Dems Determined to Leave America Borderless

And hence, defenseless.

Frontpage mag

 

The quintessential example of “Chutzpah” is the young man who kills both of his parents and then pleads for mercy arguing that he is an orphan.

The Democrats have succeeded in providing an even more egregious example of demonstrating chutzpah by betraying their oaths of office and betraying their constituents and, indeed, all Americans.

The official report, 9/11 and  Terrorist Travel begins with the following paragraph:

It is perhaps obvious to state that terrorists cannot plan and carry out attacks in the United States if they are unable to enter the country. Yet prior to September 11, while there were efforts to enhance border security, no agency of the U.S. government thought of border security as a tool in the counterterrorism arsenal. Indeed, even after 19 hijackers demonstrated the relative ease of obtaining a U.S. visa and gaining admission into the United States, border security still is not considered a cornerstone of national security policy. We believe, for reasons we discuss in the following pages, that it must be made one.

The Democrats continue to refuse to provide the funding for DHS to address the border crisis that exists along the dangerous and highly porous U.S./Mexican border while complaining about the conditions in which illegal aliens, particularly alien children, are being housed in detention facilities that were never designed to handle the number of aliens currently being housed within their over-crowded confines.

On June 25, 2019 Fox News reported, “Dem-led House passes $4.5B bill to aid migrants at border, setting up showdown with GOP-led Senate.”

Continue reading

JW Inside Report: How the Deep State Risked National Security over the Awan Bros. Scandal

Judicial Watch

 

In this episode of “JW Inside Report,” investigative reporter Luke Rosiak of The Daily Caller discusses his findings on the Awan Bros/Democrat IT scandal in his new book “Obstruction of Justice.”

A Democratic IT staffer named Imran Awan was arrested in July 2017 on charges of bank fraud. He was employed with Debbie Wasserman Shultz and other congressional members. He is also a suspect in a cybersecurity investigation, having been banned from congressional networks earlier in the year. In addition, his relatives, also government IT employees, are currently being investigated for alleged involvement in defrauding the federal government as well as compromising sensitive information from congressional servers. Check out Luke’s new book HERE

Mexican Journalist Reveals the Truth About the Caravan

Photo via US Daily Review

Townhall

Rachel Alexander

 

Mexican journalist Alex Backman has released a stunning expose on the caravan from Central America. He says the migrants are robbing and stealing in Mexico. They carjack cars containing just one occupant. There are even accounts of rapes. Many of the migrants will not let people film them. If they see someone filming them through a car window, they stop the car and demand the phone. Backman suspects the reason they don’t want to be filmed is because they have criminal histories.

He said the Mexican president hasn’t done anything to stop it. The Mexican government is instead providing them with necessities including medical aid. This despite the fact that 48 percent of Mexicans disapprove of the caravan. Almost 2,700 Central Americans have applied for asylum in Mexico since the caravan started. However, the Mexican government says it does not have the resources to house all the caravan members for six months.

Honduran President Juan Orlando Hernández told Vice President Mike Pence that “the caravan was organized by leftist organizations.” Left-wing organizations are providing assistance. They include the coalition CARA Family Detention Pro Bono Project, which stands for the Catholic Legal Immigration Network, the American Immigration Council, the Refugee and Immigration Center for Education and Legal Services and the American Immigration Lawyers Association. At least three of the groups are funded by George Soros’ Open Society Foundation.

Of course, exposing this is risky, because the left is fond of denying that Soros funds its ventures, labeling anyone who points out the connection as a conspiracy theorist. Kelly Johnston, a vice president at Campbell Soup, was fired after he tweeted about Soros funding the caravan.

Continue reading

Thousands of Armed U.S. Troops Will Be Deployed to the Border by Friday,

Thousands of Armed U.S. Troops Will Be Deployed to the Border by Friday, Here’s What They’ll Be Doing

BREAKING: Thousands of Armed U.S. Troops Will Be Deployed to the Border by Friday, Here's What They'll Be Doing

Townhall.com

by Katie Pavlich

 

Officials from the Department of Homeland Security and Department of Defense announced Monday 5200 additional active duty U.S. troops will be deployed to the southern border with Mexico by Friday. Eight-hundred soldiers are on their way to Texas now.

“They are in fact deploying with weapons,” U.S. Northern Command Air Force General Terrence O’Shaughnessy said during a press conference. “I think the President has made it clear that border security is national security.”

 

Troops are being sent to bolster border security in Arizona, New Mexico and Texas as at least three caravans from Central America make their way through Mexico and toward the United States. The caravans pose a special threat due to their size, which range from 3,000 people to more than 10,000. According to U.S. Customs and Border Protection Commissioner Kevin McAleenan, at least one caravan near Guatamala, Mexico has used violent tactics to breach a number of international borders.

