Bennett and added another to be given to all those who are not Mohammedans.

Please feel free to use them as you wish.

Questions for non-Mohammedans

  1. The the Book of Genesis states: “I am the Lord your God, who brought you out of Egypt, out of the land of slavery.” Do you agree with this?
  2. “You shall have no other gods before me.” Do you agree with this? If not what God do you worship?
  3. “You shall not make for yourself an image in the form of anything in heaven above or on the earth beneath or in the waters below. You shall not bow down to them or worship them; for I, the Lord your God, am a jealous God, punishing the children for the sin of the parents to the third and fourth generation of those who hate me, but showing love to a thousand generations of those who love me and keep my commandments.” Do you agree with this? Do you bow down to false images?
  4. “You shall not misuse the name of the Lord your God, for the Lord will not hold anyone guiltless who misuses his name.” Do you agree with this?
  5. “Remember the Sabbath day by keeping it holy. 9 Six days you shall labor and do all your work, 10 but the seventh day is a Sabbath to the Lord your God. On it you shall not do any work, neither you, nor your son or daughter, nor your male or female servant, nor your animals, nor any foreigner residing in your towns. For in six days the Lord made the heavens and the earth, the sea, and all that is in them, but he rested on the seventh day. Therefore the Lord blessed the Sabbath day and made it holy.” Do you agree with this?
  6. “Honor your father and your mother, so that you may live long in the land the Lord your God is giving you.” Do you agree with this?
  7. “You shall not murder.” Do you agree with this?
  8. “You shall not commit adultery.” Do you agree with this? Have you ever committed adultery?
  9. “You shall not steal.” Do you agree with this? Have you ever stolen?
  10. “You shall not give false testimony against your neighbor.” Do you agree with this? Have you lied?
  11. “You shall not covet your neighbor’s house. You shall not covet your neighbor’s wife, or his male or female servant, his ox or donkey, or anything that belongs to your neighbor.” Do you agree with this? Have you coveted?

Questions for Mohammedans

  1. The Sunna of Mohammed says that Muslims must be punished for leaving Islam. Do you agree with this?
  2. Mohammed was a killer of pagans, Christians and Jews that did not agree with him. Do you agree with this example?
  3. Mohammed repeatedly advised Muslims to deceive Kafirs to advance Islam. The Koran has over 90 versus that say Mohammed is the perfect example for Muslims to follow. Do you follow the perfect example of Mohammed? Have you deceived a Kafir?
  4. The Koran, the Sunna of Mohammed and Shariah Law of all schools say that the husband can beat his wife. Do you beat your wife?
  5. Shariah law says that if must rule over the kafirs, the non-Muslims. Do you agree with this?
  6. I have heard that, according to accepted Islamic sources, Mohammed, at the age of 49, married a 6-year old girl, and that he had sex with her when he was 52 and she was only 9 years old. Is that really true?
  7. In December 1948, the United Nations passed the Universal Declaration of Human Rights which enshrines the most important values of Western Civilization such as freedom of religion, freedom from religion, freedom of conscience, equality of religions, and equality of men and women. It is a fact that not a single one of the 57 Muslim countries has accepted the Universal Declaration of Human Rights. Instead, all of the Muslim countries signed the Cairo Declaration of Human Rights in Islam which makes Islam superior to all other religions, and which explicitly makes shariah Law, the only source of human rights. What, exactly, is it about the Universal Declaration of Human Rights which shariah law finds unacceptable?
  8. The Koran says: The unbelievers are your inveterate enemy. (4:101). The Koran also says that unbelievers are the “vilest of all creatures” (96:8) and “worst of animals” (8:55). What hope is there of coexistence when Mohammed teaches practicing Muslim to have this attitude toward non-Muslims?
  9. A fundamental principle of Christianity and Judaism is the “Golden Rule” which says “Do unto others as you would have them do unto you.” Yet, the Koran says: “Mohammed is God’s apostle. Those who follow him are ruthless to the unbelievers but merciful to one another.” (48:29) With this attitude, how can orthodox followers of Mohammed possibly co-exist with non-Muslims?

RELATED ARTICLE: The Eighth Deadly Sin

The TRUTH about the Muslim Immigration BAN

This video by Steve Cioccolanti & Discover Ministries explains why Christians have a Biblical role to deal with real world issues, such as media lies and America’s policies toward Islam.

Pastors, priests and rabbis have a duty to expose the truth as does Steve Cioccolanti.

KHAN JOB? Khizr Khan claims his ‘travel privileges are being reviewed’

Khizr Khan first rose to national prominence when he verbally attacked Donald Trump during the Democratic National Convention stating that Trump had sacrificed nothing and questioned whether Trump had ever read the Constitution.  We will discuss the Constitution at the conclusion of my commentary.

Khan is a Harvard educated lawyer whose son Humayun Khan, a captain in the U.S. Army died in Iraq in 2004.  He had graduated from the University of Virginia.

Khizr Khan has accused President Trump of discriminating against Muslims and once again, made headlines when Ramsay Talks, the speakers bureau who purportedly had arranged a speaking engagement in Toronto for Khan, posted a notice that a March 7 speaking event was cancelled blaming a purported notification that his “travel privileges are being reviewed”:

Khizr Khan Event Cancellation:

Late Sunday evening Khizr Khan, an American citizen for over 30 years, was notified that his travel privileges are being reviewed.  As a consequence, Mr. Khan will not be traveling to Toronto on March 7th to speak about tolerance, understanding, unity and the rule of law.  Very regretfully, Ramsay Talks must cancel its luncheon with Mr. Khan.

Guests will be given full refunds.

Mr. Khan offered his sincere apologies to all those who made plans to attend on March 7th.  He said:  “This turn of events is not just of deep concern to me but to all omg fellow Americans who cherish our freedom to travel abroad.  I have not been given any reason as to why.  I am grateful for your support and look forward to visiting Toronto in the near future.

On March 6, 2017 Politico reported, Khizr Khan claims travel privileges under review, noting in part:

Khan said in a statement that he was confused about why his travel status changed, without explaining in detail the circumstance.

“This turn of events is not just of deep concern to me but to all my fellow Americans who cherish our freedom to travel abroad,” Khan said. “I have not been given any reason as to why. I am grateful for your support and look forward to visiting Toronto in the near future.”

It’s not clear exactly what Ramsay Talks meant by “traveling privileges,” and the group did not respond to a request for comment, nor did Khan.

A U.S. Customs and Border Protection official, citing privacy issues, declined to discuss Khan specifically but appeared to dispute the report, telling POLITICO that CBP doesn’t contact travelers in advance of their travel abroad.

“With respect to Global Entry or trusted traveler membership, CBP’s engagement is about the status of membership in the program, not any particular travel itself,” the official said. “Of course, any U.S. citizen with a passport may travel without trusted traveler status. All individuals are subject to inspection departing or upon arrival to the United States.”

On March 7, 2017 the Washington Post reported, Khizr Khan’s claim that the U.S. is restricting his travel may be unraveling.

In rushing to report on this, the media ignored the laws that address the issuance of passports to U.S. citizens and the admission of U.S. citizens seeking to enter the United States.  Apparently

the overwhelming visceral urge to attack the U.S. government under the Trump administration was apparently too great for the journalists to take a breath and do their homework.

American citizens who possess a valid passport or equivalent travel document do not require the permission of the United States government to travel outside the United States.  The only time that any such restriction might be imposed is if a citizen of the United States has been convicted of certain crimes or is being prosecuted for allegedly committing serious crime(s) and a court has required that such a citizen surrenders his/her passport to prevent international flight to evade prosecution.

Federal law established the grounds by which a U.S. citizen would be denied a passport.  Generally convicted felons may be issued a passport but citizens convicted of certain crimes international drug trafficking may be ineligible.  The section of law that relates to such situations is, 22 U.S. Code § 2714 – Denial of passports to certain convicted drug traffickers.

As for United States citizens returning to the United States, two documents are worth considering because they provide verification of a fundamental fact, American citizens may never be barred from reentering the United States under any conditions, whatsoever.

The official website of Customs and Border Protection (CBP) provides information about the Immigration Inspection Program and includes the following excerpt:

Individuals seeking entry into the United States are inspected at Ports of Entry (POEs) by CBP officers who determine their admissibility. The inspection process includes all work performed in connection with the entry of aliens and United States citizens into the United States, including preinspection performed by the Immigration Inspectors outside the United States.

