What is the Justice Department Investigating and Prosecuting Anyway?

A sudden decision to drop the case against Marc Turi, the legitimate arms dealer approved by Hillary to move weapons to Libya, oh…no…then to Qatar and then not at all had his home raided. Why? Good question except Turi Defense was approved not never launched any shipments. The case against him fell apart mostly due to the notion the government would have to produce documents of the case and background for legal discovery and it would have further tainted Hillary Clinton’s actions regarding Qaddafi and her actions in Libya. Hummm okay….what else? All kinds of cases and questions, try a few of these below. Remember too that Obama issued a pardon for Iranians in the United States during the prisoner swap with Iran. Don’t forget those pesky 5 Taliban commanders released for Bowe Bergdahl.

Meanwhile:

Hamas On Campus, and Hamas is a terror organization, since 1997.

 Introduction:

Across America college campuses are being flooded with pro-terrorist propaganda by groups supported by college administrators and student funds. These groups are led by Students for Justice in Palestine but they include the broad coalitions of the left which have become the breeding grounds for a new anti-Semitism. Boycott, Divest and Sanctions resolutions targeting the state of Israel for destruction are passed to chants of “Allahu Ahkbar,” while Jewish students are the targets of verbal and physical harassments which have reached epidemic proportions. This is a report on the 10 schools most supportive of the efforts of Students for Justice in Palestine and its allies, to demonize the state of Israel and bring about its destruction.

Students for Justice in Palestine (SJP) portrays itself as a typical student organization and multicultural group advocating for “social justice” in the Middle East, but this image is a cleverly constructed disguise. Students for Justice in Palestine is not concerned about justice in Palestine where the Hamas regime steals hundreds of millions of dollars earmarked for humanitarian aid and uses it to dig terror tunnels whose only purpose is to murder Jews. In truth, SJP is a pro-terror organization that is funded by anti-Israel Hamas terrorists for the purpose of destroying Israel, the world’s only Jewish state, and committing genocide against its Jewish population as prescribed in the Hamas charter.

Visit Stop the Jew-Hatred on Campus

1. Brooklyn College (CUNY)

2. San Diego State University

3. San Francisco State University

4. Tufts University

5.  University of California Berkeley

6.  University of California Irvine

7.  University of California Los Angeles

8.  University of Chicago

9.  University of Tennessee Knoxville

10. Vassar College

More here from Front Page.

**** Then there is Mosed Omar.

Federal prosecutors — acting abruptly and without public explanation — have moved to drop a controversial criminal passport fraud case that critics alleged stemmed from coercive interrogations at the U.S. embassy in Yemen.

Earlier this year, a grand jury in San Francisco indicted Mosed Omar on passport fraud charges linked to a statement he signed during a 2012 visit to the U.S. diplomatic post in the unstable Middle Eastern nation.

After signing the statement saying he’d used a false name when he was naturalized as a U.S. citizen in 1978, Omar’s U.S. passport was confiscated and a request for a passport for his daughter was denied. Omar eventually made it back to the U.S. on a temporary travel permit. More here from Politico.

There was the case of Huma Abedin not only working officially at the State Department for Hillary Clinton, but at the same time she was on the payroll of Teneo. Has this investigation and case advanced in any form? Not so much.

It seems that double dipping, meaning working for the Federal government and other outside organizations is actually quite common and this too includes staffers working for legislators in both houses of Congress. So, this does tell us there is nepotism perhaps and for sure conflicts of interest. How so you ask? Words matter and members of Congress figured out that the word ‘fellowship’ is best used to describe the work…..sheesh….

POGO: The U.S. Congress allows Members to staff their offices with Fellows who are paid by corporations, foundations, universities, non-profits, and other outside private entities.

The Fellows are required to abide by all the laws, rules, and standards governing permanent Congressional staff members. Indeed, they are often indistinguishable from permanent staff members. They work on writing legislation and Floor speeches, and represent the Member in meetings with other offices and constituents.

POGO reviewed 2,014 publicly available reports on Senate fellows and found several examples of the appearance of a conflict of interest, and that Senators did not consistently disclose fellows whose salary was paid by a third party. The House does not maintain records on Congressional Fellows at all.

On the Senate side, fellows and their supervisors are required to file reports detailing when they began their fellowship, how much money they’re making, what entity is paying their salary, and how many hours they’ve worked. Senate rules mandate that new fellows file their “Agreement to Comply with the Senate Code of Official Conduct,” known as form 41.4, at the beginning of their fellowship, at the end of each calendar quarter, and at the end of the fellowship. The fellow’s supervisor must file a “Report on Individuals Who Perform Senate Services,” known as form 41.6, which is often signed by the Senator. While these forms are available to the public, they are not electronically available and anyone interested in seeing them must visit the Senate Office of Public Records during business hours.

