Meet the Antisemitic Terrorist Leading #DayWithoutAWoman

In the New York Post column “Meet the terrorist behind the next women’s march” Kyle Smith reports:

Instead of milling around Washington, organizers have in mind a “general strike” called the Day without a Woman. In a manifesto published in The Guardian on Feb. 6, the brains behind the movement are calling for a “new wave of militant feminist struggle.” That’s right: militant, not peaceful.

The document was co-authored by, among others, Rasmea Yousef Odeh, a convicted terrorist. Odeh, a Palestinian, was convicted in Israel in 1970 for her part in two terrorist bombings, one of which killed two students while they were shopping for groceries. She spent 10 years in prison for her crimes. She then managed to become a US citizen in 2004 by lying about her past (great detective work, INS: Next time, use Google) but was subsequently convicted, in 2014, of immigration fraud for the falsehoods. However, she won the right to a new trial (set for this spring) by claiming she had been suffering from PTSD at the time she lied on her application. Oh, and in her time as a citizen, she worked for a while as an ObamaCare navigator.

Rasmea Yousef Odeh. Photo: AP

You can see why she’s a hero to the left. Another co-author, Angela Davis, is a Stalinist professor and longtime supporter of the Black Panthers. Davis is best known for being acquitted in a 1972 trial after three guns she bought were used in a courtroom shootout that resulted in the death of a judge. She celebrated by going to Cuba.

A third co-author, Tithi Bhattacharya, praised Maoism in an essay for the International Socialist Review, noting that Maoists are “on the terrorist list of the US State Department, Canada, and the European Union,” which she called an indication that “Maoists are back in the news and by all accounts they are fighting against all the right people.” You know you’re dealing with extremism when someone admits to hating Canada.

Read more…

World Jewish Daily reports:

The lead organization behind the upcoming “International Women’s Strike” has called for the destruction of Israel and embraced a Palestinian terrorist as one of its leaders.

According to the Algemeiner, the organization behind the proposed “strike” issued a manifesto calling for “the decolonization of Palestine,” a euphemism for the genocidal desire to destroy Israel as a Jewish state.

It declares this racist goal “the beating heart of this new feminist movement” and states, “We want to dismantle all walls, from prison walls to border walls, from Mexico to Palestine.”

In addition, one of the movement’s most prominent organizers is the antisemitic, racist Palestinian terrorist Rasmea Odeh, who spent over a decade in an Israeli prison for murdering two Israelis in a pair of terrorist attacks.

Odeh has been charged with lying on her citizenship application by denying her terrorist history.

Indivisible North Coast Oregon (INCO) posted the following on its website:

MARCH 8 Women’s Strike and Postcard Party

From the Women’s March Instagram post:

In the spirit of women and their allies coming together for love and liberation, we offer A Day Without A Woman. We ask: do businesses support our communities, or do they drain our communities? Do they strive for gender equity or do they support the policies and leaders that perpetuate oppression? Do they align with a sustainable environment or do they profit off destruction and steal the futures of our children? We saw what happened when millions of us stood together in January, and now we know that our army of love greatly outnumbers the army of fear, greed and hatred. On March 8th, International Women’s Day, let’s unite again in our communities for A Day Without A Woman. Over the next few weeks we will be sharing more information on what actions on that day can look like for you. #DayWithoutAWoman #WomensMarch

Read more…

Regarding Indivisible and the Women’s March, Politico reported:

Indivisible is also embracing collaboration with other major anti-Trump protest outlets. Leaders of the group were in communication with Women’s March organizers before their main event on Jan. 21, and that partnership will become official when the March unveils the third in its series of 10 direct actions that attendees have been asked to pursue in their communities.

Obama, Organizing for Action, Indivisible, Women’s March and Day Without A Woman are all part of the same anarchist movement called “resist.”

RELATED ARTICLES:

‘A Day Without a Woman’ Strike Promotes the Liberal Idea that Women are Helpless

Jewish Students Counter Anti-Zionist Rhetoric at Columbia University

FLORIDA: Bills introduced empowering parents to ‘review, object to and approve instructional materials’

On February 23rd and 24th, 2017 critically important Instructional Materials companion bills were filed in the Florida House and Senate. These curriculum bills will restore local control, empowering parents and taxpayers a meaningful place in the process for reviewing and acquiring of all textbook and online materials used to teach public school children.

Sen. Tom Lee and Rep. Byron Donalds are the sponsors for SB 1210 and HB 989. Think of them as “fixit” companion bills to a very “well-intentioned Senate Bill passed into law in 2014. However, the 2014 law was not implemented by a single school district.  The original intent was to establish each school board to be constitutionally responsible for the instruction materials used in their respective districts and to establish an open, transparent process for reviewing, raising objections to and approving instructional materials used with K-12 students.

When passed these “fixit” bills will restore the original intent in 5 key ways:

  1. Require each school district shall implement a transparent Policy/Process within their District whether they acquire from the State list or create their individual acquisition program.
  2. Provide a definition of quality materials and requirement for providers to meet Florida existing laws.
  3. Tighten the definition of instructional materials to include “on-line” materials.
  4. Give each District School Board greater flexibility to use instructional materials that meet or exceed current Florida Standards.
  5. Expand a parent’s right to object to include the rights of all taxpayers.

At the heart of these fixit bills are the enhanced definition of “quality materials”. Every product you buy as a consumer has an explicit set of quality standards. Obvious examples: the car you drive and the cellphone and computer you use. Not so with the 100’s of millions of dollars Florida spends on textbooks.

Today, the materials are provided by Pearson PLC and one or two other large publishers. They are riddled with political and religious indoctrination; revised history teaching our children they are victims of oppressive and outdated founding principles; and age inappropriate sexually explicit materials aimed at destroying family values.

See the documentation at www.floridaCitizensAlliance.com – Search for “Objectionable Materials Report”


Background

SB 864 (FS 1006.283) was the K-12 Curriculum Bill signed into law by Governor Scott in July of 2014.

Its purpose was to:

  • Assign each school board the constitutional responsibility to select and provide adequate instructional materials.
  • Require each district to create a transparent review policy/process allowing parents to review instructional materials and raise objections if the material was not accurate or was objectionable.
  • Allow School districts to implement their own selection and acquisition programs as an alternative to buying from the State approved lists.

NOTE: It contained numerous loopholes that resulted in many School District ignoring the law.

2017 Companion bills SB 1210 and HB 989 fix the loopholes:

  • Require that each District School Board shall implement a transparent Policy/Process within their
  • District whether they acquire from the State list or create their individual acquisition program.
  • Provide a definition of quality materials and require all materials meet Florida existing laws (notes).
  • Tighten the definition of instructional materials to include “on-line” materials.
  • Give each District School Board greater flexibility to use instructional materials that meet or exceed current Florida Standards.
  • Expand a parent’s right to object to include the rights of taxpayers.

Bottom Line: This law will empower parents and community taxpayers a meaningful seat at the table to significantly improve the quality of instructional materials in public schools.

Note 1: Florida has a very good statute FS 1003.42 2a-f that requires the teaching of our founding principles and “historically accurate materials”. This statute is not being followed today in Florida as many textbook providers distort and reconstruct our history to promote a political agenda.
Note 2: FS 847.011 and FS 847.012 clearly prohibit age inappropriate sexually explicit material in K-12 public schools.

