11/21/17

It’s Worse Than You Think: The Federal Government Has No Clue What It Is Spending

By: Denise Simon | Political Vanguard

Do you think our federal government knows how much and where it is is spending money?

Well, think again.

Back in 2014, the Government Accountability Office presented this is prepared testimony:

The federal government has no idea how many tax dollars it’s wasting on redundant federal programs every year—but it’s likely in the neighborhood of $45 billion.”

That’s according to the Government Accountability Office, which identified more than two dozen new areas of inefficiency and overlap in its annual report to Congress. This is on top of the more than 160 redundant areas that the GAO has identified in its three previous reports.

“It’s impossible to account for how much money is wasted through duplication, in part because the government doesn’t keep track of which programs each agency is responsible for,” Comptroller Gene Dodaro said prepared congressional testimony.

Examples you ask?

Right now, there are 10 different agencies within the Department of Health and Human Services that are providing similar services relating to AIDS outreach in minority communities. There are also 11 different agencies performing autism research without properly coordinating their efforts.

In another example included in the 200-page report, the auditors found that Colorado’s Schriever Air Force Base has eight different satellite control centers controlling 10 different satellite programs.

Meanwhile, the report also identified a $4.2 billion loan program within the Department of Energy for Advanced Technology Vehicles Manufacturing that hasn’t been utilized since 2011.

There is even a video to report waste, fraud and abuse, but no one seems to know how to solve those issues. Checking the House Oversight and Government Reform Committee website, there are no reports or menu of items they are investigating. Where is the confidence in that?

The GAO issued a report dated November 2017, that included this little passage:

“Reported improper payment estimates totaled over $1.2 trillion government-wide from fiscal years 2003 through 2016. Agencies are statutorily required to perform improper payment risk assessments to identify programs and activities that may be susceptible to significant improper payments and are required to report an improper payment estimate for ones that are susceptible to significant improper payments.”

Due to the Harvey Weinstein predatory sexual behavior scandal, many other names have recently hit the headlines with similar cases including members of both houses of Congress. As such, we learned there is essentially a pay-off slush fund where the victim was provided taxpayer funds to shut up, sign a non-disclosure and to for the most part go away. Note the payouts:

Still not convinced spending is literally out of control?

GAO’s 2016 report found that the Social Security Administration (SSA) has not fully addressed the growing amount of Disability Insurance overpayments.  In FY 2014, SSA identified $1.3 billion in such payments, in part because Congress still allows individuals to collect both full Social Security Disability Insurance benefits and Unemployment Insurance at the same time.  The Congressional Budget Office (CBO) estimates that eliminating this double-dipping would save $1.9 billion over the next 10 years.    The Treasury department’s Earned Income Tax Credit program had $15.6 billion in improper payments and the Social Security Administration’s errant payments totaled $7.1 billion.

The 2016 report also highlights a mounting problem of obsolete information technology (IT) systems in the federal government.  For example, the Department of Homeland Security was supposed to integrate and modernize its 422 different human resources systems and applications in 2003.  GAO found that “limited progress” has been made, and none of its many recommendations in this area have been addressed.

The federal government spends more than $1 billion on mobile devices per year; however, “GAO found that among 15 selected agencies, only 5 had complete service and device inventories.”  Therefore, most agencies are unable to know when taxpayer-funded devices are no longer needed or are being abused.

The 2016 report also cites many other outlandish examples of government duplication run amok, one of the most obvious being the existence of two programs in two different agencies that are tasked with inspecting the same type of catfish.  There are 45 programs in nine different agencies for employment for people with disabilities.  The federal government operates more than 90 different programs to foster the construction of green buildings in the private sector.   In FY 2014, unobligated balances, or the amount of money not spent by an agency or department, stood at $870 billion.

So, it seems we have enough reasons to declare we don’t trust you, the government anymore right? Yes, but is anyone listening? Not so much.

So, trotting over to the U.S. Treasury website you can find the Final Monthly Treasury Statement. The report includes the final budget results and details a deficit of $666 billion for Fiscal Year 2017. Fascinating number eh?

The issue is only 36 pages and it is suggested you begin at Table 3 and mobilize a team of friends where collectively you can perhaps define the line items, the duplicate programs or worse why they exist at all.

There is an app for that at least at the state level for only a handful of states. Yeah for California, right?

The Pew Charitable Trust in part published the following:

“In Long Beach, California, six city employees were fired after people complained items had gone missing from inside impounded cars. In Philadelphia auditors found safety issues in a dozen rental properties as well as over $350,000 in unpaid taxes. And in Richmond, Virginia, a city employee is on the hook for nearly $10,000 in bogus expenses.”

All of these cases were brought to auditors’ attention by tipsters using hotlines or fraud apps, which allow smartphone users to anonymously report government waste, fraud and abuse.

Cities and states have long had hotlines for reporting misuse of government resources. But mobile apps bring a new level of sophistication. They allow people to submit photos and videos in support of their claims; and in some cases auditors can use the app to respond and ask for follow-up information, all while maintaining a tipster’s anonymity.

Sixty-four percent of American adults now carry a smartphone, according to a report from the Pew Research Center. (The Pew Charitable Trusts funds both the Pew Research Center and Stateline.) Because reporting waste, fraud and abuse through an app is so easy, people are more inclined to do so, auditors say.

“Smartphones are becoming a ubiquitous tool, and I think we need to meet people where they are,” said Dave Yost, the state auditor who in 2014 introduced a fraud app in Ohio.

The cost of developing the apps varies. Ohio was able to develop its app in-house, while Richmond spent about $10,000 for outside help. Pittsburgh’s app was unveiled this month. It cost $20,000 to develop and will cost $3,000 for upkeep, but it also allows users to access a range of databases on city contracts and campaign contributions.

Uncertain Impact

In many places, it’s hard to discern how much of a difference the apps are making compared to traditional hotlines because auditors don’t keep track of where tips originate. Many of the apps allow users to call a fraud hotline from the app.

So far, relatively few citizens have downloaded the apps. In Long Beach there have only been 160 downloads. In Ohio there have been 673. In Philadelphia, which in 2011 developed one of the first fraud apps, there have been 2,015 downloads.

Whether tips are received through a hotline or an app, governments have received valuable information.

This is an important exercise for every American paying taxes and the challenge is to question your senator or representative. If that fails, try contacting the House Oversight Committee and ask some hard questions, in fact make some demands.