Is there a code of conduct, formal disclosures and rules that apply here? Yes….is there compliance? Not so much. Essentially, this is but another means to lobby members of Congress and to ensure earmarks are designated, and they are.

Require disclosure in the House of Representatives

The House Rules committee should introduce language into the Code of Official Conduct that would require Representatives to report when their office employs an individual who is compensated by any source outside of the United States Government. Such a report should include the identity of the source of the compensation and the amount or rate of compensation.

More oversight in the Senate

Senate reporting of Fellows who are paid by corporations, foundations, universities, non-profits, and other outside private entities is falling short.  The Senate Ethics Committee needs to increase its oversight over the Congressional Fellows reporting requirements, actively checking with Member offices to make sure they don’t have any Fellows employed for years they don’t report any. The Senate Ethics Committee should also increase training for Member offices on what they are required to report, at the start of each Congress it should hold a series of trainings for all Member offices.

Both Chambers should require electronic filing of these disclosures, in a publically accessible format

The Senate, and House as it begins to require reporting on Fellows, should transition to an electronic filing system that can be accessed by the public. This will allow for more uniform participation by Member offices and more public oversight over the Congressional Fellowship programs. Read on here for further and exact details from POGO. Fabulous investigative work and causes for more questions to be asked and solutions to be applied.

 

 

 

General Milley on our Enemies with Emphasis on Russia

   

Primer: For all you pro Russian and pro Putin types out there:

What you Need to Know About the Gerasimov Doctrine’

and

Russian Hybrid Warfare: How to Confront a New Challenge to the West

***

Military: The U.S. Army‘s chief of staff on Tuesday issued a stern warning to potential threats such as Russia and vowed the service will defeat any foe in ground combat.

“The strategic resolve of our nation, the United States, is being challenged and our alliances tested in ways that we haven’t faced in many, many decades,” Army Chief of Staff Gen. Mark Milley told an audience at the Association of the United States Army’s annual meeting in Washington, D.C.

“I want to be clear to those who wish to do us harm … the United States military — despite all of our challenges, despite our [operational] tempo, despite everything we have been doing — we will stop you and we will beat you harder than you have ever been beaten before. Make no mistake about that.”

Milley’s comments come during an election year in which voters will decide a new president and commander in chief — and a period of increased military activity of near-peer competitors, including Russia and China.

The Army has struggled to rebuild its readiness after more than a decade of extended combat operations in Iraq and Afghanistan. The service has significantly cut the size of its force since the Cold War and decreased its modernization budget in the last decade, Milley said.

“While we focused on the counter-terrorist fight, other countries — Russia, Iran, China, North Korea — went to school on us,” he said. “They studied our doctrine, our tactics, our equipment, our organization, our training, our leadership. And, in turn, they revised their own doctrines, and they are rapidly modernizing their military today to avoid our strengths in hopes of defeating us at some point in the future.”

Milley also quoted a senior Russian official as saying publicly, “The established world order is undergoing a foundational shake-up” and that “Russia can now fight a conventional war in Europe and win.”

The general warned that future warfare with a near-peer adversary will “be highly lethal, unlike anything our Army has experienced at least since World War II.”

“Our formations will likely have to be small; we will have to move constantly,” he said. “On the future battlefield, if you stay in one place for longer than two or three hours, you will be dead.”

Despite the challenges, Milley said the Army will adapt to survive such a dangerous battlefield.

“It’s a tall order for sure — to project power into contested theaters, fight in highly populated urban areas, to survive and win on intensely lethal and distributed battlefields and to create leaders and soldiers who can prevail. Tough? Yes. But impossible? Absolutely not,” Milley said.

“Make no mistake about it, we can now and we will … retain the capability to rapidly deploy,” he said, “and we will destroy any enemy anywhere, any time.”

**** So what is percolating globally and against the United States that has the Pentagon concerned?

Using the same provocations that Iran has used against the United States, Russia is doing the same thing.

Nato jets scrambled as Russian bombers fly south

Two Russian Blackjack bombers were intercepted by fighter jets from four European countries as they flew from the direction of Norway to northern Spain and back, it has emerged. Norway, the UK, France and Spain all scrambled jets as the TU-160 planes skirted the airspace of each country. It comes at a time of heightened tension between the West and Russia. Correspondents say the frequency of Russian bombers being intercepted by Nato planes has increased markedly. Spanish media say it is the furthest south such an operation has had to take place. More here from the BBC.

