An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

YouTube’s Trusted Flagger Program, a Sham

The legal complaint is here.

No wonder Dennis Prager (Prager University) is suing YouTube for censorship.

Image result for youtube trusted flagger program photo

YouTube Trusted Flagger program

The YouTube Trusted Flagger program was developed by YouTube to help provide robust tools for government agencies and non-governmental organizations (NGOs) that are particularly effective at notifying YouTube of content that violates our Community Guidelines.

Individuals who are part of the YouTube Contributors program also frequently report videos that may violate YouTube’s Community Guidelines.

The YouTube Trusted Flagger program includes:

  • A bulk-flagging tool that allows for reporting multiple videos at one time
  • Private forum support for questions about the policy enforcement process
  • Visibility into decisions on flagged content
  • Prioritized flag reviews for increased actionability

Program eligibility

Government agencies and NGOs are eligible for participation in the YouTube Trusted Flagger program. Ideal candidates flag frequently and with a high rate of accuracy.

Before becoming deputized for participation, applicants must attend a YouTube training to learn about our Community Guidelines and enforcement processes. These trainings are led by YouTube’s Trust & Safety and Public Policy teams.

Flag review process

Videos flagged by trusted flaggers are reviewed by YouTube content moderators according to YouTube’s Community Guidelines. Content flagged by trusted flaggers is not automatically removed or subject to any differential policy treatment — the same standards apply for flags received from other users. However, because of their high degree of accuracy, flags from trusted flagger are prioritized for review by our teams.

The Trusted Flagger program exists exclusively for the reporting of possible Community Guideline violations. It is not a flow for reporting content that may violate local law. Requests based on local law can be filed through our content removal form.

Google, really?

YouTube Trusted Flaggers help Google fight terrorism online, along with better automated detection, content warnings, and counter-radicalization content

Google and YouTube are working along with Facebook, Microsoft and Twitter to help fight terrorism online.

Google has pledged a four-pronged strategy:

1. Improving automated systems that detect problematic videos.

We will now devote more engineering resources to apply our most advanced machine learning research to train new “content classifiers” to help us more quickly identify and remove extremist and terrorism-related content.

2. Expanding the Trusted Flagger program

Trusted flaggers – both individuals and organizations – flag content correctly more than 90% of the time.

We will expand this programme by adding 50 expert NGOs to the 63 organisations who are already part of the programme, and we will support them with operational grants. This allows us to benefit from the expertise of specialised organisations working on issues like hate speech, self-harm, and terrorism. We will also expand our work with counter-extremist groups to help identify content that may be being used to radicalise and recruit extremists.

3. Making inflammatory content harder to find and endorse

In future [videos that do not clearly violate policy, but contain inflammatory religious or supremecist content] will appear behind an interstitial warning and they will not be monetised, recommended or eligible for comments or user endorsements.

4. Using the “Redirect Method” for counter-radicalization efforts

… we are working with Jigsaw to implement the “Redirect Method” more broadly across Europe. This promising approach harnesses the power of targeted online advertising to reach potential Isis recruits, and redirects them towards anti-terrorist videos that can change their minds about joining. In previous deployments of this system, potential recruits have clicked through on the ads at an unusually high rate, and watched over half a million minutes of video content that debunks terrorist recruiting messages.

*** So…..they use the Southern Poverty Law Center as a trusted flagger?

The Southern Poverty Law Center is assisting YouTube in policing content on their platform, The Daily Caller has learned.

The left-wing nonprofit — which has more recently come under fire for labeling legitimate conservative organizations as “hate groups” — is one of the more than 100 nongovernment organizations (NGOs) and government agencies in YouTube’s “Trusted Flaggers” program, a source with knowledge of the arrangement told TheDC.

The SPLC and other program members help police YouTube for extremist content, ranging from so-called hate speech to terrorist recruiting videos.

All of the groups in the program have confidentiality agreements, a spokesperson for Google, YouTube’s parent company, previously told TheDC. A handful of YouTube’s “Trusted Flaggers,” including the Anti-Defamation League and No Hate Speech — a European organization focused on combatting intolerance — have gone public with their participation in the program. The vast majority of the groups in the program have remained hidden behind their confidentiality agreements.

The SPLC’s close involvement in policing content on YouTube is likely to cause consternation among conservatives who worry that they may not be treated fairly. The left-wing group has consistently labeled pedestrian conservative organizations as “hate groups” and has been directly tied to violence against conservatives in the past. Floyd Lee Corkins, who opened fire at the Family Research Center in 2012, said he chose the FRC for his act of violence because the SPLC listed them as a “hate group.”

It’s unclear when the SPLC joined YouTube’s “Trusted Flaggers” program. The program goes back to 2012 but exploded in size in recent years amid a Google push to increase regulation of the content on its platforms, which followed pressure from advertisers. Fifty of the 113 program members joined in 2017 as YouTube stepped up its content policing, YouTube public policy director Juniper Downs told a Senate committee in January.

Downs said the third-party groups work closely with YouTube’s employees to crack down on extremist content in two ways, both of which a Google spokesperson previously confirmed to TheDC.

First, the flaggers are equipped with digital tools allowing them to mass flag content for review by YouTube personnel. Second, the partner groups act as guides to YouTube’s content monitors and engineers designing the algorithms policing the video platform but may lack the expertise needed to tackle a given subject.

