Wednesday, June 12, 2013

Current Events - June 12, 2013

PK'S NOTE:  Here's a couple articles on how to somewhat get around cleaner. Personally, I think that horse has already left the barn but there are ways to "not help" the process from this point forward. It may be "legal" but I still think the government doing this is unconstitutional.

The big flip-off: Company doesn't give feds data


'World's most private search engine' won't betray you to Obama

The federal government may be secretly accessing Americans’ online videos, emails, photos and search histories – with the help of Apple, Google, Microsoft, Yahoo, Facebook, YouTube, PalTalk, AOL and Skype – but “the world’s most private search engine” is staunchly defending its users’ privacy and civil liberties.

StartPage.com and its sister search engine, Ixquick.com, were launched in 2006 to provide a private way for Americans to conduct Internet searches. StartPage provides a private portal to Google results, and Ixquick allows users to retrieve private results from other search engines.

WND reported in 2010 when Katherine Albrecht, a Harvard-trained privacy expert who helped develop StartPage, warned, “It would blow people’s minds if they knew how much information the big search engines have on the American public. In fact, their dossiers are so detailed they would probably be the envy of the KGB.”

It happens every day, Albrecht explained. When an unfamiliar topic crosses people’s minds, they often go straight to Google, Yahoo or Bing and enter key terms into those search engines. Every day, more than a billion searches for information are performed on Google alone.

“If you get a rash between your toes, you go into Google,” she said. “If you have a miscarriage, you go into Google. If you are having marital difficulties, you look for a counselor on Google. If you lose your job, you look for unemployment benefit information on Google.”

Albrecht said Americans unwittingly share their most private thoughts with search engines, serving up snippets of deeply personal information about their lives, habits, troubles, health concerns, preferences and political leanings.

“We’re essentially telling them our entire life stories – stuff you wouldn’t even tell your mother – because you are in a private room with a computer,” she said. “We tend to think of that as a completely private circumstance. But the reality is that they make a record of every single search you do.”

The search engines have sophisticated algorithms to mine data from searches and create very detailed profiles about Americans. She said those profiles are stored on servers and may fall into the wrong hands – for example, the federal government’s detailed files on unwitting U.S. citizens.

Just recently, the Washington Post reported it obtained a top-secret document on a government program in which the NSA and FBI are “tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets.”

The program, code-named PRISM, was utilized to obtain information that has become a critical part of President Obama’s daily briefing, according to the Post, which added, “NSA reporting increasingly relies on PRISM as its leading source of raw material, accounting for nearly 1 in 7 intelligence reports.”

And McClatchy recently reported, “Privacy policies for Google, Yahoo! and other Internet service providers explicitly state that the companies collect users’ data, such as names, email addresses, telephone numbers, credit cards, IP addresses, search queries, purchases, time and date of calls, duration of calls and physical locations.

“The policies say that companies may use that information to send you targeted advertising or, if necessary, to comply with requests from government authorities.”

In a December 2009 interview with CNBC, Google CEO Eric Schmidt divulged that search engines may turn over citizens’ private information to the government.

“If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place,” Schmidt said. “But if you really need that kind of privacy, the reality is that search engines, including Google, do retain this information for some time. And it’s important, for example, that we are all subject to the United States Patriot Act. It is possible that information could be made available to the authorities.”

However, StartPage and Ixquick say they have neither participated in PRISM nor shared Americans’ data with the federal government.

“The privacy of our users rests on three important foundations,” explained StartPage and Ixquick CEO Robert Beens. “We are based in the Netherlands, we use encrypted connections, and – most importantly – we don’t store or share any of our users’ personal search data.”

A statement from StartPage and Ixquick explained:


  • No user data stored: StartPage and Ixquick never store user data, including IP addresses and search queries, so government agencies have no incentive to ask for these. This privacy is so complete; the company doesn’t even know who its customers are, so it can’t share anything with Big Brother.

  • Encrypted (HTTPS) connections: StartPage and Ixquick were the first search engines to use automatic encryption on all connections to prevent snooping. When searches are encrypted, third parties like ISPs and the NSA can’t eavesdrop on Internet connections to see what people are searching for.