Map locator

Given the failed truce or cease fire agreement regarding Syria, it was announced by John Kerry and approved by the White House and National Security Council to walk away fully from Russia and seek other avenues with regard to the deadly civil war in Syria. As noted, last week before the Senate, it was admitted there was no Plan B.

In recent months, Russia has been quite aggressive and militant towards Americans in Moscow and other cities in Russia. Some diplomats have been beaten up, robbed and their homes broken into. The most recent incident involved some Americans being drugged.

“We are outraged,” Russian Deputy Foreign Minister Sergey Ryabkov said in a statement posted on the Russian Foreign Ministry website, adding the claim may have been the work of the US State Department seeking “revenge” for the collapse of talks between the two counties to address the situation in Syria.
 
Russia’s denial came after a report two days ago by Radio Free Europe/Radio Liberty that the diplomats — a man and a woman who were not senior officials — allegedly had their drinks spiked with a date-rape drug while attending a United Nations convention on corruption last November. The report, attributed to anonymous sources, said the State Department quietly protested the incident to Russian officials.
The story also said one of the diplomats had been treated at a “Western medical clinic” – which Russia said was not true. More here from CNN.
American personnel and diplomats are being evacuated from talks and some ground operations in Syria where and when the bloodshed continues in Aleppo.

Russia had agreed to a cease-fire last month, but that fell apart quickly. Russia argues that the United States has failed in its commitment to separate the moderate rebel groups it supports from more radical factions such as the Syrian branch of Al Qaeda.

Kirby said the United States will withdraw a team that had been dispatched to open a so-called joint implementation center, in which Russian and American armed forces were going to join efforts to fight Islamic State and other jihadi groups.

Also Monday, Russian President Vladimir Putin signed a decree suspending his country’s participation in a treaty with the U.S. designed to eliminate nuclear weapons.

Putin cited “a threat to strategic stability as a result of USA’s unfriendly acts toward Russia.” This was a reference to a deepening diplomatic spat between the Kremlin and the White House over Syria, as well as tensions and sanctions that followed Russia’s 2014 takeover of Crimea and its support to separatists in eastern Ukraine.

It is the latest action by Russia that serves to unwind the nuclear-cooperation and weapons treaties that have governed the relationship between the U.S. and Russia in the years after the Soviet dissolution.

The U.S. said it would continue to participate in multilateral talks over Syria, aimed at achieving a cessation of hostilities and the delivery of aid, and would communicate with Russia regarding airstrikes to avoid collisions.

Last week, when it first threatened to suspend Syria talks with Russia, Washington said it would consider other options, including additional financial sanctions or even military operations. More here from the LATimes.

Then it appears the National Security Council and the State Department pinged the United Nations for some action….well kinda sorta.

The United States virtually blocked the United Nations Security Council’s statement that condemned the mortaring of Russia’s embassy in Damascus, Russia’s Permanent Mission to the global organization said.

“It was actually blocked by the U.S. delegation, which tried to bring outside elements into a standard text. Brits and Ukrainians clumsily helped Americans,” the mission said.

It said that the behavior of the three countries “testifies to their blatant disrespect for the Vienna Convention on Diplomatic Relations”, which demands to protect diplomatic and consular facilities and personnel.

The Russian mission said that “when such crimes were committed earlier, including against the diplomatic missions of Western countries, Russia has always unconditionally supported their condemnation by the Security Council.”

“We have to state that the moral principles of some of our colleagues in the Security Council have seriously teetered,” it said. More here from TASS.

Russia is taking all precautions forecasting future aggressions in Syria as they installed the S-300 anti-aircraft missile defense system at the Russia base of Tartus which is near Latakia, Syria on the Mediterranean Sea.

Further there is the matter of the Baltics and Ukraine. Control and management of the Mediterranean and the Black Sea is at risk.

NATO members must increase the alliance’s military capabilities, position additional forces in the Baltics and Eastern Europe, establish a maritime force in the Black Sea and bolster its presence in the Arctic, all to counter Russia’s growing military strength and increasingly belligerent behavior toward its neighbors, the Atlantic Council said in a new report.

The report, “Restoring the Power and Purpose of the NATO Alliance,” also urges America’s leaders to strengthen U.S. leadership of NATO, work to restore public support for the trans-Atlantic alliance and “counter those who threaten to withdraw U.S. support for NATO.” And it calls on alliance members to maintain their commitment to securing Afghanistan and to increase military assistance and intelligence-sharing with “its Arab partners” in response to the spreading terrorist threat.

