Obama DID Veto Defense Bill, Losing 40,000 Troops

While the media was consumed with Hillary Clinton’s testimony before the Gowdy Benghazi Commission, another important event took place and it included Barack Obama’s famous pen. He vetoed the$612 billion Defense bill, stating it was full of gimmicks and did not allow him the money or pathway to close Guantanamo.

Has anyone in the Obama administration bothered to consider what our adversaries are doing with their military like China and Russia much less Iran?

In part from FNC:

Four years after Congress passed and Obama signed into law strict, across-the-board spending limits, both parties are eager to bust through the caps for defense spending. But Obama has insisted that spending on domestic programs be raised at the same time, setting off a budget clash with Republicans that has yet to be resolved.

To side-step the budget caps, known in Washington as sequestration, lawmakers added an extra $38.3 billion to a separate account for wartime operations that is immune to the spending limits. The White House has dismissed that approach as a “gimmick” that fails to deal with the broader problem or provide long-term budget certainty for the Pentagon.

Obama also rejects the bill as written due to provisions making it harder for him to transfer suspected terror detainees out of the military prison in Guantanamo Bay, Cuba, a key campaign promise that Obama is hard-pressed to fulfill before his term ends. The White House has also expressed concerns over provisions preventing military base closures and funding equipment beyond what the military says it needs.

A deeper consequence for the military:

FreeBeacon: The Army has disclosed that it has cut 80,000 soldiers since 2010 and plans to reduce the force by another 40,000 by the end of 2017, bringing the total active number of troops to 450,000, according to a report to Congress that was recently released under a Freedom of Information Act (FOIA) request.

“Nearly every Army installation will experience reductions of some size,” according to the report, which was obtained and released by the Federation of American Scientists (FAS).

It warns of a “permanent reduction of sizable numbers of members of the Armed Forces,” which translates to a 21 percent total cut across the board.

“Significant structure cuts at overseas installations have already occurred,” according to the report.

The Army will be forced to further cut its budget in 2018 and beyond, according to the report

“These force structure reductions and the resulting impacts on installation populations could be significant to both military communities and to the defense posture of our nation.”

At least six Army installations will see their forces cut by more than 1,000 soldiers, according to the report. These include Fort Benning in Georgia, Fort Bliss in Texas, Fort Hood in Texas, Joint Base Elmendorf-Richardson in Alaska, Joint Base Lewis-McChord in Washington, and Schofield Barracks in Hawaii.

The continuing cuts come as the military faces massive and ongoing budget cuts that have not only reduced the forces but have also impacted the purchase and maintenance of military hardware.

While experts have expressed concerns about the United States’ ability to combat threats across the globe on multiple fronts, the Army maintains that the reduced force will not harm its abilities.

“The Army will continue to be a force that can deploy and sustain capabilities across the range of military operations anywhere in the world on short notice,” according to the report.

Still, “force structure reductions and the resulting impacts on installation populations could be significant to both military communities and to the defense posture of our nation,” the Army says in the report.

An additional number of posts in the civilian Army workforce will also be eliminated by 2019, the report states.

The report includes an evaluation of the “the local economic, strategic, and operational consequences of the reductions at” the six installations mentioned above.

The cuts were spread “broadly” across the force “in terms of geography and organizationally,” according to the report. “There simply was not one segment of the Army that could sustain the entirety of the cuts.”

Screen Shot 2015-10-22 at 1.43.35 PM

Soldiers will likely experience an interruption in their lives, though the Army is seeking to minimize this.

“The Army will employ all possible measures to minimize personnel turbulence (to both Soldiers and their Families) associated with the force structure reductions on the six installations in question,” the report states. “There will be instances where Soldiers (and Families) will depart an installation on an accelerated timeline.”

Local economies also will be impacted by the cuts. These include direct losses from government contract service jobs that will be cut, as well as “indirect job losses that would occur in the community because of a reduction in demand for goods and services.”

Meanwhile, President Obama vetoed on Thursday a massive defense spending bill that would fund military operations across the globe and provide troops with a pay raise.

