Wednesday, August 26, 2009

Glenn Beck's fear of Obama: Seize power overnight Rush: 'Most dangerous time in my life for freedom and liberty in this country'

By Joe Kovacs

Will President Obama "seize power overnight" in a move to consolidate White House control of the U.S. government?

That's the fear of Fox News anchor Glenn Beck who discussed the issue at length today with another broadcasting powerhouse, radio's Rush Limbaugh.

"I fear this government, this administration has so much framework already prepared, that they will seize power overnight before anybody even gives it a second thought," Beck said.

His comment came as he was analyzing the changing nature of the media since Obama's election, citing the administration's close ties with the NBC network, owned by corporate giant General Electric:

If you watch what could only be called the administration's organ – anything involved with GE or NBC – you've got [GE CEO] Jeffrey Immelt on the board of the Federal Reserve, you have him in the Oval Office consulting not only on health care, but the financial situation, and they are an organ.

If you watch MSNBC, I contend that you will see the future because they are laying the ground for a horrible event ... anything from the right, there's some awful event and I fear this government, this administration has so much framework already prepared, that they will seize power overnight before anybody even gives it a second thought.

Limbaugh responded, "I don't think they're going to be able to seize it overnight without anybody knowing about it." ....

Obama: Much worse than I had predicted

By Roger Runningen and Brian Faler

.... “While the danger of the economy immediately falling into a deep recession has receded, the American economy is still in the midst of a serious economic downturn,” the White House report said. “The long-term deficit outlook remains daunting.”

The budget shortfall for 2010 would mark the second straight year of trillion-dollar deficits. Along with the unemployment numbers, the deficit may complicate President Barack Obama’s drive for his top domestic priority, overhauling the U.S. health care system. ....


Obama: Boys from Brazil better than U.S. President blocks oil drilling at home, funds exploration abroad

The following report is excerpted from Jerome Corsi's Red Alert

A controversy developed when it was revealed the Obama administration is willing to spend billions of dollars to fund offshore drilling in Brazil while blocking U.S. development of oil and natural gas resources by continuing environmental objections to opening U.S. offshore drilling, Jerome Corsi's Red Alert reports.

Underlying the controversy was the disclosure that Obama-supporter and billionaire hedge-fund manager George Soros bought a $811 million stake in Petroleo Brasileiro SA in the second quarter, making the Brazilian state-controlled oil company his investment fund's largest holding. ....

Files prove Pentagon is profiling reporters

from Stars and Stripes

WASHINGTON — Contrary to the insistence of Pentagon officials this week that they are not rating the work of reporters covering U.S. forces in Afghanistan, Stars and Stripes has obtained documents that prove that reporters’ coverage is being graded as “positive,” “neutral” or “negative.”

Moreover, the documents — recent confidential profiles of the work of individual reporters prepared by a Pentagon contractor — indicate that the ratings are intended to help Pentagon image-makers manipulate the types of stories that reporters produce while they are embedded with U.S. troops in Afghanistan. ....

Congressional Research Service: Illegal Aliens Could Receive Benefits Under Health Care Bill

House Judiciary Committee Ranking Member Representative Lamar Smith (R-Texas) challenged President Barack Obama's radio address from the weekend where the President said that the proposed health care legislation won't cover illegal aliens. Citing a report from the Congressional Research Service that identifies several loopholes in H.R. 3200, Rep. Smith released a statement urging the inclusion of a verification mechanism into the bill. ....

To torture or not to torture

by Jim Kouri

In response to news reports that the US Attorney General Eric Holder will appoint a special prosecutor to investigate allegations of CIA operatives torturing suspects, Congressman Trent Franks (R -AZ) today released a statement on the Obama Administration's reversal of his promise not to seek retribution against CIA officials.

"The Obama Administration's decision to look into the possibility of prosecuting CIA officials who helped interrogate captured terrorists can do nothing but harm the efforts of our intelligence community. From now on, those government employees who seek to protect the American people by extracting high-value, potentially life-saving information from active terrorists will have to wonder whether they will be subject to lawsuits filed by their very own Commander-in-Chief," said Rep. Franks. ....

U.S. to monitor detainees' foreign protection

A day after it unveiled new recommendations on handling terrorism suspects, the Obama administration struggled to explain how it would be able to send detainees to countries with poor human rights records and prevent them from being tortured. ....

Taliban confirm leader's death

DERA ISMAIL KHAN, Pakistan | Pakistani Taliban commanders acknowledged Tuesday that the militants' top leader, Baitullah Mehsud, was dead, ending weeks of claims and counterclaims over his fate following a U.S. missile strike on his father-in-law's home this month. ....

Glenn Beck Closing in on Van Jones

$1,000 per day, 30 days jail for refusing swine flu shot?