“An officer is responsible for determining the nationality and identity of each applicant for admission and for preventing the entry of ineligible aliens, including criminals, terrorists, and drug traffickers, among others. U.S. citizens are automatically admitted upon verification of citizenship; aliens are questioned and their documents are examined to determine admissibility based on the requirements of the U.S. immigration law.”

Next we should consider that Section 12.1 (Inspection of U.S. Citizens) contained in the U.S. Customs and Border Protection (CBP) Inspector’s Field Manual:

12.1 Inspection of U.S. Citizens.

When you are convinced that an applicant for admission is a citizen of the United States, the examination is terminated. This is not to say that your role as an inspector is always completed at that time. Listing of the subject in a lookout system may dictate further action, such as notifying Customs or another agency of the person’s entry.

It must be emphasized that the grounds of inadmissibility contained in 212(a) of the INA are applicable only to aliens. Consequently, the examination of a person claiming to be a United States citizen is limited to matters required to establish present citizenship. Once you are satisfied the person being examined is a U.S. citizen and any required lookout query has been completed, the examination is over.

The only question the remains is why Kahn would make these claims.  Were there not enough customers willing to pay to hear him speak about “tolerance, understanding, unity and the rule of law?”

Was he convinced that the sequel to his appearance at the Democratic Convention where he launched an attack on Donald Trump might propel him into a politically prominent role in the Democratic Party?

Was he seeking to create the illusion that the United States has turned into a police state and Americans had lost their freedoms under the month-old Trump administration?

Whatever his motivation, it is clear that Mr. Kahn is hardly eager to promote “tolerance, understanding, unity and the rule of law.”

The death of Kahn’s son is a tragedy and he must be remembered as a hero who died defending our nation.  But Mr. Kahn needs to understand that by creating a false claim about some contrived review of his “travel privileges” does not honor his son’s memory and certainly does not help to bring all Americans together but is divisive- perhaps intentionally divisive.

It is likely that Khizr Khan and his wife legally immigrated to the United States, to obviously pursue his dreams and apparently prospered as a result.

Mr. Khan is certainly right about the Constitution guarantees of equal protection under the law, but also includes

Article IV, Section 4, to wit:

The United States shall guarantee to every State in this Union a Republican Form of Government, and shall protect each of them against invasion; and on Application of the Legislature, or of the Executive (when the Legislature cannot be convened) against domestic Violence.

Thousands of innocent people have died at the hands of terrorists operating in the United States in a series of deadly attacks carried out by radical Islamists who most often entered the United States through ports of entry.

The measures that Donald Trump called for in his campaign and in his subsequent executive orders, including “extreme vetting” have been consistent with the demands of the Constitution and with the findings and recommendations published in The 9/11 Commission Report and the official report “9/11 and  Terrorist TravelStaff Report of the National Commission on Terrorist Attacks Upon the United States.

A section worth reviewing found in the latter report, Terrorist Entry and Embedding Tactics, 1993 to 2001 begins with the following paragraph:

The relative ease with which the hijackers obtained visas and entered the United States underscores the importance of travel to their terrorist operations. In this section we explore the evolution of terrorist travel tactics and organization. We begin with terrorist plots in the 1990s and conclude with the 9/11 attack.

3.2 Terrorist Travel Tactics by Plot includes the following:

Although there is evidence that some land and sea border entries without inspection occurred, these conspirators mainly subverted the legal entry system by entering at airports. In doing so, they relied on a wide variety of fraudulent documents, on aliases, and on government corruption.

Facts are, indeed, stubborn things.

EDITORS NOTE: This column originally appeared in FrontPage Magazine.

VIDEO: The ‘TOP 5’ Under Reported Scariest Facts About the Vault 7 WikiLeaks Release

In this video, we go over the latest news collected from the WikiLeaks Vault 7 release about the CIA. We go over scariest revelations from this release giving you some context on Donald Trump, The Russia Hysteria and the vast amount of accountable power the CIA actually has.

RELATED ARTICLES:

Who is Attorney General Loretta Lynch? FISA court handled two requests to wiretap Donald Trump

WikiLeaks: CIA Uses ‘Stolen’ Malware to ‘Attribute’ Cyberattacks to Nations Like Russia

Phished Wiretap Scandal Implodes by Dennis G. Hurst

Non-Denial “Denial” Demands Criminal Investigation Into Obama’s Silent Coup

Freedom Watch offers to represent President Trump and White House over illegal Obama wiretapping

Obama & FISA: Trump Wiretap May Have Been Sought | National Review

Obama spox says Obama never wiretapped a US citizen — immediately receives harsh history lesson – TheBlaze

DOJ seized phone records for Fox News numbers, reporter’s parents | Fox News

What you need to know about FISA Court Warrants

FISA warrants and the investigation into whether Obama ordered one is hog wash at the highest level.

Today my dad, who is 78, called me and asked a vital question about the FISA warrants and criminal warrants the Democrats and Republicans are fighting about.  He said,

“Dave you were a Federal Agent, if your boss wanted you to carryout a task did you ask him for his written authority to do so?”

I said,

“Of course not, when we received orders from our superiors we carried them out without question.”

He then said,

“Don’t you think if Obama wanted something done like wiretaps that he knew were wrong, unethical, and criminal that he would not write anything down he would simply inform his subordinates to carry the action out and it would filter to the street level people to carry out the specific orders?”

My father a 78 year old man with limited education figured out the way criminals do things without having a criminal history, law enforcement training political or journalist experiences.  In today’s world high level criminals understand that using the computers or writing letters to their subordinates is public and open information, even at the classified level numerous people can read them.  Of course  there his a Congressional investigation any and all written communications can be and will be obtained.

I was a Federal Agent for over 15 year with the highest U.S. Government clearances.  High level criminals are usually well educated people and they know how to cover themselves from being a target of a civil or criminal investigation.

This is how it would work if Obama wanted ‘Trump Towers’ wiretapped. 

Obama would talk secretly in private (outside of the White House office) with a senior government official he trusted and was a hard core liberal themselves. He would discuss what he wanted done and the senior official would channel it down with one on one discussions with other senior officials and finally it would be discussed with CIA/NSA or military intelligence operatives.

Likely the U.S. military were involved with carrying out the orders of the President. 

Military personnel will carry out orders without any questions whatsoever.  They assume their superior is instructing them todo something tat has been approved.  Many times Americans feel the highest feel intelligence people with all the proper clearances and experience are the CIA and NSA.  The military are much better prepared and much more close mouthed about what they do than civilian employees of the CIA. They are in the U.S. military and if they leak intelligence they will be court martialed without publicity and they will go to Fort Leavenworth for the rest of their lives. In addition they are more loyal  their superiors than the civilians of the CIA and NSA.

It I a 100% certainty that Obama and his staff di not use the FBI.  Today the FBI is purely a political machine.  The senior staff will burn you in a hard way and have no loyalty to their street level agents.

I cant discuss operations I had in the intelligence field with such operations, but I can say if my Commander brought me and my team to his office and gave us orders to do something we would have done it without question because we believed in his loyalty to our country.  This is not always true with civilian intelligence agencies.

In the meantime journalists, their puppet guest speakers, politicians, and other personnel will investigate the wiretapping allegations and conclude they reviewed FISA and criminal files of the FBI and could find no document that links Obama to any wiretapping orders.  Of course they will find routine and basic FBI reports that targeted a few low level Trump staff, but will determine no criminal activity was revealed.

Of course Obama had Trump Towers and many other locations wiretapped, but never will there be any evidence found.  Seldom do military operations organizations get request to turn over their Top Secret files on such activities of wiretapping.  They are never suspected to be the people our senior leaders turn to when they suspect the President of the U.S. has ordered criminal wiretapping orders.  If the Navy SEALs (American heroes) and take out Osama Bin Laden do you think they could not be used to tap a few phones.

Wake up FOX News and others.  Stop boring us when you know nothing will come of a FISA investigation.  Note:  Thanks Dad for seeing the reality of what is happening in the world today.  Your generation understands and loves America more so than at any other time or group of citizens.

Analysis: Listen to your elders.

Middle East Strategic Issues Facing the Trump Administration

Dr. Walid Phares

Dr. Walid Phares, Trump Campaign Foreign Policy Adviser and Fox News National Security and Foreign Policy Expert.