Those dollars reported by Treasury, those dollars in payouts and those dollars in waste, fraud and abuse are yours….you need to take ownership all while we are watching congress playing in the tax reform sandbox.

11/21/17

What the Uranium One Documents Reveal

By: Denise Simon | Founders Code

Uranium One is engaged through its subsidiaries and joint ventures in uranium production, and in the exploration and development of uranium properties, in Kazakhstan, the United States, Tanzania and elsewhere. Uranium One is focused on low cost and low technical risk operations, with existing, near and medium-term production visibility in some of the world’s largest uranium resource jurisdictions.

Uranium One is a joint venture partner with JSC NAC Kazatomprom, the Kazakhstan state-owned atomic energy company, in six major producing uranium mines in Kazakhstan – Akdala, South Inkai, Karatau, Akbastau, Zarechnoye and Kharasan. The company also operates the Willow Creek uranium mine in Wyoming, and is the operator of, and owns a 13.9 percent interest in, the Mkuju River uranium development project in Tanzania.

Uranium One’s revenues are largely derived from the sale of uranium concentrates. The company sells its uranium to major nuclear utilities in Russia, Europe, North America, South America, Middle East and Asia.

***

This was an internal coup advanced by the Obama administration. What is worse, where are those Hillary, State Department of CFIUS or White House related emails?

***

William Campbell, the FBI informant, documented for his FBI handlers the first illegal activity by Russians nuclear industry officials in fall 2009, nearly a entire year before the Russian state-owned Rosatom nuclear firm won Obama administration approval for the Uranium One deal, the memos show.

Evidence gathered by an FBI undercover informant conflicts with several media reports as well as statements by Justice officials concerning the connections between a Russian nuclear bribery case and the Obama administration’s approval of the sale of Uranium One to Russia’s state-owned Rosatom nuclear company. More here.

***

During Campbell’s time working as a confidential informant, he was required by the Russians to launder large sums of money to financial institutions in Cyprus, Latvia and Seychelles. With Campbell’s help the FBI uncovered an extensive money Russian nuclear money laundering apparatus and Campbell was working solo. He was required to launder money, from his own salary, on particular days and times when Russian money handlers would be working at the banks. If he missed a scheduled pay time for any reason his Russian counterparts would threaten him, he told his attorney. He was also required on many occasions to deliver cash directly to those who were being paid off, most of which he recorded on hidden cameras for the FBI.

It didn’t end there. In order to keep his cover he spent many nights with his Russian counterparts drinking, collecting information and more importantly gaining their trust. He was in his early 60s and his once unblemished driving record ended with a DUI in 2008 and two other reckless driving charges in 2010 and 2012, said Toensing, who noted they were all misdemeanors.

THE PLAYERS

The cast of characters deep within the Russian nuclear agency also included another American businessman named Rod Fisk, whose company Transportation Logistics International, also known as TLI,  was the primary transport company for Russian enriched uranium sold to the United States.

Fisk passed away in 2011, and his Vice President Daren Condrey replaced him. In 2015, Daren Condrey, of Maryland, pleaded guilty to conspiring to violate the Foreign Corrupt Practices Act (FCPA) and conspiring to commit wire fraud, according to the DOJ.

Adding to the colorful array of Russian criminals the FBI was watching, was a Russian national named Vadim Mikerin. He was then a top official of the Russian nuclear arms subsidiary Tenex. Mikerin, who had close ties to elite members of the Kremlin, and who bragged in emails and documents about his families connections to current Russian President Vladimir Putin, would later become president of Tenam, the American subsidiary that began operations in 2010, according to the contract. Boris Rubizhevsky, another Russian national from New Jersey,  who was  president of the security firm NEXGEN Security, also pleaded guilty in 2015, to conspiracy to commit money laundering.  He served as a consultant to TENAM and to Mikerin. He was sentenced to prison last week along with three years of supervised release and a $26,500 fine, according to a recent Reuters report.

Mikerin was eventually arrested for a racketeering scheme that dated back to 2004, and included fraud, extortion and money laundering. But he only plead guilty to money-laundering. He was sentenced to 48 months in prison in December 2015. More here.

Here are five revelations from those documents reviewed by The Hill:

Russia saw its purchase of Uranium One as part of a strategy to dominate global uranium markets, including making the United States more dependent on Moscow’s nuclear fuel.

Documents the informant gave the FBI clearly show that the purchase of Uranium One was seen by Russia and its American consultants as one tool in a strategy to “control” the uranium market worldwide. In the United States, that strategy focused on securing billions of new uranium contracts to create a new reliance on Russian nuclear fuel just as the Cold War-era Megatons to Megawatts program was ending.

Uranium One did export some of its U.S. uranium ore.

News organizations, including The Washington Post, continue to report none of Uranium One’s product left the U.S. after Russia took control. In fact, the Nuclear Regulatory Commission (NRC) approved an export license for a third party trucking firm to export Uranium One ore to Canada for enrichment, and that some of that uranium ended up in Europe, NRC memos show. Uranium One itself admits that as much as 25 percent of the uranium it exported to Canada ended up with European or Asian clients through what is know in the industry as “book transfers.”

The FBI informant Douglas Campbell does have information to share with Congress about Rosatom’s Uranium One purchase.

Justice officials have suggested in recent stories that Campbell has little on Uranium One because his work forced on nuclear bribery involving a different Rosatom subsidiary. While it’s true Campbell’s undercover work focused on criminality inside the Rosatom subsidiary Tenex, he did gather extensive documents about Rosatom’s efforts to win approval to buy Uranium One.

The FBI did have evidence that Rosatom officials were engaged in criminality well before the Obama administration approved Rosatom’s purchase of Uranium One.

Evidence that a foreign company is involved in criminality can disqualify it from Committee on Foreign Investment in the United States (CFIUS) approval to buy a sensitive U.S. asset. And Campbell helped the FBI recorded the first criminal activity by Rosatom officials inside its Tenex arm in November 2009, nearly an entire year before CFIUS approved Rosatom’s purchase of Uranium One.

Justice officials trusted the informant Campbell enough to keep him working undercover for six years and to pay him more than $51,000 once the convictions were secured.

A check obtained by The Hill shows the FBI paid Campbell an informant fee of more than $51,000 in January 2016, shortly after the last convictions in the Russian nuclear bribery case were made.

11/21/17

Counterfeit Operations, Iran and North Korea

By: Denise Simon | Founders Code

It is a global business and a nasty one.

