09/12/18

CIA Files On al Qaeda/bin Laden Leading Up To 9/11

By: Denise Simon | Founders Code

The collection includes rarely released CIA emails, raw intelligence cables, analytical summaries, high-level briefing materials, and comprehensive counter-terrorism reports that are usually withheld from the public because of their sensitivity. Today’s posting covers a variety of topics of major public interest, including background to al Qaeda’s planning for the attacks; the origins of the Predator program now in heavy use over Afghanistan, Pakistan and Iran; al Qaeda’s relationship with Pakistan; CIA attempts to warn about the impending threat; and the impact of budget constraints on the U.S. government’s hunt for bin Laden.

The documents released by the CIA detail the meticulousness of al Qaeda’s plot against the United States and CIA attempts to counter the rising terrorist threat. A previously undisclosed raw intelligence report that became the basis for the December 4, 1998, President’s Daily Brief, notes that five years before the actual attack, al Qaeda operatives had successfully evaded security at a New York airport in a test-run for bin Laden’s plan to hijack a U.S. airplane. [1998-12-03]. CIA analytical reports also provide interesting insights into al Qaeda’s evolving political strategies. “In our view, the hijackers were carefully selected with an eye to their operational and political value. For instance, the large number of Saudi nationals was most likely chosen not only because of the ease with which Saudi nationals could get US visas but also because Bin Laden could send a message to the Saudi Royal family.” [2003-06-01]

Reports on early attempts to apprehend bin Laden detail the beginning of the U.S. Predator drone program in Afghanistan and Pakistan. “First Predator mission over Afghanistan [excised] September 7, 2000.” [1] “Twice in the fall of 2000, the Predator observed an individual most likely to be Bin Laden; however we had no way at the time to react to this information.” [2004-03-19] American UAVs did not have sufficient weapons capabilities at the time the CIA likely spotted bin Laden in 2000 to fire on the suspect using the UAV.

Continue reading

09/12/18

Care Center Owners Charged With Human Trafficking

By: Denise Simon | Founders Code

And there are at least 50 criminal counts against the owners… a sanctuary state eh?

Rainbow Bright Adult Residential Facility in South San Francisco, CA provides Assisted Living services.

The staff at Rainbow Bright Adult Residential Facility provide personalized services designed to meet the needs of every patient. The dedicated health professionals offer the assistance you need while respecting your independence.

Rainbow Bright Adult Residential Facility is a licensed care provider with the State of California. The California Department of Social Services provides a list of registered care providers in California.

Continue reading

09/12/18

N. Korean, Park Jin-Hyok Charged With Global Cyber Attacks

By: Denise Simon | Founders Code

A North Korean suspect is wanted by U.S. authorities on suspicion of hacking. (Courtesy of the U.S. Federal Bureau of Investigation)

U.S. CHARGES NORTH KOREAN HACKER

Federal prosecutors charged a North Korean man, Park Jin-Hyok, with crimes in connection with a series of costly cyber attacks around the globe, including the WannaCry ransomware attack in 2018, the heist of Bangladesh’s central bank in 2017, and the hack of Sony Pictures in 2014. It is the first time the Justice Department has explicitly charged a North Korean hacker backed by the government. Park was allegedly working as a programmer for a North Korean front company in China called Chosun Expo, which had ties to North Korea’s military intelligence.

Legal analysts say the complaint is the most detailed public accounting yet of North Korea’s cyber attacks against foreign adversaries. The Justice Department has now brought hacking-related charges against North Korea, China, Iran, and Russia.

(WSJ, NYT, Reuters, DOJ)

Park Jin Hyok, named by officials as a member of the so-called Lazarus Group hacking team behind last year’s WannaCry global ransomware attack and the 2014 digital attack on Sony, apparently used not only advanced technology but elaborate reconnaissance work to digitally steal money and sensitive information.

Continue reading

09/12/18

Young Enemies-Within Movement

By: Lloyd Marcus

For decades we have allowed the American left (public education, Hollywood, Democrat Party, and fake news media) to indoctrinate our children; teaching them that America sucks and is the greatest source of pain and suffering for people both here and abroad. We’re still allowing leftists to mold and shape our kids into their anti-Christian radical progressive image as early as preschool. https://bit.ly/2Nsk9PT

Consequently, we have young adults in positions of power and influence who literally hate their country. Like sleeper-cells, leftists’ young enemies-within operatives are seeking to bring down America as founded by any means necessary; openly advocating violence and treason. https://bit.ly/2NupCWu