Smoking Gun in Hillary/Benghazi Hearing Was Chelsea

The first attack happened and Hillary left the State Department and went home. While at home she had people telling her people were missing and dying. If one of your diplomatic posts was attacked would you leave the office and go home? When questioned about being alone at home during the attack, Hillary laughed.

But, Chelsea knew first the Benghazi attackers were Ansar al Sharia…..then Hillary told the same to the Libyan and Egyptian government…..oh then those pesky talking points about the video was the other track at the same time where the White House was calling YouTube while brave and fighting Americans were still on the roof and 2 at the mission post had already died.

Attkisson: Within hours of the Sept. 11, 2012 terrorist attacks in Benghazi, Clinton emailed her daughter, Chelsea, that Americans had died at the hands of an al-Qaeda like group. Al-Qaeda is the Islamic extremist terrorist group that was led by Osama bin Laden. Clinton also informed Egypt’s prime minister and Libya’s president that the attacks were “preplanned” and “had nothing to do with” an anti-Islamic video posted on YouTube.

That is perspective and real when the Democrats whined all day about how much money has been spent on the Gowdy Benghazi Commission. Isn’t live priceless? Not so much with those Democrats.

All the Democrats are claiming victory today as is Hillary’s team as she never had a meltdown. But real details and facts don’t matter except to those seeking and finding the truth in verified evidence.

  1. Post Qaddafi, Hillary took a play it by ear posture in Libya, hence the lack of email traffic on the topic as noted with visual stacks of emails today in the hearing.
  2. The people in Libya and especially Ambassador Chris Stevens did not have Hillary’s email address and actually never spoke to her by phone after he was sworn in as Ambassador, replacing Ambassador Cretz who was removed from the country due to WikiLeaks cables. Perhaps Ambassador Stevens should have just coordinated more security by asking Blumenthal, as he was forced to responded to forwarded emails by Hillary, that originate by Sidney Blumenthal.
  3. Oh, Hillary NEVER had a computer at the State Department.
  4. While the attack was going on, Hillary issued an official written statement that it WAS an attack, but what about that video thing that went on for weeks including Susan Rice on all the Sunday talk shows?
  5. One of the security contractors was operating in Libya without a contract and license.
  6. There were more than 600 requests for more security, none got to Hillary? No country summary went to Hillary discussing Libya as a failing country?
  7. Benghazi was originally a temporary mission, soon to be a permanent facility, so she never signed a waiver exempting Benghazi from meeting security standards mandated by law.
  8. Congressman Pompeo of Kansas asked Hillary about Marc Turi and the weapons bound for the Transnational Council. Her response was she knew nothing about Turi or the weapons, but that discussion and the list of weapons were in her emails.
  9. No one was disciplined or fired over Benghazi failures.
  10. Chris Stevens was my friend but he never asked me for an increase in security, he couldn’t as he had no way to contact me other than go through my people at the State Department.

In closing, Hillary’s entire legal team handled the email sorting and the servers, she said she had no role. Did those lawyers all have security clearance to do that? Nah….and so it goes.

Stingray and Warrantless Cell Phone Tracking Policy

DHS issues stingray policy and answers to Oversight Committee

SCMagazine: The Department of Homeland (DHS) followed the Department of Justice’s (DOJ) lead on Wednesday with the release of its cell-site simulator, or “stingray,” policy.

The policy, as the agency wrote, “provides guidance and establishes common principles for the use of cell-site simulators across DHS.” The policy applies to the “use of cell-site simulator technology inside the United States in furtherance of criminal investigations,” the memorandum states.

Primarily, the policy hits on a required search warrant before operating a stingray device. In the past, the government has been derided for picking up innocent citizens’ data while they’re sharing public spaces with criminal investigation targets.

The majority of cases will require prosecutors to obtain a search warrant supported by probable cause; however, in exigent circumstances under the Fourth Amendment, such as situations where law enforcement’s needs are “so compelling that they render a warrantless search objectively reasonable” the warrant requirement can be waved. Exceptional circumstances are also exempt from a mandatory warrant. These instances often occur when obtaining a search warrant is “impracticable,” such as when Secret Service agents are protecting the president.

As far as data collection, data must be deleted as soon as the target is identified and no less than once every 30 days.

The policy release was accompanied by a hearing at the U.S. House Committee on Oversight and Government Reform. The representatives asked for clarification from both DHS and the DOJ on their stingray use and rules.

