White House Invited Muslim Brotherhood Policy



A ROUND TABLE DISCUSSION WITH “THE STOP QATAR NOW COALITION”

Who Are the Muslim Brotherhood-Linked Leaders Obama Met?


The Stop Qatar Now Coalition of good Patriots have spent weeks gathering evidence, documents and performed interviews to bring to publication the facts on the Muslim Brotherhood penetration into the American culture against the will and knowledge of Americans and the U.S. Constitution…

BROADTCAST LIVE WORLDWIDE:  THURSDAYS – 9:00PM (eastern) / 6:00pm (pacific) on WDFP – Restoring America Radio , Red State Talk Radio, American Agenda, Nightside Radio Studios, and on Freedom In America Radio

Uncovering the AUMF Against Islamic State

There is zero strategy in the Authorization of Military Force the White House sent electronically to Congress today. At the core of this feeble document is all deference to Iran and the building issues with Russia. Yet the most unspoken issue is Barack Obama taking a swipe at GW Bush.

Ralph Peters told Fox News this morning that Obama’s war authorization reads as if it were written by a nervous lawyer, not a bold Commander in Chief. He said there are so many caveats in it that you’d think it was a Hollywood contract negotiation.

As far as the ‘no enduring troops’ phrase, Peters says that’s simply a swipe at George W. Bush. He says this White House can’t get over the fact that Bush ever existed and it’s a dig at the occupation of Iraq.

The AUMF notably allows Obama to employ U.S. ground troops against ISIS, but with the proviso that such operations not be “enduring.” The three-year limitation comes alongside the repeal of the 2002 authorization to use force in Iraq, but the AUMF notably leaves intact the 2001 authorization to use military force against al Qaeda — the resolution the Obama administration is relying on to conduct its war on ISIS now.

The Obama administration’s draft language and transmittal letter, obtained from congressional sources, appears below:

 

TO THE CONGRESS OF THE UNITED STATES:

The so-called Islamic State of Iraq and the Levant (ISIL) poses a threat to the people and stability of Iraq, Syria, and the broader Middle East, and to U.S. national security. It threatens American personnel and facilities located in the region and is responsible for the deaths of U.S. citizens James Foley, Steven Sotloff, Abdul-Rahman Peter Kassig, and Kayla Mueller. If left unchecked, ISIL will pose a threat beyond the Middle East, including to the United States homeland.

I have directed a comprehensive and sustained strategy to degrade and defeat ISIL. As part of this strategy, U.S. military forces are conducting a systematic campaign of airstrikes against ISIL in Iraq and Syria. Although existing statutes provide me with the authority I need to take these actions, I have repeatedly expressed my commitment to working with the Congress to pass a bipartisan authorization for the use of military force (AUMF) against ISIL. Consistent with this commitment, I am submitting a draft AUMF that would authorize the continued use of military force to degrade and defeat ISIL.

My Administration’s draft AUMF would not authorize long-term, large-scale ground combat operations like those our Nation conducted in Iraq and Afghanistan. Local forces, rather than U.S. military forces, should be deployed to conduct such operations. The authorization I propose would provide the flexibility to conduct ground combat operations in other, more limited circumstances, such as rescue operations involving

U.S. or coalition personnel or the use of special operations forces to take military action against ISIL leadership. It would also authorize the use of U.S. forces in situations where ground combat operations are not expected or intended, such as intelligence collection and sharing, missions to enable kinetic strikes, or the provision of operational planning and other forms of advice and assistance to partner forces.

Although my proposed AUMF does not address the 2001 AUMF, I remain committed to working with the Congress and the American people to refine, and ultimately repeal, the 2001 AUMF.

Enacting an AUMF that is specific to the threat posed by ISIL could serve as a model for how we can work together to tailor the authorities granted by the 2001 AUMF.

I can think of no better way for the Congress to join me in supporting our Nation’s security than by enacting this legislation, which would show the world we are united in our resolve to counter the threat posed by ISIL.