Dr. Walid Phares was the Middle East and Foreign Affairs consultant to the Trump Campaign and national security and foreign policy expert at Fox News.  Among his extensive published noteworthy works are the acclaimed best selling 2006 book, Future Jihad: Terrorist Strategies against America and the 2014 The Lost Spring: US Policy: in the Middle East and Catastrophes to Avoid.  He is currently under consideration by the Trump Administration for a possible post at the US State Department. We were afforded an opportunity to interview him on a wide range of Middle East issues facing the Trump Administration on Northwest Florida’s Talk Radio 1330 AM WEBY.  The program aired February 20, 2017.

Among Middle East policy issues addressed by Dr. Phares during the interview were

  • The rise of a new Mid East Security alliance known as the Arab NATO composed of the Gulf Arab Emirates, Saudi Arabia, Jordan; Egypt with outreach to Israel to combat the rising regional and global hegemony of a nuclear ICBM equipped Iran.
  • Possible initiatives to contain Iran Middle East and Global geo-political objectives following the JCPOA and release of over $150 billion in sequestered funds used to acquire and develop nuclear weapons and Nuclear ICBMs threatening the Middle East, Europe and ultimately the US.
  •  Creation of  autonomous  safe zones  within the framework of a post-Assad federal  Syria for ethnic/religious groups in Syria including Kurds, Alawites, Druze and Sunni Muslims;
  • Withdrawal of all foreign forces including Iran and  proxy Hezbollah; Islamist terrorist groups, Turkey, defeat of ISIS by US –led coalition forces;
  • End of the 27 year regime of indicted war criminal Sudan President Bashir to end Jihad  genocide of indigenous populations in Darfur, Nuba Mountains, South Kordofan  a threat to the Sahel region of Africa
  • Possible Administration adoption of both domestic and international Muslim Brotherhood terrorist designations.

What follows is the transcript of the interview with Dr. Phares.

Mike Bates:                Good afternoon welcome back to Your Turn. This is Mike Bates. Middle East roundtable discussion time. With me in the studio Jerry Gordon, Senior Editor of the New English Review and its blog “The Iconoclast”, welcome Jerry.

Jerry Gordon:            Glad to be back Mike.

Bates:            You can find Jerry at www.newenglishreview.org.  Joining us by telephone is Dr. Walid Phares, Middle East and Foreign Affairs Consultant to the Trump campaign and expert foreign policy contributor to Fox News.  Dr. Phares, welcome.

Walid Phares: Thank you for having me gentlemen.

Bates:              Dr. Phares is also the author of the books The Lost Spring. U.S. Policy in the Middle East and Catastrophes to Avoid” and the bestselling book Future Jihad: Terrorist Strategies against America. You can find Dr. Phares at www.walidphares.com.

Gordon:          Walid there has been a flurry of interest in the media recently about the formation of a regional national security group that would involve the Sunni monarchies, Emirates and even possibly Israel. You have been a proponent of something like that for a while. Why don’t you give us your views and an update?

Phares:           Yes indeed. Basically the idea is about forming an Arab military alliance. I have called it seven years ago in an article on al-arabiya.com in 2010, the Arab NATO. Originally the idea before the Arab Spring erupted was to put together the resources of Arab governments’ counter-terrorism forces to fight at the time Al Qaeda. Then the Iranian regime started to become very active in Yemen and of course it has Hezbollah in Lebanon. Since the Arab Spring all these civil wars created an unstable area in the region. The idea travelled through briefings before Congress and at the European Parliament. Many quarters in the region were talking about it. It became a strong idea over the past year, especially after the U.S. election of Donald Trump as President. During the election campaign, he met with Egyptian President El-Sisi in September 2016. After the election he communicated with a number of Arab leaders including with Sheikh Mohammed of the UAE, King Salman of Saudi Arabia, the King of Bahrain, the Tunisian President, the Prime Minister of Lebanon, and after inauguration he met with King Abdallah of Jordan and with important players in the region. He will soon be meeting again with President Sisi as he already met with the Prime Minister of Israel. The idea is to build mostly an Arab alliance which means those countries described as moderates who face not just Al Qaeda and ISIS but also the Muslim Brotherhood. Three of these countries have put the Brotherhood on their list of terrorist or extremist entities. Then you have the Iranian Islamic Republic threatening Iraq, Syria, Lebanon and Yemen. The project is now being discussed among these players. There are lots of tensions with some of these countries on other issues. However, they are coming to the conclusion that they need a joint force to confront radical Islamic terror.

The question with regard to Israel is different. At this point in time and after the Iranian expansion in the region and the war against ISIS, some of these countries, Egypt, Jordan and to a certain extent the Gulf Cooperation Council members are talking to the Israelis. In certain areas of the region, such as the Sinai and Southern Syria, there is coordination between Israel, Egypt and Jordan which has been facilitated via Camp David and the other peace agreements. However, never have we seen an Arab military alliance forming; especially when Iran is progressing with development of its own missile force. Iran has fired missiles at Mecca, against United States Naval vessels. So the proposal for a regional Arab military force is building momentum to push forward. The coordination with Israel is going to come when the Trump administration will be able to reignite discussions between these countries and Israel with regard to security arrangements in the region to make sure that the threats of ISIS and the Iranian regime are dealt with.

Gordon:          There have been missile tests which are said to violate the JCPOA agreement. What is the status of Iran’s compliance with their end of the deal that was brokered with Barack Obama and the P5 Nations? What is the threat from the Iranian regime?

Phares:           There are two kinds of threats I mentioned in my 2014 book The Lost Spring and in later briefings and hearings before Congress and with European lawmakers.  Number one, it’s about non-implementing the Iran nuclear deal. They are actually not shutting down their program and there has been a lot are reporting about this.

Second they are developing long range and medium range missiles. These missiles are not designed to deliver conventional pay loads. These are missiles that would have nuclear, chemical or biological warheads. The range of some of these missiles can reach the Gulf Emirates, Saudi Arabia, Israel, Turkey and Egypt. Some of the missiles they are developing are able to reach Europe and may soon be able to reach the across the Atlantic. So this is a very serious threat.

In my writings I call this the dome. Israel has the Iron Dome to defend against rockets and missiles coming from Hamas or from Hezbollah. What the Iranians are doing is establishing a ‘superdome’ that would be equipped with anti-aircraft and very advanced missiles purchased from Russia with the Iran nuclear deal money. Under that superdome they are developing everything in their armed forces: their tanks, missiles, communications and radars. Any geopolitical expert will tell you Iran is not just involved in warfare in Iraq, although they have their militia there. The commander of the Iranian Qods Force Suleimani is always there. In Syria they are virtually in control of the Assad regime. In Lebanon they have Hezbollah. In Yemen they are basically the partners of the Houthi militia. And Iran is doing something else, basically sending threatening messages to our partners in the region. Threatening messages against Israel? All the time. However, it is sending threatening messages against the UAE, Bahrain, and the Saudis. Recently they even signified that they will be acting in the Bab-al-Mandab at the mouth of the Red Sea, which commands access to the Suez Canal.

All this was done under the Obama administration which allowed the Iranians to develop the expansion of its “superdome.” Regarding the Iranian expansion, the Trump administration is sending a signal back to Tehran that we are watching these developments. The question is how the Iranian regime would respond to Washington when it says it has had enough – these are red lines and we are not going to permit your expansion any further.

Bates:              In terms of the nuclear agreement under the Obama administration it was very front-loaded for Iran and very back loaded for the United States. Iran got all their money up front without really having to do anything. They made a promise to comply while they received all that they wanted up front. We expected them to not continue developing their nuclear weapons program, while it seems like they are really proceeding to achieve that objective anyway. Given that background I have two questions. One, is there any possibility of re-imposing sanctions and two, what would be the point since Iran has received what they wanted, already?

Phares:           That is a great question. Indeed, the fact that we have just transferred a lot of money to the Iranian regime which they have used to purchase the equipment. They are not using those funds to support the people of Iran. They are using it for the comfort of the elite of the regime and to equip themselves with a deterrent despite our having released those funds. This is the tip of the iceberg. The hundred and fifty billion dollars is only the beginning. By opening up the Iranian market, by lifting up some of the sanctions and opening the market from Europe and other parts of the world, the hope was this would have a positive effect on the Iranian regime. Because we cannot control it, can we reinforce sanctions? Yes. President Trump can cancel previous executive orders; however, he would need to have Congress pass new sanctions.