Mega-millionaire pro-football player, Colin Kaepernick, is an operative of the leftists’ young enemies-within movement. Nike executives who gifted Kaepernick hero-status for hating his country are also members of the young enemies-within movement. Facebook and Twitter are active members of the movement, boldly censoring conservative, patriotic, and Christian speech claiming such talk is hateful. https://fxn.ws/2DFpAUp

Continue reading

09/12/18

Egypt: President appoints two Christian governors defying Islamic Sharia

By: Dr. Ashraf Ramelah | Voice of the Copts

In Egypt, the president appoints the governors of the country’s provinces. This practice began with President Nasser after the kings’ era. Last month, President Al-Sisi appointed two Christian governors to two principally Christian provinces — the highest concentration of Christians in all of rural Egypt — located in Upper Egypt and West Egypt. This is monumental in a country where Islamic sectarianism dictates politics.

When Al-Sisi took office in 2013 for a four-year term, he immediately appointed new governors, all Muslim, for each of the 27 provinces as did his predecessors – Mubarak, Sadat, and Nasser. Now at the beginning of his second term, Al-Sisi replaced two of his original governors at the end of their six-year terms with two Christians – the first time in modern history that some all-Christian towns would have a Christian administration. However, there was one earlier unsuccessful attempt at this by Egypt’s military interim government (SCAF) in 2012 after Mubarak was ousted.

This has inspired an outpouring of positive enthusiasm from Egypt’s Coptic community bringing hope and optimism where disappointment and anger were mounting against the Al-Sisi government by many. It remains to be seen as of yet if any opposition will come from the Muslim community and if their terror elements will respond with violence.

Continue reading

09/12/18

More International Classified Material On Hillary’s Server

By: Denise Simon | Founders Code

Ruh Roh… hope the statute of limitations does not apply here.

As a reminder:

When Clinton was running for president in 2008, she had a private server installed at her home in Chappaqua, New York. The domains clintonemail.com, wjcoffice.com, and presidentclinton.com, which were registered to a man named Eric Hoteham, all pointed to that server. In 2013, a Denver-based IT company called Platte River Networks was hired to manage the server, but wasn’t cleared to work with classified information. The company executives received death threats for taking on the contract. It was later discovered that multiple private servers were used for Clinton’s email.

Clinton used a BlackBerry phone to communicate during her tenure as secretary of state, including sending and receiving emails through her private server in New York. The State Department expressed concern about the security of the device. Clinton had requested the NSA provide a strengthened BlackBerry, similar to the one used by President Obama. But, her request was denied. Instead, the NSA requested that Clinton use a secure Windows Phone known as the Sectera Edge, but she opted to continue using her personal BlackBerry.

Continue reading

09/12/18

Hey Moscow, What About the ‘Neuroweapons’ Used in Cuba Attacks

By: Denise Simon | Founders Code

General view of the U.S. Embassy in Havana after the U.S. government pulled more than half of its diplomatic personnel out of Cuba in September 2017. (Photo: Ernesto Mastrascusa/Getty Images)

Primer:

Neurotechnologies as Weapons of Mass Disruption or Future Asymmetric Warfare: Putative Mechanisms, Emerging Threats, and Bad Actor Scenarios

Intelligence agencies investigating mysterious “attacks” that led to brain injuries in U.S. personnel in Cuba and China consider Russia to be the main suspect, three U.S. officials and two others briefed on the investigation tell NBC News.

The suspicion that Russia is likely behind the alleged attacks is backed up by evidence from communications intercepts, known in the spy world as signals intelligence, amassed during a lengthy and ongoing investigation involving the FBI, the CIA and other U.S. agencies. The officials declined to elaborate on the nature of the intelligence.

The evidence is not yet conclusive enough, however, for the U.S. to formally assign blame to Moscow for incidents that started in late 2016 and have continued in 2018, causing a major rupture in U.S.-Cuba relations.

Continue reading

09/12/18

Judge Kavanaugh and the Catholic Hierarchy

By: Cliff Kincaid | America’s Survival

Attorney Arthur Schulcz, who fought Navy bias against evangelical Christians, examines Supreme Court nominee Judge Kavanaugh’s bias in cases that have come before him and how he defers to the hierarchy of the Catholic Church. “He protected Catholics against a clearly illegal system” of promoting chaplains in the Navy, Schulcz explains. In doing so, he adds, Kavanaugh’s rulings have violated the constitutional prohibition on the establishment of a state religion. Yet, Republicans and Democrats on Capitol Hill don’t want to touch the issue, in the same way they ignore Kavanaugh’s role in the ultimate Clinton cover-up – the murder of Clinton White House lawyer Vincent Foster.