The White House,

JOINT RESOLUTION

To authorize the limited use of the United States Armed Forces against the Islamic State of Iraq and the Levant.

***

Whereas the terrorist organization that has referred to itself as the Islamic State of Iraq and the Levant and various other names (in this resolution referred to as ‘”ISIL’”) poses a grave threat to the people and territorial integrity of Iraq and Syria, regional stability, and the national security interests of the United States and its allies and partners;

Whereas ISIL holds significant territory in Iraq and Syria and has stated its intention to seize more territory and demonstrated the capability to do so;

Whereas ISIL leaders have stated that they intend to conduct terrorist attacks internationally, including against the United States, its citizens, and interests;

Whereas ISIL has committed despicable acts of violence and mass executions against Muslims, regardless of sect, who do not subscribe to ISIL’s depraved, violent, and oppressive ideology;

Whereas ISIL has threatened genocide and committed vicious acts of violence against religious and ethnic minority groups, including Iraqi Christian, Yezidi, and Turkmen populations;

Whereas ISIL has targeted innocent women and girls with horrific acts of violence, including abduction, enslavement, torture, rape, and forced marriage; Whereas ISIL is responsible for the deaths of innocent United States citizens, including James Foley, Steven Sotloff, Abdul-Rahman Peter Kassig, and Kayla Mueller;

Whereas the United States is working with regional and global allies and partners to degrade and defeat ISIL, to cut off its funding, to stop the flow of foreign fighters to its ranks, and to support local communities as they reject ISIL;

Whereas the announcement of the anti-ISIL Coalition on September 5, 2014, during the NATO Summit in Wales, stated that ISIL poses a serious threat and should be countered by a broad international coalition;

Whereas the United States calls on its allies and partners, particularly in the Middle East and North Africa that have not already done so to join and participate in the anti-ISIL Coalition;

Whereas the United States has taken military action against ISIL in accordance with its inherent right of individual and collective self-defense;

Whereas President Obama has repeatedly expressed his commitment to working with Congress to pass a bipartisan authorization for the use of military force for the anti-ISIL military campaign;

and Whereas President Obama has made clear that in this campaign it is more effective to use our unique capabilities in support of partners on the ground instead of large-scale deployments of U.S. ground forces:

Now, therefore, be it Resolved by the Senate and House of Representatives of the United States of America in Congress assembled, That

SECTION 1. SHORT TITLE.

This joint resolution may be cited as the “Authorization for Use of Military Force against the Islamic State of Iraq and the Levant.”

SEC. 2. AUTHORIZATION FOR USE OF UNITED STATES ARMED FORCES.

(a) AUTHORIZATION.—The President is authorized, subject to the limitations in subsection (c), to use the Armed Forces of the United States as the President determines to be necessary and appropriate against ISIL or associated persons or forces as defined in section 5.

(b) WAR POWERS RESOLUTION REQUIREMENTS.— (1) SPECIFIC STATUTORY AUTHORIZATION.—Consistent with section 8(a)(1) of the War Powers Resolution (50 U.S.C. 1547(a)(1)), Congress declares that this section is intended to constitute specific statutory authorization within the meaning of section 5(b) of the War Powers Resolution (50 U.S.C. 1544(b)). (2) APPLICABILITY OF OTHER REQUIREMENTS.—Nothing in this resolution supersedes any requirement of the War Powers Resolution (50 U.S.C. 1541 et seq.).

(c) LIMITATIONS.— The authority granted in subsection (a) does not authorize the use of the United States Armed Forces in enduring offensive ground combat operations.

SEC. 3. DURATION OF THIS AUTHORIZATION. This authorization for the use of military force shall terminate three years after the date of the enactment of this joint resolution, unless reauthorized.

SEC. 4. REPORTS.

The President shall report to Congress at least once every six months on specific actions taken pursuant to this authorization.

SEC. 5. ASSOCIATED PERSONS OR FORCES DEFINED.

In this joint resolution, the term ‘‘associated persons or forces’’ means individuals and organizations fighting for, on behalf of, or alongside ISIL or any closely-related successor entity in hostilities against the United States or its coalition partners.