What we need in America is a new joint strategic approach towards the Iranian regime. We have an opportunity for the next two years to achieve that. This should be initiated during the next six months. We need to signify that to our allies in Europe. That is why the recent trip by Vice President Pence to the Munich Security Conference sent an important message. We need to assure that the Europeans are not doing something else while we are putting sanctions in place, while at the same time they are doing business with Iran. We need to communicate that through the foreign policy pundits here in the US and abroad. At the same time, the new Administration is working with Israelis on intelligence coordination with pro-American members of the Gulf Cooperation Council. We need to work more with Jordan and the Egyptians. I think we can reverse the Obama policy. However, we also need to send a strong message to the Russians when President Trump meets with President Putin that while we can work together on fighting the Jihadists, the Islamic State and al Qaeda. On the other hand we must tell them that we have serious problems with the Iranian regime and they need to recognize that situation.

Bates:              Assuming that President Trump was to reverse executive orders by President Obama and re-impose some U.S. sanctions on Iran, what would be the effect on US firms interested in opening the Iranian market? Other than Boeing, the United States really isn’t doing a whole lot of business with Iran, while the rest of the world is. Can’t Iran really live without us anyway?

Phares:           Yes, we have the contract with Boeing and then we have a long line of American businesses waiting to do business with Iran. We have stopped not just the contracts under consideration but also many US companies mobilized by the Iranian regime to do business there. Don’t underestimate when a U.S. decision is made public what would happen in other parts of the world. There are many Europeans who will start to calm down and are not going to do business with Tehran. I am not saying all Europeans will follow our lead. Germany under Chancellor Merkel will continue but others may not. The Arab economic and political power of the region will be strengthened by our making those decisions. Moreover, the ripple effect of such Presidential executive orders could go as far as East Asia. Iran has achieved tremendous economic openings, because of the Obama policy, with South Korea, Japan and others. These are our partners in the region who have a common problem with North Korea. Their choice will be: should they risk their relationship with the U.S. now that we have this problem with North Korea and do some business with Iran? I would not underestimate a change in U.S. policy towards Iran, even if we cannot control that change with our partners. They will understand that they would have to rearrange their policies.

Gordon:          Syria is foremost in the minds of people trying to find a resolution to nearly six and a half years of a bloody civil war hemorrhaging refugees involving Iran its proxy Hezbollah, the Russians, Turkey, Kurds and others. You have written about this. You have actually been ahead of the pack on this. What are your thoughts and suggestions about what to do?

Phares:           Let’s address Syria. What we should not see in the Syria resolution is for Assad, Hezbollah and Iran to take back all of Syria and to transform it into an anti-American, anti-Western, anti-moderate entity. On the other hand, we don’t want to see the Jihadists, Al Qaeda, ISIS or Muslim Brotherhood linked organizations take over Syria, bring down Assad and create an Emirate or Caliphate. Everything in between can be looked at as possible solutions. But these are the two “no’s.”

What has happened in Syria over the past six years is a new set of geopolitical realities. One of these realities is that there is a consensus worldwide that ISIS should disappear. Most of ISIS areas are in western Syria. Therefore the forces operating in the northwest of Syria are the Kurds and Arab Sunni in the south. The first recommendation would be to have the US-led coalition establish safe zones. To create those safe zones you are going to have to dismantle ISIS and create this coalition. With regard to the Assad regime, for now it is protected by the Russians. There needs to be a discussion between the President of the United States and President of Russia to solve that issue.

More importantly, the issue is what is going to be the future of Syria? My answer is that I cannot imagine a Syria which won’t be federal, which won’t give the Kurds autonomy. I’m not addressing who will rule that autonomy, but the principle should be having a Kurdish community with its own autonomy. Every other community in Syria may have its own version of autonomy for the Alawites, the Druze, the Christians and Sunni Arabs. They should be enabled to rule their own areas. Of course we will back the moderates across that federation. However, that seems to be the healthiest geopolitical solution for Syria.

Gordon           You have written extensively about the problems of Jihadism and the Sudan, which has been a state sponsor of terrorism. After the election of President Trump you reached out to a number of émigrés, particularly from the Nuba community here in the US. Why is the Sudan a clear and present geo-political danger under President Bashir to the Sahel region of Africa?

Phares:           Realize that Sudan has been having these problems, not just during the last six months. We are talking about nearly thirty years since 1989 while an outspoken Jihadi regime has committed genocide first against the south that established its own independent Republic in 2011 and which still has its own its own problems. Then there is genocide perpetrated by the same regime that has been sanctioned by the International Criminal Court. Bashir’s Jihadist militia ravaged Darfur, in the west the Abyei people in the east, the Nubian community in the north and the Nuba people in the south of the Islamic Republic of Sudan. It seems to me that the international community and U.S. effort should concentrate on making a change in Sudan because this regime has been backing Jihadists perpetrating these collective atrocities. There needs to be a regime change. Unfortunately, the Obama administration just before leaving office lifted some U.S. and U.S. backed UN sanctions against the Bashir regime. What Washington should do under the Trump administration with the help of Congress is to put back those sanctions but also develop a coherent Sudan policy. We don’t have one now.  We need to speak with the communities inside Sudan and figure out what is their desire for the future.

Bates:              Dr. Phares what is the current status of the Muslim Brotherhood vis-a-vis the U.S. State Department and are you expecting any changes under the Trump Administration?

Phares:           Under the Obama administration there was no change in terms of the Muslim Brotherhood. It was the opposite. The Muslim Brotherhood was seen as partners within our own homeland. Their NGO’s or fronts across the United States have participated in the activities of various departments of the U.S. Government. a number of Congressional members have denounced the Brotherhood in briefings and hearings but nothing has happened. The Brotherhood was able to have an influence at the State Department and other parts of the Obama administration in terms of our policy towards Egypt. We actually backed the Muslim Brotherhood regime in Egypt. We backed Ennahda of Tunisia which is a cousin of the Brotherhood. We backed Brotherhood factions in Libya and across the region. Now this has to change under the Trump administration. President Trump mentioned them in his speeches, as did both Secretary of State Tillerson and Secretary of Defense Mattis.

Bates:              Do you expect the President to change that?

Phares:           I expect it to change but it’s going to take longer than our current expectations.

Bates:              Dr. Walid Phares thanks for joining this discussion. You can find Dr. Phares at: www.walidphares.com.

Phares:           Thank you for inviting me.

Soviet Fascism in America: Agents of Influence

Headlines about President Trump’s connection with Russia are all over the world, 24/7. There is some truth to it—the connection of a U.S. President and Russia is reality-with a small correction to the name of the President. It is President Barack Obama, who had constant clandestine ties to Russia. I have been reporting this secret connection since 2008 in my latest two books. The recent Trump tweet about the wiretapping of his campaign by the Obama Administration is the same, a logical and monumental addition to the history of aiding the enemy. This is the moment in history for President Trump to reveal the Truth about Russia, the KGB, and the Soviet Mafia in America…

History of President Reagan and Russia

When a medical doctor treats a patient, he or she fights against a disease and its causes. As a rule, after finding the causes a doctor deals with the disease. That way the patient is cured – his body is healed. These physicians are knowledgeable professionals with the experience to make a correct diagnosis. However, unlike those specialists, the medical profession has another type of doctor—they treat the symptoms of disease. In this case the patient will never be cured and the treatment will never bring healing. This is similar to politicians on the world stage—the leaders of the Western civilization. At this time of war, while we are fighting terrorists, knowledge and the ability to arrive at the correct diagnosis, is only in identifying the enemy. Then we will have the assurance of success and victory in the War on Terror.

A history of America’s presidents shows leaders who, based on their knowledge and ability to correctly assess the world predicament, have united all citizens to rebuff the enemy. Under the leadership of such leaders the country eventually won the war and began the process of healing. Immigrating to the United States in 1981, I watched one great leader. There are no words to express my love for him, because he saved not only America, but the entire planet. His vision of the world, knowledge of the enemy, and guts to deliver the truth made him the greatest leader of the Twentieth Century. President Ronald Reagan unified all Americans; Democrats and Republicans, white, black, Latino, and Asian, by telling the truth in identifying the Soviet Union as the Evil Empire! He was right on all accounts, though many people did not know a lot of information then. It became known later. Yet, trusting the President, the country joined his motto Peace through Strength and the great leader of the twentieth century had been born!

