White House Invited Muslim Brotherhood Policy



A ROUND TABLE DISCUSSION WITH “THE STOP QATAR NOW COALITION”

Who Are the Muslim Brotherhood-Linked Leaders Obama Met?


The Stop Qatar Now Coalition of good Patriots have spent weeks gathering evidence, documents and performed interviews to bring to publication the facts on the Muslim Brotherhood penetration into the American culture against the will and knowledge of Americans and the U.S. Constitution…

BROADTCAST LIVE WORLDWIDE:  THURSDAYS – 9:00PM (eastern) / 6:00pm (pacific) on WDFP – Restoring America Radio , Red State Talk Radio, American Agenda, Nightside Radio Studios, and on Freedom In America Radio

Uncovering the AUMF Against Islamic State

There is zero strategy in the Authorization of Military Force the White House sent electronically to Congress today. At the core of this feeble document is all deference to Iran and the building issues with Russia. Yet the most unspoken issue is Barack Obama taking a swipe at GW Bush.

Ralph Peters told Fox News this morning that Obama’s war authorization reads as if it were written by a nervous lawyer, not a bold Commander in Chief. He said there are so many caveats in it that you’d think it was a Hollywood contract negotiation.

As far as the ‘no enduring troops’ phrase, Peters says that’s simply a swipe at George W. Bush. He says this White House can’t get over the fact that Bush ever existed and it’s a dig at the occupation of Iraq.

The AUMF notably allows Obama to employ U.S. ground troops against ISIS, but with the proviso that such operations not be “enduring.” The three-year limitation comes alongside the repeal of the 2002 authorization to use force in Iraq, but the AUMF notably leaves intact the 2001 authorization to use military force against al Qaeda — the resolution the Obama administration is relying on to conduct its war on ISIS now.

The Obama administration’s draft language and transmittal letter, obtained from congressional sources, appears below:

 

TO THE CONGRESS OF THE UNITED STATES:

The so-called Islamic State of Iraq and the Levant (ISIL) poses a threat to the people and stability of Iraq, Syria, and the broader Middle East, and to U.S. national security. It threatens American personnel and facilities located in the region and is responsible for the deaths of U.S. citizens James Foley, Steven Sotloff, Abdul-Rahman Peter Kassig, and Kayla Mueller. If left unchecked, ISIL will pose a threat beyond the Middle East, including to the United States homeland.

I have directed a comprehensive and sustained strategy to degrade and defeat ISIL. As part of this strategy, U.S. military forces are conducting a systematic campaign of airstrikes against ISIL in Iraq and Syria. Although existing statutes provide me with the authority I need to take these actions, I have repeatedly expressed my commitment to working with the Congress to pass a bipartisan authorization for the use of military force (AUMF) against ISIL. Consistent with this commitment, I am submitting a draft AUMF that would authorize the continued use of military force to degrade and defeat ISIL.

My Administration’s draft AUMF would not authorize long-term, large-scale ground combat operations like those our Nation conducted in Iraq and Afghanistan. Local forces, rather than U.S. military forces, should be deployed to conduct such operations. The authorization I propose would provide the flexibility to conduct ground combat operations in other, more limited circumstances, such as rescue operations involving

U.S. or coalition personnel or the use of special operations forces to take military action against ISIL leadership. It would also authorize the use of U.S. forces in situations where ground combat operations are not expected or intended, such as intelligence collection and sharing, missions to enable kinetic strikes, or the provision of operational planning and other forms of advice and assistance to partner forces.

Although my proposed AUMF does not address the 2001 AUMF, I remain committed to working with the Congress and the American people to refine, and ultimately repeal, the 2001 AUMF.

Enacting an AUMF that is specific to the threat posed by ISIL could serve as a model for how we can work together to tailor the authorities granted by the 2001 AUMF.

I can think of no better way for the Congress to join me in supporting our Nation’s security than by enacting this legislation, which would show the world we are united in our resolve to counter the threat posed by ISIL.

The White House,

JOINT RESOLUTION

To authorize the limited use of the United States Armed Forces against the Islamic State of Iraq and the Levant.

