An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Russian Govt Hackers broke into DNC, Stole Trump Oppo

They have been inside for a year.

Last month May, ODNI James Clapper already testified to this.

The director of national intelligence on Wednesday said officials had seen signs of attempted cyberattacks on 2016 presidential campaigns.

“We’ve already had some indications of that,” James R. Clapper Jr. said at a cyber-event at the Bipartisan Policy Center in Washington.

He did not indicate whether the attempted intrusions were successful or whether they were by foreign or domestic hackers. Nor did he specify whether the websites or campaign networks of Democratic candidates Hillary Clinton and Bernie Sanders or Republican presumptive nominee Donald Trump were targeted.

“We’re aware that campaigns and related organizations and individuals are targeted by actors with a variety of motivations — from philosophical differences to espionage — and capabilities — from defacements to intrusions,” said Brian P. Hale, director of public affairs for the Office of the Director of National Intelligence. “We defer to FBI for specific incidents.” More here from WaPo.

   

 

Russian government hackers broke into DNC servers, stole Trump oppo

The hackers had access to the information for approximately one year.

Politico: Russian government hackers broke into the computer systems of the Democratic National Committee and accessed information about Democratic candidates as well as a database on opposition research against Donald Trump, POLITICO has confirmed.

The Washington Post first reported on Tuesday that the DNC was aware of suspicious activity in April; within 24 hours of the first signals that something was amiss, cyber firm CrowdStrike was brought in to install monitoring software to analyze the details of who was responsible.

The hackers had access to the information for approximately one year but were all cleared out over the last weekend, the Post reported, noting that the DNC said that no personal, financial or donor information had been accessed or taken.

“The security of our system is critical to our operation and to the confidence of the campaigns and state parties we work with,” said Rep. Debbie Wasserman Schultz (D-Fla.), the DNC chairwoman, in a statement. “When we discovered the intrusion, we treated this like the serious incident it is and reached out to CrowdStrike immediately. Our team moved as quickly as possible to kick out the intruders and secure our network.”

A spokesman for the Russian Embassy told the Post that he had no knowledge of the hacking.

Shawn Henry, the president of CrowdStrike, told MSNBC moments after the story broke that the DNC was “very responsive” to the hack.

“They immediately recognized and had a high degree of urgency that this was important by calling us in,” Henry said. “The key piece is moving towards remediation. How are we able to quickly kind of stop the flow of intelligence that’s leaving that network and move the attackers off the network and provide the organization, allow them to build a network that is free from this type of tools that the Russians had put on to the network.”

Henry, former executive assistant director at the FBI, said the DNC contacted his organization through their legal counsel.

“We deployed certain pieces of technology that we use to try to get some visibility into the extent, the depth and breadth of this particular breach. In the course of this, working very closely with the I.T. staff of the DNC, we were able to identify with a very high degree of confidence a group that we have attributed back to the Russian government targeting that DNC network,” Henry said. “We know with certainty my time in the bureau and now at Crowd Strike that foreign intelligence services are constantly interested in political processes. They’re interested in strategies. They’re interested in foreign policy, et cetera. And the DNC and other NGOs that have been targeted over the years by this very, very sophisticated group with a high degree of capability and some very, very sophisticated technology.”

 

 

Militant Islam, Obama Admin Forbidden Terms

A distinction needs to be made. Radical extremists are for the force multipliers, those like Anwar al Awlaki. The militants like Mohammed Emwazi are born from the radicals and they are the deadly enforcers of the Islamic doctrine and Sharia.

Don’t blame the FBI for failures, with particular regard to the worst terror attack in American by a gunman, Orlando. Blame the White House. All the Q&A sessions, congressional testimony and press briefings by FBI Director James Comey have had an underlying message, a cry for help, attention and support.

Don’t blame the intelligence community including CENTCOM and the Pentagon for battlefield or rules of engagement failures. That belongs to the entire White House national security team. The Office of National Intelligence has also been affected.

This is not political correctness at all, it is a Barak Obama edict, sensitivity to Islam across our homeland and across the globe. Obama has had a strident mission since he assumed the Oval Office to create a Muslim protective shield. This is beyond dispute.

While not in any chronological order, there are some very key decisions that were made and continue to be made by the Obama administration that affect our national security and this generational war titled the Overseas Contingency Operation.