That was written by me at the end of the 20th century. The conclusion is clear—knowledge of the enemy is a must. President Reagan knew the disease and the symptoms– the modus operandi of the KGB and its method and policy of disinformation. Today, in March 2017 we have the exact same predicament only the name of our President has changed. Yet, in addition to that, we gave Russia and Putin twenty-five years to undermine international order and develop the KGB modus operandi and the disease—the ideology of Soviet Fascism. As a result, today we are dealing with the Evil Empire of Global Terrorism and witnessing a political drama of incompetence within some media outlets in covering the world and especially Russia…

Whether President Donald J. Trump is the man of history in the 21st century and the second Ronald Reagan, only the time will tell. He correctly listed American carnage—the symptoms of the disease in his Address to Congress. But, for an unknown to me reason, he has not directly identified the disease, the way President Reagan had done it thirty-six years ago. He did not pronounce the name of the ideology, I have been writing about for the last twenty years—Soviet Fascism. By the way, I have listed some signs of Soviet Fascism on American soil in my column American Carnage, February 11, 2017.

President Trump was telling us that he “inherited a mess.” He is right, but he is not aware of the depth of the mess—the Washington DC swamp is deadly. It is the ideology of Soviet Fascism that makes it deadly. Soviet/Russian subversive activities have never ended: the recent talk on “fake news,” about an alleged Trump contact with Russia is only a part of that. Regrettably, the disinformation method of the KGB, not reported by the media, yet, the Obama holdovers are well aware of the method…

What an irony! The media was deaf and mute for the last eight years of Obama’s Administration, when a secret cooperation with Russia in many respects, including military collaboration was flourishing. I was presenting recently that exact information in details in my column American Carnage, February 11, 2017 and had been writing about it during the last eight years. If you read Socialist Lies you are familiar with the term Obama/Putin joint venture. For those who had never heard that term, here is a brief information and description.

Obama/Putin Joint Venture

Neither Benghazi nor any other of Obama’s scandals will ever be uncovered without the knowledge of Obama/Putin joint venture. Moreover, a mess, inherited by President Trump will continue undeterred by any of his actions until Obama’s holdovers are eliminated. In fact, they are the Soviet Mafia on the soil of America. When I introduced you to the Obama/Putin joint venture, I also named it–Destruction of the American Republic. It has the common ideology, a foundation in Soviet Fascism. The logic should tell you that any of Trump’s success in Making America Great Again requires authentic knowledge of Obama/Putin joint venture to fight it.

We are dealing with the same symptoms of a disease President Reagan identified and defeated. Did you know that people from former Soviet Republics are now joining ISIS? Field commanders of ISIS are known to be Saddam’s former security operatives, trained by the Soviet/Russian security forces. Did you notice a pattern of Obama being late to many of the important issues of our day: ISIS, Syria, Iraq, Iran, IRS, Benghazi, and Ukraine? In fact, those events are the components of an ideology working against the interests of America.

And again as you can see in all of Obama actions or non-actions connected to Russia; Putin is up, and America is down. Watching Obama for the last eight years and knowing the ideology of Soviet fascism, I have invented the term Obama/Putin Joint Venture. In fact, it means—Obama/KGB joint venture. I don’t believe one word Obama eloquently speaks—eloquence used by him to hide his real thoughts in the best traditions of Stalin’s political correctness. You should know the Soviet Mafia to understand Obama’s behavior. By the way, the Russian ambassador Kislyk visited the White House twenty-two times and had personal meetings with Obama four times. Obama was not lazy, stupid or incompetent, as some suggested, on the contrary he was very successful in his joint venture to expand the implementation of political correctness and Soviet Fascism in America. Regrettably, NATO had missed it. Look at what I had written in 2014:

Fortunately, there are signs that NATO is beginning to grasp some truth about the Russia that emerged after the fall of the Soviet Union, the truth, I have been writing about for the last twenty-five years. “NATO has struggled to counter Moscow’s tactics in a conflict where traditional military force is only one part of the fight…” NATO underestimated the role of political correctness–that insidious evil of the world… Financial Times, Friday August 29, 2014: Russia’s new art of war. Unfortunately, NATO had not realized the help provided by Obama to Russia then in 2014. NATO also has not been familiar with the ideology that united Obama and Putin, NATO had not realized that we have the Evil Empire of Global Terrorism in the 21st century.

As you can see President Trump has inherited a very complicated and dangerous world. To solve those monumental domestic and overseas problems requires presentation of the whole truth and only the truth. This is the major task before President Donald J Trump. Unfortunately, some Republicans still do not understand whom they are dealing with. Do you remember a woman-voter who complained to John McCain about her fear of an Obama presidency before the 2008 election? Senator McCain assured her that Obama is “an honest and decent man.” It was enough for me to vote for Romney in the next 2012 election. I was shocked, when Republicans confirmed Loretta Lynch as Attorney General. They forgot or even did not know her connection to Bill Clinton…

Politicized Media and Intel

To derail a positive public response to a very successful Trump presentation before Congress, the Democrats sent an army of surrogates to exacerbate the Trump alleged collusion with Russia. The collective choruses of loud voices prevailed in the media: radio, internet, and TV. And Trump’s tweet about Obama’s wiretapping of Trump Tower was a timely and essential response. To understand the symptoms and the political disease, I purposely gave you a paragraph from the Soviet Decision of 1955, introducing the term “agents of influence” in my column February 11, 2017.

There are two types of “agents of Influence”—the enemies trained to subversive activities and those ill-informed Americans in both political parties. Let me give you an example of an enemy in the media. The correspondent of the New York Times, Walter Durante in the 1930s was the KGB agent of influence. Find him in Wikipedia and you will see how he helped Stalin during the Purges and Show Trails to kill thousands of innocent people. Stalin paid him very well for deceiving and fooling the West.

Stalin died March 5, 1953, but his Doctrine is alive and well. Look at what happened March 5, 2017 on CNN. The State of the Union had a show named “crises of public trust.” They were accusing Trump of lying and misleading. They were the convenient toys of the KGB due to their total ignorance. None of the participants knew that they were discussing Russia in the day of Stalin’s death, let alone that their knowledge of the KGB or the Soviet Mafia was ZERO. The CNN show, GPS, has repeated the same main motive– Trump is wrong in all accounts on the same exact day, no word about Stalin. Those people are the second type of the “agents of influence” due to their political ignorance. They are spreading “fake news” and helping the KGB to create confusion and chaos in America…

The same picture is a politicized Intelligence Community, all seventeen of them. I don’t know whether any of the seventeen had vetted a “community organizer,” named Barack Obama. If you read any of my books, you know that I didn’t trust American Intel, for a very simple reason—any country’s Intel is a primary target for the KGB and GRU. I was surprised when none of the seventeen agencies of our Intel stopped a massive transfer of American high technology to the Russian military by the Clinton Mafia, or stopped Iran Nuclear Deal beneficiary for Putin. By the way, why do we need seventeen agencies? Russia has only three and very successfully runs half of the world. They are the FSB (a former KGB), GRU, and Investigative Committee. Stalinist Doctrine has prevailed over all three.

My explanation of two types of “agents of influence,” can be applied to our Intel as well. Today they constitute a Shadow Government run by Obama. He operates through his accomplices—they together ran America and the world for the last eight years. They are the soldiers of the Democrat Party, who hate Trump and will fight his administration to the last drop of their blood. Some of them have no idea of Obama/KGB joint venture, having been fooled and deceived by Obama.

There is another reason for me to discuss our Intel—I am a victim of their ignorance. Bill Clinton eliminated all research of Russia, he also tried to silent myself, as the author and researcher of Russian history and the KGB. A FISA court under Bill Clinton has launched multiple surveillances against me: my computer and phone were wiretapped, my mail arrested, and I was fired from my teaching position in a University. I had been a conservative, teaching the truth about Soviet Russia to Americans. Despite that, I continued writing my books and columns, but since then the information about them has been blocked by our Intel. Due to those activities by Intel, Americans were prevented from learning the Truth about Soviets/Russia. You can see the result of that today, in March 2017—nobody understands the predicament in America and the world. Look at our incompetent media and tell me why a FISA court made me a “foreign agent.” What an overwhelming confusion and chaos…

My friend, a former CIA officer, knowing my research of Soviet Fascism, sent me this e-mail: Video / Mark Levin: Lays out evidence supporting accusation that Obama’s Authorized Spying Is Police State Tactics.

“The republic is in great danger. The trusted assessment several months ago was that there many in the intelligence community were waging war against Trump. Unfortunately Mark Levin who is held in high regard presents evidence here (short outtake from TV interview):

I agree with my friend. The American Republic is in great danger! Due to the civil war against ignorance and “agents of influence”, America is on the threshold of Watergate No.2. Please, read my two latest books—better late than never!