***

Whereas the terrorist organization that has referred to itself as the Islamic State of Iraq and the Levant and various other names (in this resolution referred to as ‘”ISIL’”) poses a grave threat to the people and territorial integrity of Iraq and Syria, regional stability, and the national security interests of the United States and its allies and partners;

Whereas ISIL holds significant territory in Iraq and Syria and has stated its intention to seize more territory and demonstrated the capability to do so;

Whereas ISIL leaders have stated that they intend to conduct terrorist attacks internationally, including against the United States, its citizens, and interests;

Whereas ISIL has committed despicable acts of violence and mass executions against Muslims, regardless of sect, who do not subscribe to ISIL’s depraved, violent, and oppressive ideology;

Whereas ISIL has threatened genocide and committed vicious acts of violence against religious and ethnic minority groups, including Iraqi Christian, Yezidi, and Turkmen populations;

Whereas ISIL has targeted innocent women and girls with horrific acts of violence, including abduction, enslavement, torture, rape, and forced marriage; Whereas ISIL is responsible for the deaths of innocent United States citizens, including James Foley, Steven Sotloff, Abdul-Rahman Peter Kassig, and Kayla Mueller;

Whereas the United States is working with regional and global allies and partners to degrade and defeat ISIL, to cut off its funding, to stop the flow of foreign fighters to its ranks, and to support local communities as they reject ISIL;

Whereas the announcement of the anti-ISIL Coalition on September 5, 2014, during the NATO Summit in Wales, stated that ISIL poses a serious threat and should be countered by a broad international coalition;

Whereas the United States calls on its allies and partners, particularly in the Middle East and North Africa that have not already done so to join and participate in the anti-ISIL Coalition;

Whereas the United States has taken military action against ISIL in accordance with its inherent right of individual and collective self-defense;

Whereas President Obama has repeatedly expressed his commitment to working with Congress to pass a bipartisan authorization for the use of military force for the anti-ISIL military campaign;

and Whereas President Obama has made clear that in this campaign it is more effective to use our unique capabilities in support of partners on the ground instead of large-scale deployments of U.S. ground forces:

Now, therefore, be it Resolved by the Senate and House of Representatives of the United States of America in Congress assembled, That

SECTION 1. SHORT TITLE.

This joint resolution may be cited as the “Authorization for Use of Military Force against the Islamic State of Iraq and the Levant.”

SEC. 2. AUTHORIZATION FOR USE OF UNITED STATES ARMED FORCES.

(a) AUTHORIZATION.—The President is authorized, subject to the limitations in subsection (c), to use the Armed Forces of the United States as the President determines to be necessary and appropriate against ISIL or associated persons or forces as defined in section 5.

(b) WAR POWERS RESOLUTION REQUIREMENTS.— (1) SPECIFIC STATUTORY AUTHORIZATION.—Consistent with section 8(a)(1) of the War Powers Resolution (50 U.S.C. 1547(a)(1)), Congress declares that this section is intended to constitute specific statutory authorization within the meaning of section 5(b) of the War Powers Resolution (50 U.S.C. 1544(b)). (2) APPLICABILITY OF OTHER REQUIREMENTS.—Nothing in this resolution supersedes any requirement of the War Powers Resolution (50 U.S.C. 1541 et seq.).

(c) LIMITATIONS.— The authority granted in subsection (a) does not authorize the use of the United States Armed Forces in enduring offensive ground combat operations.

SEC. 3. DURATION OF THIS AUTHORIZATION. This authorization for the use of military force shall terminate three years after the date of the enactment of this joint resolution, unless reauthorized.

SEC. 4. REPORTS.

The President shall report to Congress at least once every six months on specific actions taken pursuant to this authorization.

SEC. 5. ASSOCIATED PERSONS OR FORCES DEFINED.

In this joint resolution, the term ‘‘associated persons or forces’’ means individuals and organizations fighting for, on behalf of, or alongside ISIL or any closely-related successor entity in hostilities against the United States or its coalition partners.

SEC. 6. REPEAL OF AUTHORIZATION FOR USE OF MILITARY FORCE AGAINST IRAQ. The Authorization for Use of Military Force Against Iraq Resolution of 2002 (Public Law 107– 243; 116 Stat. 1498; 50 U.S.C. 1541 note) is hereby repealed.

But what about Libya, Afghanistan or Pakistan?

The Islamic State has expanded its presence in the failed state of Libya, and if not confronted, the terror group may be able to gain strategic territory in its quest to form an Islamic Caliphate, according to the Washington Institute’s Andrew Engel. While the United States and its allies are focused on Syria and Iraq, IS (commonly referred to as ISIL or ISIS) has its eyes beyond that fight.

