Uncategorized

U.S. soldier ambushed in Niger fought to the end

(AP) WASHINGTON — An American soldier killed in an ambush in Niger with three comrades but recovered days later wasn’t captured alive by the enemy or executed at close range, The Associated Press has learned, based on the conclusion of a military investigation. It found evidence he apparently fought to the end.

Dispelling a swirl of rumors about how Sgt. La David T. Johnson, 25, of Miami Gardens, Florida, died, the report has determined that he was killed by enemy rifle and machine gun fire as he fled the attack by an offshoot of the Islamic State group about 120 miles (200 kilometers) north of Niamey, the capital of the African country. The attack took place Oct. 4; Johnson’s body was recovered two days later.

Advertisements
Standard
Uncategorized

House GOP to wrap up Russia investigation

(NBC NEWS) WASHINGTON — As House Republicans make the case for special counsel Robert Mueller to end his investigation of Russian meddling in the 2016 election, they appear ready to bring their own intelligence probe to an end.

Senior Republicans on the House Intelligence Committee tell NBC News that they hope and expect to draw their year-long investigation to an end in the coming weeks, saying they have largely completed all interviews relevant to the narrow scope of inquiry Democrats had agreed to last spring.

The committee has conducted interviews with key witnesses almost daily this month, sometimes seeing multiple witnesses on a single day, as they eyed the finish line. Though Democrats say they have requested as many as 30 additional interviews with new witnesses, none have been scheduled beyond the end of this month.

Standard
Uncategorized

The year politics became a drag

If you feel like 2017 was the year that politics in the United States went from simply headache-inducing to total nonsense, you aren’t alone.

Calling 2017 “the year politics became a drag” is unfair to 2017.

It started long before the first day of the year.

But as long as you’ve been reading about politics, you already know.

This year was certainly a doozy, though, for the routine political watcher.

There was the spectacle of the 2016 presidential election– the former first lady of a disgraced president running against a reality television star.

The reality television star won.

And then, for more than a year, the disgraced president’s wife refused to accept the outcome.

That happened even after she said it would be terrifying for the election loser to refuse to concede.

So, with a president who is improving the economy in the Oval Office– Americans spend their days learning about how he can’t be the president.

Because the former first lady learned how to manipulate the press back in the 1990’s.

It’s not happening because the current president’s only qualifications were inherited wealth and business luck in his father’s town,

Hillary Clinton and the national press want Americans to worry because he, or someone he knows, might have talked to a Russian one time.

Even though the Cold War “ended” back in the 1990’s.

If you’re following along, it might be a fine time to stop.

Politics is a drag now.

Take care of your family.

Take care of your health.

Learn the skills you need to function without the comforts of modern society.

Because the sore losers aren’t going anywhere.

They refuse to lose.

The post The year politics became a drag appeared first on Personal Liberty®.

Standard
Uncategorized

A look back on 2017

Every year at this time we grow a little nostalgic. This prompts us to look back over the year to see where we’ve come from and how we got here.

Unlike in 2016, we didn’t have a presidential election. But that doesn’t mean there wasn’t a lot going on. In fact, it seems like the election still hasn’t ended.

John McCain, term limits, immigration and an out-of-control media were among the most popular topics of the year, as indicated by the interest of our Personal Liberty® readers. Wiretapping, the causes of the war for Southern independence (hint: it wasn’t slavery), voter-approved weed and possible criminal charges against President Barack Obama, along with a couple of health articles — which always makes us happy, because good health is as essential to liberty as the Bill of Rights — also caught your attention.

Here we highlight the Top 10 stories of the year in reverse order, as determined by readership. Looking back, we are reminded of McCain’s role in the phony Trump dossier, the corruption of the Obama administration — not that it’s ever very far from our minds — and Democrat lunacy and double-think.

So join us if you dare, as we saunter through the minefield that was 2017’s most-read articles.

And if you don’t see one of your favorites, tell us about it in the comment section below.

The post A look back on 2017 appeared first on Personal Liberty®.