The policy paper was crafted by a team led by former veteran diplomatic Nicholas Burns, who was the U.S. ambassador to NATO, and retired Gen. James Jones, a former Marine Corps commandant and Supreme Allied Commander in Europe. The report was prepared ahead of next month’s NATO summit in Warsaw. More here.

What about the Arctic?

Russia: Militarizing the Arctic

While the Arctic region remains peaceful, Russia’s recent steps to militarize the Arctic, coupled with its bellicose behavior toward its neighbors, makes the Arctic a security concern. Russia’s Maritime Doctrine of Russian Federation 2020, adopted in July 2015, lists the Arctic as one of two focal points, the other being the Atlantic.[1]

Russia’s Northern Fleet, which is based in the Arctic, now counts for two-thirds of the Russian Navy. A new Arctic command was established in 2015 to coordinate all Russian military activities in the Arctic region.[2] Underwater, Russian submarines are operating at a rate not seen since the end of the Cold War. Indeed, Admiral Viktor Chirkov, commander-in-chief of the Russian navy, stated in 2015 that the navy had ramped up submarine patrols by 50 percent from just 2013.[3]

Over the next few years, two new so-called Arctic brigades will be permanently based in the Arctic region, and Russian special forces have been training in the region. Soviet-era facilities have been re-opened; Russia is expected to have nine operative airfields in the Arctic by 2018.[4] Russia has reportedly also placed radar and S-300 missiles on the Arctic bases at Franz Joseph Land, New Siberian Islands, Novaya Zemlya, and Severnaya Zemlya.[5] Russia’s ultimate goal is to deploy a combined arms force in the Arctic by 2020, and this plan appears to be on track.[6] In early June, the Russian Navy showed off its first new icebreaker in 45 years.[7]

As an Arctic power, Russia’s military presence in the region is to be expected. However, it should be viewed with some caution in light of recent Russian aggression in its neighborhood. The former Supreme Allied Commander of Europe, General Philip Breedlove, described Russian activity in the Arctic as “increasingly troubling,” stating: “Their increase in stationing military forces, building and reopening bases, and creating an Arctic military district—all to counter an imagined threat to their internationally undisputed territories—stands in stark contrast to the conduct of the seven other Arctic nations.”[8]. More here from Heritage.

****

ABC: The Russians are already there in force. Last year, they staged a military exercise in the Arctic as seen in this Russian Ministry of Defense footage.

It involved about 40,000 troops, 15 submarines, 41 warships and multiple aircraft.  No one disputes their right to do that on their own territory.  It’s just that it wasn’t announced.

Philip Breedlove: We pre-announce ours.  No one is surprised by them whereas the exercise that Russia did was a snap exercise which is a bit destabilizing.

Until May of this year, retired four-star General Philip Breedlove was the supreme Allied commander of NATO with responsibility for the Arctic.

What else is destabilizing, he says, is Russia’s military build up along something called the Northern Sea Route skirting the Russian Arctic coastline. The route could become an alternative to the Suez Canal, saving huge amounts of time and money for the commercial shipping industry.

Philip Breedlove: I have heard as much as 28 days decrease in some of the transit from the northern European markets to the Asian markets. That is an incredible economic opportunity. And it could be a very boon— big boon to business around the world.

Lesley Stahl: What would it mean if the Russians did gain control over the Northern Sea route?

Philip Breedlove: If the Russians had the ability to militarily hold that at ransom, that is a big lever over the world economy.

Related reading: Russia’s Military Sophistication in the Arctic Sends Echoes of the Cold War

DHS Officially Issues Alert on Election Hacking

Related reading: Hacking an election is about influence and disruption, not voting machines

DHS Issues Alert on U.S. Election Hacking

The United States Department of Homeland Security has issued an Intelligence Assessment on the Cyber Threats and Vulnerabilities to U.S. Election Infrastructure. The report, which primarily downplays the risk of hacking election systems appears to conflict with recent FBI Director testimony stating that at least 20 states have been electronically probed with four suffering hacking related intrusions. The report does note that “multiple elements of US election infrastructure are potentially vulnerable to cyber intrusions. The risk to US computer-enabled election systems varies from county to county, between types of devices used, and among processes used by polling stations.”

The key judgments also include:

  • DHS has no indication that adversaries or criminals are planning cyber operations against US election infrastructure that would change the outcome of the coming US election. Multiple checks and redundancies in US election infrastructure—including diversity of systems, non-Internet connected voting machines, pre-election testing, and processes for media, campaign, and election officials to check, audit, and validate results—make it likely that cyber manipulation of US election systems intended to change the outcome of a national election would be detected.
  • We judge cybercriminals and criminal hackers are likely to continue to target personally identifiable information (PII), such as that available in voter registration databases. We have no indication, however, that criminals are planning theft of voter information to disrupt or alter US computer-enabled election infrastructure.

