The Front Page Cover
2016 The turth is the gold of today
Featuring:
US, Britain -- under a secret
program called 'Anarchist' -- hacked into
feeds from Israeli drones and fighters
Dan Lamothe
.
~~~
.
New UN Climate Czar Will Make America
Pay For Complacency
.
.
Conservatives Oppose Mass
Criminal Release
Cliff Kincaid
.
.
{aim.org} ~ With the presidential race the focus of most of the media attention, a major division among Senate Republicans over so-called “criminal justice reform” has gotten little attention... But the liberal media are now beginning to notice that conservatives are mounting a campaign to stop a piece of legislation that has been advertised as a major part of President nObama’s left-wing legacy. The Sentencing Reform and Corrections Act (S. 2123) would release thousands of criminals back on the streets at a time of rising crime rates, in the name of reducing what liberals call “mass incarceration.” In a major story on the new developments, The New York Times noted that the effort to pass the bill “has been driven by an unusual right-left alliance that includes the conservatives Charles G. and David H. Koch and the American Civil Liberties Union,” but that Senator Tom Cotton (R-AR) has now taken a strong leadership role against the bill. http://www.aim.org/aim-column/conservatives-oppose-mass-criminal-release/?utm_source=AIM+-+Daily+Email&utm_campaign=email020116&utm_medium=email.
22 Clinton Emails Withheld Because Release
Would Be ‘Too Damaging’
to National Security
Andrew McCarthy
.
.
Tech-challenged Pentagon searches
for a Silicon ally
.
Col. Gregory Jones, commander, 129th Rescue Wing, says farewell to Secretary of Defense Ash Carter as Carter departs Moffett Field, Calif., Aug. 29, 2015, following a trip to California. Department of Defense
.
{aei.org} ~ Silicon Valley is a popular destination for the feds lately. President nObama’s intelligence team trekked there last month to ask for help defeating Islamic State’s propaganda on social media... Less noticed has been the steady parade of Pentagon leaders heading west. Last summer the Pentagon leased 12,000-square feet of Class A real estate in Sunnyvale for a new office: the Defense Innovation Unit-Experimental. Why? Commanders are worried about the accelerating erosion of the American military’s technological superiority. They believe Silicon Valley’s talent and tech can restore agility and innovation. But Defense Secretary Ash Carter faces two challenges. The first is getting Americans and their elected representatives to recognize the technological stagnation. Today almost none of the new military equipment coming online is revolutionary in design or technology; most is merely an upgraded version of something from the Cold War. A half-century ago, the Pentagon had more than a dozen combat aircraft in development. Last year it had only the late and overbudget F-35 and a new bomber. The American public believes its military is No. 1, but its commanders and its enemies increasingly know differently. http://www.aei.org/publication/tech-challenged-pentagon-searches-for-a-silicon-ally/?utm_source=paramount&utm_medium=email&utm_content=AEITODAY&utm_campaign=020216.
Clinton Had Plans to Use
Hidden IT Network to Bypass
State Department Rules
Kemberlee Kaye
.
.
Hamas: The "Merchants of War" Who
Seek to Destroy Israel
Khaled Abu Toameh
.
In the words of Hamas leader Ismail Haniyeh (left), the tunnels Hamas digs from Gaza into Israel (right) are not only to "defend the Gaza Strip, but to serve as a launching pad to reach all of Palestine."
.
{gatestoneinstitute.org} ~ The myth that Hamas uses tunnels to smuggle food and other necessities to the "besieged" Gaza Strip has been buried under the rubble of the tunnel that collapsed last week east of Gaza City... The incident, in which seven members of Hamas's armed wing, Ezaddin Al-Qassam, were killed when the tunnel they were working in collapsed, provides further proof that the Islamist movement has stayed true to its charter, which calls for the total destruction of Israel. The Hamas men who were killed in the tunnel collapse belonged to the movement's elite "Tunnel Unit." According to Ezaddin Al-Qassam, the men were busy repairing one of the tunnels damaged during the 2014 war with Israel when it collapsed due to severe weather conditions. Contrary to popular belief, the tunnel was not being renovated to allow Palestinians to smuggle basic goods from Egypt to the Gaza Strip. This was one of many tunnels that Hamas has dug over the past few years to infiltrate Israel and carry out terror attacks. http://www.gatestoneinstitute.org/7352/hamas-tunnels-war.
‘I Take Classified Information Seriously,’ Boasts Hilly Clinton, Despite Evidence
JOHN HAYWARD
.
.
Mystery Surrounds Muslim Cleric
in U.S.Mountain Compound
.
.
Intelligence Official Confirms,
Hilly Emails Put Live at Risk
Jeff Dunetz
.
.
Clinton’s Technological Ignorance
is a Problem
{fixthisnation.com} ~ According to a newly-released email from 2009, incoming Secretary of State Hilly Clinton did “not know how to use a computer to do email” at the time. The email, which originated from State Department official Lewis Lukens, appeared to be in response to Clinton’s chief of staff, Cheryl Mills... Mills had earlier worried that Clinton’s inability to use anything other than her Blackberry might be a “problem.” In the email, though, Lukens seems unconcerned. He wrote that it “would not take much training to get her up to speed.” Of course, as The Hill points out, there’s no evidence that Clinton ever did figure out how to use her computer to “do email.” She has said that she never had a computer in her State Department office, apparently content to use her mobile devices as her sole method of electronic communication. Now, the Clinton staff will probably use this story as a way of reinforcing their claim that the former secretary rarely used email at all. Or they will use it as a way of showing Clinton as being technologically incompetent, as though that’s an excuse for her wanton disregard for informational security. It’s a little like her “wipe the server” comment a few months ago, where no one could quite figure out whether or not she was joking. Increasingly, it looks like she really thought “with a cloth?” was a relevant answer..