When Rod Blum (R-Iowa) probed about how agents would be reprimanded if they didn’t follow these policies, both the DOJ and DHS said individuals would be left to the agencies’ idea of appropriate punishment, but employees would definitely be held accountable.

“As with any technology procedure within an agency if individuals violate their agency’s orders they’re accountable to their agencies and subject to discipline,” said Elana Tyrangiel, principal deputy assistant attorney general, Office of Legal Policy at DOJ.

To ensure their policies are followed, both agencies instated an auditing procedure with designated executive-level contacts serving as direct lines of contact.

Secret Service allowed to use warrantless cellphone tracking

WASHINGTON (AP) – A new policy allows the Secret Service to use intrusive cellphone-tracking technology without a warrant if there’s believed to be a nonspecific threat to the president or another protected person.

Homeland Security Assistant Secretary Seth M. Stodder described to a House subcommittee Wednesday the department’s policy on the use of cell-site simulators.

Civil libertarians and privacy advocates have long expressed concern about the suitcase-size devices, known as Stingrays, which mimic cell-towers to scoop up electronic data that can be used to locate nearby phones and identify their owners. The devices don’t listen in to phone calls or capture text messages, Stodder said.

The policy the department unveiled this week is similar to the one announced in September by the Justice Department, which includes the FBI.

Federal law enforcement officers are required to get a warrant signed by a judge before using Stingrays, except under emergency “exigent circumstances” meeting the constitutional standard for probable cause under the Fourth Amendment, but when there is no time to get a warrant.

Stodder cited the example of kidnappings, such as a recent case where Immigration and Customs Enforcement officers used a Stingray to help locate and rescue a 6-year-old girl being held hostage by human smugglers in Arizona.

But Stodder said another allowed exception under the policy would let the Secret Service use Stingrays in “exceptional circumstances” without meeting the legal threshold for probable cause. In such cases, using the devices would require direct approval from “executive-level personnel” at Secret Service headquarters and the U.S. attorney for the relevant jurisdiction.

Asked whether that essentially granted a blanket exception for the Secret Service, Stodder said that the exemption would not be used in routine criminal probes, such as a counterfeiting investigation.

“The key exception that we envision is the Secret Service’s protective mission,” Stodder said. “In certain circumstances where you could have an immediate threat to the president and you have cryptic information, our conclusion in drawing the line between security and privacy here is to err on the side of protection.”

Stodder added that such information could be “a cryptic email or something like that” indicating a security threat to the president where agents would lack the time or the information to determine probable cause, “but you need to locate that person.”

Cell-site stimulators have been used for years by both state and federal law enforcement agencies, who tout them as a vital tool to catch fugitives and locate suspects. But privacy groups and some lawmakers have raised alarms about the secrecy surrounding its use and the collection of cellphone information of innocent bystanders who happen to be in a particular neighborhood or location.

Stodder could not immediately say how many times department law-enforcement officers had used Stingrays without warrants in recent years.

Rep. Ted Lieu, D-Calif., said Wednesday the newly announced guidelines are a good first step, but added that the policy still lacks transparency and provides overly broad permission for Stingrays to be used without warrants. The new federal policies also don’t apply to state and local law enforcement agencies that have purchased Stingrays, sometimes through the use of federal grants. More here.

WikiLeaks Posts the Hacked Emails of CIA Director

Yet another Obama administration placeholder that was using a private email for sensitive material.

Of particular note is the partially written summary on Iran from 2009, which appear to be the genesis and words the White House used to justify normalizing relations with the rogue nation. John Brennan was applying to obtain high security clearance to enter the Obama White House before 2009 and later assuming the role of the chief of the CIA.

*** “The United States has no choice but to find ways to coexist — and to come to terms — with whatever government holds power in Tehran,” Brennan said in the three-page memo. He added that Iran would have to “come to terms” with the U.S. and that “Tehran’s ability to advance its political and economic interests rests on a non-hostile relationship with the United States and the West.”