“We work with over 100 organizations as part of our Trusted Flagger program and we value the expertise these organizations bring to flagging content for review. All trusted flaggers attend a YouTube training to learn about our policies and enforcement processes. Videos flagged by trusted flaggers are reviewed by YouTube content moderators according to YouTube’s Community Guidelines. Content flagged by trusted flaggers is not automatically removed or subject to any differential policies than content flagged from other users,” said a YouTube spokesperson, who would not specifically comment on the SPLC’s participation in the program.

The SPLC did not return multiple voicemails and emails seeking comment.

The overwhelming majority of the content policing on Google and YouTube is carried out by algorithms. The algorithms make for an easy rebuttal against charges of political bias: it’s not us, it’s the algorithm. But actual people with actual biases write, test and monitor the algorithms.

As noted above, Google’s anonymous outside partners (such as the SPLC) work closely with the internal experts designing the algorithms. This close collaboration has upsides, Google’s representatives have said, such as in combatting terrorist propaganda on the platform.

But it also provides little transparency, forcing users to take Google’s word that they’re being treated fairly.

The SPLC has faced criticism for its cavalier definitions of “hate group” and “extremist.” The organization stoked controversy in 2015 by labeling Dr. Ben Carson, now the Secretary of Housing and Urban Development (HUD), an anti-gay “extremist.” After a backlash, the SPLC reversed its ruling and apologized to Carson.

The organization  faced a similarly intense backlash in 2016 for labeling Maajid Nawaz, a respected counter-extremism activist, an “anti-Muslim extremist.”(RELATED: SPLC Says Army Bases Are Confederate Monuments That Need To Come Down)

The Washington Examiner’s Emily Jashinsky noted last year that “the SPLC’s claim to objectivity is nothing less than fraudulent, a reality that informed observers of its practices from both the Left and Right accept.”

“The routine of debunking their supposedly objective classifications occurs like clockwork each time a major outlet makes the mistake of turning to them when reporting on the many conservative thinkers and nonprofits the group absurdly designates as hateful.”

The SPLC has faced tough criticisms not just from conservatives but from the mainstream press as well.

“At a time when the line between ‘hate group’ and mainstream politics is getting thinner and the need for productive civil discourse is growing more serious, fanning liberal fears, while a great opportunity for the SPLC, might be a problem for the nation,” Politico Magazine’s Ben Schreckinger wrote last year.

Bloomberg columnist Megan McArdle similarly noted last year that the SPLC commonly lumps in principled conservatives alongside actual racists and extremists and warned of the possibility that tech companies could rely on the SPLC’s misleading definitions.

“Given the increasing tendency of powerful tech companies to flex their muscle against hate groups,” she wrote, “we may see more and more institutions unwittingly turned into critics or censors, not just of Nazi propaganda, but also of fairly mainstream ideas.”

The 25 Most Powerful Militaries in the World

Primer:

One of the most senior generals in the U.S. suggested America faces losing influence in the world because its partners are looking to buy military equipment and training from its rivals, particularly Russia and China, who offer cheaper weapons and can supply them faster.

In a statement to the House Armed Services Committee, General Joseph L. Votel, commander of the U.S. Central Command (CENTCOM), warned that “some of our partners are seeking alternate sources of military equipment from near-peer competitors like Russia and China”.

Votel said the U.S. increasingly relies on “interoperability” in its military operations—using its allies to “accomplish common objectives”—and so its programs to supply partners with the equipment and training they need are vital in maintaining this cooperation.

He made reference to U.S. government-funded Building Partner Capacity (BPC) programs, which “encompass security cooperation and security assistance activities,” and Foreign Military Sales (FMS).

“However, due to political considerations, cost, or delivery speed, some of our partners are seeking alternate sources of military equipment from near-peer competitors like Russia and China,” Votel said. “When our partners go elsewhere, it reduces our interoperability and challenges our ability to incorporate their contributions into theater efforts.”

In 2017, the U.S. State Department spent $5.7bn on Foreign Military Financing, according to a data guide published by the Security Assistance Monitor group, around the average spend in recent years. That military aid went to 53 countries, including $150m for Iraq, $350m for Jordan, and $3.1bn for Israel. More here.

***

Ranking from Business Insider

25. Algeria

25. Algeria
Algerian soldiers at the Tiguentourine Gas Plant in In Amenas, 994 miles southeast of Algiers, January 31, 2013.
REUTERS/Louafi Larbi

Power Index rating: 0.4366

Total population: 40,263,711

Total military personnel: 792,350

Total aircraft strength: 502

Fighter aircraft: 89

Combat tanks: 2,405

Total naval assets: 85

Defense budget: $10.6 billion

24. Saudi Arabia

24. Saudi Arabia
Saudi troops stand attention at their base in Yemen’s southern port city of Aden September 28, 2015.
Reuters