.
US, Britain -- under a secret
program called 'Anarchist' -- hacked into
feeds from Israeli drones and fighters
Dan Lamothe
.
.
The Intercept reported that the secret program was called "Anarchist." It was carried out by Britain's Government Communications Headquarters, or GCHQ, and the National Security Agency from a mountaintop Royal Air Force base in Cyprus, according to report.
The Intercept reported that the secret program was called "Anarchist." It was carried out by Britain's Government Communications Headquarters, or GCHQ, and the National Security Agency from a mountaintop Royal Air Force base in Cyprus, according to report.
.
"GCHQ files provided by former NSA contractor Edward Snowden include a series of 'Anarchist snapshots' - thumbnail images from videos recorded by drone cameras," The Intercept reported. "The files also show location data mapping the flight paths of the aircraft. In essence, U.S. and British agencies stole a bird's-eye view from the drones."
"GCHQ files provided by former NSA contractor Edward Snowden include a series of 'Anarchist snapshots' - thumbnail images from videos recorded by drone cameras," The Intercept reported. "The files also show location data mapping the flight paths of the aircraft. In essence, U.S. and British agencies stole a bird's-eye view from the drones."
.
An Israeli official downplayed the significance of the report on Friday, telling the Israeli news service Haaretz the revelations weren't "very dramatic." Israeli military operations were not harmed in the process, the source told Haaretz, adding that "it goes without saying that foreign intelligence elements in the Middle East detect our operations, just like we detect the operations of other states in the region."
An Israeli official downplayed the significance of the report on Friday, telling the Israeli news service Haaretz the revelations weren't "very dramatic." Israeli military operations were not harmed in the process, the source told Haaretz, adding that "it goes without saying that foreign intelligence elements in the Middle East detect our operations, just like we detect the operations of other states in the region."
.
Officials at the NSA couldn't immediately be reached for comment, and have historically declined to comment on classified programs.
Officials at the NSA couldn't immediately be reached for comment, and have historically declined to comment on classified programs.
.
Anarchist was first started in 1998, according to The Intercept. It occasionally hacked into the feeds of drones operated by Syria and Hezbollah, but the bulk of the effort was focused on Israel, which has long had a complicated relationship with the United States when it comes to spying and intelligence collection. A summary of the CIA's budget, also released by Snowden, notes that Israel is a "priority" target for U.S. counterintelligence operations. Although allies, the United States and Israel have a history of spying on one another.
Anarchist was first started in 1998, according to The Intercept. It occasionally hacked into the feeds of drones operated by Syria and Hezbollah, but the bulk of the effort was focused on Israel, which has long had a complicated relationship with the United States when it comes to spying and intelligence collection. A summary of the CIA's budget, also released by Snowden, notes that Israel is a "priority" target for U.S. counterintelligence operations. Although allies, the United States and Israel have a history of spying on one another.
.
Photographs from the program appear to show Israeli drones equipped with missiles. Israel has long declined to discuss the arming of any of its unmanned aircraft, saying they are used for surveillance and to mark targets so that fighter jets and others manned aircraft can carry out airstrikes.
Photographs from the program appear to show Israeli drones equipped with missiles. Israel has long declined to discuss the arming of any of its unmanned aircraft, saying they are used for surveillance and to mark targets so that fighter jets and others manned aircraft can carry out airstrikes.
.
A 2008 British military document quoted by The Intercept suggested the Anarchist program was "indispensable" for maintaining an understanding of Israeli military operations and gaining insight into possible future developments in the region.
A 2008 British military document quoted by The Intercept suggested the Anarchist program was "indispensable" for maintaining an understanding of Israeli military operations and gaining insight into possible future developments in the region.
.
"In times of crisis," it said, "this access is critical and one of the only avenues to provide up to the minute information and support to U.S. and Allied operations in the area."
"In times of crisis," it said, "this access is critical and one of the only avenues to provide up to the minute information and support to U.S. and Allied operations in the area."
.
Military technology experts do not consider hacking into a video feed from a manned jet or drone to be difficult. In 2009, for example, U.S. defense officials acknowledged in media reports that Iranian-backed militants in Iraq had used off-the-shelf software costing about $26 to hack the video feeds of Predator drones.
Military technology experts do not consider hacking into a video feed from a manned jet or drone to be difficult. In 2009, for example, U.S. defense officials acknowledged in media reports that Iranian-backed militants in Iraq had used off-the-shelf software costing about $26 to hack the video feeds of Predator drones.
.
Air Force officials said that year that they were working toward encrypting all feeds by 2014. It is not clear if that has occurred.
Air Force officials said that year that they were working toward encrypting all feeds by 2014. It is not clear if that has occurred.
.
Comments