U.S. officials have long accused Iran of supplying arms to rebel Houthi forces battling for control of Yemen. But Monday’s sanctions help highlight the scope of what Western officials commonly describe as the IRGC’s far-reaching and malign activities.

“Iran itself, together with its proxy, Lebanese Hezbollah, is knee-deep and has been knee-deep in the counterfeit business for quite some time,” said Matthew Levitt with the Washington Institute for Near East Policy. “Exposing this is kind of a two-for one, both exposing the organization’s terrorist activity and also exposing the nature of the criminal activity that it engages in.” More here.

Treasury Designates Large-Scale IRGC-QF Counterfeiting Ring

11/20/2017

Iranian Network Prints Counterfeit Yemeni Bank Notes for IRGC-Qods Force

WASHINGTON – Today, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) designated a network of individuals and entities involved in a large-scale scheme to help Iran’s Islamic Revolutionary Guard Corps-Qods Force (IRGC-QF) counterfeit currency to support its destabilizing activities.  This network employed deceptive measures to circumvent European export control restrictions and procured advanced equipment and materials to print counterfeit Yemeni bank notes potentially worth hundreds of millions of dollars for the IRGC-QF.  The IRGC-QF was designated pursuant to the global terrorism Executive Order (E.O.) 13224.

“This scheme exposes the deep levels of deception the IRGC-Qods Force is willing to employ against companies in Europe, governments in the Gulf, and the rest of the world to support its destabilizing activities.  Counterfeiting strikes at the heart of the international financial system, and the fact that elements of the government of Iran are involved in this behavior is completely unacceptable,” said Treasury Secretary Steven Mnuchin.  “This counterfeiting scheme exposes the serious risks faced by anyone doing business with Iran, as the IRGC continues to obscure its involvement in Iran’s economy and hide behind the façade of legitimate businesses to perpetrate its nefarious objectives.”

Reza Heidari and Pardazesh Tasvir Rayan Co.

Reza Heidari (Heidari) is being designated today for having acted for or on behalf of the IRGC-QF and having assisted in, sponsored, or provided financial, material, or technological support for, or financial or other services to or in support of, the IRGC-QF.

Pardavesh Tasvir Rayan Co. (Rayan Printing) is being designated today for being controlled by Heidari; for having acted for or on behalf of the IRGC-QF; having assisted, sponsored, or provided financial, material, or technological support for, or financial or other services to or in support of, the IRGC-QF; and being owned by Tejarat Almas Mobin Holding, another Iranian company also being designated today.

Heidari played a key role in procuring secure printing equipment and materials for the IRGC-QF in support of the group’s currency counterfeiting scheme.  Heidari served as the managing director of Iran-based Rayan Printing, a company involved in printing counterfeit Yemeni rial bank notes potentially worth hundreds of millions of dollars for the IRGC-QF, as of late 2016.  Heidari used front companies to obfuscate the actual end user and facilitate deceptive transactions when dealing with European suppliers of secure printing equipment and materials.

ForEnt Technik and Printing Trade Center

ForEnt Technik GmbH is being designated today for being owned or controlled by Heidari, while Printing Trade Center GmbH (PTC) is being designated for having acted for or on behalf of, and assisted in, sponsored, or provided financial, material, or technological support for, or financial or other services to or in support of, Heidari.

Heidari used German-based ForEnt Technik GmbH and PTC as front companies to deceive European suppliers, circumvent export restrictions, and acquire advanced printing machinery, security printing machinery, and raw materials in support of the IRGC-QF’s counterfeit currency capabilities.  These raw materials included watermarked paper and specialty inks from European suppliers.  Heidari is the Managing Director and sole shareholder of ForEnt Technik Gmbh.

Mahmoud Seif and Tejarat Almas Mobin

Mahmoud Seif is being designated today for having assisted, sponsored, or provided financial, material, or technological support for, or other services to or in support of, the IRGC-QF.  Tejarat Almas Mobin Holding is being designated today for being controlled by Seif.

Seif is the managing director of Tejarat Almas Mobin, the parent company of Rayan Printing.  Heidari and Seif coordinated on the procurement of raw supplies and equipment that enabled the IRGC-QF counterfeiting capabilities.  Seif was involved with the logistics of importing materials for the counterfeiting project into Iran.  Additionally, Seif has previously been involved in the procurement of weapons for the IRGC-QF.

For identifying information on the individuals and entities listed today, click here: https://www.treasury.gov/resource-center/sanctions/OFAC-Enforcement/Pages/20171120.aspx

*** So, did Iran teach North Korea to counterfeit or was it the other way around? North Korea has been counterfeiting and participating in illicit activities going back decades. North Korea is not especially fretful over the newly applied sanctions or being listed again as a terror state by President Trump. While it should be done, the regime has proven methods to finesse the system.


Ri Jong Ho had simply had enough. He’d seen too many executions.

Ri, a high-profile North Korean defector, spent years working for what is essentially a slush fund for one of the most notorious regimes on the planet, Kim Jong Un and his compatriots.

Life was good. Ri helped bring in somewhere between $50 million and $100 million for North Korean elites, and was handsomely rewarded with luxuries most North Koreans couldn’t dream of in years past: a car, a color TV and some extra cash on the side, once rarities in the communist state but more commonplace now in the capital, Pyongyang.

But he watched the regime kill his peers and their families, even children.

“It was not just high level officers, officials, but their families, their children (and) their followers,” Ri told CNN in his first interview to a major US broadcast network. “It was not just once or twice a year — it was ongoing throughout the year, thousands of people being executed or purged.”

Ri said the final straw came in late 2013, when Kim Jong Un executed his own uncle, Jang Song Thaek, with an anti-aircraft gun.

“It was a cruel and crude method of execution,” he said. “After all these years living in the socialist system, I never witnessed anything like that.”

Ri was living in China at the time, and in 2014 was able to safely defect with his family.

And just like that, Kim lost one of his top money makers.

Office 39

Ri said he worked for decades in what’s known as “Office 39.”

The office is in charge of bringing in hard currency for the regime. Ri calls it a “slush fund for the leader and the leadership.”
Ri told CNN “Office 39” is not engaged in illicit activities, but the US Treasury Department says otherwise.

The US government accused the office of engaging in “illicit economic activities” to support the North Korean government. It has branches throughout the nation that raise and manage funds and is responsible for earning foreign currency for North Korea’s Korean Workers’ Party senior leadership through illicit activities such as narcotics trafficking.

