03/11/15

An Open Letter to Speaker of the House John Boehner

By: Ashraf Ramelah
Voice of the Copts

Al Sisi for president

Al Sisi for President

john boehner

John Boehner

Please allow me to congratulate you on your tremendous success in having Israel’s Prime Minister Netanyahu address Congress. The world needs to hear the truth from our friend, Israel. For decades Israel has suffered terrorist aggression from neighboring states.

Allowing Iran to have nuclear weapons would not only be a danger to the State of Israel but a threat to the entire world. At your invitation, Americans heard the Israeli Prime Minister unfold the truth to the American Congress.

The positive and urgent message of Prime Minister Netanyahu’s speech will resonate for some time to come and hopefully lead to the desired goal.

Likewise, another important leader in the Middle East may prove to be enlightening on the issue of fighting Islamic terrorism. I refer to the president of Egypt, Abd El Fatah El Sisi. If Egypt’s current president were invited to address Congress, America could know firsthand the works of Al Sisi’s government in eradicating terrorism.

Your invitation to the Israeli leader has shown America’s support of Israel in light of much opposition. Having President El Sisi address the Congress would offer Americans the same opportunity to show support for Egypt’s initiatives — tempering Islamic clerics, approaching Coptic Christians, and fighting extremist organizations linked to terror.

Mr. Speaker, you have already been instrumental in illustrating America’s support of real leadership against terrorism in the Middle East. Extending a hand now to President El Sisi would only emphasize America’s resolve to stand with rational and courageous leaders and support the outcomes of reduced terrorism in the Middle East and around the world.

For this reason, I kindly request, on behalf of my organization, Voice of the Copts, that you extend an invitation to President El Sisi of Egypt to address a joint session of the American Congress in the very near future.

Thank you.

Sincerely,

Ashraf Ramelah
Founder and president
Voice of the Copts

03/11/15

Hillary’s Emailgate Explained

By: Bethany Stotts
Accuracy in Media

Exclusive to Accuracy in Media.

Clinton’s 2016 presidential chances undoubtedly have been harmed by the revelation that she exclusively used a private email address while serving as Secretary of State. But while the media remain mired in calculations about whether Mrs. Clinton can survive this latest crisis, and who the villains are in this unfolding story, additional questions call out for answers.

Mrs. Clinton made many claims at her press conference on Tuesday. The media shouldn’t simply regurgitate them wholesale, as the AP has done, but rather they should approach them with due skepticism.

“Well, the system we used was set up for President Clinton’s office, and it had numerous safeguards,” said Mrs. Clinton. “It was on property guarded by the Secret Service and there were no security breaches. So, I think that the use of that server, which started with my husband, certainly proved to be effective and secure.”

In contrast, Philip Bump reports for The Washington Post that the domain, clintonemail.com, was established “the same day that Clinton’s confirmation hearings began before the Senate.” That is suspicious timing for a system allegedly set up to support her husband’s office.

The professional assessment by security experts quoted in the media seems to be that Mrs. Clinton’s private email was vulnerable to hacking. “The system could have previously been hardened against attack, and left to get weedy and vulnerable after she left government,” writes Sam Biddle for Gawker. “We don’t know. … With Clinton’s off-the-books scheme, there are only questions.”

“We can only go by what Clinton says,” reports USA Today.

Mrs. Clinton told the press that she had set up the account for both private and work-related emails to avoid the inconvenience of having to set up two phones and two separate accounts, but that, in retrospect, she should have thought better about it. She offered few answers about the actual details of her server, and avoided questions about whether she would subject it to independent analysis, asserting that she had done her full duty by turning over 30,490 vetted emails to the State Department.

There were about 60,000 emails in total, she said—but after the private vetting process, controlled by her and her advisors, she has since deleted the private ones. “At the end I chose not to keep my private personal emails—emails about planning Chelsea’s wedding, or my mother’s funeral arrangements, condolence notes to friends, as well as yoga routines, family vacations—the other things you typically find in inboxes,” she said. Yet the Select Committee on Benghazi’s Chair Trey Gowdy indicated that no emails have been turned over to Congress covering the duration of her 2011 trip to Libya.

Mrs. Clinton apparently expects the media to swallow whole the argument that all her emails on that trip regarded personal affairs.