Power Index rating: 0.4302

Total population: 28,160,273

Total military personnel: 256,000

Total aircraft strength: 790

Fighter aircraft: 177

Combat tanks: 1,142

Total naval assets: 55

Defense budget: $56.7 billion

23. North Korea

23. North Korea REUTERS/KCNA

Power Index rating: 0.4218

Total population: 25,115,311

Total military personnel: 6,445,000

Total aircraft strength: 944

Fighter aircraft: 458

Combat tanks: 5,025

Total naval assets: 967

Defense budget: $7.5 billion

22. Australia

22. Australia
An Australian soldier with 5th Battalion, Royal Australian Regiment makes his way up the beach after landing in amphibious assault vehicle from the USS Peleliu during an assault exercise at Marine Corps Base Hawaii as part of multinational military exercise RIMPAC, in Kaneohe, Hawaii, July 29, 2014
Hugh Gentry/REUTERS

Power Index rating: 0.4072

Total population: 22,992,654

Total military personnel: 81,000

Total aircraft strength: 465

Fighter aircraft: 78

Combat tanks: 59

Total naval assets: 47 (two aircraft carriers)

Defense budget: $24.1 billion

21. Iran

21. Iran
A soldier aboard Iranian Navy destroyer Shahid Naqdi at Port Sudan at the Red Sea State, October 31, 2012.
Reuters

Power Index rating: 0.3933

Total population: 82,801,633

Total military personnel: 934,000

Total aircraft strength: 477

Fighter aircraft: 137

Combat tanks: 1,616

Total naval assets: 398

Defense budget: $6.3 billion

20. Thailand

20. Thailand
Thai marines participate in an amphibious assault exercise as part of the Cobra Gold 2017 joint military exercise with the US at a military base in Chonburi province, Thailand, February 16, 2017.
REUTERS/Athit Perawongmetha

Power Index rating: 0.3892

Total population: 68,200,824

Total military personnel: 627,425

Total aircraft strength: 555

Fighter aircraft: 76

Combat tanks: 737

Total naval assets: 81 (one aircraft carrier)

Defense budget: $5.4 billion

19. Poland

19. Poland
Members of Poland’s 1st Mechanized Battalion of the 7th Coastal Defense Brigade take part in a military exercise with the US 1st Brigade Combat Team, 1st Cavalry Division near Drawsko-Pomorskie, November 13, 2014.
Kacper Pempel/Reuters

Power Index rating: 0.3831

Total population: 38,523,261

Total military personnel: 184,650

Total aircraft strength: 465

Fighter aircraft: 99

Combat tanks: 1,065

Total naval assets: 83

Defense budget: $9.4 billion

18. Taiwan

18. Taiwan
Taiwanese submarines at a navy base in Kaohsiung, Taiwan, March 21, 2017.
Reuters

Power Index rating: 0.3765

Total population: 23,464,787

Total military personnel: 1,932,500

Total aircraft strength: 850

Fighter aircraft: 286

Combat tanks: 2,005

Total naval assets: 87

Defense budget: $10.7 billion

17. Brazil

17. Brazil
Brazilian navy personnel patrol in an armored vehicle during an operation against drug dealers in Mangueira slum in Rio de Janeiro, June 19, 2011.
REUTERS/Ricardo Moraes

Power Index rating: 0.3654

Total population: 205,823,665

Total military personnel: 1,987,000

Total aircraft strength: 697

Fighter aircraft: 43

Combat tanks: 469

Total naval assets: 110

Defense budget: $24.5 billion

16. Vietnam

16. Vietnam
Vietnamese soldiers march in a parade marking the 70th National Day at Ba Dinh Square in Hanoi, Vietnam, September 2, 2015.
REUTERS/Kham

Power Index rating: 0.3587

Total population: 95,261,021

Total military personnel: 5,488,500

Total aircraft strength: 278

Fighter aircraft: 76

Combat 1,545

Total naval assets: 65

Defense budget: $3.4 billion

15. Israel

15. Israel
Israeli soldiers secure the Israel-Lebanon border, January 28, 2015.
Ariel Schalit/AP

Power Index rating: 0.3476

Total population: 8,174,527

Total military personnel: 718,250

Total aircraft strength: 652

Fighter aircraft: 243

Combat tanks: 2,620

Total naval assets: 65

Defense budget: $15.5 billion

14. Indonesia

14. Indonesia
Indonesian soldiers arrive at Talang Betutu airport in Palembang to reinforce firefighter teams in south Sumatra province, September 10, 2015
Beawiharta Beawiharta/REUTERS

Power Index rating: 0.3347

Total population: 258,316,051

Total military personnel: 975,750

Total aircraft strength: 441

Fighter aircraft: 39

Combat tanks: 418

Total naval assets: 221

Defense budget: $6.9 billion

13. Pakistan

13. Pakistan
A Pakistani Ranger gestures during a daily parade at the Pakistan-India joint checkpoint at Wagah border, on the outskirts of Lahore, October 23, 2011.
Mohsin Raza/Reuters

Power Index rating: 0.3287

Total population: 201,995,540

Total military personnel: 919,000

Total aircraft strength: 951

Fighter aircraft: 301

Combat tanks: 2,924

Total naval assets: 197

Defense budget: $7 billion

12. South Korea

12. South Korea
A South Korean army K1A1 battle tank fires during South Korea-US joint military live-fire drills at Seungjin Fire Training Field in Pocheon, South Korea, near the border with North Korea, August 28, 2015.
AP