North Korea has been accused of crimes like hacking banks, counterfeiting currency, dealing drugs and even trafficking endangered species.

Workers who help bring in cash for the regime are granted access to the outside world — especially China — in order to establish networks that are crucial to making money, analysts say. They often have diplomatic privileges that allow them to evade their host country’s domestic laws, experts say.

Ri said he was not involved in illegal activities and that they were not under the purview of Office 39, but did not deny they occurred. He said much of North Korea’s hard cash is earned through exporting labor — the country sends workers across the globe and collects much of their pay, according to the UN — and exporting natural resources like coal, which China used to buy but has since stopped.

Illicit activities make a lot of money, though. The Congressional Research Service estimated in 2008 that North Korea could earn anywhere from $500 million to $1 billion from these types of illicit activities.

That money helps fund the lavish lifestyles of the North Korean elites while sanctions limit the country’s ability to make money. That keeps North Korea’s leadership happy and helps Kim prevent coup attempts, analysts say.

“They (North Korean leaders) are focused on maintaining their ruling power, and they are working on making this dynasty-like system lasting for a long time,” Ri said. “So instead of focusing on their economic development or better life, they are more focused on maintaining their system.

Some of Office 39’s profits also go to the country’s nuclear and missile programs, which crossed an important threshold this month with the testing of two intercontinental ballistic missiles, weapons that experts say likely put the United States homeland in North Korea’s range.

CNN reached out to the North Korean mission at the United Nations for a response to the interview with Ri. An official at the mission said Ri was lying to “make money and save his own life.”

‘Hundreds of fishing boats’

Analysts say Office 39 is likely now in the cross hairs of US President Donald Trump’s administration.

The Trump team has made it clear that one of the ways it plans to deal with North Korea is to squeeze its revenue streams across the globe in order to pressure them into negotiations over their weapons programs.

Who speaks for the United States on North Korea? Contradictions emerge

Ri is not sure if the tactic will work, as he says it’s easy to side-step sanctions and believes the international community has made strategic mistakes that could come back to bite them.

North Korean companies can just change their names once sanctioned, he says. North Korean leaders don’t keep much money abroad, so the sanctions against them are pointless, according to Ri. Smugglers are difficult to catch.

“Smuggling is conducted by any and every means you could imagine. Mostly larger items are done using ships, for example by filing a cargo list … where what’s written on the (list) is different from what is really being shipped,” he said. “On the open sea, the Yellow Sea, there are hundreds of fishing boats — both from China and North Korea — and all the smuggling is done by these so-called fishing boats.

Going after China

Ri believes that secondary sanctions — targeting those who do business with North Korea, like the United States did to China’s Bank of Dandong in June — is the way to go, especially in China.

Beijing accounts for about 85% of North Korean imports in 2015, according to UN data, though Ri revealed that Pyongyang does import some oil from Russia.

North Korean economist Ri Gi Song told CNN in February that China accounts for 70% of trade and that trade with Russia is increasing. More here from CNN.

11/20/17

Down with Vichy Republican Collaborators! – Part IV of IV

By: Thomas Wigand | New Zeal

Down with Vichy Republican Collaborators – Part I

HONNEUR et PATRIE (Honor and Country)

Down with Vichy Republican Collaborators!

Vive la Republican Résistance!

The French Resistance, facing the overwhelming military might of the Wehrmacht, but confident in the righteousness of its cause, did not take the “pragmatic” approach of appeasement, much less collaboration, but instead continued the fight. This set them apart from their fellow French who collaborated with the Nazis – the Vichy. The “pragmatic” arguments made by the Vichy are today echoed by “big tent” “Republicans” – “Well, everything’s going the Nazis’ way, so we need to be practical. And we Vichy are the lesser of two evils.”

When ultimate victory is uncertain, even unlikely, isn’t it still preferable to go down fighting in the cause of righteousness than to submit to subservience and to Collectivism? Progressivism begins as soft tyranny – are we not better off to fight now rather than listen to the “pragmatic” moderates who want to bow and make peace with subservience? Can we, facing a “Wermacht” of politicians, academics, airhead media talking heads and “community organizers” do no less than be the political equivalent of the French Resistance? Are not the courage and fealty to righteousness that they displayed characteristics also shared by true Americans? If the French Resistance would take on the Wehrmacht and the Gestapo, are we to shrink from taking on the Democrat Party and an Ostapo of the likes of Barack Hussein Obama, Bill Ayers, ACORN, media and entertainment airheads, ivory tower academics, Nancy Pelosi and Chuck Schumer?

Our cause is righteous and, like the French Resistance, we have allies too: Western civilization; the divinely-inspired Declaration of Independence and Constitution of the United States; the sometimes hibernating but (as the post-911 reaction showed) still vibrant spirit of patriotism among a large swath of our fellow citizens … and plain old “common sense” that Progressivism has not yet totally snuffed out. We must be unapologetic Conservatives proudly enunciating our continued fidelity to our Judeo-Christian heritage and the timeless gifts bequeathed to us by the Founding Fathers.

There are some who believe that time, and demographics, and a losing (if not lost) cultural war mean that we must “moderate” the GOP in order to “appeal” to the middle. This is the voice of career politicians, reflexively loathe to take firm stands on anything, as their rubber-spine sense of survival means that they gravitate not toward leadership but its opposite – pandering to every possible voter by gyrating to offend none. This is the way of Vichy Republicans.

But by succumbing to the Democrat efforts to play on the “ethnicity” field they (and we) have allowed the Democrats to choose the field of battle. When accurately and articulately communicated, Conservatism transcends demographics and ethnicity (that is why Democrats avoid debating their ideas “on the merits”). Conservatism as a political philosophy is universal and superior, offering all, no matter their ethnicity or demographics, the promise of the dignity (but also responsibility) of individual liberty, and a better life for themselves and their children. For human beings, no matter their background, this trumps the Collectivist-Progressive-Democrat model of subservience, the indignity of dependency and perpetually declining standards of living. To beat the Democrats at their divide and conquer ethnicity game, we need merely have the courage of our convictions, and then to articulate them.