Standard
Uncategorized

Only 1 reason DNC destroyed server, says U.S. intel expert

Hillary Clinton (Photo: Twitter)

Hillary Clinton (Photo: Twitter)

WASHINGTON – The allegedly hacked Democratic National Committee server that handled email from the Hillary Clinton 2016 presidential campaign and the DNC is the key piece of forensic evidence in Russia’s suspected interference in the 2016 presidential election.

The intelligence-community assessment on purported Russian meddling in the race, conducted by the CIA, the FBI, and the NSA released in Jan 2017, concludes Russian President Vladimir Putin personally ordered the hacking of the DNC and the dissemination of e-mails from key staffers via WikiLeaks to damage Hillary Clinton’s candidacy.

But the intelligence agencies attributing the sweeping cyber-intrusion to Russia-backed hackers have yet to provide any actual evidence substantiating their claims about how the DNC data was obtained or by whom.

In fact, not a single government agency has even viewed the hacked computer servers to conduct a forensic data-breach investigation.

They never will.

The DNC destroyed the server, former DNC Chairwoman Donna Brazile revealed.

RELATED: Watch Donna Brazile have meltdown over Seth Rich

The FBI asked the DNC to surrender its allegedly breached servers to the bureau. But the DNC didn’t comply and instead, hired the cybersecurity firm CrowdStrike to make a “replica” of all the information on its server and computers, turning over a major law-enforcement investigation to the private sector.

“The person we hired was the former No. 3 at the FBI, and they worked it out. [CrowdStrike] got a list from the FBI – the things that the FBI wanted. In that list of items that the FBI requested, they asked for a replica or an exact copy of everything that we have from our server – knowing that if we got rid of our server. We actually would get rid of our entire database,” Brazile explained during a discussion at the National Press Club in Washington, D.C., about her new book, “Hacks.”

“Our brain would be gone. And then essentially we would have nothing.”

http://ift.tt/1UyqoPZ

if(typeof(jQuery)==”function”){(function($){$.fn.fitVids=function(){}})(jQuery)};
jwplayer(‘jwplayer_BMD71KJB_pszPfxYQ_div’).setup(
{“playlist”:”http:\/\/content.jwplatform.com\/feeds\/BMD71KJB.json”,”ph”:2}
);

CrowdStrike claimed in the summer of 2016 that “two separate Russian intelligence-affiliated adversaries” had hacked into the DNC network in May 2016 by a group the firm encountered in 2015 while investigating a hack on the unclassified networks of the White House, State Department, and Joint Chiefs of Staff.

Google, which gave millions of dollars to the Clinton campaign and was under fire during the election for manipulating and suppressing negative search results for Clinton, is one of the CrowdStrike’s primary investors.

Another company which significantly invests in CrowdStrike is Warburg Pincus, a company run by a former staffer of both the Clinton and Obama administrations, Timothy Geithner.

Thank President Trump for all his accomplishments during his first year in office. Send him a FREE card of your choice. Go to ThankTrump.us

Availing the server to the FBI for examination would allow intelligence agencies and federal government resources to determine whether the DNC was in fact hacked, establish the source of the breach, and verify whether the trove of DNC and Clinton campaign emails published during the election were leaked from a party within the DNC.

Yet, Brazile insisted “killing” the server was critical after the data was breached because the server would continue to be affected by spyware had it not been destroyed.

“In the last two weeks of the election, we had to make another decision as to whether or not to shut down that server – to actually kill it – because we kept getting, you know, we kept getting more spyware,” she said. “They were so stealth; the operation was so stealth.”

The replica and remediation process after the hacking cost the DNC “millions” of dollars, Brazile said.

“We made a replica of everything and turned it all over to [the FBI]. We also let them see all of the evidence from all of the individual computers, from everything else. So, we – trust me, it cost us quite a penny to make replicas and then we destroyed the machines and then bought the staff people new laptops,” she said. “If you can imagine this, right before the convention, these staffers had lost all of their data, all of their materials – everything was gone. Everything was wiped clean, but we made a replica.”

While Brazile admits she cooperated with the FBI by supplying the agency of replicas of its server, DNC deputy communications director Eric Walker told Buzzfeed on Jan. 4 the FBI never requested access to the DNC’s computer servers in question, and that it had been “providing access to all of the information uncovered by CrowdStrike – without any limits.”