  • Not under U.S. jurisdiction: StartPage and Ixquick are based in the Netherlands, so they are not directly subject to U.S. regulations, warrants, or court orders. They can’t be forced to participate in spying programs like PRISM. The company has never turned over a single bit of user data to any government entity in the 14 years it has been in business, which is not surprising since there is no data in the first place.
“Unfortunately, it takes a scandal like PRISM to wake people up to the erosion of privacy, ” Albrecht said. “As people get fed up with being spied on, they look for alternatives. We already serve nearly 3 million private searches each day, and we expect that number to grow as people seek shelter from search engines that store and share their private information.”

This summer, the company plans to launch a new email service called StartMail, which will provide a paid and heavily encrypted private email application. Anyone interested in being a StartMail beta tester can now sign up.

http://www.wnd.com/2013/06/this-company-doesnt-share-your-online-info/?cat_orig=politics

5 Ways to Thwart the NSA and Gov’t from Spying on You

Those concerned about their communication privacy — be it over the phone or on the Web — may then be wondering: Is there anything to be done? Is full privacy even possible?


We went searching and found a few answers. Here are a few tips:



1. Go off the grid: Although the most extreme measure, not communicating electronically would prevent such data from ever being available for collection in the first place. If you want to know what it’s like to go at least without the Internet for a year, check out Paul Miller’s column on The Verge after he did just that.


But as Elad Yoran, CEO of the IT security company Vaultive, told TheBlaze “the choice of not communicating electronically is not one that’s real for us.”


One choice people do have though, Yoran said, is being conscious of what they post online. “Choosing to post a picture on Facebook or to tweet is an action we take deliberately and that we control,” he said.


Even if you have your social media sites set to private, that information is still being collected by the site itself and could be obtained legally through a court order.


2. Keep your browsing quiet: If you’ve been freaked out when shopping online for a Father’s Day tie and found that ads about menswear are cropping up on unrelated sites afterward, you might consider secure browsing. Although what to get dad might not be a controversial search, users could have their reasons to wish to keep searches private or just don’t want their searches to be recorded in cyberspace. TheBlaze has reported on secure Internet browsing before (Here’s How You Can Browse the Web Without Being Tracked), but here’s a bit of a recap.

  • Private mode: most Web browsers have the ability to allow you to search privately, without cookies being enabled to track your movements. There are also browser extensions like Ghostery,  Abine’s Do Not Track and AVG’s Do Not Track that prevent “invisible” entities from tracking searches as well.
  • Hide your IP address: an even higher level of security hides your computer’s IP address entirely. There are several services that do this including Hot Spot Shield, which is VPN (virtual private network) software, and the search engine StartPage. 
  • Go hard core with ‘Tor’: CNET called the Tor Project “hard core” and potentially even “overkill” when it comes to secure browsing. Tor is free software that enables not only browsing that is anonymous but it encrypts data transport and doesn’t reveal a user’s location or how long they were browsing. How? It reroutes your IP address several times before connecting.
  • Encryption for data transmitted over an Internet connection, would “take thousands of years to break,  and even if the NSA had quantum computers, it would still take them years to decode,” Peter Zaborszky, the owner of BestVPN.com, told TheBlaze.
     
    3. Encrypt. Encrypt. Encrypt.: Yoran’s biggest piece of advice for companies using cloud computing is to encrypt their data. After it’s in the hands of a cloud service provider, like Microsoft, Google and many others, if they receive a court order for information, they might be obligated to turn it over.

    Here are tips for encryption from Yoran, who is a member of the FBI Information Technology Advisory Council and the  Department of Homeland Security Advisory Board for Command, Control and Interoperability for Advanced Data Analysis:

  • Encrypt data before it goes to the cloud.
  • Encrypt data persistently in all three states. Data exists in three states: transit, at rest and in use.
  • Hold onto encryption keys yourself. Data can only be made usable with keys.
When it comes to the individual cloud users, encryption packages available for companies are not quite there yet, according to Yoran. (The encryption mentioned in the secure browsing section above addresses encryption of data transmitted over an internet connection).


“I believe this kind of encryption technology will one day be available for consumers, but it’s not yet,” he said.


For now, individuals could avoid using cloud services like Dropbox and Google for information storage or transport that they wish to keep secure.


4. Secure phone conversations: Unless you want to be old fashioned and use a pay phone (if you can even find one), there are fewer options to keep phone conversations secure. Gregg Smith, the CEO of Koolspan, a company focusing on mobile-encryption, detailed some of the products that can encrypt conversations, texts and other information sent from mobile devices between users.