Other elements of the report, note the resiliency of the voting infrastructure, but also the potential for nation-state disruption.

No Indication of Cyber Operations to Change Vote Outcome

  • DHS has no indication that adversaries or criminals are planning cyber operations against US election infrastructure that would change the outcome of the coming US election. Multiple checks and redundancies in US election infrastructure—including diversity of systems, non-Internet connected voting machines, pre-election testing, and processes for media, campaigns and election officials to check, audit, and validate results—make it likely that cyber manipulation of US election systems intended to change the outcome of a national election would be detected.
  • We assess that successfully mounting widespread cyber operations against US voting machines, enough to affect a national election, would require a multiyear effort with significant human and information technology resources available only to a nation-state. The level of effort and scale required to change the outcome of a national election, however, would make it nearly impossible to avoid detection. This assessment is based on the diversity of systems, the need for physical access to compromise voting machines, and the security and pre-election testing employed by state and local officials.* In addition, the vast majority of localities engage in logic and accuracy testing, which work to ensure voting machines operate and tabulate as expected—before, during, and after the election.
  • We judge, as a whole, voter registration databases are resilient to systemic, nationwide cyber manipulation because of the diverse systems and security measures surrounding them. Targeted intrusions against individual voter registration databases, however, are possible. Additionally, with illicit access, manipulation of voter data, or disruptions to their availability, may impact a voter’s ability to vote on Election Day. Most jurisdictions, however, still rely on paper voter rolls or electronic poll books that are not connected in real-time to voter registration databases, limiting the possible impacts in 2016.
  • Voting precincts in more than 3,100 counties across the United States use nearly 50 different types of voting machines produced by 14 different manufacturers. The diversity in voting systems and versions of voting software provides significant security by complicating attack planning. Most voting machines do not have active connections to the Internet.
  • We assess the impact of an intrusion into vote tabulation systems would likely be contained to the manipulation of unofficial Election Night reporting results, which would not impact the certified outcome of an election, but could undermine public confidence in the results. In addition, local election officials, media organizations, and political campaigns carefully monitor local voting patterns, particularly in electorally significant jurisdictions, and are likely to detect and begin investigating potential anomalies quickly.

Non-State Actors Likely To Continue Targeting PII, Potentially Attempt Disruption

  • We judge cybercriminals and criminal hackers are likely to continue to target voter PII. We have no indication, however, that cybercriminals are planning theft of voter information to disrupt or alter computer-enabled US election infrastructure voting. Politically-motivated criminal hackers could attempt temporary disruptive cyber attacks, such as denial-of-service (DoS) attacks or web defacements against election-related websites, in the lead-up to or during the election process. Disruptive attacks could target public-facing state and local government websites, potentially including election infrastructure used to report election results to the general public and media; however, we judge this activity would likely have little impact on the voting process itself.
  • Unknown cyber actors in mid-July used an open-source scanning tool to identify and exploit a structured query language (SQL) injection vulnerability and exfiltrate PII from a Midwestern state board of elections website, according to FBI sources with excellent access and information provided by a cybersecurity organization supporting states. In at least three other states, voting and non-voting related websites during the same period observed unsuccessful SQL injection attacks from unknown actors, according to the same reporting.
  • Cybercriminals routinely attempt exploitation of misconfigured and vulnerable websites and webservers via SQL injection, brute force login attempts, cross-site scripting, and other publicly known vulnerabilities, according to DHS reporting from sources with direct access.
  • Criminal hackers routinely engage in disruptive attacks such as website defacement and DoS attacks, through exploiting publicly known vulnerabilities and for-hire DoS tools, according to DHS reporting from reliable sources with direct access.