In the memo, Brennan advised Obama to “tone down” rhetoric with Iran, and swiped at former President George W. Bush for his “gratuitous” labeling of Iran as part of a worldwide “axis of evil.” Brennan also said the U.S. should establish a direct dialogue with Tehran and “seek realistic, measurable steps.” Although he didn’t specifically call for the regime of financial sanctions that the Obama administration, along with Europe, Russia and China, pushed against Iran, Brennan told the president-elect to “hold out meaningful carrots as well as sticks.” ***

In part, a deeper look at the text is as follows:

The Conundrum of Iran

Iran will be a major player on the world stage in the decades ahead, and its actions and
behavior will have a major and enduring impact on near- and long-term U.S. interests on
a wide variety of regional and global issues. With a population of over 70 million, xx
percent of the world’s proven oil reserves, a geostrategic location of tremendous
(enviable?) significance, and a demonstrated potential to develop a nuclear-weapons
program, the United States has no choice but to find a way to coexist—and to come to
terms—with whatever government holds power in Tehran. At the same time, the Iranian
Government also must come to terms with Washington, as Tehran’s ability to advance its
political and economic interests rests on a non-hostile relationship with the United States
and the West.
There are numerous hurdles that stand in the way of improved U.S.-Iranian relations, but
none is more daunting than the theocratic regime’s nearly 30-year track record of
engaging in transnational terrorism, both directly and indirectly, to advance its
revolutionary agenda. Tehran’s proclivity to promote its interests by playing the terrorist
card undermines its standing as a responsible sovereign state and calls into question
virtually all of its actions, even when pursuing legitimate political, economic, and
strategic interests. While the use of terrorism(*footnote on definition) is reprehensible
and of serious concern irrespective of the source, the wielding of the terrorism club by a
nation state such as Iran is particularly alarming and insidious because of the ability of a
government to use its instruments of national power to support, conceal, facilitate, and
employ terrorist violence. Specifically, a sovereign government has the ready ability to
provide all of the logistical requirements—e.g. the fabrication of official documentation,
explosives, and weapons; the protected use of diplomatic facilities, staff, and pouches;
and the provision of expertise, funding, and targeting intelligence—that can be used to
great effect to plan and carry out successful terrorist attacks. Too often, and for too long,
Iran has excelled at such activities.

An anonymous teen hacker claimed to have stolen a handful of files from CIA Director John Brennan’s private email account, U.S. officials reported on Monday.

CIA Director John Brennan emails

Today, 21 October 2015 and over the coming days WikiLeaks is releasing documents from one of CIA chief John Brennan’s non-government email accounts. Brennan used the account occasionally for several intelligence related projects.

John Brennan became the Director of the Central Intelligence Agency in March 2013, replacing General David Petraeus who was forced to step down after becoming embroiled in a classified information mishandling scandal. Brennan was made Assistant to the President for Homeland Security and Counterterrorism on the commencement of the Obama presidency in 2009–a position he held until taking up his role as CIA chief.

According to the CIA Brennan previously worked for the agency for a 25 year stretch, from 1980 to 2005.

Brennan went private in 2005-2008, founding an intelligence and analysis firm The Analysis Corp (TAC). In 2008 Brennan became a donor to Obama. The same year TAC, led by Brennan, became a security advisor to the Obama campaign and later that year to the Obama-Biden Transition Project. It is during this period many of the Obama administration’s key strategic policies to China, Iran and “Af-Pak” were formulated. When Obama and Biden entered into power, Brennan was lifted up on high, resulting in his subsequent high-level national security appointments.

If you have similar official documents that have not been published yet, send them to WikiLeaks.

John Brennan Draft SF86

“National Security Position” form for John Brennan. This form, filled out by Brennan himself before he assumed his current position, reveals a quite comprehensive social graph of the current Director of the CIA with a lot of additional non-govermental and professional/military career details. (17 November 2008, Author: John Brennan)

Download PDF or view HTML version.

The Analysis Corporation

FAX from the General Counsel of the CIA to the Goverment Accountability Office about a legal quarrel between the CIA and “The Analysis Corporation”. TAC seems to have lost a tender for a US watchlist-related software project to a competitor. Issues seem to revolve around “growth of historical data” and “real-time responsiveness” of the system. (15 February 2008, Sender: CIA, Office of General Counsel, Larry Passar)

Download PDF or view HTML version.