Smith described the technology as a TrustChip, which is placed into the micro SD slot of the device and is “all-in-one key management, authentication and encryption,” according to the company’s website.

Koolspan partners with companies like AT&T, Samsung and other wireless carriers around the world to offer devices with this technology.


AT&T, for example, calls it “encrypted mobile voice,” and offers it as a service for a $24.99 monthly fee.

It is important to note that for such communication to truly be secure, all people involved would need to have their devices enabled with the technology.


What about calls made online? Last year, Skype was accused of online wiretapping. Google Talk hosts information on Google’s servers, which means content, like other information on its products, is subject to compliance with U.S. laws. The Washington Post recently pointed to online telephone service Silent Circle, which has been independently verified to have end-to-end encryption of information without any backdoors for wiretapping.


The Post also pointed to RedPhone, an app for Android phones, that claims to allow end-to-end encryption of conversations. 

5. Avoid cellphone tracking: The ability of law enforcement to triangulate the position of a cellphone based on cell tower connections has been discussed recently from a legal standpoint, but is there a way to prevent this from happening in the first place? Yes, but you probably won’t like it. You have to turn your phone off and can even remove the battery for extra protection.


Location data is taken by the cell company every time you make a call, so that’s unavoidable. But Smith offered a clue to look for to see if your phone has been hacked in any way, which could open it to vulnerabilities, such as turning on the microphone remotely. Looking where the signal bar is and the letter/number designation showing connectivity, Smith said it usually shows a few bars and 3G or 4G LTE. If it shows 2G or GPRS, “that’s an initial sign you might be hacked,” he said.


If you see this sign, Smith explained, someone has pulled you into a lower level of connectivity where there is generally less security and might allow them to access information or features inside your phone.


Is full privacy even possible?

Tech experts say even some encryption services have left backdoors for law enforcement purposes. And Smith said completely preventing metadata being collected from phone communications isn’t entirely possible either. The tips mentioned above are just a few ideas to increase privacy.


Zaborszky said unless one isolates oneself from how the rest of society uses technology, it’s not possible to avoid all snooping. “But it is important to know that it’s not the technical side of things that is the weak link, but the legal side and the fact that most of these companies are based in the USA and are bound by US laws,” he noted.

http://www.theblaze.com/stories/2013/06/11/5-ways-to-thwart-the-nsa-and-govt-from-spying-on-you/ 

Even if You Have Nothing to Hide You Have Something to Fear

...Our nation was built on the principle of the rule of law; the notion that people are most free if they cede only a minimum of their natural rights to government, limited by a written Constitution, in order to secure liberty. 

Yet now we are witnessing a government unbridled by the rule of law, which has become subservient to the whims of its leaders; and based not on the goal of ensuring liberty and justice, but on constructing arbitrary conditions of "security."

In this paradigm, the Fourth Amendment no longer carries any real significance for we are asked to accede to the principle that a president and his administration posses “inherent power” -- superseding any other authority or limitation -- to secretly gather, store, and analyze an infinite amount of information gathered from the private communications of millions of law-abiding citizens.

Distressingly, the failsafe on such unbridled power, supposed to be exercised by the Congress through its oversight responsibilities, has been sorely lacking. Instead, we have the spectacle of senior Senators like Saxby Chambliss (R-GA), Lindsey Graham (R-SC), and Nancy Pelosi (D-CA) defending actions by the NSA as beneficent because -- as we are asked to accept on faith -- they have "kept us safe." We are admonished to resist the urge to limit such extreme power because, in their Orwellian worldview, "if you have nothing to hide, you have nothing to fear."

This is the childish solipsism to which our cherished, constitutionally guaranteed rights have been reduced.

A few weeks ago, I wrote that Democrats faced a moral crisis as the Obama Administration turned the liberal vision of Big Government into an omnipotent police state in which citizens' rights are pre-empted by the collective and over-arching need for “security.” However, Republicans, too, face this identity crisis. The people of the United States, for the first time as a result of these leaks, are becoming privy to the true scope of government snooping.

Our country truly is at a crossroad; one defined by philosopher Ayn Rand some seven decades ago, when she correctly observed: “When you take away a man’s privacy, you gain the power to control him absolutely.” "Control" -- that is what this is really all about. 