Definition of quality materials spelled out in SB 1210 and HB 989

When passed into law, these Instructional Materials companion bills will restore local control of curriculum to each school district, give a meaningful voice to parents and the local community in the selection process for instructional materials, and require instructional materials used in the classroom meet the following criteria:

a. Be research-based, and be proven to be effective in supporting student learning

  1. Provide a non-inflammatory, objective, and balanced viewpoint on issues
  2. Be appropriate to the students’ ages and varying levels of learning
  3. Be accurate and factual
  4. Be of acceptable technical quality
  5. Shall strictly adhere to the requirements of Florida Statute 1003.42(2) US Constitutional Founding values and principles
  6. Not contain pornography or sexually explicit content as is otherwise prohibited by Florida Statute 847.012(3).

The Detailed 11 page report of objectionable materials in Florida Schools documenting extensive political and religious indoctrination, revisionist history, issues with APUSH, pornographic material and destructive math pedagogy can be found at http://floridacitizensalliance.com/liberty/?s=objectionable+materials+report

flca logoABOUT THE FLORIDA CITIZENS ALLIANCE (FLCA)

Florida Citizens Alliance is a grassroots Alliance working with 80+ grassroots organizations committed to dramatically improving the outcomes for our Florida children. FLCA helped draft this legislation and we are strong citizen advocates for its passage. Our Goal is simple- to unleash the individual learning potential of every child! We invite your support. Subscribe to our website. Adding your voice makes our collective voice louder!

Soviet Fascism in America: Agents of Influence

Headlines about President Trump’s connection with Russia are all over the world, 24/7. There is some truth to it—the connection of a U.S. President and Russia is reality-with a small correction to the name of the President. It is President Barack Obama, who had constant clandestine ties to Russia. I have been reporting this secret connection since 2008 in my latest two books. The recent Trump tweet about the wiretapping of his campaign by the Obama Administration is the same, a logical and monumental addition to the history of aiding the enemy. This is the moment in history for President Trump to reveal the Truth about Russia, the KGB, and the Soviet Mafia in America…

History of President Reagan and Russia

When a medical doctor treats a patient, he or she fights against a disease and its causes. As a rule, after finding the causes a doctor deals with the disease. That way the patient is cured – his body is healed. These physicians are knowledgeable professionals with the experience to make a correct diagnosis. However, unlike those specialists, the medical profession has another type of doctor—they treat the symptoms of disease. In this case the patient will never be cured and the treatment will never bring healing. This is similar to politicians on the world stage—the leaders of the Western civilization. At this time of war, while we are fighting terrorists, knowledge and the ability to arrive at the correct diagnosis, is only in identifying the enemy. Then we will have the assurance of success and victory in the War on Terror.

A history of America’s presidents shows leaders who, based on their knowledge and ability to correctly assess the world predicament, have united all citizens to rebuff the enemy. Under the leadership of such leaders the country eventually won the war and began the process of healing. Immigrating to the United States in 1981, I watched one great leader. There are no words to express my love for him, because he saved not only America, but the entire planet. His vision of the world, knowledge of the enemy, and guts to deliver the truth made him the greatest leader of the Twentieth Century. President Ronald Reagan unified all Americans; Democrats and Republicans, white, black, Latino, and Asian, by telling the truth in identifying the Soviet Union as the Evil Empire! He was right on all accounts, though many people did not know a lot of information then. It became known later. Yet, trusting the President, the country joined his motto Peace through Strength and the great leader of the twentieth century had been born!

That was written by me at the end of the 20th century. The conclusion is clear—knowledge of the enemy is a must. President Reagan knew the disease and the symptoms– the modus operandi of the KGB and its method and policy of disinformation. Today, in March 2017 we have the exact same predicament only the name of our President has changed. Yet, in addition to that, we gave Russia and Putin twenty-five years to undermine international order and develop the KGB modus operandi and the disease—the ideology of Soviet Fascism. As a result, today we are dealing with the Evil Empire of Global Terrorism and witnessing a political drama of incompetence within some media outlets in covering the world and especially Russia…

Whether President Donald J. Trump is the man of history in the 21st century and the second Ronald Reagan, only the time will tell. He correctly listed American carnage—the symptoms of the disease in his Address to Congress. But, for an unknown to me reason, he has not directly identified the disease, the way President Reagan had done it thirty-six years ago. He did not pronounce the name of the ideology, I have been writing about for the last twenty years—Soviet Fascism. By the way, I have listed some signs of Soviet Fascism on American soil in my column American Carnage, February 11, 2017.

President Trump was telling us that he “inherited a mess.” He is right, but he is not aware of the depth of the mess—the Washington DC swamp is deadly. It is the ideology of Soviet Fascism that makes it deadly. Soviet/Russian subversive activities have never ended: the recent talk on “fake news,” about an alleged Trump contact with Russia is only a part of that. Regrettably, the disinformation method of the KGB, not reported by the media, yet, the Obama holdovers are well aware of the method…

What an irony! The media was deaf and mute for the last eight years of Obama’s Administration, when a secret cooperation with Russia in many respects, including military collaboration was flourishing. I was presenting recently that exact information in details in my column American Carnage, February 11, 2017 and had been writing about it during the last eight years. If you read Socialist Lies you are familiar with the term Obama/Putin joint venture. For those who had never heard that term, here is a brief information and description.

Obama/Putin Joint Venture

Neither Benghazi nor any other of Obama’s scandals will ever be uncovered without the knowledge of Obama/Putin joint venture. Moreover, a mess, inherited by President Trump will continue undeterred by any of his actions until Obama’s holdovers are eliminated. In fact, they are the Soviet Mafia on the soil of America. When I introduced you to the Obama/Putin joint venture, I also named it–Destruction of the American Republic. It has the common ideology, a foundation in Soviet Fascism. The logic should tell you that any of Trump’s success in Making America Great Again requires authentic knowledge of Obama/Putin joint venture to fight it.

We are dealing with the same symptoms of a disease President Reagan identified and defeated. Did you know that people from former Soviet Republics are now joining ISIS? Field commanders of ISIS are known to be Saddam’s former security operatives, trained by the Soviet/Russian security forces. Did you notice a pattern of Obama being late to many of the important issues of our day: ISIS, Syria, Iraq, Iran, IRS, Benghazi, and Ukraine? In fact, those events are the components of an ideology working against the interests of America.

And again as you can see in all of Obama actions or non-actions connected to Russia; Putin is up, and America is down. Watching Obama for the last eight years and knowing the ideology of Soviet fascism, I have invented the term Obama/Putin Joint Venture. In fact, it means—Obama/KGB joint venture. I don’t believe one word Obama eloquently speaks—eloquence used by him to hide his real thoughts in the best traditions of Stalin’s political correctness. You should know the Soviet Mafia to understand Obama’s behavior. By the way, the Russian ambassador Kislyk visited the White House twenty-two times and had personal meetings with Obama four times. Obama was not lazy, stupid or incompetent, as some suggested, on the contrary he was very successful in his joint venture to expand the implementation of political correctness and Soviet Fascism in America. Regrettably, NATO had missed it. Look at what I had written in 2014:

Fortunately, there are signs that NATO is beginning to grasp some truth about the Russia that emerged after the fall of the Soviet Union, the truth, I have been writing about for the last twenty-five years. “NATO has struggled to counter Moscow’s tactics in a conflict where traditional military force is only one part of the fight…” NATO underestimated the role of political correctness–that insidious evil of the world… Financial Times, Friday August 29, 2014: Russia’s new art of war. Unfortunately, NATO had not realized the help provided by Obama to Russia then in 2014. NATO also has not been familiar with the ideology that united Obama and Putin, NATO had not realized that we have the Evil Empire of Global Terrorism in the 21st century.