Power Index rating: 0.2741

Total population: 50,924,172

Total military personnel: 5,829,750

Total aircraft strength: 1,477

Fighter aircraft: 406

Combat tanks: 2,654

Total naval assets: 166 (one aircraft carrier)

Defense budget: $43.8 billion

11. Italy

11. Italy
An Italian soldier, part the UN Interim Force in Lebanon (UNIFL), patrols the Lebanese coast from a helicopter as the Italian aircraft-carrying cruiser Garibaldi patrols near Beirut, Lebanon, October 1, 2006.
REUTERS/Fadi Ghalioum

Power Index rating: 0.2694

Total population: 62,007,540

Total military personnel: 267,500

Total aircraft strength: 822

Fighter aircraft: 79

Combat tanks: 200

Total naval assets: 143 (two aircraft carriers)

Defense budget: $34 billion

10. Egypt

10. Egypt
Egyptian military police stand guard at the Almaza military airport where the bodies of soldiers who died in attacks in north Sinai were being turned over to relatives for burial, in Cairo, Egypt, January 30, 2015.
Associated Press

Power Index rating: 0.2676

Total population: 94,666,993

Total military personnel: 1,329,250

Total aircraft strength: 1,132

Fighter aircraft: 337

Combat tanks: 4,110

Total naval assets: 319 (two aircraft carriers)

Defense budget: $4.4 billion

9. Germany

9. Germany
German Bundeswehr soldiers fire mortars during the Joint Air Warfare Tactical Exercise 2014 at an army training area in Bergen, May 20, 2014.
REUTERS/Fabrizio Bensch

Power Index rating: 0.2609

Total population: 80,722,792

Total military personnel: 210,000

Total aircraft strength: 698

Fighter aircraft: 92

Combat tanks: 543

Total naval assets: 81

Defense budget: $39.2 billion

8. Turkey

8. Turkey
Turkish army tanks and military personal are stationed in Karkamis on the Turkish-Syrian border in the southeastern Gaziantep province, Turkey, August 25, 2016
Umit Bektas/Reuters

Power Index rating: 0.2491

Total population: 80,274,604

Total military personnel: 743,415

Total aircraft strength: 1,018

Fighter aircraft: 207

Combat tanks: 2,445

Total naval assets: 194

Defense budget: $8.2 billion

7. Japan

7. Japan
Japanese Ground Self-Defense Force tanks fire during an annual training session near Mount Fuji at Higashifuji training field in Gotemba, west of Tokyo, August 19, 2014.
Yuya Shino/REUTERS

Power Index rating: 0.2137

Total population: 126,702,133

Total military personnel: 311,875

Total aircraft strength: 1,594

Fighter aircraft: 288

Combat tanks: 700

Total naval assets: 131 (four aircraft carriers)

Defense budget: $43.8 billion

6. United Kingdom

6. United Kingdom
A British Parachute Regiment soldier prepares to load a helicopter during a simulated medical evacuation in an exercise at the Hohenfels Training Area, in Hohenfels, Germany, June 17, 2016.
Sgt. Seth Plagenza/US Army

Power Index rating: 0.2131

Total population: 64,430,428

Total military personnel: 232,675

Total aircraft strength: 856

Fighter aircraft: 88

Combat tanks 249

Total naval assets: 76 (two aircraft carriers)

Defense budget: $45.7 billion

5. France

5. France
Tanks drive down the Champs Elysees avenue during the Bastille Day parade in Paris, Friday, July 14, 2017.
Associated Press

Power Index rating: 0.1914

Total population: 66,836,154

Total military personnel: 387,635

Total aicraft strength: 1,305

Fighter aircraft 296

Combat tanks: 406

Total naval assets: 118 (four aircraft carriers)

Defense budget: $35 billion

4. India

4. India
Indian soldiers, followed by Bhishma tank, the locally assembled version of the T-90 S tank, and vehicle-mounted Brahmos missiles in a Republic Day parade in front of the presidential palace in New Delhi, India, January 23, 2009.
AP

Power Index rating: 0.1593

Total population: 1,266,883,598

Total military personnel: 4,207,250

Total aircraft strength: 2,102

Fighter aircraft: 676

Combat tanks: 4,426

Total naval assets: 295 (three aircraft carriers)

Defense budget: $51 billion

3. China

3. China
Soldiers from a special unit of the People’s Armed Police in Xinjiang at a training session in Kashgar, Xinjiang Uighur Autonomous Region, China.
Reuters/Stringer

Power Index rating: 0.0945

Total population: 1,373,541,278

Total military personnel: 3,712,500

Total aircraft strength: 2,955

Fighter aircraft: 1,271

Combat tanks: 6,457

Total naval assets: 714 (one aircraft carrier)

Defense budget: $161.7 billion

2. Russia

2. Russia
Russian President Vladimir Putin inspects the Vice-Admiral Kulakov anti-submarine-warfare ship in Novorossiysk, September 23, 2014.
REUTERS/Mikhail Klimentyev/RIA Novosti/Kremlin

Power Index rating: 0.0929

Total population: 142,355,415

Total military personnel: 3,371,027

Total aircraft strength: 3,794

Fighter aircraft: 806

Combat tanks: 20,216

Total naval assets: 352 (one aircraft carrier)