What can be established at this juncture is depressingly disturbing for national security.

“…security experts consulted by Gawker have laid out a litany of potential threats that may have exposed [Mrs. Clinton’s] email conversations to potential interception by hackers and foreign intelligence agencies,” writes Biddle. This, despite Mrs. Clinton’s assertion that there were no breaches.

Problems identified by Biddle’s sources include that the URL log-in was accessible by anyone in the world, and could have been linked to an “administrative console interface to the Windows machine or a backup,” allowing the possibility that Mrs. Clinton’s emails could have been copied in their entirety by hackers. And, as of March, reports Biddle, “the server at sslvpn has an invalid SSL certificate.” Without a valid SSL certificate there is no third-party indicating that the key is still good, and not hacked.

“An exact physical address could not be determined” for the server, but Internet records indicate that it’s in Chappaqua, New York, reported Bloomberg News.

The server, as of March 4, was on “factory default for the security appliance” when it could have been “replaced by a unique certificate purchased for a few hundred dollars,” making it vulnerable to hacking, it reports.

But, the paper hedges, “While Clinton didn’t have a classified e-mail system, she had multiple ways of communicating in a classified manner, including assistants printing documents for her, secure phone calls and secure video conferences.”

Similarly, Mrs. Clinton asserted at the press conference that she never sent classified information through her private email.

It is not necessary to reveal classified information directly to jeopardize national security or the international diplomatic process. As Thomas Patrick Carroll, formerly of the Central Intelligence Agency’s Directorate of Operations, explained in 2001 for the International Journal of Intelligence and Counterintelligence, “classification usually has relatively little to do with the information itself, but a lot to do with the protection of sources and methods.” His given example was how a foreign minister’s personal assistant might have a private conversation with that minister and obtain “the minister’s private observations on the matter,” later relaying this to U.S. intelligence for their exploitation. These types of inside observations prove invaluable for all foreign intelligence services.

If Mrs. Clinton’s email was hacked, then foreign governments such as Iran, China, Russia, and others, might have gained access to her private internal musings about diplomatic talks as she worked out the details with her staff—an intelligence treasure trove.

One must also ask, if Mrs. Clinton refused to set up a government email, how high was that refusal relayed? If it wasn’t relayed to the very top by security specialists, then why not?

Mrs. Clinton was sworn in on January 21, 2009. A couple months after she took office, in March of 2009, the University of Toronto and TheSecDevGroup issued their report on Ghostnet, a cyberespionage network established by an unknown party to mine data from the Tibetans. They found “real-time evidence of malware that had penetrated Tibetan computer systems” which was connected to a large network of 1,295 infected computers in 103 countries—almost 30 percent of which were high-value targets such as ministries of foreign affairs.

The authors of the report found “that GhostNet is capable of taking full control of infected computers, including searching and downloading specific files, and covertly operating attached devices, including microphones and web cameras,” and was sent through “contextually relevant emails” that look like real emails.

Granted, the mechanism of action for Ghostnet would not have been the same as that which could have compromised the server that Mrs. Clinton was using. But few can claim ignorance about the degree of threat posed by the use of insecure systems at the time.

The Ghostnet network compromised computers at the “ministries of foreign affairs of Iran, Bangladesh, Latvia, Indonesia, Philippines, Brunei, Barbados and Bhutan; embassies of India, South Korea, Indonesia, Romania, Cyprus, Malta, Thailand, Taiwan, Portugal, Germany and Pakistan.”

Even if the Obama administration’s appointees lacked the know-how to anticipate cyber threats when they took office, they were undoubtedly immediately educated about the dangers by the government’s more knowledgeable members. Bob Gates, the former Director of Central Intelligence, and later Defense Secretary under Obama, commented in his 2014 book, Duty, that “A number of the new appointees, both senior and junior, seemed to lack an awareness of the world they had just entered.” He noticed that “fully half” of those in the Situation Room had their “cell phones turned on during the meeting, potentially broadcasting everything that was said to foreign intelligence electronic eavesdroppers” and he ensured that such behavior stopped.

The Ghostnet story made page A1 of the New York Times in March 2009. Can this administration really claim innocence about the security threats posed by an insecure, private email server when Clinton served as Secretary of State? How much did President Obama know, and when?