As you can see President Trump has inherited a very complicated and dangerous world. To solve those monumental domestic and overseas problems requires presentation of the whole truth and only the truth. This is the major task before President Donald J Trump. Unfortunately, some Republicans still do not understand whom they are dealing with. Do you remember a woman-voter who complained to John McCain about her fear of an Obama presidency before the 2008 election? Senator McCain assured her that Obama is “an honest and decent man.” It was enough for me to vote for Romney in the next 2012 election. I was shocked, when Republicans confirmed Loretta Lynch as Attorney General. They forgot or even did not know her connection to Bill Clinton…

Politicized Media and Intel

To derail a positive public response to a very successful Trump presentation before Congress, the Democrats sent an army of surrogates to exacerbate the Trump alleged collusion with Russia. The collective choruses of loud voices prevailed in the media: radio, internet, and TV. And Trump’s tweet about Obama’s wiretapping of Trump Tower was a timely and essential response. To understand the symptoms and the political disease, I purposely gave you a paragraph from the Soviet Decision of 1955, introducing the term “agents of influence” in my column February 11, 2017.

There are two types of “agents of Influence”—the enemies trained to subversive activities and those ill-informed Americans in both political parties. Let me give you an example of an enemy in the media. The correspondent of the New York Times, Walter Durante in the 1930s was the KGB agent of influence. Find him in Wikipedia and you will see how he helped Stalin during the Purges and Show Trails to kill thousands of innocent people. Stalin paid him very well for deceiving and fooling the West.

Stalin died March 5, 1953, but his Doctrine is alive and well. Look at what happened March 5, 2017 on CNN. The State of the Union had a show named “crises of public trust.” They were accusing Trump of lying and misleading. They were the convenient toys of the KGB due to their total ignorance. None of the participants knew that they were discussing Russia in the day of Stalin’s death, let alone that their knowledge of the KGB or the Soviet Mafia was ZERO. The CNN show, GPS, has repeated the same main motive– Trump is wrong in all accounts on the same exact day, no word about Stalin. Those people are the second type of the “agents of influence” due to their political ignorance. They are spreading “fake news” and helping the KGB to create confusion and chaos in America…

The same picture is a politicized Intelligence Community, all seventeen of them. I don’t know whether any of the seventeen had vetted a “community organizer,” named Barack Obama. If you read any of my books, you know that I didn’t trust American Intel, for a very simple reason—any country’s Intel is a primary target for the KGB and GRU. I was surprised when none of the seventeen agencies of our Intel stopped a massive transfer of American high technology to the Russian military by the Clinton Mafia, or stopped Iran Nuclear Deal beneficiary for Putin. By the way, why do we need seventeen agencies? Russia has only three and very successfully runs half of the world. They are the FSB (a former KGB), GRU, and Investigative Committee. Stalinist Doctrine has prevailed over all three.

My explanation of two types of “agents of influence,” can be applied to our Intel as well. Today they constitute a Shadow Government run by Obama. He operates through his accomplices—they together ran America and the world for the last eight years. They are the soldiers of the Democrat Party, who hate Trump and will fight his administration to the last drop of their blood. Some of them have no idea of Obama/KGB joint venture, having been fooled and deceived by Obama.

There is another reason for me to discuss our Intel—I am a victim of their ignorance. Bill Clinton eliminated all research of Russia, he also tried to silent myself, as the author and researcher of Russian history and the KGB. A FISA court under Bill Clinton has launched multiple surveillances against me: my computer and phone were wiretapped, my mail arrested, and I was fired from my teaching position in a University. I had been a conservative, teaching the truth about Soviet Russia to Americans. Despite that, I continued writing my books and columns, but since then the information about them has been blocked by our Intel. Due to those activities by Intel, Americans were prevented from learning the Truth about Soviets/Russia. You can see the result of that today, in March 2017—nobody understands the predicament in America and the world. Look at our incompetent media and tell me why a FISA court made me a “foreign agent.” What an overwhelming confusion and chaos…

My friend, a former CIA officer, knowing my research of Soviet Fascism, sent me this e-mail: Video / Mark Levin: Lays out evidence supporting accusation that Obama’s Authorized Spying Is Police State Tactics.

“The republic is in great danger. The trusted assessment several months ago was that there many in the intelligence community were waging war against Trump. Unfortunately Mark Levin who is held in high regard presents evidence here (short outtake from TV interview):

I agree with my friend. The American Republic is in great danger! Due to the civil war against ignorance and “agents of influence”, America is on the threshold of Watergate No.2. Please, read my two latest books—better late than never!

To be continued www.simonapipko1.com

U.S. Catholic Bishops promise to ‘disrupt’ President Trump

In January 2016 The Vortex reported on Communists infiltrating the Catholic Church. The Church Militant’s Michael Voris reported:

During the early years of Communism in the 1920s and 30s, the evil was being spread worldwide as the Blessed Mother had predicted at Fatima in 1917. Communist parties were being formed in various European countries and in American cities as well. They were already attempting to upset the political and cultural order.

alice_von_hildebrand-255x362

Alice von Hildebrand

But what only a very small number of people knew was that the top dogs of Communism had already released the hounds on the Church. The carefully organized plan was to recruit young men who were loyal Communists and get them placed in seminaries. This was carried out by various agents during the 1920s and 30s.

Fast forward 30 years to the 1960s, and the fruits were beginning to be seen. Learned, dedicated, faithful men and women in the Church were looking around and fretting, not sure from what framework they should understand the demolition of the Faith they were witnessing. At one point, Pope Paul VI even said that it appeared the Church was in auto-demolition.

One of those deeply distressed was a refugee from Hitler’s Germany, the brilliant theologian Dietrich von Hildebrand. He and his wife Alice were sitting down one day with a friend, a woman by the name of Bella Dodd. Bella Dodd had been received back into the Catholic Church by Abp. Fulton Sheen in April of 1952.

Read more.

VIDEO: The Vortex—Trump and Catholics

In the Life Site News article “These US Catholic bishops promise to ‘disrupt’ Trump” John Zmirak reports:

…Cardinal Peter Turkson and twenty-four American Catholic bishops have recently endorsed a political program that is dangerous, unbiblical, un-Catholic and uncharitable. In fact it is soaked in ideological rage, and explicitly aligns itself with the anti-Trump movements to “disrupt” the president’s enforcement of U.S. law. At least one of the bishops present, Robert McElroy of San Diego, has promised that the church he controls will actively help flout U.S. immigration laws.

This program was laid out at the First U.S. Regional Meeting of Popular Movements, which happened two weeks ago, and summed up in a manifesto called “Message from Modesto.” That “Meeting” included not just the cardinal and the bishops, but staff from the Vatican department for the Promotion of Integral Human Development and the Catholic Campaign for Human Development [CCHD].

The CCHD is the organization that radical Saul Alinsky personally helped left-wing Catholics to design, as the exposé A Wolf in Sheep’s Clothing documents. The Chicago branch of the CCHD, with the approval of then Cardinal Joseph Bernardin, cut the check that sent the young Barack Obama to his first Saul Alinsky “community organizing” school.