Vulnerability of Computer-Enabled Election Systems

  • We assess multiple elements of US election infrastructure are potentially vulnerable to cyber intrusions. The risk to computer-enabled election systems, however, varies from county to county, between types of devices used and among processes used by polling stations.
  • Electronic Voting Systems: Security researchers have repeatedly demonstrated in laboratory testing environments that voting machines are vulnerable to compromise, usually with physical access, and such compromises could result in the manipulation of vote totals. Election outcomes would only be impacted if the compromise happened on a large scale across multiple machines or jurisdictions—which we judge to be beyond the capability of any adversary—or in cases of smaller local elections where the margin of victory is at a smaller scale.
  • Voter Registration Databases: Online voter registration systems provide a potential point of vulnerability to enable cyber actors to gain illicit access to voter registration databases. Cyber actors have exploited these portals in the past to gain illicit access to voter information. Compromises of voter registration databases have resulted in the potential release of PII, but not the modification of records—with the exception of one unconfirmed incident of voter registration manipulation reported by US media. The exposure of voters’ information would have limited impact on the integrity of the election process; however, it could undermine confidence in the system and provide the ability to conduct further cyber operations.
  • Public Dissemination of Voting Results: State government information technology solutions generally include a public-facing Internet-connected portion that is used to report election results to the general public and media, which some states have begun migrating to the cloud due to Election Day demand. Vulnerabilities in the public-facing Internet portion could be used to display inaccurate vote results to the public and media. Election Day results are not the official results of the state or local jurisdiction.

election-hacking

1999: Clinton Admin Knew/Facilitated China Military Theft

 Wen Ho Lee

Related reading: 2015, FBI Arrests Chinese Millionaire Once Tied to Clinton $$ Scandal

Related reading: The Russia-China relationship could lead to some interesting changes on the global stage.

And the biggest changes are occurring far away from Washington’s orbit.

obama xi putinUS President Barack Obama (L-R), China’s President Xi Jinping, and Russia’s President Vladimir Putin during a photo shoot at the International Convention Center at Yanqi Lake in Beijing, November 11, 2014. REUTERS/Kim Kyung-Hoon

Although the Sino-Russo relationship predates the Ukraine conflict, there’s no question that the crisis has shifted Moscow even more toward Beijing.

Over the last year, we saw the two countries sign highly publicized energy deals, conduct joint military exercises, and even generally support each others’ foreign policy adventures. More here from BusinessInsider.

Here are a few questions for investigators in both houses of Congress to pose:

NYT’s: To Samuel Berger, the Hogan & Hartson trade lobbyist turned national security adviser: Why can’t Congress see your memo to President Clinton summarizing the devastating Cox report on espionage when it was submitted for security clearance in January? With the report now public, no claim of secrecy can properly be made.

Clinton pretended two months ago to have been uninformed of wholesale espionage. Did Berger’s January cover memo truly reflect the Cox report’s revelations, or did it lull the President into a false sense of national security?

To Bill Richardson, Energy Secretary since September 1998: You were briefed on espionage suspicions in November, and received the Cox report in January. Did you never have occasion to mention its serious implications on China policy to the President? You knew Secretary of State Albright was going to China in February; why did you withhold it from her? Did the White House suggest she be kept ignorant, or was it your own idea?

To F.B.I. Director Louis Freeh: Attorney General Janet Reno says ”I was not apprised of the details of the case at the time the decision was made” to reject wiretap surveillance of Wen Ho Lee at Los Alamos. Didn’t you think this was important enough to take to the top? She also says your 1997 request ”did not contain a request to search any computer.” If that is true, why not?

To the Senate Democratic leader, Tom Daschle: The bipartisan Cox report charges the White House with failing to inform Congress, but you say ”Republican chairs of the Congress were warned about this as early as 1996 and also chose to do nothing.” Did you read those ”warnings” before accusing Senator Arlen Specter and Representative Porter Goss of failing in their intelligence oversight duties? Can the public now see if those staff briefings were complete?

To Dan Burton, chairman of the House Government Reform and Oversight Committee: With Reno Justice allowing all Clinton’s illegal Asian fund-raisers to cop a plea and walk, you’ve subpoenaed Charlie Trie for June 10 and John Huang for June 17. Will you allow the ranking Democrat, Henry Waxman, to turn hearings into a partisan circus, or will you depose Trie and Huang extensively beforehand to discover links to Bruce Lindsey, the D.N.C.’s Don Fowler and Hillary’s Harold Ickes?

To George Tenet, Director of Central Intelligence: You reported to Cox that information on China’s theft of our W-88 nuclear warhead design came from a ”walk-in” planted by Chinese intelligence. That’s counterintuitive counterintelligence; does nobody in C.I.A. dispute the ”dangle” theory? Where is he now, and is he (or she) singing?

To Richard Shelby and Bob Kerrey of Senate Intelligence: The Cox report ran 900 pages, but nearly 400 pages were cut out by the Clinton sanitizers. Was all of this really for security reasons, or do many redactions cover C.I.A., F.B.I. and White House embarrassments?

To Senator Robert Torricelli, Democrat of New Jersey: You told CBS’s Bob Schieffer that Clinton should talk to Reno about ”her ability to perform her duties.” Are you worrying about her judgment under a physical affliction, or making a nonpartisan judgment on sustained misfeasance at Justice — or helping the White House toss her off the sled to save Sandy Berger?