“Due to the large size of the potential caravans that may arrive at the border, the Department of Homeland Security has further requested the support of the Department of Defense,” McAleenan said. “We will not allow a large group to enter the U.S. unlawfully.”

Troops will be used to build fencing, provide medical units, harden points of entry and address key gaps in points of entry. Air and ground transportation will be provided to move agents and equipment. This support requires military planning teams and heavy equipment, including Black Hawk helicopters and fixed wing aircraft.

One-thousand additional Customs and Border Protection officers and agents are also being deployed to handle operations.

More Evidence of Political Coverup in Dem IT Security Scandal

Judicial Watch

More evidence has surfaced about the disturbing political coverup of grave national security violations committed by the Pakistani who ran House Democrats’ information technology. His name is Imran Awan and last year he was arrested on bank-fraud charges at Dulles International Airport in Washington D.C.  while trying to flee to his native Pakistan. Even after getting fired by some members of Congress for stealing computers and data systems, Florida’s Debbie Wasserman Schultz, then Democratic National Committee (DNC) chair, kept him and let him have access to her emails and files as well as the password to the electronic device she used for DNC business. At one point, Awan had access to the computers of dozens of members of Congress, including those on the House Intelligence and Foreign Affairs committees. Judicial Watch has launched an investigation and is pursuing public records.

The government’s bizarre failure to prosecute Awan for the national security violations he appears to have committed points to a political coverup that’s dangerous, craven and borders on traitorous. A House Office of Inspector General investigation determined earlier this year that Awan and his relatives committed numerous violations of House security policies, including logging into the House Democratic Caucus server thousands of times without authorization. The same news agency that reported that story published alarming new revelations in the case this month, concluding that “Democrats appear to want to keep the case out of court” because “a trial could expose their reckless IT practices.” It turns out that, not only has Capitol Police failed to make any arrests, it inadvertently gave evidence to defense attorneys that was supposed to go to prosecutors. It gets better; prosecutors appear to be sharing information with someone on Capitol Hill who in turn is leaking it to Awan’s lawyer.

Here is an excerpt from the news article published just a few days ago: “The Capitol Police turned over a trove of evidence in the alleged Imran Awan House cyberbreach and theft case to the defense attorneys when they were supposed to deliver it to prosecutors instead, according to court documents and a source.” Someone inside government apparently tipped off Awan’s lawyer, Chris Gowen, that a reporter was digging around for information on the Capitol Police’s suspicious mistake involving the mishandling of evidence. Gowen, a former public defender in Miami Florida, worked for Bill Clinton and on Hillary Clinton’s failed 2008 presidential campaign. The exchange of information (known as discovery) in a federal criminal case occurs between prosecutors from the U.S. Attorney’s Office and defense lawyers by either registered mail or a third-party copy service. Law enforcement is never involved, according to federal law enforcement sources contacted by Judicial Watch.

Legal experts and veteran federal agents contacted by Judicial Watch say something smells rotten in this case. The so-called inadvertent disclosure to Awan’s defense team by Capitol Police was intentional for one of two reasons, the experts assert. Perhaps the prosecution is alerting the defense of particular facts of the case to generate cooperation and further the probe into political figures. “This is possible because prosecutors are always gun shy when it comes to prosecuting political figures, especially the figures who may be culpable in the case,” said a longtime Federal Bureau of Investigation (FBI) official who has worked on similar cases. “They do not want to go to trial for a number of reasons, so they are showing their hand to induce a plea with cooperation.”

The second reason, according to Judicial Watch’s sources, is that there is corruption and the inadvertent disclosure was purposeful to help bolster the defense without being obvious and backing down in court. “Either way, something is up,” a longtime federal agent told Judicial Watch. “I have never heard of anyone at the federal level inadvertently handing over documents to the defense en mass like this, never happens.” Chris Farrell, Judicial Watch’s Director of Investigations and Research, maintains that “the Awan case has all the characteristics of a major national security crime, specifically, 18 USC Sec 793(f),” which carries a punishment of up to 10 years in prison. A former military intelligence officer specializing in counterintelligence and human intelligence, Farrell added that treating the Awan case as anything less than a major national security crime is either negligence or complicity. “The bungled handling of evidence is disgraceful and amateurish,” Farrell said, adding that “the effort to bury, constrain and minimize the Awan case is deeply disturbing, and points to the need for a legitimate, full investigation by a competent law enforcement agency with substantial experience in counterintelligence and cyber-crime arenas.”

Cyberwar: The New Forever Battle, Indicators of Compromise

Founders Code

by

The United States is in the midst of the most resounding policy shift on cyber conflict, one with profound implications for national security and the future of the internet. The just-released U.S. Cyber Command “vision” accurately diagnoses the current state of cyber conflict and outlines an appropriate new operational model for the command: since cyber forces are in “persistent engagement” with one another, U.S. Cyber Command must dive into the fight, actively contesting adversaries farther forward and with more agility and operational partnerships.