Another group that took part in the “Meeting”  was PICO, the Latin American far-left organization that used George Soros’ money  to spin Pope Francis’ 2015 U.S. visit as a boost to Democrats in the 2016 election.

Read more…

Zmirak lists five proposals made by these 25 Catholic bishops, the first being, “We urge every faith community, including every Catholic parish, to declare themselves a sanctuary for people facing deportation …. All cities, counties and states should adopt policies that get ICE out of our schools, courts and jails, stop handing over people to ICE…”

The Holy Bible says:

Matthew 22:21 Jesus said “Render to Caesar the things that are Caesar’s; and to God the things that are God’s.”

Romans 13:1 “Let every person be in subjection to the governing authorities. For there is no authority except from God and those which exist are established by God.”

These bishops are welcome to their personal views on President Trump and the federal laws dealing with immigration and refugee resettlement. But they are not ordained to deny the word of God.

Please watch this excerpt of the interview with Dr. Alice von Hildebrand:

RELATED ARTICLES:

The Coup Against Trump

Politics and Pope Francis: What is the role of the Catholic Church and the State?

VIDEO: President Trump vindicated by Wikileaks CIA dump

ZeroHedge in a column “Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential CIA Documents“; Another Snowden Emerges” reports,

A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

RELATED ARTICLES:

NSA Whistleblower Backs Trump Up on Wiretap Claims -US News & World Report

Wikileaks Exposes ‘Vault 7’ — The CIA’s ‘Zero Day’ Weapon

Trump Tower: Wikileaks ‘dumps’ files revealing out-of-control intelligence operations

A Solid Case for the Full Adoption of LED Street Lighting

led street lights comparisonLEDs are fast replacing regular filament bulbs in many spaces. This is largely due to the ability of LEDs to save energy and provide a better quality of light. LEDs can be controlled to vary their intensity depending on traffic density and other factors. A typical HPS lamp uses 75% more electricity than an LED lamp. The quality of the LED light is higher, despite the lower power consumption.

There has been an argument that LED lights are 5 times more expensive to buy and install but a study showed that the street lights can pay for themselves within 6 years through the reduced electricity and recurrent maintenance costs.

Where LED street lighting has been tested, the problem that kept coming up was glare. The good news is that there are researchers in Germany who have made low-glare LEDs to be used for streetlighting. Here is our argument for the adoption of low-glare LEDs for street lights.

Environmental Conservation

One of the biggest drawbacks associated with the HPS lamps that are used for streetlights in many areas, is that they contribute to the mercury dumped on land.  HPS lights carry an estimated 6mg/100W of mercury while LEDs carry zero. The use of LEDs is also likely to reduce the emission of CO2 gases by 125 tons per year.

Dimming

It is possible to dim an HPS lamp. However, it is not easy to do so. The reason for that is special ballast is required to dim HPS lamps and the dimming limit is 50%. LEDs on the other hand can be dimmed easily. All that is needed is a small program to run the dimming. LEDs and the Internet of Things are easily compatible, making it possible to control LED lights remotely. A LED streetlight has a low dimming limit of 10%, which means it can be dimmed by more than 90%.

Longevity

The HPS lamp is likely to last between 10,000 and 24,000 hours before it burns up and needs replacing. While that is a decent mileage, LED lights can last well over 50,000 hours. The financial implication is that money spent on acquiring 2 HPS lamps can go towards the acquisition of an LED lamp.

Low-Glare

The most exciting development in LEDs for streetlighting is the discovery of a way through which to reduce glare. This has been a problem because it increases the risk of accidents happening. With this new development, there simply is no logical reason why streetlights should not be LED-lit.

EDITORS NOTE: The featured image is by by Sergey Zolkin.

ANSWERING FACEBOOK: Playing Dodgeball with Abortion Realities

The abortion debate inevitably travels in the same issue-avoiding circles. I was recently on an ABC panel debating the courts blocking Florida’s 24-hour wait period for a woman to get an abortion after receiving counseling, providing time for her to weigh more information into her life-and-death decision.

Naturally enough, it devolved into a debate on abortion — as it always should. I was debating a pro-choice feminist and board member of the ACLU. And a friend. Our debate was feisty but civil — an important goal.

However, the debate continued on Facebook, where it became decidedly less civil. One of the great canards thrown at me all the time is that I cannot have an opinion on this because I am a man. This is so easily cut down and burned that there is never a response to my point. It’s just reiterated that I can’t. I’m male.

What this and so much of the rest of abortion debate dodgeball suggest is that rational thought, morals and, more than ever, science, make the pro-choice position completely indefensible. There is simply no way to defend a woman’s “right” to end the life of another human being for any reason she chooses, at any point in the pregnancy she chooses.

Canards flying everywhere

Hence we have the dodgeball arguments that this is a “choice”; that this is about “reproductive health rights”; that this is about “health care”; that a man cannot have an opinion.

No, the first and central issue is whether that which is in the womb is a human being with rights inherent as a human being. Most people actually see that is the case, at least after a month or two. Science gives us evidence with brain waves, heartbeats and in-womb pictures.

So when I make these points, they are really never refuted head-on. This is demonstrated with painful clarity in the Facebook debate that followed. It’s linked below.

Here is a sampling from Facebook, from both men and women:

“I watched it last night. I still don’t understand why men think they have a say in women’s health.”

“The next segment should be on prostate health. I’m looking forward to (a woman) expressing her opinion on that.”

“A man’s opinion on a women’s health and body issue is just not on equal footing with (a woman’s), no matter how eloquent and reasonable it may be.”

“What if women were up in arms because of men’s selfish refusal to get vasectomies?? What if we tried to FORCE men to get vasectomies for the safety of women?”

“Another man chimes in, lol.”

FYI, the response that men cannot have an opinion on this is astonishingly faulty thinking. Morals are not gender-dependent. Right and wrong is right and wrong. There is not a different set of rights and wrongs based on gender. It is not morally acceptable for a woman to steal from a man because she is a woman, because *stealing* is wrong. It is not morally acceptable for a man to kill a woman, or another man, because *murder* is wrong. Stealing and murder are wrong independent of which gender is doing it and which gender is considering its morality. In the same way, killing an unborn baby is either morally acceptable or not morally acceptable, independent of which gender is doing it or which gender is considering its morality.

Let’s play abortion dodgeball!

All of this is dodgeball. You see how all of the accusations avoid the central point. I’m convinced most know deep down this is the willful taking of an innocent human life. They know that is not defensible on any moral grounds.

So they play dodge the issue.

  • I throw out “Is it a human life in the womb?” They dodge left with “It’s a woman’s choice!”
  • I throw again “Is it a human life in the womb?” They dodge right with “It’s about reproductive rights!”
  • I throw again “Is it a human life in the womb?” They duck with “It’s about healthcare!”
  • I throw again “Is it a human life in the womb?” They spin sideways with “Pro-lifers don’t care about the life outside the womb!”
  • I throw again “Is it a human life in the womb?” They slide down with “If pro-lifers really cared about abortions, they would support better sex education!”
  • I throw again “Is it a human life in the womb?” They spin sideways with “You’re a man!”

I throw one last time “Is it a human life in the womb?” And one may finally answer with “No! It’s a clump of cells. Nothing more than a tumor.”

Finally. Someone admits to being a science-denier. But at least we can get on to debate the core issue with all the scientific evidence that it is indeed a measurable human being within weeks. We measure the death of a human with heartbeat and brainwaves. The baby has both of those in six to eight weeks.

