03/31/15

The Progressive Transformation of Our Federal Government

By: Frank Salvato

Unionize Illegal Immigrants

Protesters participate in a display of civil disobedience as labor organizers escalate their campaign to unionize the industry’s workers. (AP Photo/M. Spencer Green)

With the addition of Ecuador and the Philippines as signatories to “memorandums of understanding,” the National Labor Relations Board (NLRB) – effectively acting on behalf of the US federal government – has agreed to engage three foreign countries in international outreach programs designed to teach immigrants how to participate in labor organizing in the United States. Ecuador and the Philippines join Mexico as signatories to the memorandums. The agreements – which do not distinguish between those who have entered the US legally and those who have not, present several questions, including those of jurisdiction, treaty making and purpose.

The NLRB, by charter, is an independent agency of the United States government. Its members are all appointed by the President of the United States with the consent of the US Senate. It is divided into two authoritative entities: the General Counsel and the Board. The General Counsel is tasked with investigating and prosecuting unfair labor practice claims; the Board is the adjudicative body that rules on the cases brought to it.

The NLRB’s authority is legislatively limited to private sector employees (excluding governmental, railroad and airline employees covered by the Adamson Railway Labor Act, and agricultural employees) and the US Postal Service. Yet over the years, many court decisions have allowed for the board’s jurisdictional standards to become so low that almost all employers whose businesses have any appreciable impact on interstate commerce have been absorbed into the its purview, rightly or not.

What is missing from the board’s legislated organizational purview is the authority to extend its power outside the United States. Further, when it comes to agreements between the United States and foreign governments, the exclusive right to create and execute treaties in the name of the United States and/or the American people rests with the Executive Branch, pursuant to the consent of the US Senate, codified by Article II, Section 2, of the United States Constitution. By entering into agreements with foreign nations – agreements that possess the full legal weight of the United States government, the NLRB has essentially circumvented the constitutional process for entering into treaties and usurped the authorities of both the Executive Branch and the Legislative Branch of the federal government.

Additionally, the basic functions of the NLRB are meant to be centered on non-partisan arbitration and enforcement. Nowhere in the board’s legislated authority is there a proviso to advance the causes of either employers or organized labor, let alone a provision that grants them the power to teach labor organization to any demographic or faction, nationally or internationally; legally or illegally present in the United States. By entering into an agreement to provide instruction on labor organization, the NLRB has not only abdicated its mandate to be non-partisan, it has demonstrated a decided bias supporting organized labor.

Ronald J. Pestritto, Graduate Dean and Professor of Politics at Hillsdale College, writes in Woodrow Wilson: Godfather of Liberalism,

“Policymaking today, in many areas of national concern such as the environment, health care, and financial regulation, is done primarily by agencies within the bureaucracy to which Congress has delegated broad swaths of legislative authority. Recent battles ranging from rules for greenhouse gas emissions to benefits that must be covered by private health insurance plans have been fought not primarily in Congress, but in or against administrative agencies that are exercising the power given to them by Congress.”

The NLRB is certainly part of the Progressive Movement’s installed bureaucracy; a bureaucracy that functions parallel to the authority of elected government; a bureaucracy that functions even when our elected government does not. By entering into ipso facto treaties with foreign nations, the NLRB has permanently opened the Pandora’s box of transformative bureaucracy, and it is a direct threat to our original form of government.

Frank Salvato is the Executive Director of BasicsProject.org a grassroots, non-partisan, research and education initiative focusing on Constitutional Literacy, and internal and external threats facing Western Civilization. His writing has been recognized by the US House International Relations Committee and the Japan Center for Conflict Prevention. His opinion and analysis have been published by The American Enterprise Institute, The Washington Times, The Jewish World Review, Accuracy in Media, Human Events, Townhall.com and are syndicated nationally. Mr. Salvato has appeared on The O’Reilly Factor on FOX News Channel, and is the author of six books examining Islamofascism and Progressivism, including “Understanding the Threat of Radical Islam”. Mr. Salvato’s personal writing can be found at FrankJSalvato.com.

03/11/15

Hillary’s Emailgate Explained

By: Bethany Stotts
Accuracy in Media

Exclusive to Accuracy in Media.

Clinton’s 2016 presidential chances undoubtedly have been harmed by the revelation that she exclusively used a private email address while serving as Secretary of State. But while the media remain mired in calculations about whether Mrs. Clinton can survive this latest crisis, and who the villains are in this unfolding story, additional questions call out for answers.

Mrs. Clinton made many claims at her press conference on Tuesday. The media shouldn’t simply regurgitate them wholesale, as the AP has done, but rather they should approach them with due skepticism.

“Well, the system we used was set up for President Clinton’s office, and it had numerous safeguards,” said Mrs. Clinton. “It was on property guarded by the Secret Service and there were no security breaches. So, I think that the use of that server, which started with my husband, certainly proved to be effective and secure.”

In contrast, Philip Bump reports for The Washington Post that the domain, clintonemail.com, was established “the same day that Clinton’s confirmation hearings began before the Senate.” That is suspicious timing for a system allegedly set up to support her husband’s office.

The professional assessment by security experts quoted in the media seems to be that Mrs. Clinton’s private email was vulnerable to hacking. “The system could have previously been hardened against attack, and left to get weedy and vulnerable after she left government,” writes Sam Biddle for Gawker. “We don’t know. … With Clinton’s off-the-books scheme, there are only questions.”

“We can only go by what Clinton says,” reports USA Today.