It now appears that the Obama administration received questions from Gawker’s John Cook about the ramifications of Clinton’s private email use back in 2013. The Obama administration has likely spent at least those two years—if not much longer—covering for Mrs. Clinton. Her press conference to explain her exclusive use of private email fails to satisfy, and the press should continue demanding answers until this presidential hopeful provides some real ones.

03/11/15

About the NRA and Grover Norquist…

Dear NRA,

As a proud member of this great organization (NRA) it is necessary to always vet any individual seeking to be a member of NRA’s Board, it has come to my attention that Grover Norquist is one of those individuals. Would you not agree that America today is facing repeated attacks by countries and individuals both foreign and domestic who seek to destroy our Constitution, our principles, and our way of life? If the NRA agrees with this premise, it will require the NRA to carefully consider and report any links or associations that may tie Grover Norquist to the Muslim Brotherhood. The term “the enemy within” must always be carefully weighed before considering any one individual that may influence Constitutional law or policies that are crafted to guard the safety of our Country.

Roger Doxaras

03/11/15

The Betrayal Papers, Part IV of V: A New Genocide

Obama and the Muslim Brotherhood created and backed the Arab Spring, and are responsible for the rise of genocidal ISIS.

Part I of The Betrayal Papers explained the history and context of the Muslim Brotherhood’s influence in the American government.

Part II looked at the associations of seven Obama officials with Muslim Brotherhood front organizations in the United States.

Part III traced the Muslim Brotherhood’s and the State of Qatar’s influence on domestic policy and Obama administration scandals.

Part IV will examine foreign policy under Obama. It will explain how the Obama administration and U.S. Department of State have used the American military and standing in the world as tools to kick start the creation of a new Islamic Caliphate. Obama’s unconscionable enabling of and silence regarding a new genocide will be revealed. Finally, this article will offer a cursory reassessment of America’s allies, and which countries we have lost as friends.

“The transformation of America has been in the full swing ever since 2008. President Obama’s no-show in Paris was an embarrassment for all Americans. But it also was a signal to the Islamic jihadis. It’s one of the many signals he’s sent over the years while he’s in office. Now there’s no question: We got a hell of a job ahead of us… with the Muslim Brotherhood penetration in every one of our national security agencies, including all our intelligence agencies.

Is Obama a Muslim?

This is the question that many Americans and people around the globe are asking themselves lately. From his refusal to label the Islamic State “Islamic,” to his lecture about the Crusades at the National Prayer breakfast, what once was taboo is now starting to be verbalized.

Yet this may be the slightly wrong question to ask. The ruling establishment of Saudi Arabia, home to Islam’s holiest sites, Mecca and Medina, is rightly considered an authoritative voice of Islam. In case you missed it, the Saudis have emerged as some of Obama’s biggest critics.

In doing so, the Saudis also revealed the truth regarding the Arab Spring.

Writing in the Saudi daily Al-Jazirah, columnist Dr. Ahmad Al-Faraj, while supporting Israeli’s Prime Minister Benjamin Netanyahu’s speech before Congress, not only called Obama “one of the worst U.S. presidents;” he also exposed the nature of so-called “democratic revolutions” in the region. Stated al-Faraj:

Since Obama is the godfather of the prefabricated revolutions in the Arab world, and since he is the ally of political Islam, [which is] the caring mother of [all] the terrorist organizations, and since he is working to sign an agreement with Iran that will come at the expense of the U.S.’s longtime allies in the Gulf, I am very glad of Netanyahu’s firm stance and [his decision] to speak against the nuclear agreement at the American Congress despite the Obama administration’s anger and fury.”

Translation: Obama served as a mouthpiece for, and armed, the Muslim Brotherhood (i.e., “political Islam”) revolutionaries in Egypt, Tunisia, Libya, and Syria. He was aided in this incredibly destructive policy of jihad by Secretary of State Hillary Clinton until her resignation in 2013, and has been further aided by her successor, John Kerry.

The original Muslim Brotherhood, the Ikhwan, was banished from Saudi Arabia in 1927. The conservative Wahhabi Saudi royals have traditionally had little use for exporting jihad, and indeed are one of the United States’ oldest strategic allies in the region. Despite Americans’ revulsion at Saudi Arabia’s application of barbaric sharia (i.e., Islamic) law in their own country, outside the Kingdom Saudis have every reason to maintain the status quo with neighbors, including Israel, Jordan, and Egypt. That means keeping the Muslim Brotherhood out of power.