The report, titled The Islamic State’s Expansion in Libya, says Libya’s ex-ambassador to the Emirates Aref Ali Nayed is worried that if Washington does not act, IS will use Libya to threaten Europe. The IS has increased its physical and media presence in the last three months. A local terrorist organization, the Islamic Youth Shura Council (IYSC), has pledged its loyalty to IS.

“ISIS leader Abu Bakr al-Baghdadi recognized the Libyan ‘provinces’ of Barqa (Cyrenaica), Tripolitania, and Fezzan as belonging to his self-styled ‘caliphate,’” Engel said.

Adding to concerns, IS is winning the battle to be the dominant terrorist group in the region, just as it is in Iraq and Syria. Al-Barqawi has said that the terrorist organization would like to remove the borders of North African countries Tunisia, Libya, and Egypt to form a province similar to the one they are building in Syria and Iraq, which they call the “Euphrates Province.”

Even the NYT’s Admits Obamacare Purgatory

Ah, Sylvia Burwell if you received the memo, would you please call the White House for comment? The next step is beyond repealing Obamacare, if all else fails, at least rename it from ‘Affordable’ to Hell on Earthcare. Then last week while Burwell was providing testimony to Congress, the exchange did not go too well. During a hearing on the Health and Human Services (HHS) department budget, Secretary Sylvia Burwell had a contentious exchange with Sen. John Cornyn, R-Texas, over whether the administration has a contingency plan should it lose the Supreme Court case that will be argued this session over the fate of the health care law.

The case, King v. Burwell, deals with whether the federal government can give subsidies to Obamacare recipients in states with federally-run health care exchanges.

Cornyn asked Burwell, “If the administration loses in the King vs. Burwell case, do you believe you already have the authority to make an administrative fix, or will you come to congress to ask for additional legislation?

Insured, but Not Covered

WHEN Karen Pineman of Manhattan received notice that her longtime health insurance policy didn’t comply with the Affordable Care Act’s requirements, she gamely set about shopping for a new policy through the public marketplace. After all, she’d supported President Obama and the act as a matter of principle.

Ms. Pineman, who is self-employed, accepted that she’d have to pay higher premiums for a plan with a narrower provider network and no out-of-network coverage. She accepted that she’d have to pay out of pocket to see her primary care physician, who didn’t participate. She even accepted having co-pays of nearly $1,800 to have a cast put on her ankle in an emergency room after she broke it while playing tennis.

But her frustration bubbled over when she tried to arrange a follow-up visit with an orthopedist in her Empire Blue Cross/Blue Shield network: The nearest doctor available who treated ankle problems was in Stamford, Conn. When she called to protest, her insurer said that Stamford was 14 miles from her home and 15 was considered a reasonable travel distance. “It was ridiculous — didn’t they notice it was in another state?” said Ms. Pineman, 46, who was on crutches.

She instead paid $350 to see a nearby orthopedist and bought a boot on Amazon as he suggested. She has since forked over hundreds of dollars more for a physical therapist that insurance didn’t cover, even though that provider was in-network.

                                           

The Affordable Care Act has ushered in an era of complex new health insurance products featuring legions of out-of-pocket coinsurance fees, high deductibles and narrow provider networks. Though commercial insurers had already begun to shift toward such policies, the health care law gave them added legitimacy and has vastly accelerated the trend, experts say.

The theory behind the policies is that patients should bear more financial risk so they will be more conscious and cautious about health care spending. But some experts say the new policies have also left many Americans scrambling to track expenses from a multitude of sources — such as separate deductibles for network and non-network care, or payments for drugs on an insurer’s ever-changing list of drugs that require high co-pays or are not covered at all. For some, like Ms. Pineman, narrow networks can necessitate footing bills privately. For others, the constant changes in policy guidelines — annual shifts in what’s covered and what’s not, monthly shifts in which doctors are in and out of network — can produce surprise bills for services they assumed would be covered. For still others, the new fees are so confusing and unsupportable that they just avoid seeing doctors.

It is true that the Affordable Care Act has erased some of the more egregious practices of the American health insurance system that left patients bankrupt or losing homes to pay bills. Insurers can no longer deny coverage to those with pre-existing conditions, for example. And the new policies cap out-of-pocket spending so long as the patient receives care within the plan. Most important, the act has offered health insurance to an estimated 10 million Americans who did not have any, often by expanding Medicaid or providing subsidies.