Draft: Intel Position Paper

Challenges for the US Intelligence Community in a post cold-war and post-9/11 world; a calling for inter-agency cooperation, a ten-year term for the Director of the CIA and the Director of National Intelligence. It also demands the autonomy of the Intelligence Community, that it “… must never be subject to political manipulation and interference.” An unfinished paragraph is titled “Damaging Leaks of Classified Information”. (15 July 2007, Author: John Brennan)

Download PDF or view HTML version.

The Conundrum of Iran

Recommendations to the next President (assuming office in Jan. 2009) on how to play the figures on the U.S.-Iranian Chessboard (18 November 2007, Author: John Brennan)

Download PDF or view HTML version.

Torture

Letter from Vice Chairman Bond, Senate Select Committee on Intelligence, to his fellow board members with a proposal on how to make future interrogation methods “compliant” and “legal”. Instead of listing all allowed methods, every kind of interrogation should be considered compliant, as long as it is not explicitly forbidden by the “Army Field Manual” (AFM). (May 2008)

Download PDF or view HTML version.

Torture Ways

A bill from July 2008 called “Limitations on Interrogation Techniques Act of 2008” explicitly list the forbidden interrogation techniques mentioned in the previous document and can be considered a direct implementation of the recommendations of Christopher Bond. (31 July 2008)

Download PDF or view HTML version.

Pakistan Terror Cells and Nuclear Weapons, the Nightmare

What is at issue with Pakistan? India, Khorasan or Islamic State or all of that and more?

Under the Bush administration, the U.S. paid $100 million to secure Pakistan’ nuclear weapons. This included materials, warheads and laboratories. The full details are here. The big question now is how will Obama handle the new demands of Pakistan and their ultimatums?

Pakistan to tell U.S. it won’t accept limits on tactical nuclear arms

ISLAMABAD (Reuters) – Pakistani Prime Minister Nawaz Sharif will tell U.S. President Barack Obama this week that Islamabad will not accept limits on its use of small tactical nuclear weapons, Pakistani officials said on Wednesday.

Pakistan insists smaller weapons would deter a sudden attack by its bigger neighbor India. But the United States worries tactical weapons may further destabilize an already volatile region because their smaller size makes them more tempting to use in a conventional war.

Sharif and Obama are due to meet on Thursday.

The United States wants Pakistan to commit to not using tactical nuclear weapons but Islamabad wants to keep its options open as a way of deterring a potential Indian attack, said Maria Sultan, head of the South Asian Strategic Stability Institute. More here.

Nightmare: Pakistan To Deploy Small Tactical Nuclear Weapons

Pakistani Prime Minister Nawaz Sharif is coming to the United States next week on an official visit, and the New York Times reports that ahead of the visit the Obama administration is holding talks with Pakistani officials about Pakistan’s plan to deploy a small tactical nuclear weapon which would be more difficult to monitor and secure than Pakistan’s arsenal of larger weapons. According to Home Land Security News Wire, the White House has not yet commented on the issue. Experts doubt Pakistan would agree to any limits on its nuclear arsenal. “If Pakistan would take the actions requested by the United States, it would essentially amount to recognition of rehabilitation and would essentially amount to parole,” George Perkovich, vice president for studies at the Carnegie Endowment for International Peace, told the Times.

“I think it’s worth a try,” Perkovich added. “But I have my doubts that the Pakistanis are capable of doing this.” Other officials and outside experts said the main component of the proposed deal would be the loosening of strict controls imposed on Pakistan by the Nuclear Suppliers Group, an affiliation of nations that try to control the creation of weapons. The Times reports that the Bush administration spent as much as $100 million on a secret program to help secure Pakistan’s nuclear arsenal, helping with physical security and the training of Pakistani security personnel. Those efforts continued in the Obama years. Administration officials have told Congress that most of Pakistan’s nuclear arsenal is under good safeguards, with warheads separated from delivery vehicles and a series of measures in place to guard against unauthorized use. These officials fear, however, the smaller weapons are easier to steal, or would be easier to use should they fall into the hands of a rogue commander.

