Hillary Clinton Says Banning Fossil Fuel Extraction on Public Lands a ‘Done Deal’

Hillary Clinton said that banning fossil fuel extraction on public lands is a ‘done deal,’ the Hill reported. Continue reading

Chicago Stock Exchange Says It’s Being Sold to Chinese-Led Group

The Chicago Stock Exchange said a Chinese investor group agreed to acquire it, giving the buyer entry into the intensely competitive U.S. equity market.

Chongqing Casin Enterprise Group has signed a definitive agreement to acquire the company, according to a statement Friday, which didn’t give financial terms. The exchange said the deal is expected to close in the second half of the year, though that will require regulatory approval. Continue reading

Chinese Defector Reveals Beijing’s Secrets

U.S. intelligence is debriefing brother of former presidential aide, translating documents

A defector from China has revealed some of the innermost secrets of the Chinese government and military, including details of its nuclear command and control system, according to American intelligence officials.

Businessman Ling Wancheng disappeared from public view in California last year shortly after his brother, Ling Jihua, a former high-ranking official in the Communist Party, was arrested in China on corruption charges.

Ling Wancheng, the defector, has been undergoing a debrief by FBI, CIA, and other intelligence officials since last fall at a secret location in the United States, said officials familiar with details of the defection who spoke on condition of anonymity. The defector is said to be a target of covert Chinese agents seeking to capture or kill him.

Among the information disclosed by Ling are details about the procedures used by Chinese leaders on the use of nuclear weapons, such as the steps taken in preparing nuclear forces for attack and release codes for nuclear arms. Continue reading

Miscalculation: Iran Gets Twice As Much In Sanctions Relief, State Department Blames Treasury Department

The White House has been claiming Iran, as part of the nuclear deal with the Obama administration, would only get access to $50 billion immediately but it turns out that number was off by a lot. Continue reading

Obama’s eye-opening order to Pentagon: Make combat weapons safer, not more lethal

Wartime U.S. presidents have taken keen personal interest in picking the most lethal gun for the military.

But in President Obama’s first foray into small-arms procurement for the armed forces, his Jan. 4 executive order on gun control directs the Pentagon to find ways to make not so much more lethal firearms, but safer ones.

His direct order has brought a few snickers among retired combatants who argue that the commander in chief is issuing his directive at a time of more pressing small-arms priorities. The military, critics say, fields a flawed personal rifle and has spent more than a decade selecting a new off-the-shelf pistol, with no winner yet. Continue reading

Exposure of US spying on Israeli drones served a pressing Russian interest

https://i2.wp.com/www.debka.com/dynmedia/photos/2016/01/30/src/IAI_drones_carrying_missiles.jpg

 

The latest batch of “top secret” documents to be leaked to the web magazine The Intercept by fugitive former NSA advisor Edward Snowden, showing that the US had spied on Israeli air force operations for more than 18 years, is as interesting for its timing as its revelations.

For three years, the magazine has published Snowdon leaks almost exclusively. This time, on Tuesday, Jan. 26, it released files exposing a joint operation by US and British intelligence agencies codenamed Anarchist. For almost two decades, Israeli air force operations, mainly by drones, were monitored and their transmission feeds intercepted from the British intelligence base in the Troodos Mountains in Cyprus, as well as the NSA base in Menwith Hill, north of Manchester, England. Continue reading

Forgetting Castro’s Crimes

https://i2.wp.com/s3.freebeacon.com/up/2016/01/FidelRaul.jpg

Fidel Castro and Raul Castro in 1959 / AP

 

Review: Rafael Rojas, ‘Fighting Over Fidel: The New York Intellectuals and the Cuban Revolution’

Between the Old Left and the New Left, between the radicalism of the 1930s and the radicalism of the 1970s, there comes the curious figure of Fidel Castro. A celebrated revolutionary thinker. The absolute ruler of Cuba—and, for a time, the man believed to have finally solved the Communist dilemma: finding a way of being Marxist without becoming Stalinist, creating a fully socialist state that would not harden into totalitarianism.

He didn’t, of course. Soon after it seized power in 1959, Castro’s revolutionary government became a socialist dictatorship, barely distinguishable from all the other Communist states of its time. But the surprising lesson of Rafael Rojas’s new book, Fighting Over Fidel, is how brief was the time, how narrow the window, that serious leftists actually believed in Castro’s exceptionalism. Continue reading

Israeli Drone Feeds Hacked by American and British Intelligence

In case you were wondering what side the United States (and Great Britain) now takes in regards to Israel and Iran, wonder no more:

 

 

AMERICAN AND BRITISH INTELLIGENCE secretly tapped into live video feeds from Israeli drones and fighter jets, monitoring military operations in Gaza, watching for a potential strike against Iran, and keeping tabs on the drone technology Israel exports around the world.