In April of 2009, Barak Obama delivered ‘The New Beginnings’ speech. In this presentation he spelled out his full agenda in what was to become the long-term mission to elevate Muslims and their organizations at home and globally. The White House objectives have been successful and consequential.

With the new beginning announced, Obama extended his same purpose throughout government agencies, law enforcement and policies as a mandatory doctrine.

‘Just before that Christmas Day attack, in early November 2009, I was ordered by my superiors at the Department of Homeland Security to delete or modify several hundred records of individuals tied to designated Islamist terror groups like Hamas from the important federal database, the Treasury Enforcement Communications System (TECS). These types of records are the basis for any ability to “connect dots.”  Every day, DHS Customs and Border Protection officers watch entering and exiting many individuals associated with known terrorist affiliations, then look for patterns. Enforcing a political scrubbing of records of Muslims greatly affected our ability to do that. Even worse, going forward, my colleagues and I were prohibited from entering pertinent information into the database.’ Philip Haney, The Hill.

Directly after the 9/11 attack, the Bush administration did reach out to the Muslim communities to determine who was with peace and national security and who perhaps gave clues of a larger and hidden condition that could be festering that would prove clues to more domestic security challenges.

Then came the Holyland Foundation trial in 2007/2008. The material facts and conditions of the domestic threat, people, money, collaboration and global consequence all converged in a courtroom in Texas.

During the Holy Land trial, FBI Agent Lara Burns testified in court that CAIR was a front for HAMAS. One trial exhibit submitted by federal prosecutors – and stipulated to by the defense in the case – explained that these organizations were dedicated to a “civilizational-jihadist process” to destroy America from within and replace the Constitution with sharia (Islamic law):

The Ikhwah [Muslim Brotherhood] must understand that their work in America is a kind of grand Jihad in eliminating and destroying the Western civilization from within and “sabotaging” its miserable house by their hands and the hands of the believers so that it is eliminated and God’s religion [Islam] is made victorious over all other religions. (p. 21)

Federal prosecutors specifically cited this internal Muslim Brotherhood planning document as the strategic goal of these U.S.-based Islamic groups – the very same group advising the Obama Administration. The federal judge in the Holy Foundation case agreed with the case presented by the federal prosecutors had made regarding these organizations, stating in one ruling that “the Government has produced ample evidence to establish the associations with CAIR, ISNA and NAIT with HLF…and with HAMAS.” (p. 14-15) More important details here from the CounterjihadReport.

The Department of Justice under Eric Holder was included in the full protection of the terror networks and associated people. Congressman Gohmert of Texas challenged AG Holder to no avail in a chilling exchange.

Here is where the ‘words matter’ material documentation began. The Obama administration took this agenda to new standard.

In 2009, DHS published via the Office of Intelligence and Analysis Assessment a ‘Rightwing Extremism’ document, pinpointing those that may challenge the Obama Muslim doctrine. Additionally, DHS posted The Department of Homeland Security launched a ‘Do’s and Dont’s bulletin.

The entire complexion of the Department of Homeland Security began to change with new personnel and outreach under Secretary Janet Napolitano. The outreach extended to law enforcement agencies of which LAPD demonstrates.

The order to purge documents, training materials and database was made. The proof is here.

Barak Obama was not finished. In 2015, the White House introduced a strategy for CVE, Counter Violent Extremism.

Then comes the foreign policy of Obama. All deference to Iran began before Obama assumed the White House in 2009 and continues today. Secret back channels to Iran using Ambassador Burns began in 2008. Further, there is Iraq and Syria with Islamic State. Documents here on ISIS prove the intelligence and forecasts were known, available and delivered.

This would not be complete without mentioning China, Russia or North Korea where policies are non-existent.

The Paris attack was a slaughter and Obama found it wise to snub the solidarity march with other world leaders.

Obama touted Yemen as one of his successes but the country collapsed. Finally, the Obama policy doctrine crumbled and the cause was fully explained here. Obama wilfully recoiled as he and Hillary did on Benghazi.

It really no longer matters that Barak Obama, Hillary Clinton or John Kerry refuse to use key terms to describe militant Islam, the entire well verse and informed world have defined it for them. What does matter beyond the words are the policies and refusals of missions, strategies and conditions to keep America, her interests and allies safe.

It is no wonder there is no global respect for the Obama administration and there is much less to fear from her.