Days later on Jan 10, former FBI Director James Comey told the Senate Intelligence Committee the FBI issued “multiple requests at different levels” to the DNC to gain direct access to their computer systems and conduct their own forensic analysis and his investigators were denied access to the physical servers.

“Our forensics folks would always prefer to get access to the original device or server that’s involved, so it’s the best evidence,” he said.

Comey struggled to explain why the FBI was not given access.

After “multiple requests at different levels … what was agreed to is that the private company would share with us what they saw,” he said.

In March 2017, Comey told the House Intelligence Committee his investigators had still not accessed the servers analyzed by CrowdStrike, but maintained his investigators believed they had an “appropriate substitute.”

Brazile blasted Comey for testifying to Congress that the DNC did not cooperate with the FBI regarding access to its server.

“We turned over,” she said. “Every time [the FBI] would say that about us I would go after them and say ‘What the hell are you talking about? We’ve given you everything that you’re asking for.’”

A cybersecurity government contractor for a U.S. intelligence agency who spoke with WND anonymously argued Brazile’s explanation for “killing” the server “is the stupidest thing I ever heard.”

“That’s clearly a lie by a politician who knows nothing about cyber security, or they’re lying. It doesn’t matter if the server has spyware. The FBI wanted the server in the unaltered condition that it was in operation. If it had spyware, it’s not going to matter to the FBI. They are going to do cyber forensics on everything on the server, regardless of the spyware,” he said.

An FBI’s investigative file on Clinton revealed during the 2016 presidential race that the Clinton campaign used a special program known as BleachBit to delete her private emails and try to prevent their recovery.

The DNC likely followed suit, the cybersecurity expert suspected.

“If the FBI came to your door and said, ‘We are taking your laptop, for an investigation,’ you are not going to say ‘Well, let me give you a copy of the data,’ unless your name is Hillary Clinton. I promise you it’s going to be filtered out and all the incriminating and illegal evidence that’s on there is going to be destroyed because they know that if they delete the files from the hard drive, the data is still there, it just deletes the reference to the file.”

The primary purpose of the DNC destroying the server, he said, is to conceal data.

“The only reason they would replicate the data is to sort through what they don’t want the FBI getting, then they destroyed the original server so real forensic analysis cannot be performed on the data that was deleted. I guarantee you there’s a lot of missing emails on the replica,” he continued. “Even if they scrub the hard drive, there are techniques that the FBI has to recover deleted data. I guarantee the DNC erased the files off the server. It’s not the DNC’s job to determine whether the FBI needs to be protected from spyware. They should have just turned it over as is and they didn’t because they have something to hide. This is common knowledge that any cyber security person would know.”

Dr. Howard J. Cohen, who has over 30 years experience in architecture and implementation of complex software applications, ranging from bioinformatics to chip-design tools, told WND he believed the Russians hacked the DNC server based off of what he’s read and seen in the news.

But Brazile’s explanation for why the DNC destroyed the server doesn’t add up, Cohen argued.

“Making a replica of the information on the disks is standard forensic practice, but why they would then want to destroy the original? It seems like a cover-up to me,” he said. “You’re getting rid of possible useful information. There’s no other reason to destroy the server that I can think of.”

“That doesn’t make sense – that really doesn’t make sense to me,” he continued. “Why would you destroy the machines, which is, in some sense, doing a cover-up or making further investigation impossible?”

Brazile’s claim the server needed to be destroyed because it contained spyware is also implausible, Cohen said.

“If a computer has been infected in some ways, you can certainly wipe it clean and rebuild it from clean back up,” he said. “There are different exploits to take over machines by actually going into firmware of a computer, which is software that lives inside some chips and is outside of the disks. If the firmware is infected you might not be able to actually get rid of the exploit. In that sense, maybe you’d want to replace the chips that contain the firmware.”

“You keep the server as evidence. You make replicas or images of disks to prevent the original evidence from getting damaged if you are doing some testing that may be destructive. The imaging is standard for disk backup and recovery.”