The nightmare:

In part from CTC: In March 2014, nine members of al-Qa`ida, who were active with the group in the Afghanistan-Pakistan region, defected to the group that now calls itself the “Islamic State.”[1] The defections took place months before the Islamic State formally announced its Caliphate and at that time little public attention was given to the shift in allegiances of those al-Qa`ida men, despite one of them being the brother of famed jihadi ideologue Abu Muhammad al-Maqdisi.[2] The defections, at the time, seemed more like an outlier, but in hindsight they were an early sign of broader developments affecting Afghanistan’s and Pakistan’s militant landscapes. The Islamic State’s formal declaration of its “Khorasan” chapter in January 2015 is another indicator of the changes that are taking place. These changes are being pushed by what currently appears to be a fairly loosely configured, but noteworthy, network of groups and individuals who are trying to alter the direction of South and Central Asia’s multiple jihads.


A useful starting point are those individuals and groups in Afghanistan and Pakistan who have publicly pledged bay`a to Abu Bakr al-Baghdadi, the Islamic State’s self-described “Caliph,” and whose pledge has been officially recognized by the Islamic State. The individual appointed in January 2015 as ISK’s leader is Hafiz Khan Saeed, a former Tehrik-i-Taliban (TTP) commander responsible for that group’s operations in Orakzai, an agency in Pakistan’s Federally Administered Tribal Areas (FATA) that is very close to the important city of Peshawar.[4] After the death of Hakimullah Mehsud, Khan Saeed was also considered a front-runner–along with Maulana Fazlullah, then the TTP head for Malakand–to replace the deceased TTP leader. Fazlullah, as is well known, won out and assumed the TTP’s leadership position in November 2013. Close to one year later, in October 2014, Khan Saeed and four other prominent TTP commanders, as well as the group’s main spokesman, Shahidullah Shahid, left TTP and pledged their allegiance to the Islamic State.

The other commanders who did so at the time were “Hafiz Quran Daulat, TTP chief in Kurram Agency; Gul Zaman, TTP chief in Khyber Agency; Mufti Hassan, TTP chief in Peshawar; and Khalid Mansoor, the TTP chief in the Hangu district.”[5] These were significant losses for the TTP, and a win for the Islamic State, as in one fell swoop al-Baghdadi’s group gained the allegiance of the individuals the TTP had designated to control the central FATA, a strategic block of land that stretches from the settled city of Peshawar to the Khyber pass and the immediate areas surrounding it.

Then on January 10, 2015, presaging things to come, these six individuals appeared in a video where they again pledged allegiance to Abu Bakr al-Baghdadi. This time they were also joined by an expanded network of individuals, all of whom pledged bay`a to the Islamic State’s leader. This group included Saad Emirati, a former Taliban commander allegedly active in Afghanistan’s Logar Province; Ubaidah al-Peshwari, leader of the al-Tawhid and Jihad Group in Peshawar; the Deputy to Sheikh Abd al-Qadir al-Khorasani;[6] Sheikh Muhsin, a commander from Afghanistan’s Kunar province; Talha, a commander from Lakki Marwat; and Omar al-Mansur, from Pakistan’s infamous Lal Masjid (Red Mosque).[7]

According to the statement, an even broader network of groups–which ranges from the Qambar Khel tribe in Khyber and the Hudhayfah group in Dir to Qari Harun’s group in Kunar province–have also pledged their support for Hafiz Khan Saeed and his position as the Amir of the mujahideen of Khorasan.[8] Less than one week after the release of the video, the ranks of Khan Saeed’s group in Pakistan were also bolstered by “50 hardcore militants of the Amr Bil Maroof group, led by Commanders Haya Khan and Waheed Khan,” from Khyber joining.[9] Then on January 26 the Islamic State’s spokesman, Abu Muhammad al-Adnani, released a statement in which he formally announced the creation of ISK with Hafiz Khan Saeed serving as its leader. Unfortunately, despite these pronouncements and recent arrests of several alleged Islamic State members in Lahore, and the death of another one in Karachi, not much is known about ISK’s activities in Pakistan or its capabilities.[10] The same can be said for the linkages between ISK elements in Pakistan and the Islamic State, as well as South Asian foreign fighters who are operating on behalf of al-Baghdadi’s group in Syria and Iraq.