In summary, Obama owns this terror, owns this jihad and owns the death as well as the genocide. This is his legacy, he owns it as his own scarlet letter.

 

 

Post Sandy Hook Gun Laws to Judges

 

 

Post-Sandy Hook Gun Laws to Reach Justices Days After Orlando Shooting

Second Circuit upheld Connecticut restrictions on military-style rifles. But justices haven’t shown a recent interest in gun cases.

NationalLawJournal: With the worst mass shooting in American history in the background, the U.S. Supreme Court on June 16 will take its first look at a challenge to Connecticut’s ban on military-style firearms. But as past actions show, the justices may have little interest in revisiting Second Amendment disputes, including the regulation of the AR-15-style weapon reportedly used in the Orlando shootings that killed at least 50 people at a night club.

Since its landmark 2008 ruling in District of Columbia v. Heller, the high court has declined numerous requests by gun rights advocates to examine the scope of protection for firearms—from concealed carry bans to open carry and guns on campus.

One possible reason? Lower courts have largely been uniform in upholding firearm restrictions. Jonathan Lowy, director of the Legal Action Project of the Brady Campaign to Prevent Gun Violence, told The National Law Journal last year that the circuit courts haven’t split on any significant issues.

In the Connecticut case, Shew v. Malloy, the Connecticut Citizens Defense League and others challenged a law the state passed in the aftermath of the 2012 mass killing of 20 children and six adults in Newtown, Connecticut. The shooter, Adam Lanza, fired 154 rounds in less than five minutes from an AR-15 military-style rifle.

The U.S. Court of Appeals for the Second Circuit upheld the challenged provisions in October.

The Supreme Court last year was presented a chance to take up a Chicago suburb’s assault-weapon ban. In December, the court, with justices Clarence Thomas and the late Antonin Scalia dissenting, denied review in Friedman v. City of Highland Park, Illinois. The decision left in place a Seventh Circuit ruling that upheld the city’s ban on assault weapons and large capacity magazines.

Highland Park defined an “assault weapon” as a semiautomatic firearm with one of five specific features and with the capacity to accept more than 10 rounds of ammunition. A large capacity magazine is an “ammunition feeding device with the capacity to accept more than 10 rounds,” according to the ordinance.

Thomas dissented from the denial of review. He said the Heller decision asks “whether the law bans types of firearms commonly used for a lawful purpose—regardless of whether alternatives exist. And Heller draws a distinction between such firearms and weapons specially adapted to unlawful uses and not in common use, such as sawed-off shotguns.”

Thomas said Highland Park’s ban “is thus highly suspect because it broadly prohibits common semiautomatic firearms used for lawful purposes. Roughly five million Americans own AR-style semiautomatic rifles. The overwhelming majority of citizens who own and use such rifles do so for lawful purposes, including self-defense and target shooting.”

California, Connecticut, New York, Maryland, Massachusetts, New Jersey and Hawaii, have bans similar to Highland Park’s law.

In June 2015, with Thomas and Scalia again dissenting, the justices declined to review Jackson v. City and County of San Francisco. The Ninth Circuit in that case upheld certain restrictions on handguns kept in the home.

The Ninth Circuit acted again on June 10 in Peruta v. County of San Diego, holding there is no Second Amendment right for private citizens to carry concealed weapons in public.

The Connecticut case that the justices have scheduled for their June 16 conference was filed by the Connecticut Citizens Defense League and others. They are represented by the same lawyers who brought the Illinois challenge—including David Thompson of Washington’s Cooper & Kirk.

Thompson argues the Supreme Court’s ruling in Heller applies to firearms “typically possessed by law-abiding citizens for lawful purposes.”

Under Heller’s reasoning, he said, “law-abiding citizens also must be permitted to use the arms at issue in this case, which include AR-15s, the nation’s most popular semi-automatic rifles.”

Opposing review, Connecticut Assistant Attorney General Maura Osborne argued: “There is no disagreement among the lower courts on the question in this case. Indeed, the lower courts that have fully and finally considered whether a state may prohibit access to assault weapons have universally concluded that states may do so.”

Maryland regulations under review

Gun rights advocates and their opponents are closely watching a Maryland case that could create a division among circuit courts.