We should not dilute our core values, much less abandon them, by supporting “moderates” because we have “no other alternative” or that they are “the lesser of two evils.” The Progressive Pooh-Bahs of the GOP count on our continued participation in this scam. The Republican Party is the one political hope to oppose Progressivism, but can and will only do so once we purge the party of the Vichy within it. It is not disloyal to the GOP to refrain from supporting those who are disloyal to Conservative principles, for Conservative principles are Republican principles. The “moderates” are the ones who are the disloyal Republicans. Given the modern, radical Democrat Party, disloyalty to those who would appease or collaborate with it is actually an act of loyalty to the United States of America.

One suspects that the French Resistance took any number of Vichy around the back of buildings and gave them the same treatment they gave Nazi soldiers, notwithstanding the fact that the Vichy were fellow Frenchmen. We should perform the electoral equivalent to “Republican” collaborators with the radical Progressive-Democrat agenda. This is a war of ideologies, and the Establishment Republicans – the Vichy Republicans – are the equivalent of infiltrators; they’ve put on our uniform, but they’re actually fighting for the other side.

You can bet that these guys knew what to do with traitorous Vichy collaborators! Will we rise up to give the electoral equivalent to Vichy Republicans?

As of this writing (2015), the last genuinely Conservative Presidential nominee fielded by the GOP was Ronald Reagan in 1984. Thirty years subsequent experience of voting “moderate” “lesser of two evils” has produced, in the end, a massively larger federal government, socialized medicine (a/k/a Obamacare), Medicare Part D and regulatory intrusiveness befitting a totalitarian state.

Presently we have a Democrat Party that represents K Street, Wall Street and Welfare Street, and a Republican Party that represents K Street and Wall Street. We must restore the Republican Party to its rightful place: representing Main Street, i.e., the middle class, free-market (not crony) Capitalism and true to the oath of office: upholding and defending the Constitution of the United States of America – from enemies foreign and domestic.

For centuries our fellow citizens have put on the uniform, sworn to uphold and defend the Constitution of the United States of America, and many have come home wounded, or as a corpse. Compared to that bravery and sacrifice, as we confront a danger internal by enemies domestic, shall we shrink from confronting the aggressors on the political battlefield? Shall we hold our tongues? If we do, then not only do we grievously dishonor those who went before us, but don’t we also deserve to lose our country – this incalculable gift that was bequeathed us by our divinely inspired Founding Fathers?

We are on the cusp of that loss, and so must seek quick victory, if possible, to restore America. But, if quick victory is not possible, then we must at least halt their march to total Collectivism, and then incrementally begin eroding what they’ve erected – just as the Progressives have been doing to our country for over 100 years now, but in reverse. That is, restoring The United States of America.

Down with the Vichy Republican collaborators! Vive la Republican Résistance!

(Coming soon, a proposal for how to un-elect Vichy Republicans: The Seventy Percent Solution.)

11/20/17

Obama’s Plan for a One-Party Socialist State

By: Cliff Kincaid | America’s Survival

Trevor Loudon analyzes the massive Republican defeat in Virginia on November 7, 2017, in the context of Barack Obama’s return to Marxist power politics and the “Brown is the New White” strategy of taking total control in the United States. The views of Trevor Loudon do not represent those of America’s Survival, Inc. and are presented for purposes of news and information.

11/19/17

Linda Sarsour Comes Out of the Socialist Closet

By: Trevor Loudon | New Zeal

In my documentary “America Under Seige: Soviet Islam,” I made the case that many American Muslim leaders are also Marxists.

One among them is well known activist Linda Sarsour.

The Brooklyn radical recently formally joined this country’s largest crypto-communist organization, the 30,000 strong Democratic Socialists of America.

DSA and other Marxist groups have been actively recruiting Muslim activists all over the country. The Red/Green Axis, begun in pre-revolutionary Russia, is now very much a feature of political life in pre-revolutionary America.

11/19/17

A Wide Look at North Korea’s WMD Operations

By: Denise Simon | Founders Code

Primer:

South Korean surgeons operating on a North Korean defector who escaped across the Demilitarized Zone between the two countries under a hail of gunfire on Nov. 13 have found a parasite in the man’s stomach unlike any other they had seen.

The defector, who was shot five times, remained in critical condition after hours in two rounds of surgery, according to an article in the Korea Biomedical Review published on Nov. 15.

North Korean Cyber Operations: Weapons of Mass Disruption

Over the past 10 years, the escapades of various nation-state actors in the cyber realm have exploded onto the pages of top-tier media, and into prime time network news.Russian espionage against political targets during the 2016 US presidential election, wide reaching Chinese espionage against Western commercial targets, disruptive attacks against the US financial sector associated with Iran, and the destructive attacks against Sony Pictures Entertainment (SPE) are some of the premier examples of mainstream coverage of ‘cyber.’

Behind every single offensive cyber action conducted in the interest of the capable nation-states is a doctrine,[1] and North Korea, like many other nation-states, has incorporated cyber operations within their own broader military doctrine and has conducted numerous offensive operations in the furtherance of their national agenda. What is particularly alarming about DPRK operations is their willingness to initiate escalatory actions, such as their likely connections to the now infamous WannaCry ransomware, and their targeting of the global financial system.

North Korea’s disregard for the consequences of its actions sets them apart from other nation-states, and is particularly dangerous.

North Korean offensive cyber operations have been conducted to collect sensitive political and military intelligence information, to lash out at enemies who threaten their beliefs and interests, and most interestingly, to generate revenue.

This revenue generation aspect of North Korean operations was thrust into the international spotlight when, in early 2016, unauthorized transfers of funds from the Bangladesh Central Bank were issued using the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network for global banking. The attempted transfers amounting to over $950 million USD sought to move funds to entities in locations such as Sri Lanka and the Philippines; ultimately $81 million USD in funds disappeared into the ether.

The subsequent investigation revealed that the perpetrators of the attack used tools to securely delete records from the SWIFT terminals that would alert Bangladesh Central Bank employees of the transfers. Commonly referred to as a “wiper,” this secure deletion tool contained code that was linked by many in the computer security industry to one used in attacks associated with North Korea, notably the attack on SPE through a US Computer Emergency Response Team (USCERT) alert. The revelation that a state would engage in such a flagrant violation of international norms came as a surprise to many in the information security arena. North Korea watchers were, of course, not surprised as the currency generation activities benefiting the Kim family and their isolated nation have been well understood for some time.

The 2016 SWIFT attacks associated with North Korea are part of the broader currency generation operations of DPRK cyber actors and intelligence organizations. Botnets associated with espionage activity targeting South Korea have been used to generate revenue through a variety of schemes for almost 10 years. Recent DPRK activity suggests an interest in obtaining cryptocurrency, such as bitcoin, through extortion and targeting of cryptocurrency exchanges.