Defense budget: $44.6 billion

1. United States

1. United States
US Marines with Combat Logistics Detachment 1, Combat Logistics Battalion 13, 1st Marine Logistics Group, practice “combat gliding” during Integrated Training Exercise 2-15 at Camp Wilson on Twentynine Palms, California, January 31, 2015.
US Marine Corps photo by Lance Cpl. Kathryn Howard/Released

Power Index rating: 0.0857

Total population: 323,995,528

Total military personnel: 2,363,675

Total aircraft: 13,762

Fighter aircraft: 2,296

Combat tanks: 5,884

Total naval assets: 415 (19 aircraft carriers)

Defense budget: $587.8 billion

Obama, McDonough Lied by Omission: 2016 Election 7 States

Image result for dhs voting

photo

DHS disputes the NBC reporting with the following:

Jeanette Manfra, National Protection and Programs Directorate (NPPD) Assistant Secretary for the Office of Cybersecurity and Communications, released the following statement regarding the recent NBC news coverage on the Department of Homeland Security’s efforts to combat election hacking.

“Recent NBC reporting has misrepresented facts and confused the public with regard to Department of Homeland Security and state and local government efforts to combat election hacking. First off, let me be clear: we have no evidence – old or new – that any votes in the 2016 elections were manipulated by Russian hackers. NBC News continues to falsely report my recent comments on attempted election hacking – which clearly mirror my testimony before the Senate Intelligence Committee last summer – as some kind of “breaking news,” incorrectly claiming a shift in the administration’s position on cyber threats. As I said eight months ago, a number of states were the target of Russian government cyber actors seeking vulnerabilities and access to U.S. election infrastructure. In the majority of cases, only preparatory activity like scanning was observed, while in a small number of cases, actors were able to access the system but we have no evidence votes were changed or otherwise impacted.

“NBC’s irresponsible reporting, which is being roundly criticized elsewhere in the media and by security experts alike, undermines the ability of the Department of Homeland Security, our partners at the Election Assistance Commission, and state and local officials across the nation to do our incredibly important jobs. While we’ll continue our part to educate NBC and others on the threat, more importantly, the Department of Homeland Security and our state and local partners will continue our mission to secure the nation’s election systems.

“To our state and local partners in the election community: there’s no question we’re making real and meaningful progress together. States will do their part in how they responsibly manage and implement secure voting processes. For our part, we’re going to continue to support with risk and vulnerability assessments, offer cyber hygiene scans, provide real-time threat intel feeds, issue security clearances to state officials, partner on incident response planning, and deliver cybersecurity training. The list goes on of how we’re leaning forward and helping our partners in the election community. We will not stop, and will stand by our partners to protect our nation’s election infrastructure and ensure that all Americans can have confidence in our democratic elections.”

U.S. intel: Russia compromised seven states prior to 2016 election

The U.S. intelligence community developed substantial evidence that state websites or voter registration systems in seven states were compromised by Russian-backed covert operatives prior to the 2016 election — but never told the states involved, according to multiple U.S. officials.

Top-secret intelligence requested by President Barack Obama in his last weeks in office identified seven states where analysts — synthesizing months of work — had reason to believe Russian operatives had compromised state websites or databases.

Three senior intelligence officials told NBC News that the intelligence community believed the states as of January 2017 were Alaska, Arizona, California, Florida, Illinois, Texas and Wisconsin.

The officials say systems in the seven states were compromised in a variety of ways, with some breaches more serious than others, from entry into state websites to penetration of actual voter registration databases.

While officials in Washington informed several of those states in the run-up to the election that foreign entities were probing their systems, none were told the Russian government was behind it, state officials told NBC News.

All state and federal officials who spoke to NBC News agree that no votes were changed and no voters were taken off the rolls.

After NBC’s report on the compromised states aired Tuesday night, Department of Homeland Security (DHS) Acting Press Secretary Tyler Houlton challenged its accuracy in a series of tweets. “NBC’s reporting tonight on the 2016 elections is not accurate and is actively undermining efforts of the Department of Homeland Security to work in close partnership with state and local governments to protect the nation’s elections systems from foreign actors,” wrote Houlton.

“As we have consistently said, DHS has shared information with affected states in a timely manner and we will continue to do so. We have no intelligence — new or old — that corroborates NBC’s reporting that state systems in seven states were compromised by Russian government actors. We believe tonight’s story to be factually inaccurate and misleading.”

On Wednesday morning, however, Michael Daniel, the top White House cybersecurity official at the end of the Obama administration, told NBC News that the government’s assessment when he left the White House in January 2017 was that networks in seven states were compromised. He said he could not account for whether that assessment had changed in the past year.

Daniel, who is now president of the Cyber Threat Alliance, an industry group, said it was the intention of the Obama administration to inform those states, “but clearly it didn’t happen the way that we wanted it to.”

He said he could not name the states because some of the assessment was based on classified information.

“This continued debate about whether or not the states were notified is actually distracting from the larger point, which is that we need to build the relationship between the federal government and state governments in the electoral area to improve cybersecurity,” he said.

“It is also easy to get lost in the cybersecurity industry’s ability to parse words, and the differing definitions of malicious cyber activity. But between what the states themselves detected and what the federal government detected through law enforcement and intelligence, it clearly showed a really broadbased Russian campaign to probe and figure out how they could gain access to different components of our electoral systems.”