CrowdStrike has defended its investigation multiple times, stating efforts to delegitimize conclusions are part of a “Russian intelligence disinformation campaign.” But controversy continues to surround the DNC and intelligence community’s assessment that Moscow was behind the cyberattack.

According to a December 2016 Morning Consult poll, 71 percent of the American public did not believe Russia influenced the 2016 election.

President Trump has repeatedly rejected the Russian-influence claim, arguing the allegations are an attempt by Democrats to delegitimize his presidency. He has insisted anyone could have hacked the DNC and has suggested the Democratic Party’s refusal to accept help from DHS was “all a big Dem HOAX!”

According to online hacker Kim Dotcom, slain DNC staffer Seth Rich was behind the DNC’s leaked emails to WikiLeaks and was developing technologies to expose corruption and the influence of corporate money in politics.

Rich, who was officially working on voter-registration systems for the DNC in the summer of 2016, was gunned down by unknown attackers in the early hours of July 10, 2016, just blocks from his house. An official investigation has turned up nothing on his killers or any possible reason for his murder. WikiLeaks began publishing tens of thousands of Clinton campaign and DNC emails 12 days after he was killed.

WikiLeaks founder Julian Assange is offering a $10,000 reward to find Rich’s murderers and has insinuated that Rich the source who leaked the emails.

The FBI and CrowdStrike did not return WND’s request for comment.

Standard
Uncategorized

Iran seeks ‘new world order’ on ‘ruins’ of West

Jihadivideo

The prime objective of Iran’s mullah-led regime is to export its Islamic revolution worldwide to build a new Shiite “world order” on the “ruins” of Western civilization, declared a columnist for a daily paper affiliated with the country’s religious leadership, reports Joseph Farah’s G2 Bulletin..

“Iran will, in the future, become one of the poles of the world,” wrote Abdollah Motevalian in a recent column in the daily newspaper Javan.

The paper is “affiliated with the country’s ideological camp,” according to the Middle East Media Research Institute, which monitors and analyzes media in the region.

The writer cited a list of principles that provide the foundation for the Islamic revolution’s objectives.

“Identifying the enemy; believing in the need for fighting the enemy; a revolutionary discourse; a fighting strategy; persistence in fighting, with no hiatus; jihadi spirit; a plan for the fighting; tirelessness; making it a people’s war and leveraging all the human potential in the country.”

Motevalian praised the 1979 revolution in Iran that deposed the moderate shah and installed the hard-line Muslim regime.

He calls for building a “new world order” on the “ruins of the Western world order.”

Experts, he said, all recognize that the Islamic revolution “was an exceptional revolution, unlike any other in previous centuries in the world.”

Not only did it remove the shah, it launched a fight against “global arrogance,” created a “resistance axis” and directed “public opinion of the world.”

Further, it launched a plan “for creating the global rule of the Mahdi,” the personage Shiite Muslims believe will be their returning messiah figure.

For the rest of this report, and more, please go to Joseph Farah’s G2 Bulletin.

Standard
Uncategorized

Israel’s peace partner: ‘Strap on your weapon’

WASHINGTON – In answer to President Trump’s recognition of Jerusalem as Israel’s capital city, the terrorist organization headed by Palestinian Authority President Mahmoud Abbas is calling for armed struggle and riots in Facebook posts, according to Palestinian Media Watch.

Key hashtags are “#Rage for Jerusalem” and “#Rage for Al-Aqsa Mosque.”

One post shows a bloody hand holding an automatic weapon with the following message, written in Arabic:

“Strap on your weapon over your wound, and tomorrow you will awaken to a morning of freedom.” The message was posted Dec. 14 on the official page of Fatah, a long-time terror group also headed by Abbas and founded by Yasser Arafat.

fatah-bloodyfist

Trump recognized Jerusalem as the capital of Israel in a speech delivered Dec. 6. He also ordered the State Department to begin preparations to transfer the U.S. embassy from Tel Aviv to Jerusalem.

Like the reporting you see here? Sign up for free news alerts from WND.com, America’s independent news network.

Standard