In the third quarter of 2017, for instance, malicious emails containing weaponized documents were used to target international financial organizations, as well as bitcoin exchanges. The ultimate goal of these attacks, which were tracked by the information security community under names such as Stardust Chollima and BlueNoroff, is yet unknown, however theft and sabotage are likely.

Bitcoin provides attractive benefits to the isolated nation due to a lack of regulation and the ability to subvert international sanctions. In May 2017, ‘WannaCry’ exploded across the internet, encrypting sensitive material and holding the keys to decrypt the files for a ransom to be paid in bitcoin. This attack, too, had North Korean fingerprints embedded in the code used to execute the attack, as did the tools that were used to develop that code.

Attribution is a particularly sensitive subject in the cyber domain. Technical artifacts from the executable code that was used to conduct the WannaCry attack overlaps with code used in attacks against South Korean nuclear power plants and the SPE attack of 2014. While the technical artifacts can provide some measurable connections between the attacks, they require deep technical understanding to interpret. Other linkages, such as targeting and operational procedures, are the product of intelligence assessments and have been disputed by various parties muddying the water surrounding the assigning of attribution.

North Korea is an exception to the classical understanding of how most nations implement offensive cyber operations in that they incorporate espionage, disruptive/destructive attacks and financially motivated operations using the same computer code and infrastructure.

The value of cyber operations is likely recognized by North Korea’s most senior leadership through the State Affairs Commission (SAC), the General Staff of the Korean People’s Army, and Kim Jong Un himself. Subordinate units, notably the Reconnaissance General Bureau (RGB), Bureau 121, and the Command Automation Bureau (CAB), are likely responsible for executing the specific operations. The individual units may have a charter to self- finance their operations, or to contribute financial gains back to the regime, but it seems clear that various offensive operations are conducted by differing groups with their own approach and missions. For example, one group may have a primary focus on revenue generation, targeting South Korean banks and SWIFT and conducting extortive attacks, while another group might focus on intelligence collection, while a third conducts sabotage and destructive attacks.

Finally, the maturity of North Korean offensive cyber operations has been demonstrated through the integration of destructive attacks by cyber units during military exercises executed in the midst of escalating tension with South Korea. For instance, following the December 2012 launch of the Kwangmyongsong-3 satellite via the Unha-3 satellite launch vehicle, tensions on the Korean peninsula were high. That March, following the passing of UN Security Council Resolution (UNSCR 2087) and B-52 strategic bomber overflights in South Korea, North Korea responded with a particularly aggressive disruptive attack against South Korea.

This massive wiper attack targeted South Korea’s financial and media sectors and coincided with provocations by North Korean military and escalating political rhetoric. This pairing allowed for maximum psychological impact, while demonstrating North Korea’s ability to integrate offensive cyber activities into well-developed military doctrine. During these attacks, the Korea Broadcasting System (KBS), Munhwa Broadcasting Corporation (MBC), Yonhap Television News (YTN) and several Korean financial institutions reported disruptions. With the threat of military escalation on the table, many in South Korea would have depended on the media outlets for breaking news. Disruption of ATM networks and financial institutions would further add to the chaos as word of media disruptions began to spread.

As tensions are once again escalating between North Korea and the international community, more attacks perpetrated by DPRK cyber actors are likely. The recent increase in financial sector targeting associated with these actors may illustrate the potential for disruptive attacks to demonstrate both the capability of the North Korean actors, as well to achieve objectives in line with their broader military doctrine. While North Korea’s isolation may be detrimental to its economy and international relations, it is an effective shield from which to launch offensive cyber operations against a connected and delicate global system.


  1. [1]

    In order to establish some common definitions, we can look to the United States Department of Defense, who established Computer Network Operations (CNO) as a component of the broader Information Operations (Information Warfare) arena. CNO is further categorized into Computer Network Exploitation (CNE), Computer Network Attack (CNA), and Computer Network Defense (CND). Offensive cyber operations conducted by nation-states using this model would be considered CNE and CNA. The use of CNE can be roughly characterized as espionage, whereas CNA would be used to degrade, deny, disrupt, or destroy the network based systems of an adversary. This model can help provide a clear delineation of how various military, intelligence community, and law enforcement agencies with their authorities are able to conduct operations. China, Russia, Iran and virtually every nation-state in the world conduct CNE/CNA operations in accordance with their legal authorities and national interests.

    ***

    There are other weapons few discuss.

    Pyongyang has already achieved partial coverage of US territories. Last June, in a hearing before the US House Armed Services Committee, the head of the US Missile Defense Agency, Vice Admiral James Syring, said: “The advancement and demonstration of technology of ballistic missiles from North Korea in the last six months have caused great concern to me and others. It is incumbent on us to assume that North Korea today can range the US with an ICBM carrying a nuclear warhead.”

    This particular endeavor was likely assisted by Tehran. A February 2016 report by the Congressional Research Service concluded, “Iran has likely exceeded North Korea’s ability to develop, test, and build ballistic missiles.” Tehran might be, and probably is, helpful to Pyongyang with respect to technological aspects of the nuclear sphere as well.

    The nuclear component within the spectrum of North Korea’s weapons of mass destruction (WMDs) is evidently growing. The big question is whether the country’s despot, Kim Jong-un, will be the first person to use nuclear weapons since 1945.

    Quite recently, Kim elected to employ a highly lethal chemical weapon, the nerve agent VX, for a political assassination. This weapon was used last February by two female operatives, one Indonesian and the other Vietnamese, to murder Kim Jong-un’s estranged half-brother, Kim Jong-nam, in Malaysia. The victim died shortly after being assaulted by the two women, who wiped VX on his face as he prepared to board a flight to the Chinese territory of Macau. Traces of VX were revealed on swabs taken from his eyes and face.

    This deadly chemical agent was probably smuggled from North Korea to Malaysia, which in and of itself was an intriguing and risky move. Six of eight potential suspects were from Pyongyang’s Ministries of State Security and Foreign Affairs. The suspects flew from Kuala Lumpur on the day of the assassination, passing through Vladivostok on their way back to Pyongyang. South Korea’s request to detain four of the suspects was rejected by Russian officials on the grounds of lack of evidence.