That’s it. Dodge the ball of what abortion really is.

None of these remotely approach a defense for a state policy of allowing the willful killing of a human being with inherent rights by another human being for any reason, or no reason.

RELATED ARTICLE: What 1 Charity Organization Is Doing to Save 1 Million Unborn Babies

EDITORS NOTE: This column originally appeared on The Revolutionary Act.

Wikileaks Exposes ‘Vault 7’ — The CIA’s ‘Zero Day’ Weapon

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’sEmbedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf),describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.

CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products,Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

The Truth about Christians Amoung the Refugees

Executive summary

A female interpreter of Eritrean origin, who lives in Germany and of whom neither the Muslim migrants nor the locally hired Muslims know that she is a Christian, revealed what she experienced in refugee shelters in Germany:

  • Adult Muslim migrants threaten and physically attack Christian and Yazidi refugees.
  • Muslim migrant kids do not play with Christian refugee kids, then they explain that they hate them, just like their parents do.
  • Locally hired Muslim interpreters and security men seem integrated on the outside, they grew up in Germany, went to German schools and have jobs, but when they are among themselves, they reveal their true colors by stating that Germany must be Islamized, and that they disdain Germany and its values.
  • In mosques in Germany, pure hate is preached against people of other religions.
  • Muslim migrant women want to out breed Christians, because they want to annihilate them.

German aid organizations and Christian politicians have confirmed her words with their own experience. They also added that Muslim interpreters intentionally mistranslate the words of Christian refugees to make them unable to obtain asylum, cover up Muslim mobbing on Christians, and arbitrarily move Christians to the end of the charity recipients’ list.


Incognito in refugee shelters: Everything Christians live through

What a Christian female interpreter hears in shelters, is terrifying. An article by idea editor-in-chief Daniela Städter.

Wetzlar (kath.net/idea)

Only 14 per cent of refugees who filed for asylum in Germany in 2015 were Christians – over 73 per cent are Muslims. Recently, there have been aggravated reports by Christians about discrimination by Muslims in refugee accommodations. Even some Muslim interpreters and security duty coworkers would put pressure on Christians. A Christian female interpreter observes this, but she is not detected as a Christian. What she hears in the shelters, is terrifying. An article by idea editor-in-chief Daniela Städter.

In September 2016, the call of a long-standing German top female politician reaches the Evangelical News Agency idea (in Wetzlar). She has contact to a female Christian engaged in refugee assistance, who could tell controversial things about the situation in German refugee shelters. Nevertheless, the name of the woman shall not be mentioned. Subsequently, a discussion takes place in Wetzlar among the female politician, an expert in the field of refugee issues, and the 39-year-old Christian female interpreter originating from Eritrea. She speaks Arabic fluently and has already worked in various refugee shelters as an interpreter – mostly only with Muslim colleagues.

The woman acts “undercover” at it. Nobody suspects that she is Christian. The native-born Eritrean fled for Germany in 1991 on her own. She is thankful that she was taken in openly in her new homeland and was supported in many ways. Later she wants to give something back and begins to help in refugee shelters five years ago or so in an honorary capacity. She has been active mainly as an interpreter since the summer of 2016. That she is Christian, she has not mentioned it in the accommodations since the beginning. Because of her knowledge of the Arabic language, she notices quickly: “Christians are getting subjugated, intimidated and harassed by Muslim refugees. That is usual.” Often nobody realizes the mobbing, by which Yazidis and homosexual refugees are affected, too.

 “Germany must be Islamized”

Security duty coworkers and interpreters are, according to her data, almost always Muslims. They make, says the 39-year-old, a very nice impression at the first glance: “Most of them grew up here, often studied, have esteemed occupations, and they behave open-mindedly.” However, that changes as soon as they are “among themselves”: “Then they show their true colors and say sentences like ‘Germany must be Islamized’. They disdain our country and our values.” The young woman is appalled, and for a long time she does not want to take this for real. She still withholds that she is Christian in order to learn more. Among other things, she visits the Quran courses of various mosques: “There, pure hate is preached against people of other religions. The kids get that here, in Germany, taught to them from an early age.” It is similar in the refugee shelters. She notices how Muslim boys refuse to play with Christians. The female interpreter tries to mediate: “You are Muslim, he is Christian. What difference does it make?” The five-year-olds answer her:

“With the Christians, I do not play. My parents hate them, too.” The female interpreter becomes frightened: “They fled from the war to Germany and should be happy after all, that a Christian country takes them in.”

We, Muslims must get more kids than the Christians

She also tries to establish contact with the Muslim women. Many of them, despite their young age, have already had multiple kids. She cautiously wants to enlighten them about contraception methods. “After that, some women told me: We want to multiply. We must get more kids than the Christians. Only this way can we annihilate them.” As she objects and says that it is, after all, the Christians who help them, she bumps into rejection. Helping the Christians is a sin.

The might of the interpreters

The European Mission Community (in Penkun, Vorpommern) has lived through the might of the Muslim interpreters, too. Its chairman, Frank Seidler reports that at the hearings at the Federal Office for Migration and Refugees, they sometimes falsely rendered the testimonies of Christian refugees within the asylum process. That is why now, a Persian-speaking coworker is accompanying the refugees to the interviews, so that he can directly intervene in an emergency: “Since then it has been running better.” Seidler tells further about an Afghan having converted to Christianity, who was beaten up in his collective accommodations and was injured very severely. After he was helped to press charges, there were immediately countercharges by multiple Muslim refugees. The process is still running, although he counts with cessation, because testimony stands against testimony: “Unfortunately, we have already gone through this lapse often.” But where this leads is that the attackers think that they could allow themselves everything in Germany and would never be held accountable, so says Seidler.

A permanent pressure burdens Christians

The Christian aid organization Open Doors (in Kelkheim at Frankfurt am Main) makes similar observations. It is often hard to prove incidents. “With the incidents, it is not always about violence”, says the coordinator of public relations, Ado Greve, “but rather about forms of discrimination, for example at food distribution, or about threats. A permanent pressure burdens the Christians – especially the converted ones.” When a Christian is being threatened in his mother tongue in the corridor, “We cut through your neck!”, or “We will rape your wife!”, then it triggers great fear. Greve:

“The religious features imprinted by Islam in their homeland are often brought with by the perpetrators. However, to prove that, it is hard in most cases.”

But it should not lead to that the incidents are not taken seriously:

“It is important to give credit to the reports of the affected Christians.”

When Muslims translate falsely

Also from the point of view of the leader of the refugee-related work group within the Central Council of Oriental Christians in Germany, Paulus Kurt (in Munich), false translations by Muslim interpreters are a problem. From the refugees whom he advises, he makes them hand over the filled hearing questionnaires after the interview date at the Federal Office for Migration and Refugees in order to verify them together with the Christian asylum seekers. Sometimes the data of religion are false there – from an Aramean Christian, for example, becomes an Arabic Muslim. The flight reasons, too, are rendered partially inaccurately and to the disadvantage of the questioned Christians. If they notice this, they file an objection within the legal deadline of two weeks. Nevertheless, many refugees did not even know the expiration date at all, and thus passed the deadlines.