To be continued www.simonapipko1.com

U.S. Catholic Bishops promise to ‘disrupt’ President Trump

In January 2016 The Vortex reported on Communists infiltrating the Catholic Church. The Church Militant’s Michael Voris reported:

During the early years of Communism in the 1920s and 30s, the evil was being spread worldwide as the Blessed Mother had predicted at Fatima in 1917. Communist parties were being formed in various European countries and in American cities as well. They were already attempting to upset the political and cultural order.

alice_von_hildebrand-255x362

Alice von Hildebrand

But what only a very small number of people knew was that the top dogs of Communism had already released the hounds on the Church. The carefully organized plan was to recruit young men who were loyal Communists and get them placed in seminaries. This was carried out by various agents during the 1920s and 30s.

Fast forward 30 years to the 1960s, and the fruits were beginning to be seen. Learned, dedicated, faithful men and women in the Church were looking around and fretting, not sure from what framework they should understand the demolition of the Faith they were witnessing. At one point, Pope Paul VI even said that it appeared the Church was in auto-demolition.

One of those deeply distressed was a refugee from Hitler’s Germany, the brilliant theologian Dietrich von Hildebrand. He and his wife Alice were sitting down one day with a friend, a woman by the name of Bella Dodd. Bella Dodd had been received back into the Catholic Church by Abp. Fulton Sheen in April of 1952.

Read more.

VIDEO: The Vortex—Trump and Catholics

In the Life Site News article “These US Catholic bishops promise to ‘disrupt’ Trump” John Zmirak reports:

…Cardinal Peter Turkson and twenty-four American Catholic bishops have recently endorsed a political program that is dangerous, unbiblical, un-Catholic and uncharitable. In fact it is soaked in ideological rage, and explicitly aligns itself with the anti-Trump movements to “disrupt” the president’s enforcement of U.S. law. At least one of the bishops present, Robert McElroy of San Diego, has promised that the church he controls will actively help flout U.S. immigration laws.

This program was laid out at the First U.S. Regional Meeting of Popular Movements, which happened two weeks ago, and summed up in a manifesto called “Message from Modesto.” That “Meeting” included not just the cardinal and the bishops, but staff from the Vatican department for the Promotion of Integral Human Development and the Catholic Campaign for Human Development [CCHD].

The CCHD is the organization that radical Saul Alinsky personally helped left-wing Catholics to design, as the exposé A Wolf in Sheep’s Clothing documents. The Chicago branch of the CCHD, with the approval of then Cardinal Joseph Bernardin, cut the check that sent the young Barack Obama to his first Saul Alinsky “community organizing” school.

Another group that took part in the “Meeting”  was PICO, the Latin American far-left organization that used George Soros’ money  to spin Pope Francis’ 2015 U.S. visit as a boost to Democrats in the 2016 election.

Read more…

Zmirak lists five proposals made by these 25 Catholic bishops, the first being, “We urge every faith community, including every Catholic parish, to declare themselves a sanctuary for people facing deportation …. All cities, counties and states should adopt policies that get ICE out of our schools, courts and jails, stop handing over people to ICE…”

The Holy Bible says:

Matthew 22:21 Jesus said “Render to Caesar the things that are Caesar’s; and to God the things that are God’s.”

Romans 13:1 “Let every person be in subjection to the governing authorities. For there is no authority except from God and those which exist are established by God.”

These bishops are welcome to their personal views on President Trump and the federal laws dealing with immigration and refugee resettlement. But they are not ordained to deny the word of God.

Please watch this excerpt of the interview with Dr. Alice von Hildebrand:

RELATED ARTICLES:

The Coup Against Trump

Politics and Pope Francis: What is the role of the Catholic Church and the State?

VIDEO: President Trump vindicated by Wikileaks CIA dump

ZeroHedge in a column “Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential CIA Documents“; Another Snowden Emerges” reports,

A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

RELATED ARTICLES:

NSA Whistleblower Backs Trump Up on Wiretap Claims -US News & World Report

Wikileaks Exposes ‘Vault 7’ — The CIA’s ‘Zero Day’ Weapon

Trump Tower: Wikileaks ‘dumps’ files revealing out-of-control intelligence operations

Wikileaks Exposes ‘Vault 7’ — The CIA’s ‘Zero Day’ Weapon

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’sEmbedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf),describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.

CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products,Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

A Mother’s Plea for Her Son: The travesty of Derrick Miller

As a retired U.S. Army Lieutenant Colonel I stand with those soldiers who are put in harms way and are doing what they have been trained to do, close with and destroy the enemy using all means available.

I have written about the rules of engagement under the previous administration. In a column “President Obama killing our soldiers softly with his Rules of Engagement” Billy & Karen Vaughn wrote:

US soldiers in Afghanistan are now forced to fight a two-fronted war. Before each deployment, these soldiers understand fully that day after day they will do battle against relentless terrorists with shifting loyalties and unspeakable hatred. But what none of them could have foreseen was the killing field that would open from their rear…the Continental United States.

Our government’s incessant tightening of already restrictive ROE (Rules of Engagement), compounded by the failed COIN (Counterinsurgency) strategy—also known as “winning hearts and minds,” has made an otherwise primitive enemy formidable.

Our best and brightest come home in body bags as politicians and lawyers dine over white linen tablecloths; writing, modifying, and re-modifying these lethal rules…rules that favor the enemy rather than the American soldier. Rules so absurd they’re difficult to believe until you hear the same stories over and again from those returning from battle.

Billy and Karen Vaughn lost their son Navy SEAL Arron due to the rules of engagement, which benefit the enemy and harm, and kill, our men and women in uniform.

Sgt Derrick Miller

U.S. Army Sergeant Derrick Miller

I received this pleas for the mother of U.S. Army Sergeant Derrick Miller,

I am so thankful that Major Donahue asked me to send this e-mail to you today…

My name is Renee Myers and my son is Sgt. Derrick Miller of the Maryland National Guard.

Derrick is the kind of man every mother wants her son to grow up to be – strong, kind and loyal. He’s a proud daddy who adores his two daughters – this photo is one of my favorites of him holding his oldest daughter, Karina.

But what I love the most about my son is that he felt it was his duty as an American to join the National Guard. In fact, he volunteered for two of his three deployments to Iraq and Afghanistan.

Now, I wish I could go back in time and tell him not to…

Because for volunteering to defend our nation, Derrick has been sentenced to life in prison for doing exactly what the Army trained him to do!

You see, while on a combat mission in September of 2010, Derrick watched an Afghani national walk through his unit’s defense perimeter. The same man had been detained the day before under suspicion of driving insurgents to a nearby combat firefight.

So to be safe, Derrick and another U.S. soldier took him into custody for questioning with an Afghani interpreter.

Derrick asked the man why he was within the American defense perimeter. First, the man claimed to be an electrician responding to a downed power line. Then he claimed to be there to fix a water pump. Either way, he had no tools with him.

The Afghani grew more and more agitated as Derrick continued asking questions. Suddenly, he grabbed for Derrick’s weapon.

Derrick reacted immediately – firing and killing the suspect.

Richard, just days after the incident, Derrick was arrested and charged with “premeditated murder” of the Afghani insurgent!

For eight terrible months, we waited for the trial that would finally set the record straight and bring Derrick home to us. After all, there were witnesses who saw the whole incident and would testify on his behalf.

But instead, our government turned its back on Derrick – a decorated U.S. soldier – to appease Afghanistan officials.

Remember, another soldier had witnessed the interrogation and confirmed Derrick’s account. But he changed his story after the government threatened to charge him with accessory to murder.

The other witness was the Afghani translator. And in exchange for testifying against Derrick, he was granted U.S. citizenship.

Yes, our government brought him here to the U.S. and paid for him to live in an on-base hotel for six months with food, a personal van, and a $630 per month allowance – all provided at taxpayer expense!

Worst of all, the Army destroyed every bit of forensic evidence that could have proved Derrick was acting in self-defense. There were no photos. No autopsy. Nothing.

But I still believed the government would do the right thing. Instead, I held hands with my husband and Derrick’s wife, Katherine, and listened in shock as Derrick was convicted and sentenced to life in prison.

His feet were shackled, his hands cuffed to a leather belt around his waist, and, just like that, my only child was taken from me.

Since then, the world has simply fallen apart for his precious family.

The military immediately stopped Derrick’s paychecks. Derrick’s wife and my husband and I had pooled together all our money to hire a civilian attorney to represent Derrick. It cost $50,000 – every cent we had.