The biggest question is this: Will we fall for the usual ”it’s old news” and ”everybody did it” defenses? Or will we connect the dots from the (a) corrupt Asian and satellite-producer contributions to the (b) refusal to stop the theft of nuclear codes lest it offend Beijing to the (c) change of policy to sell China powerful computers capable of using those codes to simulate tests?

The House is being serious. What about the Senate?

****What is this all about you ask?

*The People’s Republic of China (PRC) has stolen design information on the United States’ most advanced

thermonuclear weapons.

* The Select Committee judges that the PRC’s next generation of thermonuclear weapons, currently under development, will exploit elements of stolen U.S. design information.

* PRC penetration of our national weapons laboratories spans at least the past several decades and almost

certainly continues today.

****

• The stolen information includes classified information on seven U.S. thermonuclear warheads, including every currently deployed thermonuclear warhead in the U.S. ballistic missile arsenal.

• The stolen information also includes classified design information for an enhanced radiation weapon (commonly known as the “neutron bomb”), which neither the United States, nor any other nation, has yet deployed.

• The PRC has obtained classified information on the following U.S. thermonuclear warheads, as well as a number of associated reentry vehicles (the hardened shell that protects the thermonuclear warhead during reentry).

****

In addition, in the mid-1990s the PRC stole, possibly from a U.S. national

weapons laboratory, classified thermonuclear weapons information that cannot be

identified in this unclassified Report. Because this recent espionage case is currently

under investigation and involves sensitive intelligence sources and methods, the

Clinton administration has determined that further information cannot be made public

without affecting national security or ongoing criminal investigations.

The W-88, a miniaturized, tapered warhead, is the most sophisticated nuclear

weapon the United States has ever built. In the U.S. arsenal, it is mated to the D-5 submarine-

launched ballistic missile carried aboard the Trident nuclear submarine. The

United States learned about the theft of the W-88 Trident D-5 warhead information, as

well as about the theft of information regarding several other nuclear weapons, in 1995.

The PRC has stolen U.S. design information and other classified information

for neutron bomb warheads. The PRC stole classified U.S. information about

the neutron bomb from a U.S. national weapons laboratory. The U.S. learned of the

theft of this classified information on the neutron bomb in 1996.

In the late 1970s, the PRC stole design information on the U.S. W-70 warhead

from the Lawrence Livermore Laboratory. The U.S. government first learned of this

theft several months after it took place. The W-70 warhead contains elements that

may be used either as a strategic thermonuclear weapon, or as an enhanced radiation

weapon (“neutron bomb”). The PRC tested the neutron bomb in 1988.

The Select Committee is aware of other PRC thefts of U.S. thermonuclear

weapons-related secrets. The Clinton administration has determined that further

information about PRC thefts of U.S. thermonuclear weapons-related secrets cannot

be publicly disclosed without affecting national security.

The PRC acquired this and other classified U.S. nuclear weapons information as

the result of a 20-year intelligence collection program to develop modern thermonuclear

weapons, continuing to this very day, that includes espionage, review of unclassified

publications, and extensive interactions with scientists from the Department of

Energy’s national weapons laboratories.

**** The full Cox Report is 700 pages but this link is the summary.  So, those questions the New York Times asked in 1999 need to be asked again today of both Hillary and Bill. What say you?

Russia v. United States: It is Getting Colder as Russia Destroys Aleppo

John Kerry announces the bi-lateral talks are over.

Russia’s response:

Указ Президента Российской Федерации от 03.10.2016 № 511 “О приостановлении Российской Федерацией действия Соглашения между Правительством Российской Федерации и Правительством Соединенных Штатов Америки об утилизации плутония, заявленного как плутоний, не являющийся более необходимым для целей обороны, обращению с ним и сотрудничеству в этой области и протоколов к этому Соглашению”

Translation: Decree of the President of the Russian Federation from 03.10.2016 # 511 “on the suspension by the Russian Federation Agreement between the Government of the Russian Federation and the Government of the United States of America on the disposition of plutonium designated as no longer required for defence purposes, and cooperation in this area and the protocols to this agreement”

If you can read Russian, the document is here.

This was signed in 2010 between Hillary Clinton and Sergei Lavrov.

MOSCOW (Reuters) – Russian President Vladimir Putin on Monday suspended an agreement with the United States for disposal of weapons-grade plutonium because of “unfriendly” acts by Washington, the Kremlin said.