Christians often have no knowledge of their rights

According to Kurt, asylum seekers also have the right for a retranslation of the questionnaire filled in German to their mother tongue. However, some interpreters did not inform the Christians about that at all. By contrast, the interpreters communicated to the coworkers of the Federal Office that the questioned one has waived the retranslation. “By that, the chance of Christians to get a long-term recognition for asylum here drops.” In the accommodations, too, the language barrier is a problem: “There, a Christian gets beaten by a Muslim, because he is eating pork in the communal kitchen – and the interpreter relays to the leadership afterwards that there was merely a general altercation about the use of the kitchen.”

What nobody realizes

According to the data by two Hessian female refugee helpers of the Central Council of Oriental Christians in Germany, it is also often about forms of discrimination in the accommodations, which go on in the background without being noticed. They name, for example, the issuance of articles of clothing. The maintainer of the accommodations provides a list with refugees who should get clothes. The slip of paper is passed to the interpreters who organize the issuance in the respective languages. At the readout, the list gets changed by them. Whoever has a Christian name, will be called at the end, and must take potluck with the rest, they say: “Nobody realizes that.”

The state assumes false preconditions

From the point of view of auditor Thomas Günster (in Fulda) engaged in refugee-related work, it is about a system error. The state assumes integration in the case of Muslim interpreters, most of them having grown up in Germany, toward the local value system, but that has not happened at all. Günster, who stands in close contact with Hessian refugee helpers and supports them at their work, says: “A sort of independence is assumed here, which is not there at all.” Rethinking must happen here.

There are positive developments in Hessen

Meanwhile, there have been positive developments, too, means Günster, who is also the chairman of the Diocesan Group Fulda of the Association of Catholic Entrepreneurs (BKU). Thus the Hessian Ministry of the Interior strives to protect religious minorities from abuses. In addition, too, the teams in the scope of security duty and interpreters should be staffed in the future with coworkers of different religious affiliations: “Minorities among the refugees must be protected and their complaints taken seriously. We must pay attention that the Christian refugees in Germany do not go to the dogs anymore.”

It looks worse in Bremen

The situation in Bremen is worse. There, the City Senate adopted a new Protection Against Violent Acts concept for refugee facilities at the end of October [2016]. In it, however, they did not go into the situation of Christian refugees. The target group of the Protection Against Violence Acts concept is girls, women, and persons who, due to their sexual or gender identity, are particularly threatened by violence. The alderwoman in the Bremen City Assembly, Sigrid Grönert (CDU) [Christian-Democratic Union, a German political party] basically welcomes the concept indeed, but already pointed out in May that beyond that, Christians also feel mobbed by Muslims over and over again.

By contrast, the Bremen City Senate stated in February that “no abuses” on religious minorities are known. Grönert: “That, unfortunately, does not correspond to reality.” According to their own data for the time frame between January 2015 and June 2016, nine cases of bodily abuses in Bremen were reported to Open Doors.

Christians do not press charges out of fear

None of the affected Syrian Christians has pressed charges – out of fear, that the situation could get worse. That abuses are not known to the authorities, simply does not mean that they do not exist, emphasizes Grönert, who is also the assistant chairman of the Evangelical Workgroup of the CDU in Bremen: “It is a pity that the issue is not being taken up over here at us, while a Federal Province like Hessen has recognized the problems. I wish that the issue were taken seriously by politics across the Federation [i.e. Germany].” She is not alone with this wish. Professor Heiner Bielefeldt, UN special rapporteur for freedom of religion and world view, incumbent till the end of October [2016], demanded at the beginning of November an honest discussion about the hints of abuses against Christian refugees in asylum accommodations.

It would be a big mistake of politics to spread the cloak of silence over it, said Professor Bielefeldt.

US Catholic Bishops [who are paid millions to bring Muslims to U.S.] assail Trump Migrant Slowdown

Actually it is over a half billion the US Conference of Catholic Bishops received from U.S. taxpayers since 2008!

(By the way, I just heard Raymond Arroyo on Fox and Friends say that the USCCB gets millions of tax dollars annually from the federal treasury, but I couldn’t find the clip.  Yeh! Finally that information is getting in to the mainstream media!)

Here is the latest from Catholic News Agency (CNA):

Bishop Vasquez

Washington D.C., Mar 6, 2017 / 03:50 pm (CNA/EWTN News).- With people fleeing humanitarian crises around the world, President Donald Trump’s new executive order halting refugee admissions is wrong, Catholic bishop and aid groups maintain.

Bishop Vasquez chairs the U.S. bishops’ committee on migration. Last time we looked we reported that 97% of the Bishop’s Migration funds money comes from you—the taxpayers!

“We remain deeply troubled by the human consequences of the revised executive order on refugee admissions and the travel ban. While we note the Administration’s efforts to modify the Executive Order in light of various legal concerns, the revised Order still leaves many innocent lives at risk,” Bishop Joe Vasquez of Austin stated March 6. Bishop Vasquez chairs the U.S. bishops’ committee on migration.

“The U.S. Catholic Bishops have long recognized the importance of ensuring public safety and would welcome reasonable and necessary steps to accomplish that goal,” he said.

“However, based on the knowledge that refugees are already subjected to the most vigorous vetting process of anyone who enters the United States, there is no merit to pausing the refugee resettlement program while considering further improvement to that vetting process.”

Here comes the big lie that Trump is reducing the number  of refugees dramatically!  Contractors, like the US Bishops, did just fine on less than 50,000 refugees during 4 of Bush’s years.

But, for only one year did Obama propose the astronomical number of 110,000 (for most of the year he would not be in office!) and that becomes the standard that the ignorant, gullible media goes with!  For the many new readers we get every day, the resettlement contractors, including the USCCB, gets paid by the head to place refugees in your towns. More refugees=more money!

“Resettling only 50,000 refugees a year, down from 110,000, does not reflect the need, our compassion, and our capacity as a nation,” Bishop Vasquez stated. “We have the ability to continue to assist the most vulnerable among us without sacrificing our values as Americans or the safety and security of our nation.”

He goes on to oppose any religious test (like the prioritization of Christians in the first EO) for admission to the US.

Now, here comes a major truth! And, this is why Christians are not prioritized from Muslim countries!

Refugees must first register with the UNHCR to be eligible for resettlement.

Trump should immediately sever our ties with the UN High Commissioner for Refugees, save us millions of dollars, and put in place a program where we, the US, chooses our refugees without the UNHCR middle men!

CNA continues……

“The Obama administration policy was to prioritize these groups, but despite this they remain severely underrepresented in U.S. refugee admissions, so it’s clear that a fair outcome is even more important than a stated priority,” he said. [Andrew Walther, vice president of communications and strategic planning at the Knights of Columbus.]

Syriac Patriarch Ignatius Joseph III Younan of Antioch has warned that Christians hoping to be resettled in the U.S. or Canada have never even had the chance.

“I personally heard on several occasions from many of our Christian refugees in Lebanon and Jordan, that their applications for refugee visas, either to the USA or Canada, are without any response, if not refused by the consulates of the USA and Canada,” he stated.

Never mentioned at CNA News is the financial reason the USCCB does not want to slow the flow for even a short period of time—$$$$$!

Here (below) is just one page of the income the USCCB is getting from you (from 2008-2016).  This does not include the millions and millions of tax payer dollars received separately by individual Catholic Charities around the country.

My screenshot from USASpending.gov captures only 7 of 227 transactions.

For those of you interested in the USAID funding be sure to scroll through the pages and see how much of that money the USCCB gets!

By the way, since the Bishops are exempt from filing Form 990’s we can’t get at their salaries.