SEC. 6. REPEAL OF AUTHORIZATION FOR USE OF MILITARY FORCE AGAINST IRAQ. The Authorization for Use of Military Force Against Iraq Resolution of 2002 (Public Law 107– 243; 116 Stat. 1498; 50 U.S.C. 1541 note) is hereby repealed.

But what about Libya, Afghanistan or Pakistan?

The Islamic State has expanded its presence in the failed state of Libya, and if not confronted, the terror group may be able to gain strategic territory in its quest to form an Islamic Caliphate, according to the Washington Institute’s Andrew Engel. While the United States and its allies are focused on Syria and Iraq, IS (commonly referred to as ISIL or ISIS) has its eyes beyond that fight.

The report, titled The Islamic State’s Expansion in Libya, says Libya’s ex-ambassador to the Emirates Aref Ali Nayed is worried that if Washington does not act, IS will use Libya to threaten Europe. The IS has increased its physical and media presence in the last three months. A local terrorist organization, the Islamic Youth Shura Council (IYSC), has pledged its loyalty to IS.

“ISIS leader Abu Bakr al-Baghdadi recognized the Libyan ‘provinces’ of Barqa (Cyrenaica), Tripolitania, and Fezzan as belonging to his self-styled ‘caliphate,’” Engel said.

Adding to concerns, IS is winning the battle to be the dominant terrorist group in the region, just as it is in Iraq and Syria. Al-Barqawi has said that the terrorist organization would like to remove the borders of North African countries Tunisia, Libya, and Egypt to form a province similar to the one they are building in Syria and Iraq, which they call the “Euphrates Province.”

Have You Met Christiana?

  • She is a member of the Carbon Finance Advisory Panel
  • She is an Advisory Committee Member of Green Cross International, founded by Pres. Gorbachev
  • She is an invited member of the Clinton Global Initiative
  • She is a member of the Global Roundtable on Climate Change led by Jeffrey Sachs at Columbia University
  • She is a technical advisor to the Prototype Carbon Fund at the World Bank
  • She was personally trained by Al Gore to deliver his presentation of ‘An Inconvenient Truth’
  • She is the Executive Secretary of the United Nations Framework Convention on Climate Change
  • She even blogs at the UNFCCC

Are you beginning to see a crusader here because there is notoriety and money and power involved? Wonder how many times she has visited the White House…

UN Climate Chief: We Are Remaking The World Economy

The United Nation’s climate chief says that reordering the global economy to fight climate change is the “most difficult” task the international body has ever undertaken.

“This is probably the most difficult task we have ever given ourselves, which is to intentionally transform the economic development model, for the first time in human history,” Christiana Figueres, who heads up the U.N.’s Framework Convention on Climate Change, told reporters.

“This is the first time in the history of mankind that we are setting ourselves the task of intentionally, within a defined period of time, to change the economic development model that has been reigning for the, at least, 150 years, since the industrial revolution,” Figueres said.

Figueres’s remarks come ahead of a meeting in Geneva next week where delegates will pour over draft treaty texts that the U.N. hopes countries will agree to in December. She doesn’t expect global warming to be solved by one treaty, but was optimistic in will be solved in the coming years. “That will not happen overnight and it will not happen at a single conference on climate change, be it COP 15, 21, 40 – you choose the number,” she said. “It just does not occur like that. It is a process, because of the depth of the transformation.”

The climate chief even held up President Obama as a shining example of steps countries can take to tackle global warming.

“The international community is quite grateful for the fact that in his second term, President Obama has turned his attention quite clearly and quite decisively to climate change,” Figueres told reporters.

“He has not only spoken about his commitment both to his national agenda on climate change, but also to the international process, and has been quite clear in his political leadership,” Figueres said, touting the EPA’s success cutting carbon dioxide emissions from power plants.

The EPA will finalize rules to cut carbon emissions from new and existing power plants this summer. Critics of these rules say they will hurt the economy through job losses and higher energy prices. Supporters, however, say it will spur green energy development and set an example for other countries to follow.