Mrs. Clinton told the press that she had set up the account for both private and work-related emails to avoid the inconvenience of having to set up two phones and two separate accounts, but that, in retrospect, she should have thought better about it. She offered few answers about the actual details of her server, and avoided questions about whether she would subject it to independent analysis, asserting that she had done her full duty by turning over 30,490 vetted emails to the State Department.

There were about 60,000 emails in total, she said—but after the private vetting process, controlled by her and her advisors, she has since deleted the private ones. “At the end I chose not to keep my private personal emails—emails about planning Chelsea’s wedding, or my mother’s funeral arrangements, condolence notes to friends, as well as yoga routines, family vacations—the other things you typically find in inboxes,” she said. Yet the Select Committee on Benghazi’s Chair Trey Gowdy indicated that no emails have been turned over to Congress covering the duration of her 2011 trip to Libya.

Mrs. Clinton apparently expects the media to swallow whole the argument that all her emails on that trip regarded personal affairs.

What can be established at this juncture is depressingly disturbing for national security.

“…security experts consulted by Gawker have laid out a litany of potential threats that may have exposed [Mrs. Clinton’s] email conversations to potential interception by hackers and foreign intelligence agencies,” writes Biddle. This, despite Mrs. Clinton’s assertion that there were no breaches.

Problems identified by Biddle’s sources include that the URL log-in was accessible by anyone in the world, and could have been linked to an “administrative console interface to the Windows machine or a backup,” allowing the possibility that Mrs. Clinton’s emails could have been copied in their entirety by hackers. And, as of March, reports Biddle, “the server at sslvpn has an invalid SSL certificate.” Without a valid SSL certificate there is no third-party indicating that the key is still good, and not hacked.

“An exact physical address could not be determined” for the server, but Internet records indicate that it’s in Chappaqua, New York, reported Bloomberg News.

The server, as of March 4, was on “factory default for the security appliance” when it could have been “replaced by a unique certificate purchased for a few hundred dollars,” making it vulnerable to hacking, it reports.

But, the paper hedges, “While Clinton didn’t have a classified e-mail system, she had multiple ways of communicating in a classified manner, including assistants printing documents for her, secure phone calls and secure video conferences.”

Similarly, Mrs. Clinton asserted at the press conference that she never sent classified information through her private email.

It is not necessary to reveal classified information directly to jeopardize national security or the international diplomatic process. As Thomas Patrick Carroll, formerly of the Central Intelligence Agency’s Directorate of Operations, explained in 2001 for the International Journal of Intelligence and Counterintelligence, “classification usually has relatively little to do with the information itself, but a lot to do with the protection of sources and methods.” His given example was how a foreign minister’s personal assistant might have a private conversation with that minister and obtain “the minister’s private observations on the matter,” later relaying this to U.S. intelligence for their exploitation. These types of inside observations prove invaluable for all foreign intelligence services.

If Mrs. Clinton’s email was hacked, then foreign governments such as Iran, China, Russia, and others, might have gained access to her private internal musings about diplomatic talks as she worked out the details with her staff—an intelligence treasure trove.

One must also ask, if Mrs. Clinton refused to set up a government email, how high was that refusal relayed? If it wasn’t relayed to the very top by security specialists, then why not?

Mrs. Clinton was sworn in on January 21, 2009. A couple months after she took office, in March of 2009, the University of Toronto and TheSecDevGroup issued their report on Ghostnet, a cyberespionage network established by an unknown party to mine data from the Tibetans. They found “real-time evidence of malware that had penetrated Tibetan computer systems” which was connected to a large network of 1,295 infected computers in 103 countries—almost 30 percent of which were high-value targets such as ministries of foreign affairs.

The authors of the report found “that GhostNet is capable of taking full control of infected computers, including searching and downloading specific files, and covertly operating attached devices, including microphones and web cameras,” and was sent through “contextually relevant emails” that look like real emails.

Granted, the mechanism of action for Ghostnet would not have been the same as that which could have compromised the server that Mrs. Clinton was using. But few can claim ignorance about the degree of threat posed by the use of insecure systems at the time.

The Ghostnet network compromised computers at the “ministries of foreign affairs of Iran, Bangladesh, Latvia, Indonesia, Philippines, Brunei, Barbados and Bhutan; embassies of India, South Korea, Indonesia, Romania, Cyprus, Malta, Thailand, Taiwan, Portugal, Germany and Pakistan.”

Even if the Obama administration’s appointees lacked the know-how to anticipate cyber threats when they took office, they were undoubtedly immediately educated about the dangers by the government’s more knowledgeable members. Bob Gates, the former Director of Central Intelligence, and later Defense Secretary under Obama, commented in his 2014 book, Duty, that “A number of the new appointees, both senior and junior, seemed to lack an awareness of the world they had just entered.” He noticed that “fully half” of those in the Situation Room had their “cell phones turned on during the meeting, potentially broadcasting everything that was said to foreign intelligence electronic eavesdroppers” and he ensured that such behavior stopped.

The Ghostnet story made page A1 of the New York Times in March 2009. Can this administration really claim innocence about the security threats posed by an insecure, private email server when Clinton served as Secretary of State? How much did President Obama know, and when?

It now appears that the Obama administration received questions from Gawker’s John Cook about the ramifications of Clinton’s private email use back in 2013. The Obama administration has likely spent at least those two years—if not much longer—covering for Mrs. Clinton. Her press conference to explain her exclusive use of private email fails to satisfy, and the press should continue demanding answers until this presidential hopeful provides some real ones.