But by endorsing and expanding the complex new policies promoted by the health care industry, the law may in some ways be undermining its signature promise: health care that is accessible and affordable for all.

“I’m always curious when I read this ‘good news’ that health costs are moderating, because my health care costs go up significantly each year, and I think that’s a common experience,” said Mark Rukavina, president of Community Health Advisors in Massachusetts.

While much of the focus in the past has been on keeping premiums manageable, “premiums now tell only a part of the story,” Mr. Rukavina said, adding: “A big part of the way they’ve kept premiums down is to shift costs to patients in the form of co-pays and deductibles and other types of out-of-pocket expenses. And that can leave patients very vulnerable.”

Such policies desperately need improvement, patients and professionals like Mr. Rukavina say. But with the Republicans attacking the Affordable Care Act at all turns, even political supporters seem reluctant to acknowledge that it has some flaws. The narrative has been cast in black or white: It’s working, or it’s a failure. The reality, of course, is gray.

AT this point, we don’t have a good definition of “affordable” — or how to measure it fully and fairly. Many studies show that national health costs, while still rising, are not growing as fast as they once were. But what does that mean for individual patients? So far the research has yielded mixed results.

A study by the Commonwealth Fund this month found that the rise in health insurance premiums in employer-based plans had slowed in 31 states since the passage of the Affordable Care Act (good news, right?). But premiums were still rising faster than median incomes (hmm). More important, perhaps, the researchers found that patients were paying more in health care expenses than ever before, during a time of stagnant wages (not so great). In fact, nearly 10 percent of median household income now goes to pay premiums and deductibles, the study found. And that does not include other kinds of health payments that patients now encounter, such as co-pays and uncovered drugs or services.

A recent New York Times/CBS poll found that 46 percent of Americans said they had trouble affording health care, up 10 percentage points in just one year. Some of the cost problems may ease as patients — now known as health care consumers — learn what to expect and how to choose and navigate their plans.

But other problems may be related to the process by which the plans are created. Under the Affordable Care Act each state was asked to select a benchmark plan as its standard. It had to cover certain “essential health benefits” like maternity care and prescription drugs; it had to have a defined actuarial value depending on the level of plan. Silver plans, for example, had to cover 70 percent of charges, leaving consumers with 30 percent. But within those parameters, competing insurers had leeway to set premiums, co-payments and deductibles, and to create networks by negotiating with doctors and hospitals. Naturally, they created policies that met the core criteria while minimizing their financial risk.

Suddenly there were hundreds of new insurance products that had never been tested in real time. Their shortcomings are now playing out in various ways.

Alison Chavez, 36, who is self-employed, signed up for a marketplace plan in October 2013 that she hoped would be an improvement on her previous plan. She had recently been given a diagnosis of breast cancer and was just beginning therapy, so she was careful to choose a policy on the Covered California marketplace that included her physicians.

But in March, while in the middle of treatment, she was notified that several of her doctors and the hospital were leaving the plan’s network. She was forced to postpone a surgery as she scrambled to buy a new commercial policy that included her doctors. “I’ve been through hell and back, but I came out alive and kicking (just broke),” she wrote in an email.

Dr. Alexis Gersten, a dentist in East Quogue, N.Y., switched her family and 11 employees to a new Blue Cross/Blue Shield plan for 2014, after a previous small-business group plan was canceled. She bought the plan through a broker, and says she was unaware that it was an Affordable Care Act plan. When her son needed an ear, nose and throat specialist, the nearest was in Albany, five hours away. Though her cardiologist was on the network list, he said he did not take the plan. She ended up driving an hour to see a new one. A dispute with the insurer about how to count deductibles left her with a $457 pediatrician’s bill. This year she has chosen a new policy.

“People may have a checklist when they buy insurance: First, premiums, then the deductible — and those are pretty easy to understand because they’re set dollar amounts,” said Lynn Quincy, associate director of health reform policy at Consumers Union. But new policies demand different and more difficult kinds of calculations, she said: “The terms are unfamiliar, and figuring out networks is especially murky.”