(Analyst's note: What? Things will surely get interesting when the reality of this one hits home.)

A new law just passed in Massachusetts imposes fines of up to $1000 per day and up to a 30 day jail sentence for not obeying authorities during a public health emergency
. So if you are instructed to take the swine flu vaccine in Massachusetts and you refuse, you could be facing fines that will bankrupt you and a prison sentence on top of that.

The YouTube video below is of a news report about this disturbing new law. In particular, pay attention at the 1:40 mark when the anchor and reporter discuss the new penalties for not obeying the health authorities during an emergency.....

If you have not realized it yet, the controversy over swine flu vaccinations is about to get very, very real. The authorities know that a lot of people are extremely concerned about the safety of the swine flu vaccine, and they are putting the infrastructure in place to deal with those dissenters.

Let us hope that the worst case scenario with the swine flu does not take place, but the reality is that health authorities across the United States are gearing up for the biggest vaccination campaign in the nation's history. It looks like this fall could be very, very interesting.


Probe of CIA Imperils Interagency Trust


WASHINGTON -- The Justice Department's decision to investigate CIA interrogation practices increased tension between the agencies and prompted a sense of betrayal among some CIA officers, current and former officials said.

Rivalries had raged since the early days of the Central Intelligence Agency's World War II-era forerunner, the Office of Strategic Services, and the trust built in the wake of the 9/11 attacks could be shattered by the investigation, these people said.

Many CIA officers were stunned by Attorney General Eric Holder's decision to launch a probe. Some were deeply angered by what they consider a selective declassification of documents describing the acts at issue, former agency officials said Tuesday.

.... "Their view is, they policed themselves and they turned themselves in," he said. Now, "they have to fight al Qaeda and the U.S. government at the same time."

.... federal law-enforcement agent said he and his colleagues also fear the cooperation and information-sharing born of necessity after the 2001 attacks will dry up. The relationship could regress to the point when two of the hijackers were allowed to slip into the U.S. even though the CIA had spotted them at a terror summit in Malaysia in 2000, the agent said.

"We need the information-sharing to be successful to do our jobs," the law-enforcement agent said. ....


Global Insights: Russia Refines Cyber Warfare Strategies

(Analyst's note: These findings are most interesting and certainly troubling.)

by Richard Weitz

The U.S. Cyber-Consequences Unit has recently issued a report documenting how Russia supplemented its conventional war against Georgia last August with a massive, well-integrated and pre-planned information warfare campaign against Georgia's Internet structure. The techniques were so successful that the unit has restricted distribution of the full report to U.S. government and certain other Internet security professionals. Only the executive summary (pdf) has been made available to the public.

The U.S. Cyber-Consequences Unit is independent, non-profit research institute affiliated with the Fletcher School of Law and Diplomacy at Tufts University. The report's main author, John Bumgarner, directs research at the unit. He and his team conducted a year-long investigation of the Russian campaign using a variety of sources, including monitored Internet traffic, Web site caches, and debriefings of Georgian victims.

According to the report, from Aug. 7 to Aug. 16, 2008, Russian citizens and their sympathizers launched a coordinated offensive that disabled dozens of important Georgian websites, including those of the country's president and defense minister, as well as the National Bank of Georgia and major news outlets. Initially, the main targets were the Internet pages of the country's main government institutions and new media, which would have played a central role in informing the Georgian public and the international community of the Russian attack. The target list subsequently expanded to include other government and media sites as well as Georgian business, education, and financial institutions. The combined effect of these attacks was to degrade the effectiveness of Georgia's national response to the Russian attack.

The techniques used by the Russian attackers suggest they had developed a detailed campaign plan against the Georgian sites well before the conflict. The attackers did not conduct any preliminary surveying or mapping of sites, but instead immediately employed specially designed software to attack them. The graphic art used to deface one Georgian Web site was created in March 2006 but saved for use until the August 2008 campaign. The attackers also rapidly registered new domain names and established new Internet sites, further indicating they had already analyzed the target, written attack scripts, and perhaps even rehearsed the information warfare campaign in advance.

Although the fighting that broke out on Aug. 7 of last year appears to have caught the parties by surprise, Russian cyber planners were undoubtedly aware that a war between Russia and Georgia was a viable option given protracted bilateral tensions. When the fighting did begin, this core group was able to use Russian-language social networking sites and other virtual mechanisms to recruit additional hackers as well as to supply them with malicious code and other tools. For example, they posted suggested targets and means of attack on public websites that could be employed even by people with limited computer knowledge. Social networking companies such as Facebook and Twitter typically do not monitor communications on their sites unless they receive complaints from users.