According to classified intelligence documents, the intelligence community defines compromised as actual “entry” into election websites, voter registration systems and voter look-up systems.

NBC News reached out to all seven states that were compromised, as well as 14 additional states that DHS says were probed during the 2016 election.

To this day, six of the seven states deny they were breached, based on their own cyber investigations. It’s a discrepancy that underscores how unprepared some experts think America is for the next wave of Russian interference that intelligence officials say is coming.

Eight months after the assessment, in September 2017, the Trump administration’s DHS finally contacted election officials in all 50 states to tell them whether or not their systems had been targeted. It told 21 states they had been targeted, and U.S. officials acknowledged that some of those attempts had been successful.

“I think the Obama administration should have been doing much more to push back against the Russians across the board,” said Juan Zarate, an NBC News analyst who was deputy national security adviser for combating terrorism under President George W. Bush. “I think the U.S. was very meek and mild in how we responded to Russian aggression.”

Denis McDonough, who was Obama’s last chief of staff, strongly disagrees, arguing the administration acted to thwart the Russians before and after the election. Obama administration spokespeople also say they transmitted sensitive intelligence regarding state compromises to congressional leaders.

“The administration took a series of steps to push back against the Russians to include far-ranging sanctions, diplomatic steps to push people associated with the Russian effort out of this country and also warning our friends and allies,” he said.

The Trump DHS, like under the Obama administration, has declined to share the intelligence assessment of which states were actually compromised, according to state election officials.

This month, in an exclusive interview with NBC News, Jeanette Manfra, the current head of cybersecurity at DHS, said that “an exceptionally small number” of those 21 states “were actually successfully penetrated.” But Manfra declined to answer questions about the classified intelligence assessment, or to say specifically how many states had been penetrated.

Top election officials from all 50 states met in Washington this month for a National Association of Secretaries of State conference and received temporary security clearances for a classified threat briefing from intelligence officials. According to two officials present, one from the intelligence community and the other a state official, the actual intelligence on state compromises was not shared.

While numerous state election officials told NBC News that the Department of Homeland Security has been stepping up communications with them, many say they’re worried they are still not getting enough information from Washington.

Illinois itself had detected a “malicious cyberattack” on its voter registration system in the summer of 2016 and reported it to DHS, saying its voter rolls had been accessed but nothing had been altered. It is the only state to acknowledge actual compromise.

The other six states from the January 2017 assessment, however, say that when DHS told them last September that their systems had been targeted, it still did not tell them that their systems had been compromised. All six also say that based on their own cyber investigations, they believe their election systems were never compromised.

Three states said publicly in September that while some state websites were affected, none were directly related to voting; specifically, Texas, Wisconsin and California say some sites were “scanned.” But a former senior intelligence official told NBC News that these types of probes can also be serious, either as gateways to other networks or as reconnoitering for future attacks.

Fears of a repeat in 2018

Nearly 16 months after the presidential election, and more than eight months before the critical midterms, many state and federal officials are convinced the Russians will be back. They’re concerned that 2016 was laying the groundwork for a possible future attack.

“We have an extreme sense of urgency on insuring security of the 2018 elections, because you don’t get a chance to do it over,” said Alex Padilla, California’s secretary of state, who said there was no evidence of a successful hack in California.

Several state election officials, including Padilla, told NBC News they think they should have been told that U.S. intelligence agencies believed they’d been breached whether or not that turned out to be true.

“It is hugely imperative that intelligence be shared with state elections officials immediately in order to protect our election infrastructure and the integrity of election results,” Padilla said.

Reluctance to share the information may be due, in part, to the classification of the intelligence itself. Multiple intelligence officials told NBC News that determining the Russian government was behind the hacks depended on “exceptionally sensitive sources and methods” including human spies and eavesdropping on Russian communications.

No state election official at the time had a security clearance sufficient to permit access to such sensitive information, according to DHS.

“Look, whether or not state elections officials had the proper clearance has unfortunately been an excuse in my opinion, a bureaucratic response for why information or intelligence hasn’t been more quickly shared with state elections officials,” Padilla said.

“We’ve got to fix that right away, because it does us no good, [when somebody is] sitting in Washington, D.C., with a bit of information about a significant cyberthreat and elections officials and locals are completely unaware. That doesn’t help anybody and that needs to be addressed,” Padilla said.

Zarate said that he thought “too much of this has happened behind the veil of the government,” and that “much more has to be discussed openly with the public about what we know of the kinds of attacks that are happening, who may be behind them, and how we defend ourselves against [them].”

A spokesperson for Florida’s secretary of state, Mark Ard, said the state was informed by DHS in September 2017 that Florida had been targeted by hackers in 2016. “This attempt was not in any way successful and Florida’s online elections databases and voting systems remained secure,” Ard said.

Texas Secretary of State Rolando Pablos said in a statement that his agency had not seen any evidence that any voting or voting registration systems in Texas were compromised before the 2016 elections.

The public information officer for the Wisconsin Elections Commission said the commission has never detected a successful hack on its system, “nor has it ever been notified of one by the Department of Homeland Security or any other state or federal agency.”

A spokesperson for the Arizona secretary of state, Matt Roberts, said the state had still not been informed of a successful hack, and had seen no evidence of one. Roberts said the state had not been told that “ANY Arizona voting system has been compromised, nor do we have any reason to believe any votes were manipulated or changed. No evidence, no report, no nothing.”