Compounding the problem is the lack of basic information to shop effectively. When Andrea Greenberg, a New York lawyer, called the help line of Health Republic to clarify the difference between two plans, she found herself speaking to someone reading off a script in the Philippines. “I was really outraged,” she said. “This is an important decision with potentially dire consequences. It’s not like you’re choosing a sweater.”

Likewise, it took many phone calls for Aviva Starkman Williams, a California computer engineer with insurance through her employer, to determine whether the pediatrician doing her son’s 2-year-old checkup was in-network for 2015. Only three of the pediatricians in her doctor’s six-person group were listed in her plan’s online directory, and since her deductible had tripled from the previous year’s, she wanted to limit her out-of-pocket payments.

The practice’s office manager couldn’t tell her for sure. The insurer’s representative said he didn’t know because doctors came in and out of network all the time, likening the situation to players’ switching teams in the National Basketball Association. “If you don’t have updated information, who does?” she asked. “Isn’t it your job to know?”

Ms. Quincy said regulators needed to do a much better job setting requirements and policing plan practices and offerings, particularly provider networks. Few states have clear standards and many rely on consumer complaints to ferret out problems.

Last month, the California insurance commissioner, Dave Jones, announced new emergency regulations concerning networks, noting: “Health insurers’ medical provider directories have been inaccurate, misleading consumers into signing up with a health insurer for access to a doctor, specialist or hospital, only to learn that these medical providers are not actually a part of the health insurer’s network.”

But for now, patients are most often left to fend for themselves. When Amy Moses, a tech entrepreneur in New York City, went online to select a plan, she paid a relatively pricey $650 per month for a United Healthcare plan to make sure her network included a longtime physician. One month into the year, the doctor’s practice was bought by a hospital, which then dropped the plan, so her doctor did as well. (A year later the doctor was still listed in the network directory.)

She discovered the change only when she contacted the physician for a referral for an urgent outpatient procedure costing thousands of dollars that had been recommended by an in-network surgeon. (Both the referring doctor and the surgeon had to be in-network for coverage.) “I literally had three days to find a new in-network internist and score an appointment to get a referral, or cancel my procedure,” she said. “I was stuck in insurance purgatory.”

Cyber-attacks surging in Utah

NSA facility is likely cause….

SALT LAKE CITY — Utah state officials have seen what they describe as a sharp uptick in attempts to hack into state computers in the last two years, and they think it related to the NSA data center south of Salt Lake City.

The increase began in early 2013 as international attention focused on the NSA’s $1.7 billion warehouse to store massive amounts of information gathered secretly from phone calls and emails.

“In the cyber world, that’s a big deal,” Utah Public Safety Commissioner Keith Squires told a state legislative committee this week.

While most of the attempts are likely innocuous, cyber experts say it is possible low-level hackers, “hactivists” unhappy with the NSA’s tactics, and some foreign criminal groups might erroneously think the state systems are linked to the NSA.

“Maybe these hackers are thinking: ‘If we can attack state systems, we can get info that NSA isn’t releasing,” said Richard Forno, director of the University of Maryland, Baltimore County’s, graduate cybersecurity program.

The state tracks the attempts with an automated system it purchased after a breach of health care information in 2012. The system detects, stops and counts the attempts to get into the computers, Squires said.

With that new equipment in place in January 2013, the state was seeing an average of 50,000 a day with spikes up to 20 million, Squires told The Associated Press. In February 2013, the number rose to an average of 75 million attacks a day, with up to 500 million on some days.

Attacks include direct attacks on websites, emails fishing for passwords, and something called “port scans,” where people probe a computer looking for weak spots.

The NSA didn’t immediately have any comment about the attacks.

Tim Junio, a cybersecurity researcher at Stanford University, said what officials refer to as “attacks” are likely just “noise from low-tech people rather than concerted efforts for meaningful foreign intelligence collection.”

But both Forno and Junio agree the NSA data center could draw the attention of hackers who think they can target state-run utilities that power the center. Being able to disrupt an NSA operation in any way would bring international notoriety to a foreign state or criminal group, Junio said.

State officials acknowledge that part of the increase is driven by an overall rise in hacking across the country. Hackers’ motivations vary, and it was impossible to determine what might be behind the activity in Utah.

Some steal personal information, like customer lists, to commit identity theft. Some take control of email servers to steal messages, send unwanted advertising or disguise the origin of their communications. Some steal corporate or government secrets from email or cloud servers, or use unlocked file servers as digital “dead drops” for their hacking tools, pirated movies, stolen files and more.