The vision, however, ignores many of the risks and how to best address them. Most importantly, the vision does not even recognize the risk that more active defense – in systems and networks in other, potentially friendly nations – persistently, year after year, might not work and significantly increases the chances and consequences of miscalculations and mistakes. Even if they are stabilizing, such actions may be incompatible with the larger U.S. goals of an open and free Internet. More here including the critique of the report.

*** Meanwhile we know all too well about Russia and China’s cyber espionage, yet when proof surfaces by hacking into their documents for evidence… both countries begin another denial session. And Trump invited Putin to a bi-lateral meeting at the White House? Any bi-lateral meeting should take place outside the United States in a neutral location like Vanuatu or the Canary Islands…

TheTimes: Russian attempts to fuel dissent and spread disinformation have been exposed by a cache of leaked documents that show what the Kremlin is prepared to pay for hacking, propaganda and rent-a-mob rallies.

Hacked emails sent by Moscow-linked figures outline a dirty-tricks campaign in Ukraine, which was invaded on the orders of President Putin in 2014. Experts said that they exposed the dangers faced by Britain and its allies because Russia used the same weapons of disinformation, bribery and distortion to attack the West.

Bob Seely, a Tory MP and expert on Russian warfare, said his analysis of the leaks, which comprise thousands of emails and a password-protected document related to the conflict in Ukraine, revealed a “shopping list of subversion”.

“There is overwhelming evidence that the tools and techniques of Russian covert conflict are being used in and against the UK, the US and the EU,” he added. “In the wake of the Skripal poisoning it’s more important than ever that we understand these methods.”

The cost and extent of tactics were disclosed in a third tranche of the so-called Surkov leaks, named after Vladislav Surkov, a Kremlin spin-master said by some to be Mr Putin’s Rasputin.

Two previous tranches, published online by Ukrainian Cyber Alliance, a hacker activist collective, were said to include emails from an account linked to Mr Surkov. He has been closely involved with the management of Donetsk and Luhansk People’s Republics, two Russian-controlled “statelets” in Ukraine established by pro-Moscow separatists.

The latest publication appears to contain emails found in accounts linked to Inal Ardzinba, Mr Surkov’s first deputy, and to a Ukrainian Communist party leader. They suggest that the Kremlin paid local groups and individuals in Ukraine that were willing to advance its aim to fracture the country.

One set of correspondence from October 2014, which appears to have been sent by a Russian politician to Mr Ardzinba, contained proposals to fund cyberoperations, including hacking email accounts for between $100 and $300. A wider plan to “troll opponents”, “demotivate enemies” on social media, and amass the personal data of targeted individuals in Ukraine’s second largest city, Kharkiv, was priced at $130,500.

The Russian foreign ministry has denied in the past that Mr Ardzinba has had anything to do with propaganda in Ukraine. According to Mr Seely, the leaks appear to reveal plans to plant new historical and philosophical ideas. The emails also include an event and two books that would claim that an area of Ukraine had Russian heritage.

Other proposals included the orchestration of anti-Ukraine, pro-Russia rallies. These involved the transport of “sportsmen” trained in martial arts to agitate at the rallies, bribes to local media to feature the protests and bribes to police to turn a blind eye. A month of rallies in Kharkiv was priced at $19,200. It included 100 participants, three organisers and two lawyers. It is unclear if the rallies took place, though others orchestrated by the Kremlin did happen, the research said. Moves to get 30 ex-communist figures elected to local government were floated in June 2015, at $120,460, the leaks said.

The Kremlin has claimed in the past that the Surkov leaks are fabricated and in the information war between Ukraine and Russia falsehoods may have been planted. However, the authors of correspondence in the first two tranches confirmed their authenticity. They were supported by the Atlantic Council, an international affairs think tank, after an analysis of metadata.

In their analysis of the third tranche, Mr Seely and his co-researcher Alya Shandra, managing editor of an English-language Ukrainian news website, say the leaks are “very likely to be authentic”. Ms Shandra and Mr Seely plan to publish their report with the Royal United Services Institute.

Peter Quentin, a research fellow at the Royal United Services Institute, said: “There is no reason to believe these leaks are any less credible than the previous tranches. This third tranche certainly seems to fit with the trend of well-documented subversion by Russian activists in the region.”

 

Comey Memo Edits Warrant Indictments

Flopping Aces

by Daniel John Sobieski

 

Now we know that not only did Hillary Clinton show intent in her handling of classified materials routed through her private server, but that former FBI Director James Comey and his team showed intent in letting her get away with it to the detriment of American national security.