On May 11, the full Fourth Circuit considered the constitutionality of Maryland’s ban on certain semiautomatic weapons. Maryland’s Firearm Safety Act, like Connecticut’s regulations, passed in the wake of the 2012 Newtown elementary school shootings. The law also prohibits magazines holding more than 10 rounds.

A three-judge panel in Kolbe v. Hogan ruled in February that the state ban imposed a “substantial” burden on the Second Amendment rights of law-abiding citizens. It vacated a district court decision that upheld the ban. The appellate panel directed the trial court to apply “strict scrutiny,” a high standard that requires the government to prove a restriction “furthers a compelling interest” and it not overly broad.

“Let’s be real: The assault weapons banned by Maryland’s [Firearm Safety Act] are exceptionally lethal weapons of war,” Fourth Circuit Judge Robert King wrote in a dissent that supported the trial judge. “In fact, the most popular of the prohibited semiautomatic rifles, the AR-15, functions almost identically to the military’s fully automatic M16.”

A decision by the full Fourth Circuit is pending.

Read More:

Thomas Objects as Justices Turn Away Challenge to Assault-Weapon Ban

A Liberal Court Could Limit Reach of ‘Heller’

Second Circuit Largely Upholds Weapon Restrictions in Connecticut, New York

Split Ninth Circuit Rejects Concealed Carry Right in Gun Case

Florida Supreme Court Takes On Open-Carry Case

The Long Push to Get Another High-Court Gun Ruling

In Wake of Oregon Shooting, Don’t Expect Gun Makers to Pay

 

FBI on Orlando Attack, Comprehensive Details

 

House members will receive a classified briefing on Tuesday afternoon on the Orlando shooting from FBI Director James Comey, Homeland Security Secretary Jeh Johson, and National Counterterrorism Center Director Nick Rasmussen, Speaker Paul Ryan’s office has announced.

Police and SWAT finally got into the club and said if you are alive, raise your hand….let that sink in.

 

Director Provides Update on Orlando Shootings Investigation

FBI Director James B. Comey said today that the FBI is working non-stop to understand what led a man to commit a mass shooting in Orlando, Florida that left 49 people dead and dozens more injured.

In a televised news briefing at FBI Headquarters, Comey said FBI investigators—working closely with state and local law enforcement agencies—are trying to understand “every moment of the killer’s path” leading up to the shooting early Sunday morning at a popular nightclub.

Comey said the shooter, who was killed in a gunfight with police responders, made three 911 phone calls from the club during the attack, beginning at about 2:30 a.m. In the calls, he claimed allegiance to the leader of the so-called Islamic State (ISIL) as well as the perpetrators of the 2013 Boston Marathon attack and a Florida man who died as a suicide bomber in Syria for a terrorist group in conflict with ISIL.

“There are strong indications of radicalization by this killer and of potential inspiration by foreign terrorism organizations,” Comey said, adding that the FBI is the lead investigative agency on this case because it is a terrorism investigation.

Director Comey also described the FBI’s prior contacts with the killer, beginning in May 2013. The FBI opened an investigation when the shooter, then working as a contract security guard, made some inflammatory comments to co-workers and claimed a family connection to Al Qaeda. The shooter was interviewed twice during the preliminary investigation, where he admitted making the statements but said he had done so in anger at his co-workers, who he believed were discriminating against him. The case was closed after 10 months.

Two months later, the shooter’s name surfaced as a casual acquaintance of the Florida man who blew himself up in Syria for the terrorist group al Nusra Front. “Our investigation turned up no ties of any consequence between the two of them,” Comey said. “We will continue to look forward in this investigation, and backward. We will leave no stone unturned.”

Comey said the Bureau is reviewing those cases to see if anything was missed. “We’re also going to look hard at our own work to see whether there is something we should have done differently. So far, the honest answer is: I don’t think so. I don’t see anything in reviewing our own work that our agents should have done differently.”

The Director, who was joined at the press briefing by Deputy Attorney General Sally Yates, expressed sorrow for the victims and their families.

“Our hearts are broken and ache for the people who are lost in Orlando, those wounded, and their families,” he said.

Comey also thanked first responders for their heroic work. “They showed professionalism and extraordinary bravery that saved lives,” he said. “We are very lucky that such good people choose lives of service in law enforcement.”

 

Chinese Govt Makes Millions of Fake Social Media Posts

Sounds just like Russia…and China has an army that is assigned to keep up the espionage against the West.