Obama’s 2016 budget proposal boosts EPA funding to help it finalize emissions rules for power plants. The budget would also give the EPA $4 billion to reward states that reduce emissions even more than federal mandates require.

Figueres also cheered Obama’s agreement with China to reduce carbon emissions by 2030 and to give the U.N.’s climate fund a $3 billion boost.

“So for all of these reasons, certainly a very welcome leadership from the United States as a single nation,” Figueres said. “Countries can attain a certain level of emission reductions on their own, but they can do much more if they collaborate with each other, in particular with certain specific sectors.”

But while Figueres seems rosy about a deal, there are already signs of countries backing away from a tough international climate treaty.

France’s foreign minister, Laurent Fabius, told an audience at an event in New Delhi, India that a climate treaty should not hurt national economic growth. “An agreement that would leave some countries to consider their growth hampered by its provisions will not be accepted,” Fabius said. *** If you can stand this nonsense and fleecing of policy and global threats, you can read more here about Christiana. One more thing, controlling climate change brings gender equality….really?

 

Cyber-attacks surging in Utah

NSA facility is likely cause….

SALT LAKE CITY — Utah state officials have seen what they describe as a sharp uptick in attempts to hack into state computers in the last two years, and they think it related to the NSA data center south of Salt Lake City.

The increase began in early 2013 as international attention focused on the NSA’s $1.7 billion warehouse to store massive amounts of information gathered secretly from phone calls and emails.

“In the cyber world, that’s a big deal,” Utah Public Safety Commissioner Keith Squires told a state legislative committee this week.

While most of the attempts are likely innocuous, cyber experts say it is possible low-level hackers, “hactivists” unhappy with the NSA’s tactics, and some foreign criminal groups might erroneously think the state systems are linked to the NSA.

“Maybe these hackers are thinking: ‘If we can attack state systems, we can get info that NSA isn’t releasing,” said Richard Forno, director of the University of Maryland, Baltimore County’s, graduate cybersecurity program.

The state tracks the attempts with an automated system it purchased after a breach of health care information in 2012. The system detects, stops and counts the attempts to get into the computers, Squires said.

With that new equipment in place in January 2013, the state was seeing an average of 50,000 a day with spikes up to 20 million, Squires told The Associated Press. In February 2013, the number rose to an average of 75 million attacks a day, with up to 500 million on some days.

Attacks include direct attacks on websites, emails fishing for passwords, and something called “port scans,” where people probe a computer looking for weak spots.

The NSA didn’t immediately have any comment about the attacks.

Tim Junio, a cybersecurity researcher at Stanford University, said what officials refer to as “attacks” are likely just “noise from low-tech people rather than concerted efforts for meaningful foreign intelligence collection.”

But both Forno and Junio agree the NSA data center could draw the attention of hackers who think they can target state-run utilities that power the center. Being able to disrupt an NSA operation in any way would bring international notoriety to a foreign state or criminal group, Junio said.

State officials acknowledge that part of the increase is driven by an overall rise in hacking across the country. Hackers’ motivations vary, and it was impossible to determine what might be behind the activity in Utah.

Some steal personal information, like customer lists, to commit identity theft. Some take control of email servers to steal messages, send unwanted advertising or disguise the origin of their communications. Some steal corporate or government secrets from email or cloud servers, or use unlocked file servers as digital “dead drops” for their hacking tools, pirated movies, stolen files and more.

For hackers seeking notoriety, the NSA would be a prized target because it employs the world’s best hackers and routinely gives advice about how to keep computers safe from online criminals.