Will we take the "constitutional road" (to use James Madison's description of the form of limited government laid out in the Federalist Papers), and muzzle the humongous, "security" driven Surveillance State that threatens to engulf us? Or, will we meekly succumb to it; complacent in the comfort that comes from a benign but all-powerful federal government? The next few months may very well answer that crucial question. Liberty itself hangs in the balance.

 http://townhall.com/columnists/bobbarr/2013/06/12/even-if-you-have-nothing-to-hide-you-have-something-to-fear-n1618353/page/full 

7 Reasons to Worry About Federal Surveillance

With leaker Edward Snowden revealing to the world that the National Security Agency has been both monitoring phone records for all Americans and obtaining emails, videos, voice chats and other private communications between American citizens and those outside the United States under the so-called PRISM program, controversy has broken out over the scope of government surveillance.

Many on the right and the left have argued that these programs are necessary to curb terrorism. Both Democratic Senator Dianne Feinstein of California and Republican Speaker of the House John Boehner of Ohio have proclaimed that Snowden is a traitor for revealing the existence of the programs. Both Republican House Intelligence Committee Chair Mike Rogers of Illinois and President Barack Obama say that the programs have stopped terrorist attacks. 

Meanwhile, others argue that these programs do not threaten basic civil liberties at all, and that Americans have nothing to fear. David Brooks of the New York Times says that the real threat to Americans isn't surveillance, but cynicism: "Big Brother is not the only danger facing the country. Another is the rising tide of distrust, the corrosive spread of cynicism, the fraying of the social fabric ..."

The truth is far less black and white than all of this. These programs may stop terror attacks; it is likely they have done so. But are they necessary to stop terror attacks, or are they merely the most convenient means for the government to do so? We all want Americans to be safe. But we also would like our emails to be private. Are those two goals mutually exclusive?

Here are the top seven reasons to worry about these federal surveillance programs.

1. It's the federal government, and the federal government cannot be trusted with unlimited personal information. As we've seen from the IRS scandal, actors at any level of government can use information to target political opposition. Distrust of government isn't baseless cynicism. It's realism. The government is filled with human beings -- 1.4 million, at last count, who have top secret security clearances. Some are bound to be nasty. After all, if Boehner and Feinstein are right, and Snowden is a traitor, he had access to all that information, too.

2. Blanket surveillance does not mesh with the Constitution. The Fourth Amendment is quite clear on the notion that search and seizure must not be unreasonable. It is difficult to think of something more unreasonable than searching the private phone records and digital information of citizens who are suspected of nothing.

3. Where does government power stop? What information does the government not have a right to see at this point? Obamacare has made the government part of our health care decisions. The IRS controls all of our financial information. The NSA apparently sees everything else.

4. The anti-terror rationale for violation of rights is identical to the rationale for gun control. Many of the same folks on the right now defending NSA surveillance object to blanket gun laws that affect the rights of hundreds of millions. The argument on the left is simple: To save one life, we'll take as many guns as we have to. Flip this argument to terror, and suddenly many on the right make that exact argument. It's bad policy on both fronts.

5. It's an excuse to treat terror in politically correct fashion. There are many who say that we have accepted blanket screening at airports and should therefore accept blanket screening of personal information. That presumes that blanket screening at airports isn't asinine. It is. Profiling behavior and associations should be the basis for law enforcement. The government argues that a panopticon national security apparatus keeps Americans safest. But that ignores the fact that panopticon capabilities do not necessarily translate into panopticon effectiveness. 

6. Centralization of information is a magnet for foreign hacking. Reportedly, much of this NSA information will be kept at a centralized location in Utah. Recently, the Chinese government has been hacking into American governmental installations including the Federal Reserve and the Pentagon. Keeping our information available for download by a creative foreign government is a recipe for disaster. 