Alaska did not respond to repeated requests for comment, but has previously denied that any breach occurred.

Bradley Moss, a lawyer specializing in national security, tried to lift the veil and find out what U.S. intelligence knew about the Russian attempts to compromise the voter system. He sued for disclosure of government files and won last week, receiving 118 top-secret pages from the intelligence community. The pages referred to “compromises” and other breaches but the pages were almost completely blacked out for security reasons.

Said Moss: “The spreadsheets show that there were documented breaches of election networks. That there were documented, numerous documented instances of attempted breaches of state election networks, and that there was a widespread concern among several agencies in the intelligence committee about the sanctity and the integrity of these election networks.”

In a statement, DHS said it has been working with state and local officials for more than a year on the issue.

“This relationship is built on trust and transparency, and we have prioritized sharing threat and mitigation information with election officials in a timely manner to help them protect their systems,” DHS acting press secretary Tyler Houlton said.

“In addition to granting state officials clearances to give them access to classified information, we work to declassify information rapidly and have the ability to grant one-day waivers when necessary to provide state officials with information they may need to protect their systems.

“We are committed to this work and will continue to stand by our partners to protect our nation’s election infrastructure and ensure that all Americans can have the confidence that their vote counts — and is counted correctly.”

A statement from the Office of the Director of National Intelligence said only: “The declassified Intelligence Community Assessment of January 6, 2017, found that Russian actors did not compromise vote tallying systems. That assessment has not changed.”

Next steps

At a Senate hearing on Tuesday, the National Security Agency director, Adm. Mike Rogers, acknowledged that the White House has not directed him to try to stop Moscow from meddling in U.S. elections.

Sen. Claire McCaskill, D-Mo., said that was “outrageous” and asked whether the U.S. was in a position to stop Russia from “doing this again.”

“We’re taking steps but we’re probably not doing enough,” Rogers said.

“I want to know, why the hell not?” McCaskill shot back. “What’s it going to take?”

While the FBI and the Department of Homeland Security say they are taking steps to shore up cyberdefenses, FBI Director Christopher Wray told Congress this month that the instructions did not come from the top.

When Sen. Jack Reed, D-R.I., asked Wray if the president had directed him or the bureau to take “specific actions to confront and blunt” ongoing Russian activities, Wray said, “We’re taking a lot of specific efforts to blunt Russian efforts.”

Reed then asked, “Specifically directed by the president?” Wray answered, “Not as specifically directed by the president.”

The White House on Tuesday pushed back on any suggestion they’re not doing enough, saying President Trump is “looking at a number of different ways of making sure that Russia doesn’t meddle in our elections.”

For the future, Zarate suggests taking a lesson from the past.

“After 9/11, the walls between law enforcement and intelligence sources had to be broken down in order to connect the dots,” Zarate said. “There has to be a whole-of-government and whole-of-nation approach to dealing with what is an assault on American democracy.”

Cyber: ‘Our adversaries have grown more emboldened’

Primer:

Russia hasn’t been sufficiently penalized for its meddling in the 2016 U.S. elections and that has emboldened Moscow to continue interfering in American elections, Adm. Michael Rogers, Commander of the U.S. Cyber Command, told the Senate Armed Services Committee on Tuesday.

“They haven’t paid a price sufficient to change their behavior,” Rogers said under questioning by Sen. Richard Blumenthal, D-Conn. Although the United States has taken some actions, including imposing additional sanctions and Special Counsel Robert S. Mueller III has indicted more than a dozen Russians for their role in the interference, “it hasn’t changed the calculus,” Rogers said, adding that “it hasn’t generated the change in behavior that we all know we need.”

In another exchange with Sen. Elizabeth Warren, D-Mass., Rogers said that Russian President Vladimir Putin has probably come to the conclusion that “that there’s little price to pay here so I can continue the activity” of interfering in the U.S. election system. More here.

*** In context however, where is Senator(s) Warren and Blumenthal’s proposed legislation on sanctions or punishment toward Russia for cyber and active measures interference? It was political posturing by Warren and Blumenthal when they can introduce multi-faceted legislation as Russia, China and North Korea continue to attack the United States via layered cyber operations including espionage.

Meanwhile…. Image result for admiral rogers nsa photo

Although competitors such as China and Russia remain the greatest threat to U.S. security, rogue regimes such as Iran and North Korea have increased in capabilities and have begun using aggressive methods to conduct malicious cyberspace activities, the military’s top cyber officer told Congress today.

Navy Adm. Michael S. Rogers, director of the National Security Agency, commander of U.S. Cyber Command and chief of the Central Security Service, testified at a Senate Armed Services Committee hearing.

“Our adversaries have grown more emboldened, conducting increasingly aggressive activities to extend their influence without fear of significant consequence,” Rogers said. “We must change our approaches and responses here if we are to change this dynamic.”

But as the cyber domain has evolved, Rogers told the senators, Cybercom’s three major mission areas endure: protecting the Department of Defense Information Network; enabling other joint force commanders by delivering effects in and through cyberspace; and defending the nation against cyber threats through support to the Department of Homeland Security and others when directed to do so by the president or secretary of defense.