*** How much more do you really need to know?

In the 10 years since the Pew Research Center and Elon University’s Imagining the Internet Center first asked experts about the future of cyber attacks in 2004 a lot has happened:
 Some suspect the Russian government of attacking or encouraging organized crime assaults on official websites in the nation of Georgia during military struggles in 2008 that resulted in a Russian invasion of Georgia.
 In 2009-2010, suspicions arose that a sophisticated government-created computer worm called “Stuxnet” was loosed in order to disable Iranian nuclear plant centrifuges that could be used for making weapons-grade enriched uranium. Unnamed sources and speculators argued that the governments of the United States and Israel might have designed and spread the worm.
 The American Defense Department has created a Cyber Command structure that builds Internet-enabled defensive and offensive cyber strategies as an integral part of war planning and war making.
 In May, five Chinese military officials were indicted in Western Pennsylvania for computer hacking, espionage and other offenses that were aimed at six US victims, including nuclear power plants, metals and solar products industries. The indictment comes after several years of revelations that Chinese military and other agents have broken into computers at major US corporations and media companies in a bid to steal trade secrets and learn what stories journalists were working on.
 In October, Russian hackers were purportedly discovered to be exploiting a flaw in Microsoft Windows to spy on NATO, the Ukrainian government, and Western businesses.
 The respected Ponemon Institute reported in September that 43% of firms in the United States had experienced a data breach in the past year. Retail breaches, in particular, had grown in size in virulence in the previous year. One of the most chilling breaches was discovered in July at JPMorgan Chase & Co., compromised. Obama Administration  officials have wondered if the breach was in retaliation by the Putin regime in Russia over events in Ukraine.
 Among the types of exploits of individuals in evidence today are stolen national ID numbers, pilfered passwords and payment information, erased online identities, espionage tools that record all online conversations and keystrokes, and even hacks of driverless cars.
 Days before this report was published, Apple’s iCloud cloud-based data storage system was the target of a so-called “man-in-the-middle” attack in China that was aimed at stealing users’ passwords and spying on their account activities. Some activists and security experts said they suspected the Chinese government had mounted the attack, perhaps because the iPhone 6 had just become available in the country. Others thouThe threat of cyber attacks on government agencies, businesses, non-profits, and individual users is so pervasive and worrisome that this month (October 2014) is National Cyber Security Awareness Month.
To explore the future of cyber attacks we canvassed thousands of experts and Internet builders to share their predictions. We call this a canvassing because it is not a representative, randomized survey. Its findings emerge from an “opt in” invitation to experts, many of whom play active roles in Internet evolution as technology builders, researchers, managers, policymakers, marketers, and analysts. We also invited comments from those who have made insightful predictions to our previous queries about the future of the Internet.

It is NOT Just George Soros

Soros Clones: 5 Liberal Mega-Donors Nearly as Dangerous as George Soros

From Buffett to Bloomberg, top left-wing supporters give $2.7 billion to push a liberal agenda.

Born: June 21, 1967

Net Worth: $7.6 Billion

Foundation: Omidyar Network Fund, Democracy Fund

Rating: 2 out of 5

Media Outlets: First Look Media, Center for Public Integrity, Center for Responsive Politics, Sunlight Foundation

EBay founder and chairman Pierre Omidyar took the idea of funding the liberal media one step further when he built a media powerhouse all of his own. He used $250 million of his own money and created the news start-up First Look Media.

Omidyar staffed First Look with career liberal journalists from other outlets, including The Guardian’s Glenn Greenwald and Slate’s Matt Taibbi. Greenwald’s liberal rants now have a prominent place at The Intercept, First Look’s online magazine. That was the only news-oriented part of the website up and running at the time of this report.  

Greenwald was one of two journalists entrusted by Edward Snowden with the leaked NSA documents. (The other, Laura Poitras, also works at The Intercept.) According to the outlet’s own website, The Intercept’s “short-term mission is to provide a platform to report on the documents previously provided by NSA whistleblower Edward Snowden.”

According to Greenwald, The Intercept launched earlier than originally planned due to an “obligation to the NSA documents to have a place to report them.” Besides reporting on the Snowden documents, The Intercept promised to “move forward with what we believe is essential reporting in the public interest.”

Because of his connection to Snowden, Greenwald’s romantic partner, David Miranda, was temporarily held at London’s Heathrow airport in August 2013 under the U.K.’s Terrorism Act 2000. British authorities confiscated Miranda’s external hard drive containing “58,000 highly classified UK intelligence documents,” according to Greenwald’s then-employer The Guardian. Starting in June, 2013, Greenwald wrote a series of articles publicizing material from Snowden’s stolen files.