Under a classified program code-named “Anarchist,” the U.K.’s Government Communications Headquarters, or GCHQ, working with the National Security Agency, systematically targeted Israeli drones from a mountaintop on the Mediterranean island of Cyprus. GCHQ files provided by former NSA contractor Edward Snowden include a series of “Anarchist snapshots” — thumbnail images from videos recorded by drone cameras. The files also show location data mapping the flight paths of the aircraft. In essence, U.S. and British agencies stole a bird’s-eye view from the drones. Continue reading

Israeli generals said among 1,600 global targets of Iran cyber-attack

Iran launched a cyber-attack targeting Israeli army generals, human rights activists in the Persian Gulf and scientists, an Israeli cyber-security firm said Thursday.

Gil Shwed, CEO of Check Point Software Technologies, said the attack began two months ago and was directed at some 1,600 people worldwide. They received email messages aimed at sending spyware into their computers, Shwed told Israel Radio. Continue reading

Is The Cloward-Piven Strategy Being Used To Destroy America?

In the mid-sixties at the height of the “social revolution” the line between democratic benevolence and outright communism became rather blurry. The Democratic Party, which controlled the presidency and both houses of Congress, was used as the springboard by social engineers to introduce a new era of welfare initiatives enacted in the name of “defending the poor”, also known as the “Great Society Programs”. These initiatives, however, were driven by far more subversive and extreme motivations, and have been expanded on by every presidency since, Republican and Democrat alike.

At Columbia University, sociologist professors Richard Cloward and Francis Fox Piven introduced a political strategy in 1966 in an article entitled ‘The Weight Of The Poor: A Strategy To End Poverty’. This article outlined a plan that they believed would eventually lead to the total transmutation of America into a full-fledged centralized welfare state (in other words, a collectivist enclave). The spearpoint of the Cloward-Piven strategy involved nothing less than economic sabotage against the U.S.

Theoretically, according to the doctrine, a condition of overwhelming tension and strain could be engineered through the overloading of American welfare rolls, thereby smothering the entitlement program structure at the state and local level. The implosion of welfare benefits would facilitate a massive spike in poverty and desperation, creating a financial crisis that would lead to an even greater cycle of demand for a fully socialized system. This desperation would then “force” the federal government to concentrate all welfare programs under one roof, nationalize and enforce a socialist ideology, and ultimately, compact an immense level of power into the hands of a select few. Continue reading

Hackers Turn Ukrainian Infrastructure into ‘Powder Keg’

For more information on SCADAs, their vulnerabilities and exploitations, please see the SCADA tag.

An example article showing American vulnerability to SCADA attacks:

UPDATE 3: U.S. probes cyber attack on water system

 

Several attacks have already taken place against regional power plants in Ukraine, resulting in several short-term blackouts in December 2015. It was the first recorded case of power outages being caused by cyber attacks and originated from a type of malware known as BlackEnergy.

It is not clear who was behind the attacks but a military spokesperson stated last week that they were originating from Russia. Another type of malware has since been discovered by investigators looking into the December cyber attacks, although researchers say it is impossible to know how many systems are currently at risk. Continue reading

U.S. Should Prepare for ‘Higher-Intensity’ Cyber Attacks From North Korea

New report criticizes U.S. response to cyber attacks

The United States should prepare for “higher-intensity” cyber attacks from North Korea by developing stronger policy to respond to attacks, according to a new report.

Current U.S. policy is insufficient to respond to cyber attacks from North Korea and discourage future attacks, according to the report from the Center for Strategic International Studies on North Korea’s cyber operations. As a result, current policy puts the United States “in the position of being repeatedly assailed by [low-intensity] attacks without concrete mechanisms to effectively respond.” Continue reading

Chinese Military Revamps Cyber Warfare, Intelligence Forces

Changes meant to improve PLA high-tech warfighting

A recent Chinese military reorganization is increasing the danger posed by People’s Liberation Army cyber warfare and intelligence units that recently were consolidated into a new Strategic Support Force.

The announcement of the military reorganization made on Dec. 31 by the Chinese government provided few details of what has changed for three military intelligence units formerly under the now-defunct General Staff Department. Continue reading

China has cyber capability to take down U.S. power grid, warns NSA

(NaturalNews) The U.S. is vulnerable to cyber attacks from China and other countries capable of shutting down the power grid and disabling vital infrastructure, according to Admiral Michael Rogers, head of both the National Security Agency and the U.S. Cyber Command.

Cybersecurity firm Mondiant confirmed that China had hacked into U.S. utility systems and has the knowledge potential to exploit vulnerabilities and shut down or disrupt them. Rogers says this could allow Chinese hackers “to shut down very segmented, very tailored parts of our infrastructure that forestall the ability to provide that service to us as citizens.” Continue reading

Russian “clandestine funding” of EU far-right: How worried should we be?

The U.S. is launching its own probe into Moscow-funded European radical political parties and populist groups the Kremlin aims to use to undermine NATO and sanctions unity, according to Ukraine Today.

Washington is concerned that cracks in the EU could undermine NATO and international sanctions following Moscow’s annexation of Crimea. A major review is underway into what The Telegraph calls “Russian clandestine funding,” Ukraine Today reported. Continue reading