RELATED ARTICLES: 

Nearly a third of FBI domestic terrorism cases involve Muslim refugees

Call the White House to support President Trump’s plan to keep us safe!

Church World Service announced yesterday that it is launching anti-Trump campaign (to raise $$$)

Breitbart: Federally-funded refugee resettlement contractor, HIAS, organized NY rally against Trump

Trump travel ban could help Canada

Rutland, VT mayoral contest focuses on candidates who could best heal rift over refugees

Magic March 3rd was yesterday, refugee flow should now be shutting down

Only Malta and Finland on target to take allocated migrants from Italy and Greece under EU ‘sharing’ scheme

Panic button as refugee contracting agencies begin to downsize as they lose federal $$$

Syrian refugee files federal lawsuit against Trump EO, wants wife and child in America with him

La fin justifie t-elle les moyens? [Does the end justify the means?]

By Wallace Bruschweiler and William Palumbo…

Political sabotage will continue to threaten President Trump until he finally acts decisively.

Another week passes, another slew of devious political attacks on President Donald J. Trump by political operatives inside the government.  Regardless of legalities, politically motivated leaks are being routinely and systematically fed to the hostile news media.  The illegal leaking of damaging and/or embarrassing information puts President Trump’s administration perpetually on the defensive, therefore unable to really focus on their agenda and enacting the policies that were promised on the campaign trail.

This behavior by government insiders (saboteurs) demonstrates the attitude of those who served in the Obama administration: the end justifies the means.  Niccolo Machiavelli would be very proud.

The latest leak emanates from the Department of Homeland Security.  A source within DHS passed an intelligence assessment memo to MSNBC’s Rachel Maddow.  In it, the memo claims that citizenship is not a determining factor in likelihood of radicalization.  Implied from this memo is that the administration’s travel ban, which Maddow erroneously calls a “Muslim ban,” is an ineffective strategy to prevent further terrorist attacks.

Furthermore, this weekend we learned that the Obama administration ordered the wiretapping of Trump Tower and Donald Trump’s cell phone.  In order to wiretap a U.S. citizen, such a request requires authorization from the Foreign Intelligence Surveillance (i.e., FISA) court.  Indeed, the permission was seemingly granted on the second request by the FISA court, likely under the pretense of monitoring communication between the Trump campaign staff and certain Russian nationals.  While news continues to break with respect to this developing story, Trump’s former campaign manager Corey Lewandowski alleged that then-Senator Jeff Sessions was also wiretapped by the Obama administration.

You don’t need a doctorate in European history to recognize that politically motivated eavesdropping is a tactic of totalitarian states.

In light of the latest revelations, we would like to submit a few pointed questions to the Trump administration:

  • If the surveillance was in place to detect interference by the Russian government in our election, and no evidence as yet has been presented to the public, can the public then assume that the wiretapping was strictly to gain a political advantage for Hillary Clinton’s camp?
  • Who ordered the wiretapping? A spokesman for former President Obama categorically denied it was issued by Obama’s White House.  Could it have been ordered by then-Attorney General Loretta Lynch?  Or, possibly, by Valerie Jarrett, who is reportedly moving in with the Obama couple in their new Washington, D.C. home?
  • Why are there still any Obama-era political appointees in key positions? What level of damage would finally convince the new administration to thoroughly “clean house?”
  • What is preventing the Trump administration from going on the offensive against the previous administration and its corrupt officials?

It is evident, plainly, that the former administration – including Barack Hussein Obama, Valerie Jarrett, Loretta Lynch, George Soros, etc. – hold Machiavelli’s dictum in high regard.  The end justifies the means.  By providing the media with fodder that militates public opinion against Trump and his cabinet, they are in effect paralyzing him as President.

The Ends Justify the Means

  • President, you and your administration have the power and the prerogative to dispense with all political appointees. The American people gave you this power when they elected you.
  • Why not sit down with your advisers and produce a list of all political appointees in the following agencies: the White House, Department of State, CIA, Justice Department, FBI, Department of Homeland Security, and more.
  • Then, fire them all in one fell swoop. “Everybody, out of the pool!”  Remove their credentials overnight and revoke their security clearances.  Send them packing, far away from our government and the halls of power.
  • Finally, for good measure and as a vital insurance policy, direct Attorney General Jeff Sessions to investigate malfeasance and corruption of the previous administration, e.g. the Clinton Foundation, etc. Let the other side scramble and “lawyer up.”

In this case, the end rightly justifies the means.

RELATED ARTICLES:

NSA Whistleblower Backs Trump Up on Wiretap Claims -US News & World Report

No One Mentions That The Russian Trail Leads To Democratic Lobbyists

Did Obama spy on Trump? Glenn Reynolds

TOWERGATE: Obama uses secret court and FBI to spy on Trump Campaign

‘The LIES and DECEPTION of the media for WEEKS!’ Mark Levin comes roaring back Monday evening

So Stelter wants me to independently corroborate what multiple media outlets reported about FISA applications?

Citizens can actually read the ‘American Health Care Act’ bill Online! Refreshing

Remember this:

Speaker Paul Ryan in an email to all Americans wrote:

I want you to be the first to know: we just introduced our bill to repeal and replace Obamacare. It is called the American Health Care Act, and it is a plan to drive down costs, encourage competition, and give every American access to quality, affordable health insurance. It protects young adults, patients with pre-existing conditions, and provides a stable transition so that no one has the rug pulled out from under them.

Unlike the Democrats, we are not going to pass legislation to find out what is in it. The American Health Care Act will proceed through a transparent process of regular order in full view of the public.

Visit www.ReadTheBill.gop to download and read the bill.

How refreshing.

Michael A. Needham, Chief Executive Officer Heritage Action for America, in an email writes:

For seven years, Republican lawmakers have campaigned on the promise of full repeal. The American people elected a Republican House, Senate, and White House to ensure this promise was kept. For most people in the individual market, there would be no significant difference between the Affordable Care Act (Obamacare) and the new American Health Care Act proposed by Republicans.

This is bad politics and, more importantly, bad policy.

If Republicans move forward with this bill, they will be accepting the flawed premises of Obamacare. Instead, they should fully repeal the failed law and begin a genuine effort to follow through on their seven year promises to create a free market health care system.

Let the negotiations on the proposed American Health Care Act begin.

RELATED INFOGRAPHIC:

RELATED ARTICLES: 

Key Takeaways From CBO Score of the Republican Health Care Bill

Conservative Lawmakers to Use Their ‘Enormous Power’ to Fight Obamacare Replacement Bill

House Republican Health Care Bill Misses the Mark

What if there’s no affordable insurance to buy?

House Republicans Release Text of Obamacare Repeal, Conservatives Call for Action ‘Now’

GOP Unveils Obamacare Replacement Legislation

Trump’s Historic Chance to Dismantle the Administrative State

What Will GOPcare Change?

RELATED VIDEOS:

Sen. Rand Paul: “They can’t keep ‘Obamacare Lite’ and expect conservatives to vote for it.” – 3/2/17

Rep. Mike Kelly discusses American Health Care Act with Neil Cavuto.

VIDEO: 11-Year Old Trumpette Explains why she supports the President

The America First Project interviewed a young Trumpette who is only 11-years old girl speaks truth to power at CPAC 2017.