Omidyar prefers to keep his own politics quiet, but his funding revealed what his words didn’t. Through his foundation, the Omidyar Network Fund, he gave more than $213 million to liberal organizations – in addition to the $250 million he spent on First Look.

The liberal groups he funded included George Soros’ Open Society Foundations, the Tides Foundation (a foundation used to funnel liberal money anonymously to a variety of causes), as well as left-wing journalism groups like the Center for Public Integrity and the Center for Responsive Politics.

Another one of Omidyar’s pet projects was promoting the idea of a “post-political” world. At first, the idea of a world without political bickering might sound appealing, but Omidyar’s end goal was to limit political opposition to the majority.

Omidyar himself said as much in the announcement notice for the creation of his latest grantmaking operation, the Democracy Fund. In the January 2013 open letter, Omidyar repeatedly accused the Republican-dominated Congress of being run by “big donors and lobbyists,” as well as being “dominated by the demonization of opponents and deceptive political rhetoric.”

Partial List of Omidyar’s Donations Since 2004:

  • First Look Media: $250,000,000
  • Sunlight Foundation: $20,505,184
  • Center for Public Integrity: $2,150,000
  • Open Society Foundation (London): $677,142
  • Tides Center: $501,000

 

Conclusion

George Soros doesn’t work alone. Despite liberal cries about conservative “dark money,” the left continued to be financed by an intricate network of dozens of millionaires, billionaires and foundations. This report highlighted only a handful of the most prominent members of this group.

The media coverage of these liberal donors was inexcusable. It was not the job of the media to promote or applaud partisan efforts, and it was negligent of them to ignore or bury connections between liberal policy initiatives and the liberals who funded them. Journalists were far more apt to cover conservative billionaires and their influence than they were to cover liberal billionaires.

As George Soros retires more and more from the political funding spotlight, liberal bankrollers like Buffett, Bloomberg, Steyer, Omidyar and the younger Soros were vying to take his place. And this report is just the tip of that iceberg. There are dozens of other millionaires, billionaires and political game changers on the left. Several big liberal players were not included in this report, including Rob McKay, the Taco Bell heir and big campaigner for higher minimum wage laws; George Kaiser, the billionaire oil tycoon who invested heavily in Oklahoma politics; Drummond Pike, the creator of the highly influential Tides Foundation.

Methodology

For this Special Report, the MRC’s Business and Media Institute looked at 990 tax returns for foundations and nonprofits associated with Bloomberg, Buffett, Steyer, Omidyar and Soros. These tax returns are available through Guidestar and the Foundation Directory. All net worth amounts come from the Forbes Billionaires List.

To gauge the media coverage of these liberal donors, BMI looked for mentions of their names in Nexis transcripts for the morning and evening news shows on ABC, CBS and NBC from January 2001 to June 2014.

Recommendations for Journalists

The Business and Media Institute has the following recommendations for journalists who are reporting on political organizations, donors and funding.

  • Follow the Money: Liberal billionaires funded a wide range of political organizations and media groups. These groups were then considered authorities by major media outlets, including ABC, NBC, CBS and CNN. Instead, reporters should challenge the biases of these groups.
  • Treat Public Figures Equally: Media outlets are quick to report on funding by Charles and David Koch to conservative organizations, but they often completely ignore the wide range of funding by liberal donors. Among them, these five liberal donors are worth more than $109 billion dollars, and they aren’t alone.
  • Dig Into Backgrounds of Both Sides: The Society of Professional Journalists Code of Ethics states that journalists should, “Support the open exchange of views, even views they find repugnant.” It is incumbent upon journalists to analyze the background and funding sources for groups and individuals on both ends of the political spectrum.

— Mike Ciandella is MRC Business Senior Analyst at the Media Research Center. *** If you are rolling your eyes by now, it gets worse, add in the interference regarding the Ukraine.