For hackers seeking notoriety, the NSA would be a prized target because it employs the world’s best hackers and routinely gives advice about how to keep computers safe from online criminals.

*** How much more do you really need to know?

In the 10 years since the Pew Research Center and Elon University’s Imagining the Internet Center first asked experts about the future of cyber attacks in 2004 a lot has happened:
 Some suspect the Russian government of attacking or encouraging organized crime assaults on official websites in the nation of Georgia during military struggles in 2008 that resulted in a Russian invasion of Georgia.
 In 2009-2010, suspicions arose that a sophisticated government-created computer worm called “Stuxnet” was loosed in order to disable Iranian nuclear plant centrifuges that could be used for making weapons-grade enriched uranium. Unnamed sources and speculators argued that the governments of the United States and Israel might have designed and spread the worm.
 The American Defense Department has created a Cyber Command structure that builds Internet-enabled defensive and offensive cyber strategies as an integral part of war planning and war making.
 In May, five Chinese military officials were indicted in Western Pennsylvania for computer hacking, espionage and other offenses that were aimed at six US victims, including nuclear power plants, metals and solar products industries. The indictment comes after several years of revelations that Chinese military and other agents have broken into computers at major US corporations and media companies in a bid to steal trade secrets and learn what stories journalists were working on.
 In October, Russian hackers were purportedly discovered to be exploiting a flaw in Microsoft Windows to spy on NATO, the Ukrainian government, and Western businesses.
 The respected Ponemon Institute reported in September that 43% of firms in the United States had experienced a data breach in the past year. Retail breaches, in particular, had grown in size in virulence in the previous year. One of the most chilling breaches was discovered in July at JPMorgan Chase & Co., compromised. Obama Administration  officials have wondered if the breach was in retaliation by the Putin regime in Russia over events in Ukraine.
 Among the types of exploits of individuals in evidence today are stolen national ID numbers, pilfered passwords and payment information, erased online identities, espionage tools that record all online conversations and keystrokes, and even hacks of driverless cars.
 Days before this report was published, Apple’s iCloud cloud-based data storage system was the target of a so-called “man-in-the-middle” attack in China that was aimed at stealing users’ passwords and spying on their account activities. Some activists and security experts said they suspected the Chinese government had mounted the attack, perhaps because the iPhone 6 had just become available in the country. Others thouThe threat of cyber attacks on government agencies, businesses, non-profits, and individual users is so pervasive and worrisome that this month (October 2014) is National Cyber Security Awareness Month.
To explore the future of cyber attacks we canvassed thousands of experts and Internet builders to share their predictions. We call this a canvassing because it is not a representative, randomized survey. Its findings emerge from an “opt in” invitation to experts, many of whom play active roles in Internet evolution as technology builders, researchers, managers, policymakers, marketers, and analysts. We also invited comments from those who have made insightful predictions to our previous queries about the future of the Internet.

It is NOT Just George Soros

Soros Clones: 5 Liberal Mega-Donors Nearly as Dangerous as George Soros

From Buffett to Bloomberg, top left-wing supporters give $2.7 billion to push a liberal agenda.

Born: June 21, 1967

Net Worth: $7.6 Billion

Foundation: Omidyar Network Fund, Democracy Fund

Rating: 2 out of 5

Media Outlets: First Look Media, Center for Public Integrity, Center for Responsive Politics, Sunlight Foundation

EBay founder and chairman Pierre Omidyar took the idea of funding the liberal media one step further when he built a media powerhouse all of his own. He used $250 million of his own money and created the news start-up First Look Media.

Omidyar staffed First Look with career liberal journalists from other outlets, including The Guardian’s Glenn Greenwald and Slate’s Matt Taibbi. Greenwald’s liberal rants now have a prominent place at The Intercept, First Look’s online magazine. That was the only news-oriented part of the website up and running at the time of this report.  

Greenwald was one of two journalists entrusted by Edward Snowden with the leaked NSA documents. (The other, Laura Poitras, also works at The Intercept.) According to the outlet’s own website, The Intercept’s “short-term mission is to provide a platform to report on the documents previously provided by NSA whistleblower Edward Snowden.”

According to Greenwald, The Intercept launched earlier than originally planned due to an “obligation to the NSA documents to have a place to report them.” Besides reporting on the Snowden documents, The Intercept promised to “move forward with what we believe is essential reporting in the public interest.”