    It can be assumed that Kim Jong-un was in on the plot from its inception. Symbolically, at least, this political assassination by VX can be regarded as an indication of Pyongyang’s chemical weapons (CW) capabilities. Whether the regime intended it to or not, the assassination signaled the readiness, usability, and deployability of North Korea’s VX, which can be used for guerrilla warfare, chemical terrorism, or wide-scale chemical attack.

    VX is also weaponized within warheads carried by ballistic missiles in Pyongyang’s  vast CW arsenal. The North Korean ballistic program constitutes the principal, though not the only, vehicle for all three WMD programs. The CW and biological weapons (BW) programs are fully matured and have marked operational offensive capabilities. Inadequate attention is being paid to Pyongyang’s large-scale offensive capacities in terms of CW and BW, but the VX political assassination incident was a wake-up call (if unintentional). More here.

11/19/17

Book Review: Harpoon: Inside the Covert War Against Terrorism’s Money Masters

By: Terresa Monroe-Hamilton

Purchase at Amazon.com

I had a very interesting book sent my way: HARPOON: Inside The Covert War Against Terrorism’s Money Masters by Nitsana Darshan-Leitner and Samuel M. Katz. I’m a military and counterterrorism wonk, so it peaked my interest. First off, this is a fascinating book and if you are analytical, it will really engross you. It comes at you from the stance of cutting off the money-flow to terrorists and that is definitely one of the primary tools we should be using in the war on terror. Plus, I just admire the heck out of the Mossad and Israel in general.

Think about it… terrorists have to have money to buy weapons to kill people. They get that money in many different ways… from the sale of drugs, to the sale of oil, investments, charities and foundations. We use our military might to keep ISIS and other enemies on the run, but to squash them, you have to strangle them financially. Israel is a master at this technique. For many years I have said we should emulate Israel in profiling and counterterrorism tactics, including border security. But I never really looked at how they cut off the lifeblood of terrorism… money. The US is now utilizing financial techniques like this to starve ISIS and it works. Europe should be using this weapon as well.

If the flow of money was cut off to ISIS and other terrorists, their Caliphate and networks would fall apart. This is why I was so furious when Obama gave millions to the Iranians, who are the biggest purveyor of terrorism on the planet. He knew what he was doing, he was funding a maniacal Islamic theocracy that will murder countless people with that money. Obama has blood all over his hands on that one.

Israel has learned the hard way, through blood and tears, that more than force is needed to take down her enemies. From 2000 to 2005, during the last Intifada, Palestinian suicide bombers relentlessly attacked Israel. The Israelis have one of the best fighting forces on the planet and they met the enemy head on. But no matter how hard they fought or how they won each encounter, the bombings continued. That was when Israeli leaders knew they needed a new game plan. So, they went after the money trail that financed everything from bomb-building factories to the cash bonuses issued to the families of suicide bombers.

Israel gave birth to a new multiagency task force codenamed Harpoon. It’s directive was to wage financial warfare against the enemies of the Jewish state. Harpoon tracked money to it source. That included charities in the US and multimillion-dollar transfers from Iran, the Gulf States and Saudi Arabia. In 2002, Harpoon expanded. It now focuses on not only intercepting the cash and the accounts, but taking them from their enemies and destroying them if necessary.

Nitsana’s book covers all of this and shows that counterterrorism is not just fought on the battlefield or through cloak and dagger, it is waged on the financial front out of necessity. Israel laser focused on this in every agency… and it worked. They even utilized lawfare in US courts and internationally to file lawsuits to stop state sponsors of terror in their tracks. The banks and the intermediaries that give life to these murderous demons are fair game and any method that can be employed to take them down is used by Israel. I applaud that wholeheartedly.

I vehemently disagree with those in the west and in the US that decry Israel’s tactics here. They raid banks etc. to stop terrorism before people die. That’s called survival. I have been less than thrilled with President George W. Bush lately. He criticized Israel’s actions as being “Wild West” in nature. Really? Because it looks to me like they work. Which is more than can be said for what the US was doing before President Trump took office. I’m not always thrilled with him either, but at least he’s kicking ISIS’ ass these days. The US has come around to Israel’s way of thinking. It’s about damn time.

From Nitsana at Fox News:

The Americans saluted Israeli spy chief Meir Dagan – the mastermind behind Harpoon – and his understanding that money was the oxygen that enabled the terror beast to live and thrive. Dagan was intent on suffocating this malignant creature through any and all means at his disposal.

In the wake of terrorist attacks in Britain, France, Spain Belgium, Germany and Sweden in recent years, Europeans will need to use the highly effective financial warfare template that Israel has already established if they hope to defeat ISIS and the terror armies that will follow.

The European intelligence services will have to cut through red tape and muster their resources to bankrupt ISIS, intercept its ability to move money from country to country, and stop it from funding fighters and operations throughout the continent.

Rendering a group like ISIS insolvent will yield victorious battlefield results.

As Nitsana put it (and I wish I had said this darn it), “A smart and successful war on terror requires James Bonds and General Pattons, as well as one or two Bernie Madoffs – and their services are needed immediately.” This woman truly gets it. Bankrupting the enemy destroys their supply lines and their killing machines. I admire this reasoning and I love this book.

From Amazon.com:

A revelatory account of the cloak-and-dagger Israeli campaign to target the finances fueling terror organizations–an effort that became the blueprint for U.S. efforts to combat threats like ISIS and drug cartels.

ISIS boasted $2.4 billion of revenue in 2015, yet for too long the global war on terror overlooked financial warfare as an offensive strategy. “Harpoon,” the creation of Mossad legend Meir Dagan, directed spies, soldiers, and attorneys to disrupt and destroy money pipelines and financial institutions that paid for the bloodshed perpetrated by Hamas, Hezbollah, and other groups. Written by an attorney who worked with Harpoon and a bestselling journalist, Harpoon offers a gripping story of the Israeli-led effort, now joined by the Americans, to choke off the terrorists’ oxygen supply, money, via unconventional warfare.