Now, with no money in the bank, his wife couldn’t pay their mortgage, utilities, car payment, or Derrick’s student loans.

Derrick had always worked two jobs so his wife could stay home after their babies were born. Now she can’t. The girls are so little and they don’t understand. They ask her over and over again, Why can’t Daddy come home?”

They wake up at night and cry for him. And honestly, sometimes so do I.

Richard, I can’t bear the thought of the girls growing up without their dad. Or Derrick not being able to scoop them up in his arms before they’re grown. But we have only one hope left now…

You see, Major Donahue heard about Derrick’s case and contacted me immediately.

As you know, Major Donahue knows firsthand from combat tours of Vietnam that you can’t send U.S. soldiers into terrorist combat zones and second-guess their actions from a desk in Washington. And now UAP is ready to help Derrick.

But first, they have to raise money for an appeal, which will require hours of legal research, expert witnesses, and legal motions. Remember, UAP is a non-profit organization, which means they don’t receive any funding from the federal government – only private donations from patriotic Americans.

It also means that I’m going to take a deep breath and ask you one of the hardest questions I’ve ever asked another person:

Can you help me fight to free my son by sending a check for any amount to UAP?

Your gift is tax-deductible. And it will help us pay for Derrick’s appeal – and help other innocent soldiers who have been unfairly charged, too.

The federal government has already spent hundreds of thousands of taxpayer dollars to convict Derrick and grant U.S. citizenship to the Afghani who testified against him.

But I must rely on the generous hearts of people like you to save my son.

That’s why I’m writing you today – to do what I can as the mother of a U.S. soldier to find good-hearted people out there who care about defending our nation’s troops.

Our attorney is going above and beyond the call of duty to fight for Derrick. But mounting his defense will cost us at least $30,000. It’s money we simply don’t have.

Can you please help UAP fund this legal battle and bring Derrick home to us?

Your $35 contribution could be the difference between letting my son rot in prison for the rest of his life for a “crime” he didn’t commit… or bringing him home to me and his girls where he belongs!

Thank you from the bottom of my heart for any help you can send to UAP today.

Yours truly,

Mrs. Renee Myers

P.S. As a member of the National Guard who volunteered for two of his three tours of duty, my son has sacrificed so much for our country. Yet in return, our government has taken away his family and his freedom! Right now Derrick desperately needs to know that he hasn’t been forgotten! Thank you for whatever amount you can send today to give him hope and to help bring him home!

The Truth about Christians Amoung the Refugees

Executive summary

A female interpreter of Eritrean origin, who lives in Germany and of whom neither the Muslim migrants nor the locally hired Muslims know that she is a Christian, revealed what she experienced in refugee shelters in Germany:

  • Adult Muslim migrants threaten and physically attack Christian and Yazidi refugees.
  • Muslim migrant kids do not play with Christian refugee kids, then they explain that they hate them, just like their parents do.
  • Locally hired Muslim interpreters and security men seem integrated on the outside, they grew up in Germany, went to German schools and have jobs, but when they are among themselves, they reveal their true colors by stating that Germany must be Islamized, and that they disdain Germany and its values.
  • In mosques in Germany, pure hate is preached against people of other religions.
  • Muslim migrant women want to out breed Christians, because they want to annihilate them.

German aid organizations and Christian politicians have confirmed her words with their own experience. They also added that Muslim interpreters intentionally mistranslate the words of Christian refugees to make them unable to obtain asylum, cover up Muslim mobbing on Christians, and arbitrarily move Christians to the end of the charity recipients’ list.


Incognito in refugee shelters: Everything Christians live through

What a Christian female interpreter hears in shelters, is terrifying. An article by idea editor-in-chief Daniela Städter.

Wetzlar (kath.net/idea)

Only 14 per cent of refugees who filed for asylum in Germany in 2015 were Christians – over 73 per cent are Muslims. Recently, there have been aggravated reports by Christians about discrimination by Muslims in refugee accommodations. Even some Muslim interpreters and security duty coworkers would put pressure on Christians. A Christian female interpreter observes this, but she is not detected as a Christian. What she hears in the shelters, is terrifying. An article by idea editor-in-chief Daniela Städter.

In September 2016, the call of a long-standing German top female politician reaches the Evangelical News Agency idea (in Wetzlar). She has contact to a female Christian engaged in refugee assistance, who could tell controversial things about the situation in German refugee shelters. Nevertheless, the name of the woman shall not be mentioned. Subsequently, a discussion takes place in Wetzlar among the female politician, an expert in the field of refugee issues, and the 39-year-old Christian female interpreter originating from Eritrea. She speaks Arabic fluently and has already worked in various refugee shelters as an interpreter – mostly only with Muslim colleagues.

The woman acts “undercover” at it. Nobody suspects that she is Christian. The native-born Eritrean fled for Germany in 1991 on her own. She is thankful that she was taken in openly in her new homeland and was supported in many ways. Later she wants to give something back and begins to help in refugee shelters five years ago or so in an honorary capacity. She has been active mainly as an interpreter since the summer of 2016. That she is Christian, she has not mentioned it in the accommodations since the beginning. Because of her knowledge of the Arabic language, she notices quickly: “Christians are getting subjugated, intimidated and harassed by Muslim refugees. That is usual.” Often nobody realizes the mobbing, by which Yazidis and homosexual refugees are affected, too.

 “Germany must be Islamized”

Security duty coworkers and interpreters are, according to her data, almost always Muslims. They make, says the 39-year-old, a very nice impression at the first glance: “Most of them grew up here, often studied, have esteemed occupations, and they behave open-mindedly.” However, that changes as soon as they are “among themselves”: “Then they show their true colors and say sentences like ‘Germany must be Islamized’. They disdain our country and our values.” The young woman is appalled, and for a long time she does not want to take this for real. She still withholds that she is Christian in order to learn more. Among other things, she visits the Quran courses of various mosques: “There, pure hate is preached against people of other religions. The kids get that here, in Germany, taught to them from an early age.” It is similar in the refugee shelters. She notices how Muslim boys refuse to play with Christians. The female interpreter tries to mediate: “You are Muslim, he is Christian. What difference does it make?” The five-year-olds answer her:

“With the Christians, I do not play. My parents hate them, too.” The female interpreter becomes frightened: “They fled from the war to Germany and should be happy after all, that a Christian country takes them in.”

We, Muslims must get more kids than the Christians

She also tries to establish contact with the Muslim women. Many of them, despite their young age, have already had multiple kids. She cautiously wants to enlighten them about contraception methods. “After that, some women told me: We want to multiply. We must get more kids than the Christians. Only this way can we annihilate them.” As she objects and says that it is, after all, the Christians who help them, she bumps into rejection. Helping the Christians is a sin.

The might of the interpreters

The European Mission Community (in Penkun, Vorpommern) has lived through the might of the Muslim interpreters, too. Its chairman, Frank Seidler reports that at the hearings at the Federal Office for Migration and Refugees, they sometimes falsely rendered the testimonies of Christian refugees within the asylum process. That is why now, a Persian-speaking coworker is accompanying the refugees to the interviews, so that he can directly intervene in an emergency: “Since then it has been running better.” Seidler tells further about an Afghan having converted to Christianity, who was beaten up in his collective accommodations and was injured very severely. After he was helped to press charges, there were immediately countercharges by multiple Muslim refugees. The process is still running, although he counts with cessation, because testimony stands against testimony: “Unfortunately, we have already gone through this lapse often.” But where this leads is that the attackers think that they could allow themselves everything in Germany and would never be held accountable, so says Seidler.

A permanent pressure burdens Christians

The Christian aid organization Open Doors (in Kelkheim at Frankfurt am Main) makes similar observations. It is often hard to prove incidents. “With the incidents, it is not always about violence”, says the coordinator of public relations, Ado Greve, “but rather about forms of discrimination, for example at food distribution, or about threats. A permanent pressure burdens the Christians – especially the converted ones.” When a Christian is being threatened in his mother tongue in the corridor, “We cut through your neck!”, or “We will rape your wife!”, then it triggers great fear. Greve:

“The religious features imprinted by Islam in their homeland are often brought with by the perpetrators. However, to prove that, it is hard in most cases.”

But it should not lead to that the incidents are not taken seriously:

“It is important to give credit to the reports of the affected Christians.”