The pertinent question is not whether Obama is secretly a Muslim, per se, but rather if Obama is a secret Muslim Brother. That is the real question.

Continue reading

03/11/15

Why was Sid Blumenthal advising Hillary Clinton on Libya?

By: Kenneth R. Timmerman
Accuracy in Media

Exclusive to Accuracy in Media

Until Rep. Trey Gowdy (R-SC) revealed last week that his Benghazi Select Committee was investigating Hillary Clinton’s use of a private email server for her official State Department communications, no one had a good explanation for why none of the Congressional committees that had previously investigated Benghazi had ever cited a single Hillary Clinton email in their reports.

Congressional Democrats had been pooh-poohing Gowdy’s investigation, claiming that all the important questions about Benghazi had been “asked and answered” by previous committees.

Now the best that Gowdy’s counterpart, Rep. Elijah Cummings (D-MD), can do is object to subpoenas (especially when they are issued to Hillary Clinton in person, through Counsel), and to huff and puff about the investigation becoming a “surrogate” for the “Republican National Committee.”

What a change a single revelation can bring.

We now learn that Hillary Clinton not only used a private server, maintained at her Chappaqua, New York home for official communications, but that she never used a government email at all. Not once.

No [email protected], or [email protected] or anything of the kind. Just multiple accounts on her family server, clintonemail.com, including [email protected], the same address used by former Clinton White House aide Sidney Blumenthal to communicate with her on Benghazi and related matters.

Federal prosecutors recently finished up their case against former CIA Director David Petraeus, who was conveniently forced to resign just three days after the November 2012 elections, before he could clarify what he knew about Benghazi. (Given that Petraeus had just returned from a September 2, 2012 trip to Ankara, Turkey, where he had been trying to tamp down publicity due to an arms shipment from Benghazi to the Syrian rebels, he certainly knew a lot.)

In a widely criticized decision, they forced him to plea bargain one count of a misdemeanor in exchange for dropping more serious charges. The full extent of the FBI’s case against Petraeus involved him sharing personal, hand-written notebooks with his biographer.

Prosecutors noted that the CIA had installed a SCIF—a specialized high-security area—in his Arlington, Virginia home where he could safely store classified materials brought home from the CIA. That facility was dismantled by the CIA without incident two months after Petraeus resigned from the Agency.

The prosecutors never accused Petraeus of improperly storing U.S. government classified materials either in the SCIF or elsewhere. Nor did they accuse him of sending classified materials over an unsecure server.

If they could prosecute Petraeus on one count of improperly handling classified material (he kept those personal notebooks in a rucksack in his attic), one can only speculate how many thousand counts of mishandling classified information could be brought against Mrs. Clinton. Of course, she denies having sent classified information over her personal server, but in that case how did she communicate on classified matters with her envoys and subordinates?

Was the private server at her residence designed, installed, and maintained by a U.S. government security agency? Was it connected to the government’s Secret Internet Protocol Router Network (SIPRNet) and physically separated from the open Internet?

The Sid Blumenthal memos, sent from his AOL account to Hillary’s private email server, suggest that this was not the case. If so, the former Secretary of State was breaking the law—big time.

When the memos first surfaced in 2013—posted to the Internet by a Romanian hacker known as “Guccifer” —neither the State Department nor their purported author acknowledged their authenticity. Given that they initially surfaced on the website of Russia Today, Vladimir Putin’s reliably anti-American TV network, that was enough to consign them to oblivion as yet another Internet hoax.

Now we learn that former CIA official Tyler Drumheller apparently helped to gather the “intel” that Blumenthal sent to Hillary on the Benghazi attacks and other political developments inside Libya.

This is extremely significant because the initial memo sent by Blumenthal, dated September 12, 2012, cites “a sensitive source,” who purportedly met with Libyan President Magarief shortly after the attacks began and claimed that a YouTube video sparked the “protest” against the U.S. diplomatic compound in Benghazi.

Magarief himself never said such a thing, although the memo is worded to suggest that he did. He blew up when he heard Susan Rice make that claim on the Sunday talk shows after the attack, as I write on pages 347 and 348 of Dark Forces: The Truth About What Happened in Benghazi.