Because of his connection to Snowden, Greenwald’s romantic partner, David Miranda, was temporarily held at London’s Heathrow airport in August 2013 under the U.K.’s Terrorism Act 2000. British authorities confiscated Miranda’s external hard drive containing “58,000 highly classified UK intelligence documents,” according to Greenwald’s then-employer The Guardian. Starting in June, 2013, Greenwald wrote a series of articles publicizing material from Snowden’s stolen files.

Omidyar prefers to keep his own politics quiet, but his funding revealed what his words didn’t. Through his foundation, the Omidyar Network Fund, he gave more than $213 million to liberal organizations – in addition to the $250 million he spent on First Look.

The liberal groups he funded included George Soros’ Open Society Foundations, the Tides Foundation (a foundation used to funnel liberal money anonymously to a variety of causes), as well as left-wing journalism groups like the Center for Public Integrity and the Center for Responsive Politics.

Another one of Omidyar’s pet projects was promoting the idea of a “post-political” world. At first, the idea of a world without political bickering might sound appealing, but Omidyar’s end goal was to limit political opposition to the majority.

Omidyar himself said as much in the announcement notice for the creation of his latest grantmaking operation, the Democracy Fund. In the January 2013 open letter, Omidyar repeatedly accused the Republican-dominated Congress of being run by “big donors and lobbyists,” as well as being “dominated by the demonization of opponents and deceptive political rhetoric.”

Partial List of Omidyar’s Donations Since 2004:

  • First Look Media: $250,000,000
  • Sunlight Foundation: $20,505,184
  • Center for Public Integrity: $2,150,000
  • Open Society Foundation (London): $677,142
  • Tides Center: $501,000

 

Conclusion

George Soros doesn’t work alone. Despite liberal cries about conservative “dark money,” the left continued to be financed by an intricate network of dozens of millionaires, billionaires and foundations. This report highlighted only a handful of the most prominent members of this group.

The media coverage of these liberal donors was inexcusable. It was not the job of the media to promote or applaud partisan efforts, and it was negligent of them to ignore or bury connections between liberal policy initiatives and the liberals who funded them. Journalists were far more apt to cover conservative billionaires and their influence than they were to cover liberal billionaires.

As George Soros retires more and more from the political funding spotlight, liberal bankrollers like Buffett, Bloomberg, Steyer, Omidyar and the younger Soros were vying to take his place. And this report is just the tip of that iceberg. There are dozens of other millionaires, billionaires and political game changers on the left. Several big liberal players were not included in this report, including Rob McKay, the Taco Bell heir and big campaigner for higher minimum wage laws; George Kaiser, the billionaire oil tycoon who invested heavily in Oklahoma politics; Drummond Pike, the creator of the highly influential Tides Foundation.

Methodology

For this Special Report, the MRC’s Business and Media Institute looked at 990 tax returns for foundations and nonprofits associated with Bloomberg, Buffett, Steyer, Omidyar and Soros. These tax returns are available through Guidestar and the Foundation Directory. All net worth amounts come from the Forbes Billionaires List.

To gauge the media coverage of these liberal donors, BMI looked for mentions of their names in Nexis transcripts for the morning and evening news shows on ABC, CBS and NBC from January 2001 to June 2014.

Recommendations for Journalists

The Business and Media Institute has the following recommendations for journalists who are reporting on political organizations, donors and funding.

  • Follow the Money: Liberal billionaires funded a wide range of political organizations and media groups. These groups were then considered authorities by major media outlets, including ABC, NBC, CBS and CNN. Instead, reporters should challenge the biases of these groups.
  • Treat Public Figures Equally: Media outlets are quick to report on funding by Charles and David Koch to conservative organizations, but they often completely ignore the wide range of funding by liberal donors. Among them, these five liberal donors are worth more than $109 billion dollars, and they aren’t alone.
  • Dig Into Backgrounds of Both Sides: The Society of Professional Journalists Code of Ethics states that journalists should, “Support the open exchange of views, even views they find repugnant.” It is incumbent upon journalists to analyze the background and funding sources for groups and individuals on both ends of the political spectrum.

— Mike Ciandella is MRC Business Senior Analyst at the Media Research Center. *** If you are rolling your eyes by now, it gets worse, add in the interference regarding the Ukraine.