Cybercom Milestones

Rogers highlighted milestones in Cybercom’s growth.

Joint Force Headquarters DODIN, the subordinate headquarters responsible for securing, operating and defending the Defense Department’s complex information technology infrastructure, has achieved full operational capability, he said.

Joint Task Force Ares, created to lead the fight in cyber against the Islamic State of Iraq and Syria, has successfully integrated cyberspace operations into broader military campaigns, has achieved some “excellent results,” and will continue to pursue ISIS in support of the nation’s objectives, the admiral told the Senate panel.

Cybercom also has significantly enhanced training in cyber operation platforms to prepare the battlespace against key adversaries, he said.

Milestones expected to be achieved this year include Cyber Command’s elevation to a combatant command responsible for providing mission-ready cyberspace operations forces to other combatant commanders, Rogers said.

New Facility

In addition, the admiral said, Cybercom will be moving into a state-of-the-art integrated cyber center and joint operations facility at Fort Meade, Maryland, enhancing the coordination and planning of operations against cyber threats.

“Without cyberspace superiority in today’s battlefield, risk to mission increases across all domains and endangers our security,” Rogers said.

Cybercom’s focus on innovation and rapid tech development has extended all the way to small businesses and working with the private sector while maintaining cybersecurity, Rogers told the committee.

“We intend in the coming year to create an unclassified collaboration venue where businesses and academia can help us tackle tough problems without needing to jump over clearance hurdles, for example, which for many are very difficult barriers,” Rogers explained.

After serving more than four years as a commander of Cybercom and after nearly 37 years of service as a naval officer, Rogers is set to retire this spring.

“I will do all I can during the intervening period to ensure the mission continues, that our men and women remain ever motivated, and that we have a smooth transition,” he said.

N Korea Linked to Syrian Chemical Weapons

While there has been some chatter that the United States would consider talks with North Korea, that likelihood appears rather dim.

Ambassador Joseph Yun, the special representative for North Korea Policy, is retiring this week after more than 30 years in the Foreign Service.

Yun is yet another member of the Senior Foreign Service who is leaving while the department is still under a hiring freeze and many top roles have not been filled.

There has been growing frustration among the diplomatic ranks over the Trump administration’s handling of foreign policy and Secretary of State Rex Tillerson’s “redesign” plan of the department. Spokesperson Heather Nauert said in a statement Yun was retiring for “personal reasons and the Secretary has reluctantly accepted his decision and wished him well.” More here.

Meanwhile….as more sanctions have been applied to North Korea, the Trump administration’s biggest national security challenge, the U.S. Treasury sanctioned one person, 27 companies and 28 ships, according to a statement on the U.S. Treasury Department’s website.

The United States also proposed a list of entities to be blacklisted under separate U.N. sanctions, a move “aimed at shutting down North Korea’s illicit maritime smuggling activities to obtain oil and sell coal.”

 photo

UNITED NATIONS — North Korea has been shipping supplies to the Syrian government that could be used in the production of chemical weapons, United Nations experts contend.

The evidence of a North Korean connection comes as the United States and other countries have accused the Syrian government of using chemical weapons on civilians, including recent attacks on civilians in the Damascus suburb of eastern Ghouta using what appears to have been chlorine gas.

The supplies from North Korea include acid-resistant tiles, valves and thermometers, according to a report by United Nations investigators. North Korean missile technicians have also been spotted working at known chemical weapons and missile facilities inside Syria, according to the report, which was written by a panel of experts who looked at North Korea’s compliance with United Nations sanctions.

The report highlights the potential danger posed by any such trade between Syria and North Korea, which could allow Syria to maintain its chemical weapons while also providing North Korea with cash for its nuclear and missile programs.

The possible chemical weapons components were part of at least 40 previously unreported shipments by North Korea to Syria between 2012 and 2017 of prohibited ballistic missile parts and materials that could be used for both military and civilian purposes, according to the report, which has not been publicly released but which was reviewed by The New York Times.

The eight experts who make up the panel all come from different countries and possess specific expertise in areas like weapons of mass destruction, maritime transport and customs controls. Since 2010 the panel has had a mandate from the Security Council to investigate possible sanctions violations by North Korea and present its findings in an annual report.

Though experts who viewed the report said the evidence it cited did not prove definitively that there was current, continuing collaboration between North Korea and Syria on chemical weapons, they said it did provide the most detailed account to date of efforts to circumvent sanctions intended to curtail the military advancement of both countries.

William Newcomb, who was chairman of the United Nations panel of experts on North Korea from 2011 to 2014, called the report “an important breakthrough.”

Since the start of the Syrian civil war in 2011, there have been suspicions that North Korea was providing equipment and expertise to maintain the chemical weapons program of Syria’s president, Bashar al-Assad. Those suspicions were not assuaged when in 2013 Syria signed onto the Chemical Weapons Convention and claimed to give up its chemical weapons stocks.

“We knew stuff was going on,” Mr. Newcomb said. “We really wanted to up the game on chemical weapons programs, and we just weren’t able to get what we needed to do so.”

The report, which is more than 200 pages long, includes copies of contracts between North Korean and Syrian companies as well as bills of lading indicating the types of materials shipped. Much information was provided by unidentified United Nations member states. More here.