“It’s a cliche after Watergate that the key investigation in most circumstances is to ‘follow the money’ (in the words of Deep Throat). This is the story of how Mossad led this movement and substantially effected investigations of terrorism and similarly important matters and how this influenced the CIA’s later work in the same field. Bravo Mossad! Thanks for leading the way” – R. James Woolsey, CIA director (1993-1995)

And here is the press release for the book, that gives an inside look:

The haunting images of the hijacked airliners crashing into the World Trade Center, the pools of blood on the streets of Paris, and the aftermath of the horrific massacres in a nightclub in Orlando and on the streets of Barcelona, have been seared into our collective conscious, leaving us all feeling frustrated, vulnerable and afraid. Tragically, the universal approach to combating this ruthless global threat has been focused on the conventional responses anchored in dilatory military actions that have produced foreseeable and pedestrian results. However, with groups like ISIS bringing in billions of dollars annually to finance their attacks, and the Islamic Republic of Iran bankrolling its proxies Hamas and Hezbollah with an endless flow of cash, a small and covert group of intelligence operatives spearheaded a dynamic new front to combat terrorist armies by depriving them of the oxygen they require to breath: the money needed to carry out attacks around the world. This is a story of a pioneering and innovative method of fighting terrorism – financial warfare waged against the extremist organizations, their leadership and the rogue regimes that support them. It all began in Israel, the small and embattled nation that has become fabled for its cutting edge hi-tech creativity and the prowess of its espionage services. This is the previously untold tale of perhaps the greatest and most disruptive Israeli start-up of them all and its joint-venture with the United States’ counterterrorism community.

In HARPOON: Inside The Covert War Against Terrorism’s Money Masters, Israeli activist attorney Nitsana Darshan-Leitner and New York Times bestselling author Samuel M. Katz bring to light the previously classified account of how one nation, facing a tsunami of unstoppable suicide terrorism, forged its intelligence, military, law enforcement, and political leaders into a powerful task force, code-named Harpoon, to combat terror financing around the world.

Traveling back to the 1990s, Darshan-Leitner and Katz introduce Meir Dagan, a legendary soldier and spymaster, who spent a lengthy military career serving the State of Israel in the up-close-and-personal world of deadly special operations ultimately becoming the director of the Mossad, the Jewish State’s famed espionage service. Dagan’s reputation was that of a warrior, a man who moved silently behind enemy lines with a dagger between his teeth. But as a commanding general frustrated with the limitations and inefficiencies of the conventional approach to warfare that failed to stem the waves of bus-bombings, drive-by shootings and suicide attacks in Israel, Dagan sought new and imaginative strategies. He pieced together an outside-the-box solution to target the source of the terrorists’ power, a complex underground economy of “blood money” that enlisted banks and charities to distribute funds to the diabolical masterminds behind the suicide attacks and catastrophic murders. Dagan assembled a dream team of specialists from the intelligence services, the Israel Defense Force, the National Police, and even Israel’s IRS, to fight the ever transforming terrorist groups and their money across the Middle East, South America, Africa, and around the globe. In the process, Harpoon fused an operational alliance with the highest reaches of the United States government to fight terror on a truly global front.

This is the untold and remarkable story of modern day “Untouchables.” This elite and covert force intercepted banking records, perpetrated financial con games, unleashed invasive and destructive computer malware attacks, called in missile strikes against bankers, and violently eliminated financiers and bag men in foreign capitals. This is also the story of the private lawyers who pioneered the use of American counterterrorism suits to bring terrorist groups, and the countries and financial institutions that provided them material support, to their knees.

I have several new heroes here. This is just my kind of book. These are the good guys, make no mistake about it. If you want a peak into the real war on terror, this book is it. Pick up a copy at Amazon.com. I’m passing mine on to friends in the counterterrorism fields here in the US. It’s an epic read.

11/18/17

Down with Vichy Republican Collaborators! – Part III of IV

By: Thomas Wigand | New Zeal

Down with Vichy Republican Collaborators – Part I of IV

Introduction: History informs us that scoundrels abound.  Current events inform us that scoundrels currently control the GOP.  What follows is the second installment of an abridged version of  a “communiqué” from the book Communiqués From the Vast Right-Wing Conspiracy. This particular communiqué was first written circa 2012, and then updated in 2015.  Thus, it predates – and so is a precursor to – the current endeavor of Breitbart’s Stephen K. Bannon to effect what would amount to “regime change” within the GOP – the goal of which is to electorally expel “Establishment ‘Republicans'” and elect genuinely Conservative ones.  This is stated not to gloat, but to highlight that this is not a problem of recent origin, nor one that is diminishing.  Quite the opposite.  Mitch McConnell’s and Paul Ryan’s sabotage by inaction of the Trump agenda; and recent revelations that one former President Bush voted for Hillary Clinton, and the other withheld his vote from Donald Trump, should dispel any lingering doubts concerning “Establishment ‘Republicans'” being in-bed and under the covers with the Progressive Democrats – and so Establishment Republicans – SWAMP REPUBLICANS – are actual enemies, not weak allies. Those who knowingly and willingly collaborate with evil are …

Down with Vichy Republican Collaborators!

Vive la Republican Résistance!

And what is Progressivism? It is but a branch, a division of Collectivism; and Collectivism in all its forms is evil. If we who love America and what it stands for are to successfully defend against, and ultimately defeat this aggression by the radical Left, we can afford no less within the GOP than the same cohesion and uniformity that the radicalized Democrat Party now enjoys. The Republican Party must be a cohesive, determined and unapologetic force for what is right. We did not start this war; we did not ask for it. But we must confront this evil. Not accept it. Not appease it. Not collaborate with it. But DEFEAT it – totally and unconditionally.

The moderates’ “pragmatism” is retreat in the face of anti-Americanism. Their “bipartisanship” is “appeasement” of the forces of anti-Americanism. While occasional “tactical retreat” may be necessary, theirs is preemptive, unilateral and perpetual retreat. In this battle, we are deploying “Republican” politicians who approach everything as a political matter (i.e., “how do we market the GOP to get enough votes to stay in office?”). They face-off against committed ideologues that are out to “fundamentally transform” the United States, performing a revolution against the Constitution of the United States in all senses except a public declaration of their intentions (which they shrewdly withhold). Such imbalance inexorably leads to defeat for the cause of liberty.

The “moderates” and “big-tenters” would have us unilaterally and preemptively surrender the field without a fight. For example, a majority of Americans want secured borders and traditional marriage. So the Left’s agenda is in opposition to most voters. Yet the “moderates” want us to avoid those issues, lest we offend certain demographics, even as the Left continues its march to impose its minority positions – in which it will succeed if unopposed. At the same time, regarding issues in which polling indicates that we might currently be “in the minority,” the “moderate Republicans” will cite this as why we must “soften” and “broaden” our approach. So when the majority agrees with us we should shut up and concede anyway, and when it doesn’t we should climb aboard the Leftist train. Huh? What’s wrong with this picture?

Continue reading