 

Red astroturf: Chinese government makes millions of fake social media posts

“50-cent” posters aim to distract from dissent rather than confront it.

arsT: Data scientists at Harvard University have found that the government of the People’s Republic of China generates an estimated 448 million fake social media posts per year. The posts are an effort to shape online conversations by citizens and to distract them from sensitive topics “and change the subject”—largely through “cheerleading” posts promoting the Chinese Communist Party and the government.

The research, conducted by Harvard professor Gary King and former Harvard graduate students Jennifer Pan and Margaret Roberts and supported by Harvard’s Institute for Quantitative Science, made use of a goldmine of propaganda content. This included a leaked archive of e-mails sent to the Zhanggong District Internet Propaganda Office from 2013 to 2014 that showed government workers’ documentation of completion of fake post work, including screen shots. The research also analyzed social media posts on Chinese websites from 2010 to 2015.

Previously, posts like these were believed to be the work of what observers have called the “50-cent Party”—named for what some believed the posters are paid by the state for their propaganda work. As it turns out, the posts analyzed by King and his co-researchers were likely mostly written for free as an extra duty of government employees.

And while the “50c” posts had long been assumed to be focused on attacking critics of the government and the Party, the researchers found instead that “the Chinese regime’s strategy is to avoid arguing with skeptics of the party and the government, and to not even discuss controversial issues. We infer that the goal of this massive secretive operation is instead to regularly distract the public and change the subject, as most of these posts involve cheerleading for China, the revolutionary history of the Communist Party, or other symbols of the regime.” In essence, the fake posts are a government-sponsored “astro-turfing” campaign—an attempt to create the impression of a grassroots groundswell of support for the Party and the government.

The term “astro-turfing” first became widely used  to online public relations efforts by Microsoft as the company was fighting a government anti-trust case through the Microsoft-funded group Americans for Technology Leadership, though the term had been used in the past to describe off-line fake grassroots efforts. It has become a common (but unethical) political and marketing practice—particularly as companies try to shape online reviews and comments about their products and services. But none has engaged in this practice on the scale of the Chinese government’s campaign, which used government workers to spread happy talk about the Party and state. Of the posts analyzed from the Zhanggong archive, the researchers found 99.3 percent were contributed by one of more than 200 government agencies. Twenty percent of those posts were posted directly by employees of the Zhanggong Internet Propaganda Office, with smaller percentages coming from other regional and municipal government agencies.

As for the allegation that these astroturfers get paid by the government for their posts, the researchers noted, “no evidence exists that the authors of 50c posts are even paid extra for this work. We cannot be sure of current practices in the absence of evidence but, given that they already hold government and Chinese Communist Party (CCP) jobs, we would guess this activity is a requirement of their existing job or at least rewarded in performance reviews.”

Yup, there is more….

Related reading: Japan, India agree to boost three-way defense cooperation with U.S.

Related reading: U.S., India Sign 10-Year Defense Framework Agreement

Defence forces on alert after Chinese cyber attack

TheNewIndianExpress: An alert has been issued to the Indian Army, Navy and Air Force that a Chinese Advanced Persistent Threat (APT) group called Suckfly, based in Chengdu region, is targeting Indian organisations. India’s defence establishment is its prime target.

Suckfly is involved in carrying out cyber espionage activities by sending out a malware called Nidiran.

According to the alert, Suckfly has stolen certificates from legitimate software developing firms in South Korea and is using them to camouflage its attacks. “Sensitive information from targeting computers and networks is exfiltrated, and this information is being used to undermine the national security and economic capabilities,” the alert issued from the Ministry of Defence states.

APT is a network attack in which an unauthorised person gains access and stays there undetected for a long period of time. The intention of an APT attack is to steal data instead of causing damage to the network or organisation.

“It has successfully carried out cyber espionage by infecting computers of both government and commercial houses of India involved in e-commerce, finance, healthcare, shipping and technology. Targeting of military personnel cannot be ruled out, keeping in mind the sensitive nature of data being handled by them,” the alert adds.

What is alarming for security agencies is that the cyber attack was carried out from the headquarters of China’s People’s Liberation Army. Chengdu Military Command is in charge of security along India’s eastern sector in the Tibet region, including Arunachal Pradesh. Defence Minister Manohar Parrikar had visited Chengdu Military Command during his visit to Beijing in April.