A Kremlin spokesman said Putin had signed a decree suspending the 2010 agreement under which each side committed to destroy tonnes of weapons-grade material because Washington had not been implementing it and because of current tensions in relations.

The two former Cold War adversaries are at loggerheads over a raft of issues including Ukraine, where Russia annexed Crimea in 2014 and supports pro-Moscow separatists, and the conflict in Syria.

The deal, signed in 2000 but which did not come into force until 2010, was being suspended due to “the emergence of a threat to strategic stability and as a result of unfriendly actions by the United States of America towards the Russian Federation”, the preamble to the decree said.

It also said that Washington had failed “to ensure the implementation of its obligations to utilize surplus weapons-grade plutonium”.

The 2010 agreement, signed by Russian Foreign Minister Sergei Lavrov and then-U.S. Secretary of State Hillary Clinton, called on each side to dispose of 34 tonnes of plutonium by burning in nuclear reactors.

Clinton said at the time that that was enough material to make almost 17,000 nuclear weapons. Both sides then viewed the deal as a sign of increased cooperation between the two former adversaries toward a joint goal of nuclear non-proliferation.

“For quite a long time, Russia had been implementing it (the agreement) unilaterally,” Kremlin spokesman Dmitry Peskov told a conference call with journalists on Monday.

“Now, taking into account this tension (in relations) in general … the Russian side considers it impossible for the current state of things to last any longer.”

Ties between Moscow and Washington plunged to freezing point over Crimea and Russian support for separatists in eastern Ukraine after protests in Kiev toppled pro-Russian President Viktor Yanukovich.

Washington led a campaign to impose Western economic sanctions on Russia for its role in the Ukraine crisis.

Relations soured further last year when Russia deployed its warplanes to an air base in Syria to provide support for Syrian President Bashar al-Assad’s troops fighting rebels.

The rift has widened in recent weeks, with Moscow accusing Washington of not delivering on its promise to separate units of moderate Syrian opposition from “terrorists”.

Huge cost overruns have also long been another threat to the project originally estimated at a total of $5.7 billion.

Meanwhile what Russia is doing to Aleppo is beyond the definition of war crimes.

NBCNews: Russian-made cluster bombs — weapons that kill indiscriminately and inflict long-lasting damage — were used in an attack on at least one hospital in the ravaged Syrian city of Aleppo last week, a video obtained by NBC News appears to show.

The video shows two unexploded submunitions amid the rubble at the M10 hospital in rebel-held eastern Aleppo following a morning airstrike on Sept. 28. Several experts and sources independently identified the devices as Russian-made ShOAB 0.5 cluster submunitions, bomblets delivered by an air-delivered scattering device called the RBK-500. Both are known to be used by both the Russian and Syrian air forces.

However, it is difficult, even for specialists in unexploded ordnance disposal, to definitively identify such munitions in the field. The ShOAB 0.5 is visually similar to a U.S.-made series of bomblets.

Image: Medics inspect the damage outside a field hospital after an airstrike in the rebel-held al-Maadi neighbourhood of Aleppo

Medics inspect the damage outside a field hospital after an airstrike in the rebel-held al-Maadi neighbourhood of Aleppo, Syria on Sept. 28, 2016. ABDALRHMAN ISMAIL / Reuters

The use of cluster bombs on the hospital — part of a larger series of strikes that also hit a second hospital and a nearby bakery — underscores the relentless brutality of Syria’s civil war, which lurched back into violence last month after the disintegration of a brief cease-fire. The casualties include hundreds of children killed or injured in Aleppo by a myriad of weapons falling on the city.

The hospitals were among the few facilities that remained to treat the hundreds of thousands of civilians caught up in the brutal new government offensive on eastern Aleppo. It is not clear whether the second hospital, called M2, was hit with cluster bombs.

NBC News visited both hospitals and spoke to medical staff there. Among the patients at M2 was a prematurely born infant struggling to survive: Miriam, born on Sept. 10 when her mother, seven months pregnant, went into labor during the airstrike.

“These kids are innocent, and they came into this world under very difficult circumstances, they came into this world during a war,” said Um Mohammad, the nurse who had been tending the children and infants in the hospital. Um Mohammad is a pseudonym, meaning “mother of Mohammad.”

At M2, the attack started at about 4:00 a.m., according to Dr. Mohammad Abu Rajab, a physician at the hospital who uses a pseudonym to avoid reprisals for his work in opposition-controlled areas.

“This has resulted in the hospital being taken out of service completely and indefinitely,” Abu Rajab said. “This was systematic and direct targeting of this hospital, which was home to pediatric and women’s health specialists.” A must read of the rest of the article here.