Sen. Ron Johnson, R-Wis., chairman of the Homeland Security Committee, in a Thursday letter to current FBI Director Christopher Wray, reveals how edits to Comey’s exoneration memo went beyond changing “grossly negligent” to “extremely careless” but edited out content that shows the FBI knew Hillary was intentionally in violation of the Espionage Act but that, since the decision to exonerate her had already been made, they had to submit to the annals of history a lie they agreed upon:

Newly released documents obtained by Fox News reveal that then-FBI Director James Comey’s draft statement on the Hillary Clinton email probe was edited numerous times before his public announcement, in ways that seemed to water down the bureau’s findings considerably.Sen. Ron Johnson, R-Wis., chairman of the Senate Homeland Security Committee, sent a letter to the FBI on Thursday that shows the multiple edits to Comey’s highly scrutinized statement.

In an early draft, Comey said it was “reasonably likely” that “hostile actors” gained access to then-Secretary of State Hillary Clinton’s private email account. That was changed later to say the scenario was merely “possible.”

Another edit showed language was changed to describe the actions of Clinton and her colleagues as “extremely careless” as opposed to “grossly negligent.” This is a key legal distinction.

Johnson, writing about his concerns in a letter Thursday to FBI Director Christopher Wray, said the original “could be read as a finding of criminality in Secretary Clinton’s handling of classified material.”

“This effort, seen in light of the personal animus toward then-candidate Trump by senior FBI agents leading the Clinton investigation and their apparent desire to create an ‘insurance policy’ against Mr. Trump’s election, raise profound questions about the FBI’s role and possible interference in the 2016 presidential election and the role of the same agents in Special Counsel Mueller’s investigation by President Trump,” Johnson said.

Indeed this does raise profound questions. Coupled with the text messages of lead investigator, FBI Agent Peter Strzok,who has become known as the Zelig of the FBI who mysteriously appeared at every controversial moment, expressing clear intent to prevent the election of Donald Trump, we have before us a criminal conspiracy in which the most powerful law enforcement agency on this planet conspired with one political party to defeat the candidate of the other:

The letter reveals specific edits made by senior FBI agents when Deputy Director Andrew McCabe exchanged drafts of Comey’s statement with senior FBI officials, including Peter Strzok, Strzok’s direct supervisor, E.W. “Bill” Priestap, Jonathan Moffa, and an unnamed employee from the Office of General Counsel (identified by Newsweek as DOJ Deputy General Counsel Trisha Anderson) – in what was a coordinated conspiracy among top FBI brass to decriminalize Clinton’s conduct by changing legal terms and phrases, omitting key information, and minimizing the role of the Intelligence Community in the email investigation. Doing so virtually assured that then-candidate Hillary Clinton would not be prosecuted.

Imagine what was at stake here. If the FBI had just followed the evidence where it led and drew the obvious conclusions, Hillary Clinton would have been indicted, the Democratic Party would have been irreparably shattered, with Donald Trump winning in a popular vote as well as electoral vote landslide. This, in the view of a corrupted and politicized FBI had to be prevented at all costs and the Comey memo had to be sanitized before its release:

(Excerpt) Read more at floppingaces.net

National Security Cover-Ups, Missteps, and Miscalculations

 

Family Security Matters

by JANET LEVY

 

The Muslim Brotherhood has penetrated every one of our national security agencies, including our intelligence agencies, according to retired Navy admiral James “Ace” Lyons, former commander of the U.S. Pacific fleet.  Adm. Lyons made this startling declaration Jan. 16, 2015 during a conference sponsored by the Center for Security Policy, a conservative Washington, D.C. think-tank.

In the two years since, no action has been taken to reverse this dangerous situation.  Empowerment of individuals of questionable loyalties within our intelligence community continues unabated, as does a counterfactual view of Islam and thwarting of terrorist investigations.  Our government routinely targets and cashiers productive, legitimate counter-terrorism experts and fails to label terrorist organizations as such.  U.S. intelligence failures and feckless politicization have gone on for years, rendering our protections against terrorism ineffectual and putting our country at grave risk.

Continue reading

When “Compassion” Endangers National Security

https://www.thenation.com/wp-content/uploads/2017/01/Holman_Rule_Congress_rtr.jpg

Image via thenation.com

Family Security Matters

by MICHAEL CUTLER

In spite of its well-deserved reputation for wastefulness (and other foibles), Congress does have a “recycling program,” wherein failed legislative efforts are recycled by our politicians in Washington.

The ENLIST Act (H.R. 60), currently under consideration, failed to pass in 2014 but is back again.

The term “ENLIST” is an acronym for “Encourage New Legalized Immigrants to Start Training.”

Here is the summary of this bill as it appears on the Congressional Website:

Continue reading