7. The nature of Americanism is changing in very nasty ways thanks to growth of government. The debate about rights versus safety is a valuable one. But too many Americans are now thinking in terms of "needs" vs. rights. We have heard politicians ask whether we truly need to be free from government surveillance; these same politicians often ask whether we need a certain level of income, or need AR-15s. We may not need those things, but we have a right to them. The moment America becomes a "needs" country in which the government unilaterally decides what we need and regulates everything else we cease to be America.

http://townhall.com/columnists/benshapiro/2013/06/12/7-reasons-to-worry-about-federal-surveillance-n1618073/page/full 

Why NSA Spying on All of Us Doesn't Get the Job Done

Barry Rubin, terrorism expert and author of thirteen books on the Middle East mess, lays out the clear case over at PJ Media, that to uncover jihadi threats the NSA has to target the bad guys.  It is not helpful to flood themselves with records of 3 billion phone calls a day, trampling on our Constitution in the process.  Our problem isn't lack of information; it is the political willingness to follow up on leads.  We enable Muslim Brotherhood and other jihadis to dictate the training of our military, FBI, Homeland security and State Department policy, which leads us to a paralysis of politically correct thinking that leads directly to loss of American lives. 

This must read article has a number of hair raising examples I was not familiar with before.

Rubin writes:


Isn't it absurd that the United States - which can't finish a simple border fence to keep out potential terrorists; can't stop a would-be terrorist in the U.S. Army who gives a PowerPoint presentation on why he is about to shoot people (Major Nidal Hasan); can't follow up on Russian intelligence warnings about Chechen terrorist contacts (the Boston bombing); or a dozen similar incidents - must now collect every telephone call in the country?
Isn't it absurd that under this system, a photo-shop clerk has to stop an attack on Fort Dix by overcoming his fear of appearing "racist" to report a cell of terrorists?
That it was left to brave passengers to jump a would-be "underpants bomber" from Nigeria, because his own father's warning that he was a terrorist was insufficient?
Isn't it absurd that terrorists and terrorist supporters visit the White House, hang out with the FBI, and advise the U.S. government on counter-terrorist policy, even while - as CAIR does - advising Muslims not to cooperate with law enforcement? And that they are admiringly quoted in the media?
Meanwhile, a documented, detailed revelation of this behavior in MERIA Journal by Patrick Poole - "Blind to Terror: The U.S. Government's Disastrous Muslim Outreach Efforts and the Impact on U.S. Middle East Policy" - a report which rationally should bring down the governmentdoes not get covered by a single mass media outlet?
Imagine this scene:
"Sir, we have a telephone call about a potential terrorist attack!"
"Not now, Smithers, I'm giving a tour of our facility to some supporters of Hamas and the Muslim Brotherhood."
How about the time when the U.S. consulate in Jerusalem had a (previously jailed) Hamas agent working in their motor pool with direct access to the vehicles and itineraries of all visiting U.S. dignitaries and senior officials?

Rubin's article concludes:


Compared to the time Obama came to office, the Islamists who support violence against America now rule Egypt, Tunisia, the Gaza Strip, Lebanon, and perhaps soon Syria. Offenses have been stepped up in Somalia and Yemen; are being maintained in Iraq; and still rule over Syria and Iran. In Turkey, an Islamist terror-supporting regime has been embraced by Obama.
This represents a massive retreat, even if it is a largely unnoticed one.
So the problem of growing government spying is three-fold.
- It is against the American system and reduces liberty.
- It is a misapplication of resources. Money is being spent and liberty sacrificed for no real gain.
- Since government decision-making and policy about international terrorism is terrible, the threat is increasing.
If you don't get value or enhanced security while freedom is being reduced and the enemy is getting stronger, $1 trillion certainly isn't a bargain.
Read more: http://www.americanthinker.com/blog/2013/06/why_nsa_spying_on_all_of_us_doesnt_get_the_job_done.html#ixzz2W0miYUsj

Which Database: OFA or NSA?

In the wake of the explosive NSA data-mining revelations, Breitbart TV reminded us of an interesting Rep. Maxine Waters bombshell from February.  In an interview, Rep. Waters described a very powerful database that "no one has ever seen before in life," "put in place" by Obama, that had "information about everything on every individual on ways that it's never been done before." [sic] 

The Breitbart piece was titled "Breitbart Flashback: Maxine Waters Reveals Obama's Secret Database Filled with Voters' Private Info."

Although what Rep. Waters described seems eerily similar to the recently leaked NSA secret database, she was not referring to the NSA, and not necessarily to anything "secret."

Waters and her interviewer specifically identified the keeper of the "powerful" database that she described as "Organizing for America" ("OFA") -- Obama's campaign machine, which at the time was being restructured as a 501(c)4 and renamed "Organizing for Action."