The 6 Most Destructive Myths About Ebola

While fears and concerns mount in the face of the worst Ebola outbreak history, potentially dangerous myths and rumors are also being spread. Ranging from simple misunderstandings to deliberate misinformation.

burning of ebola victims source

Burning of Ebola victims.

The current West African Ebola outbreak has claimed more than 4,000 lives, but recent media coverage has also ignited a firestorm of panic and misinformation regarding the virus. In some cases, the myths surrounding Ebola make it more difficult for health workers to combat and contain it, and even harmless rumors can create unnecessary paranoia. Below are some of the most common and persistent myths about the Ebola virus.

It is Highly Contagious:

Ebola is highly infectious, but it is not very contagious. In humans, the virus spreads through close contact with infected bodily fluids such as sweat, saliva, blood, fecal matter, and semen. Ebola is not considered an airborne virus, since it cannot survive in the open air or travel long distances. Casual contact with an infected person is considered to bear a low risk of infection, which is why the majority of cases are reported amongst health care workers in constant close contact with infected patients. As viruses go, Ebola spreads at a much slower rate than most. Smallpox, which was successfully eliminated by a targeted vaccine program, was more than twice as contagious, while measles is a staggering nine times more contagious than Ebola.

Outside Assistance is Making it Worse:

One of the more dangerous myths about Ebola is that international aid efforts are making the outbreak worse. In some regions, there are even rumors that the virus was introduced by international healthworkers, creating distrust and hindering relief efforts. Some people also worry that sending health workers increases the odds of the disease spreading in other parts of the world, but current evidence suggests that this fear is unfounded.

There is No Hope for a Cure:

While there are currently no cures or vaccines for Ebola, that doesn’t mean that one won’t be developed. There are a number of promising treatments and vaccines that are being tested by the World HealthOrganization to ensure that they are effective and free of harmful side-effects. Many experts predict that a vaccine may even be developed and approved within a matter of months.

All Ebola Victims Die:

While Ebola is undoubtedly a dangerous and often-fatal virus, it is important to understand the data relating to its mortality rate in the proper context. There are several strains of Ebola, each with different reported mortality rates, ranging from 20% to 90%, making it difficult to pin down an accurate figure. Moreover, experts argue that many of the deaths attributed to Ebola could be prevented if patients were treated in facilities with better access to treatment and stricter adherence to safety protocols. With state of the art medical care, the mortality rate of Ebola may even be as low as 10-20%, making it roughly as fatal as SARS.

Travel and Immigration Pose a Serious Risk:

One of the most persistent myths about Ebola is that immigrants and foreign travelers pose a major risk of spreading the virus. The simple fact is that immigrants and travelers from anywhere in the world besides West Africa are not a threat. In countries facing the Ebola epidemic, air travel has become much more restricted, and screening processes have improved for both incoming and outgoing passengers. Since a person who does not display symptoms of the virus is not contagious, it is unlikely, though not impossible, that a serious epidemic could result from air travel.

The U.S. Isn’t Prepared to Deal with Ebola:

Much of the hysteria stemming from this Ebola outbreak is based around the idea that the United States wouldn’t be able to contain the virus. However, it is important to realize that the reason Ebola poses such a threat in West Africa is due to the lack of adequate healthcare in affected countries. Ebola is no more deadly or contagious than many other diseases, but the lack of training, clean medical supplies, and personnel in West African hospitals has created a situation where the disease is able to run rampant. In a country with strong healthcare infrastructure and state of the art facilities, the Ebola virus would be much easier to contain.

Ebola is certainly a major public health priority in West Africa, but the truth is that for most of the world, it is far from the apocalyptic threat that many people claim it to be. The persistent myths and rumors above have fueled widespread paranoia and public fear about the virus, but it is vitally important to understand the facts in order to better facilitate efforts to contain and eliminate the outbreak at its source.

source

IMMIGRATION: President Trump’s Revised EO is Constitutional, Legal, and Common Sense

President Trump has signed a revised Executive Order (EO) on immigration and refugee resettlement. Democrats are already calling it a “Muslim ban.” A question that Democrats should ask themselves: What if former President Clinton had banned the 9/11/2001 hijackers from entering the United States, would we be better off today?

Secretary of Homeland Security John Kelly released the following statement about the EO:

“The Executive Order signed today by President Trump will make America safer, and address long-overdue concerns about the security of our immigration system. We must undertake a rigorous review of our visa and refugee vetting programs to increase our confidence in the entry decisions we make for visitors and immigrants to the United States. We cannot risk the prospect of malevolent actors using our immigration system to take American lives.

The Executive Order signed today is prospective in nature—applying only to foreign nationals outside of the United States who do not have a valid visa. It is important to note that nothing in this executive order affects current lawful permanent residents or persons with current authorization to enter our country. If you have a current valid visa to travel, we welcome you. But unregulated, unvetted travel is not a universal privilege, especially when national security is at stake.

“The Department of Homeland Security has worked closely with the Department of Justice, the Department of State, and the White House to create an executive order that addresses our information concerns while protecting the homeland and our citizens.”

Hans von Spakovsky in his The Daily Signal article “Why Trump’s Revised Executive Order Is Constitutional, Legal, and Common Sense” writes:

President Donald Trump’s revised executive order restricting travel from terrorist safe havens is just as constitutional and legal as his original order, despite what some courts such as the 9th U.S. Circuit Court of Appeals said about the original order.

But the revisions he has made, which clarify that the executive order does not apply to any foreigners who already hold visas to enter the U.S., will make it tougher for activist judges to justify any injunction orders they might be inclined to issue against it. Yet there is little doubt that progressive groups will seek such orders.

The executive order, “Protecting the Nation from Foreign Terrorist Entry into the United States,” confirms what the administration had previously announced, which is that the temporary, 90-day suspension of entry into the U.S. from certain designated countries will not apply to:

  • Lawful permanent residents as well as diplomatic, NATO, and U.N. personnel.
  • Foreign nationals admitted after the effective date of the executive order.
  • Individuals with a visa valid on the date of the executive order.
  • Dual nationals travelling on a passport issued by a non-designated country.
  • Individuals already granted asylum or refugee status before the effective date of the executive order.

This is an important revision because it voids the due process concerns that the 9th Circuit expressed—namely, that individuals who had already received approval to enter or reside in the United States might have that right taken away from them without a review and appeal process.

Read more…

Spakovsky concludes, “This executive order is clearly within the president’s authority under 8 U.S.C. § 1182 (f), in which Congress clearly delegated to the president the authority to suspend the entry of any aliens into the U.S. when he believes it would be ‘detrimental to the interests of the United States’.”

ABOUT HANS VON SPAKOWSKY

Portrait of Hans von Spakovsky

Hans von Spakovsky is an authority on a wide range of issues—including civil rights, civil justice, the First Amendment, immigration, the rule of law and government reform—as a senior legal fellow in The Heritage Foundation’s Edwin Meese III Center for Legal and Judicial Studies and manager of the think tank’s Election Law Reform Initiative. Read his research. Twitter: @HvonSpakovsky

RELATED ARTICLES: 

Tennessee Files Lawsuit Challenging Constitutionality of the Fed Refugee Resettlement Program

Who’s paying for the DACA program? | TheHill

Trump makes key changes to travel ban

Five takeaways from Trump’s new travel ban

Iraq’s lobbyists mobilized after travel ban, documents reveal

Politico: Fight will now focus on 120-day refugee moratorium

No One Mentions That The Russian Trail Leads To Democratic Lobbyists