When Muslims translate falsely

Also from the point of view of the leader of the refugee-related work group within the Central Council of Oriental Christians in Germany, Paulus Kurt (in Munich), false translations by Muslim interpreters are a problem. From the refugees whom he advises, he makes them hand over the filled hearing questionnaires after the interview date at the Federal Office for Migration and Refugees in order to verify them together with the Christian asylum seekers. Sometimes the data of religion are false there – from an Aramean Christian, for example, becomes an Arabic Muslim. The flight reasons, too, are rendered partially inaccurately and to the disadvantage of the questioned Christians. If they notice this, they file an objection within the legal deadline of two weeks. Nevertheless, many refugees did not even know the expiration date at all, and thus passed the deadlines.

Christians often have no knowledge of their rights

According to Kurt, asylum seekers also have the right for a retranslation of the questionnaire filled in German to their mother tongue. However, some interpreters did not inform the Christians about that at all. By contrast, the interpreters communicated to the coworkers of the Federal Office that the questioned one has waived the retranslation. “By that, the chance of Christians to get a long-term recognition for asylum here drops.” In the accommodations, too, the language barrier is a problem: “There, a Christian gets beaten by a Muslim, because he is eating pork in the communal kitchen – and the interpreter relays to the leadership afterwards that there was merely a general altercation about the use of the kitchen.”

What nobody realizes

According to the data by two Hessian female refugee helpers of the Central Council of Oriental Christians in Germany, it is also often about forms of discrimination in the accommodations, which go on in the background without being noticed. They name, for example, the issuance of articles of clothing. The maintainer of the accommodations provides a list with refugees who should get clothes. The slip of paper is passed to the interpreters who organize the issuance in the respective languages. At the readout, the list gets changed by them. Whoever has a Christian name, will be called at the end, and must take potluck with the rest, they say: “Nobody realizes that.”

The state assumes false preconditions

From the point of view of auditor Thomas Günster (in Fulda) engaged in refugee-related work, it is about a system error. The state assumes integration in the case of Muslim interpreters, most of them having grown up in Germany, toward the local value system, but that has not happened at all. Günster, who stands in close contact with Hessian refugee helpers and supports them at their work, says: “A sort of independence is assumed here, which is not there at all.” Rethinking must happen here.

There are positive developments in Hessen

Meanwhile, there have been positive developments, too, means Günster, who is also the chairman of the Diocesan Group Fulda of the Association of Catholic Entrepreneurs (BKU). Thus the Hessian Ministry of the Interior strives to protect religious minorities from abuses. In addition, too, the teams in the scope of security duty and interpreters should be staffed in the future with coworkers of different religious affiliations: “Minorities among the refugees must be protected and their complaints taken seriously. We must pay attention that the Christian refugees in Germany do not go to the dogs anymore.”

It looks worse in Bremen

The situation in Bremen is worse. There, the City Senate adopted a new Protection Against Violent Acts concept for refugee facilities at the end of October [2016]. In it, however, they did not go into the situation of Christian refugees. The target group of the Protection Against Violence Acts concept is girls, women, and persons who, due to their sexual or gender identity, are particularly threatened by violence. The alderwoman in the Bremen City Assembly, Sigrid Grönert (CDU) [Christian-Democratic Union, a German political party] basically welcomes the concept indeed, but already pointed out in May that beyond that, Christians also feel mobbed by Muslims over and over again.

By contrast, the Bremen City Senate stated in February that “no abuses” on religious minorities are known. Grönert: “That, unfortunately, does not correspond to reality.” According to their own data for the time frame between January 2015 and June 2016, nine cases of bodily abuses in Bremen were reported to Open Doors.

Christians do not press charges out of fear

None of the affected Syrian Christians has pressed charges – out of fear, that the situation could get worse. That abuses are not known to the authorities, simply does not mean that they do not exist, emphasizes Grönert, who is also the assistant chairman of the Evangelical Workgroup of the CDU in Bremen: “It is a pity that the issue is not being taken up over here at us, while a Federal Province like Hessen has recognized the problems. I wish that the issue were taken seriously by politics across the Federation [i.e. Germany].” She is not alone with this wish. Professor Heiner Bielefeldt, UN special rapporteur for freedom of religion and world view, incumbent till the end of October [2016], demanded at the beginning of November an honest discussion about the hints of abuses against Christian refugees in asylum accommodations.

It would be a big mistake of politics to spread the cloak of silence over it, said Professor Bielefeldt.

La fin justifie t-elle les moyens? [Does the end justify the means?]

By Wallace Bruschweiler and William Palumbo…

Political sabotage will continue to threaten President Trump until he finally acts decisively.

Another week passes, another slew of devious political attacks on President Donald J. Trump by political operatives inside the government.  Regardless of legalities, politically motivated leaks are being routinely and systematically fed to the hostile news media.  The illegal leaking of damaging and/or embarrassing information puts President Trump’s administration perpetually on the defensive, therefore unable to really focus on their agenda and enacting the policies that were promised on the campaign trail.

This behavior by government insiders (saboteurs) demonstrates the attitude of those who served in the Obama administration: the end justifies the means.  Niccolo Machiavelli would be very proud.

The latest leak emanates from the Department of Homeland Security.  A source within DHS passed an intelligence assessment memo to MSNBC’s Rachel Maddow.  In it, the memo claims that citizenship is not a determining factor in likelihood of radicalization.  Implied from this memo is that the administration’s travel ban, which Maddow erroneously calls a “Muslim ban,” is an ineffective strategy to prevent further terrorist attacks.

Furthermore, this weekend we learned that the Obama administration ordered the wiretapping of Trump Tower and Donald Trump’s cell phone.  In order to wiretap a U.S. citizen, such a request requires authorization from the Foreign Intelligence Surveillance (i.e., FISA) court.  Indeed, the permission was seemingly granted on the second request by the FISA court, likely under the pretense of monitoring communication between the Trump campaign staff and certain Russian nationals.  While news continues to break with respect to this developing story, Trump’s former campaign manager Corey Lewandowski alleged that then-Senator Jeff Sessions was also wiretapped by the Obama administration.

You don’t need a doctorate in European history to recognize that politically motivated eavesdropping is a tactic of totalitarian states.

In light of the latest revelations, we would like to submit a few pointed questions to the Trump administration:

  • If the surveillance was in place to detect interference by the Russian government in our election, and no evidence as yet has been presented to the public, can the public then assume that the wiretapping was strictly to gain a political advantage for Hillary Clinton’s camp?
  • Who ordered the wiretapping? A spokesman for former President Obama categorically denied it was issued by Obama’s White House.  Could it have been ordered by then-Attorney General Loretta Lynch?  Or, possibly, by Valerie Jarrett, who is reportedly moving in with the Obama couple in their new Washington, D.C. home?
  • Why are there still any Obama-era political appointees in key positions? What level of damage would finally convince the new administration to thoroughly “clean house?”
  • What is preventing the Trump administration from going on the offensive against the previous administration and its corrupt officials?

It is evident, plainly, that the former administration – including Barack Hussein Obama, Valerie Jarrett, Loretta Lynch, George Soros, etc. – hold Machiavelli’s dictum in high regard.  The end justifies the means.  By providing the media with fodder that militates public opinion against Trump and his cabinet, they are in effect paralyzing him as President.

The Ends Justify the Means

  • President, you and your administration have the power and the prerogative to dispense with all political appointees. The American people gave you this power when they elected you.
  • Why not sit down with your advisers and produce a list of all political appointees in the following agencies: the White House, Department of State, CIA, Justice Department, FBI, Department of Homeland Security, and more.
  • Then, fire them all in one fell swoop. “Everybody, out of the pool!”  Remove their credentials overnight and revoke their security clearances.  Send them packing, far away from our government and the halls of power.
  • Finally, for good measure and as a vital insurance policy, direct Attorney General Jeff Sessions to investigate malfeasance and corruption of the previous administration, e.g. the Clinton Foundation, etc. Let the other side scramble and “lawyer up.”

In this case, the end rightly justifies the means.

RELATED ARTICLES:

NSA Whistleblower Backs Trump Up on Wiretap Claims -US News & World Report

No One Mentions That The Russian Trail Leads To Democratic Lobbyists

Did Obama spy on Trump? Glenn Reynolds

TOWERGATE: Obama uses secret court and FBI to spy on Trump Campaign

‘The LIES and DECEPTION of the media for WEEKS!’ Mark Levin comes roaring back Monday evening

So Stelter wants me to independently corroborate what multiple media outlets reported about FISA applications?