The most common attack techniques employed malign modifications of publicly available commercial software designed for administrators of computer networks. For example, the attackers amplified the intensity of certain "stress tests" designed to assess the capacity of servers to handle waves of HTTP packets. They also modified one program intended to add functions to Web sites so that the affected sites would request nonexistent Internet addresses chosen at random.

The report concludes that the timing of the Russian attacks and the nature of the targets indicate that the hackers, even if civilians, probably coordinated their operations with the Russian military even if no conclusive evidence exists of such collaboration. For example, the campaign began before the media had reported the start of the Russian offensive into Georgia.

The specific people involved in a cyber attack are typically difficult to identify since the Internet makes its easy to conceal identities through the use of proxy Web addresses and other means. The groups of computers attacking the Georgian sites were typically directed to do so from a computer at another location, creating malicious "botnets." The unit's report nevertheless concludes that, while some of the hijacked computers and virtual recruiting networks were hosted in the United States and other countries, the main servers that directed the attacks throughout the campaign consisted of 10 Web sites registered in Russia and Turkey. These sites are also heavily used (and presumably controlled) by Russian organized crime groups. According to the Wall Street Journal identification and credit-card information stolen from Americans were used to register nine of these sites, while one site was established using information stolen from a French citizen. It is possible that the cyber criminals, who typically attempt to extort payments from the commercial targets they attack, were seeking to advertise their contribution to the war to gain the gratitude (and ideally protection) of Russian government and military leaders.

Interestingly, the report concludes that some central controller probably instructed the attackers to limit the damage they inflicted. The attacks aimed merely to disable the Web sites through denial-of-service and Web site defacement attacks. They did not attempt to inflict physical damage, which might have occurred if they had, for instance, attempted to instruct the target's computers to take destructive actions such as erasing key data or overriding safety mechanisms protecting power, energy, or transportation systems. Yet, the effectiveness of the attacks that did occur indicates that some of the attackers probably could have conducted such destructive attacks. Ironically, the ability of the Russian attackers to disable important Georgian institutions through cyber attacks may have spared them from being destroyed by bombs and missiles, as the United States and allies did with Iraq's and Serbia's critical infrastructure to disrupt those countries' defenses in earlier wars.

Nonetheless, the moderation might have sought to demonstrate that Russia, if provoked, could destroy much of Georgia's critical civilian infrastructure. The Russian military might have aimed to convey that point as well by, for example, bombing targets near Georgia's vital Baku-Ceyhan oil pipeline without actually striking it. By demonstrating dominance in the cyber and military domains, as well as the inability of Tbilisi's Western allies to defend Georgia, Russian strategists might have aimed to underscore Moscow's security dominance within the former Soviet space as well as deter the Georgian government, and perhaps the leaders of the other former Soviet republics, from taking future actions that could threaten Russian interests.

Russian hackers were reportedly active again earlier this month when they attacked a Tbilisi computer user who posted web entries critical of Moscow's policies towards Georgia. From Aug. 6 and 7, the one-year anniversary of the Russian-Georgia War, his Facebook, Google Blogger, LiveJournal, Twitter, and YouTube accounts experienced a massive and simultaneous denial-of-service attack apparently aimed to prevent the Georgian from posting critical blog entries to mark the anniversary. The assault was so intense, involving networks of unsuspecting third-party computers that were instructed to flood the Web sites with traffic to deny access to others, that it caused the entire Twitter network to crash.

The Georgia campaign showed that Russia's offensive information operations have improved considerably since the April-May 2007 conflict with Estonia. Russians will likely seek to strengthen their cyber campaign plans even further based on what they have learned. Cyber warriors in other countries such as China are likely to borrow techniques from the Russian campaign. Investigators have found evidence that Chinese hackers have conducted pre-attack mapping of U.S. critical infrastructure such as commercial power networks and, most disturbingly, have already deployed software programs that they could employ to disrupt the networks.

The report concludes with three insightful recommendations. First, an international organization should be established to monitor the risks of cyber wars and provide early warning before attacks occur, allowing potential victims to prepare their defenses better. Second, the report calls for a global cyber response force that can rapidly assist countries under attack. Finally, states need to conduct more frequent cyber response exercises involving key public and private sector institutions with at least some foreign participation.

Meanwhile, the United States and other potential targets have been given yet another warning about the need to bolster their cyber defenses. The European Union finally convened its first ministerial meeting devoted to cyber security of critical infrastructures in late April of this year, while the U.S. military only authorized the establishment of a dedicated cyber command in June. The new CYBERCOM is not expected to become fully operational until at least a year from now. The White House continues to experience difficulties in establishing an effective policy for coordinating the diverse federal, state, and private sector computer networks associated with America's critical national infrastructures. One lesson of the Georgia War is that U.S. and NATO defenders need to accelerate their preparedness efforts.