Drumheller became infamous for several earlier pieces of disinformation. As European Division chief at the CIA’s Directorate of Operations in 2001 and 2002, he was the one who planted the phony evidence about the Niger uranium contract that was later used by the media during the Valerie Plame affair to claim that George W. Bush had “lied” about Saddam Hussein’s WMD programs. On three separate occasions, he passed the Niger information up the food chain as validated intelligence, when the CIA had been warned that it was not (see page 63 of my book Shadow Warriors).

Then-CIA Director George Tenet was so fed up with Drumheller that he spent seven full pages in his memoir debunking claims by Drumheller regarding the defector known as CURVEBALL that Tenet said were simply untrue.

Drumheller and Sid Blumenthal have a history together. In 2007, Blumenthal used Drumheller as a source to “prove” that Bush had “lied” about pre-war intelligence on Iraqi WMD. Drumheller and Blumenthal went on to work in Hillary Clinton’s presidential campaign in 2007 and 2008.

So was the Guccifer/Blumenthal memo intended as disinformation, written after Hillary Clinton put out her statement on the night of the attacks blaming them on a YouTube video? Or was it actually the source of Hillary’s false claim about the video, written and sent by someone on the ground in Libya who was attempting to plant the story?

Many reporters, myself included, have submitted Freedom of Information Act requests to the State Department, asking for all documents and communications that would show how Mrs. Clinton’s statement came to be worded as it was finally released. Where are all the drafts? Who commented on them? What did it say initially? How was it changed? By whom?

We have much of that information for the Susan Rice talking points, but nothing at all for Hillary Clinton’s statement on the evening of the attacks.

Given that there is not a single mention of a protest or the YouTube video in all the documents released to Congress, which included real-time communications from Tripoli and Benghazi from the State Department and CIA that night, exactly how Mrs. Clinton came up with that idea could provide key insight into what actually happened in Benghazi, and why.

03/11/15

Watcher’s Council Nominations – ‘Delete To The Beat’ Edition

The Watcher’s Council

Hillary Clinton is one of those people who should have resolved a long time ago never to lie. She’s absolutely awful at it. Aside from violating the Federal Records Act, there’s also the question of National Security. Unless Mrs. Clinton spent a great deal of money encrypting her private server to government standards, her illegal account was an open invitation to foreign governments or even private hackers to gain access to her account and spy on what she insists were ‘mostly private e-mails’ that had nothing to do with government affairs, something I think we all pretty much know is horse manure.

No matter how you slice it, this is a gross violation of federal law, something Hillary Clinton had full knowledge of when she did it.

Me, I still want to know what happened to that $6 billion in State Department funding that mysteriously ‘disappeared’ while she was Secretary of State and about those mysterious donations from foreign countries like Algeria to the Clinton Foundation.

Welcome to the Watcher’s Council, a blogging group consisting of some of the most incisive blogs in the ‘sphere and the longest running group of its kind in existence. Every week, the members nominate two posts each, one written by themselves and one written by someone from outside the group for consideration by the whole Council. Then we vote on the best two posts, with the results appearing on Friday morning.

Council News:

This week, Simply Jews, Seraphic Secret, Maggie’s Notebook and The Gates of Vienna earned honorable mention status with some great articles.

You can, too! Want to see your work appear on the Watcher’s Council homepage in our weekly contest listing? Didn’t get nominated by a Council member? No worries.

To bring something to my attention, simply head over to Joshuapundit and post the title and a link to the piece you want considered along with an e-mail address (mandatory, but of course it won’t be published) in the comments section no later than Monday 6 PM PST in order to be considered for our honorable mention category. Then return the favor by creating a post on your site linking to the Watcher’s Council contest for the week when it comes out on Wednesday morning.

Simple, no?

It’s a great way of exposing your best work to Watcher’s Council readers and Council members while grabbing the increased traffic and notoriety. And how good is that, eh?

So, let’s see what we have for you this week…

Council Submissions

Honorable Mentions

Non-Council Submissions

Enjoy! And don’t forget to like us on Facebook and follow us on Twitter… ’cause we’re cool like that! And don’t forget to tune in Friday for the results!