That database began as a massive voter "list" for the 2008 campaign -- the brainchild of Obama advisor David Plouffe, who was "instructed" by Obama to turn it into a "new lever of government." A second successful election later, that list evolved into a database that was the subject of a November 2012 Washington Post article that opened with this:

If you voted this election season, President Obama almost certainly has a file on you. His vast campaign database includes information on voters' magazine subscriptions, car registrations, housing values and hunting licenses, along with scores estimating how likely they were to cast ballots for his reelection. And although the election is over, Obama's database is just getting started. Democrats are pressing to expand and redeploy the most sophisticated voter list in history.

The Post piece was written before the startling revelation that the list would no longer be maintained by the DNC. An American Thinker column covered OFA's reorganization, noting that many Democrat strategists seemed not only surprised, but also uncomfortable with the idea that Obama's massive campaign organization would not be folding back into the DNC as it did after the 2008 election. As Politico noted, other Democrat-supporting groups and wealthy donors apparently folded into it (or are at least closely "affiliated"), such as mega-contributor George Soros, Media Matters, and the Center for American Progress. In addition, besides Plouffe, other familiar names in the OFA circle came from the inner circle of Obama's administration: David Axelrod, Stephanie Cutter, Jim Messina, Robert Gibbs, and Jon Carson.

The National Journal noted some Democrat "grumbling" about a potential "power struggle between the national party, which aims to elect Democrats above all else, and the new group, which aims to build the president's legacy[.]" The Atlantic Wire summed up all the fretting by "detractors and the media" over the new OFA in three parts: its debatable "promotion of social welfare," Obama's "permanent state of political campaigning," and the appearance of "selling access to the White House."

The Huffington Post observed:  "OFA's close ties to the West Wing and its control over the former campaign's resources has raised questions about where the nonprofit group ends and the White House starts." The New York Times called OFA's restructuring unprecedented and "an extension of the [Obama] administration."

Interesting points all (besides coming from the mainstream media):  an administration linked to an amply-funded nonprofit group that controls a massive database and operates as an unprecedented extension of a campaign that never seems to end.

And if that circle of relationships isn't disconcerting enough, Fox News's Catherine Herridge presented a special report on June 7 titled "Inside the World of Big Data and Big-time Politics" that noted the interesting connections of Google chairman Eric Schmidt and the Obama White House.  According to a recent article in Businessweek, Schmidt, who was actually in the Obama campaign "boiler room" on election night, has invested millions in a new firm, Civis Analytics, staffed by former OFA team members.  The firm is expected to "work for Democrat campaigns, and only Democrats -- next year." Justin Brookman of the Center of Democracy and Technology observed the potential for political targeting and "data mining of political opponents."  Jim Harper of the Cato Institute expressed concerns for the potential "hand-over of data" to "a political operation or to the government." 

With the news that Obama has overseen the NSA's secret collection of a huge database of information, while at the same time maintaining "close ties" to other organizations that operate massive databases dedicated to promoting his own policies, we should be alarmed at the potential such relationships could provide.  Did we see but a hint of that potential in the recent actions of the IRS?

Obama's Definition of "Smarter Enforcement": None

 Welcome to Opposite World again. As the U.S. Senate geared up yesterday for the Gang of Eight illegal alien amnesty bill debate, President Obama goaded Capitol Hill to pass what he called "smarter enforcement, a pathway to earned citizenship and improvements to the legal system" of immigration. Bullcrap. The White House has already bulldozed a traffic-jammed superhighway for immigration law-breakers by executive fiat.

Obama and his open-borders pals pay lip service to fairness and the rule of law for the cameras. But behind closed doors and beyond the reach of public accountability, they've already paved the way for mass deportation waivers. Read their actions, not their lips. The official White House operating policy is: No illegal alien left behind. "Smarter enforcement" means no enforcement.

Remember: Exactly one year ago this week, the president announced he would halt all deportations and start granting work permits to an estimated 2.1 million illegal aliens who entered the country as children.

This blanket amnesty through administrative non-enforcement has been plagued by questions of fraud from the get-go. According to the Center for Immigration Studies, statistics from U.S. Citizenship and Immigration Services show that the feds have rubber-stamped applications at a whopping 99.5 percent approval rate. And fraudulent use of Social Security numbers is no problem for the so-called "DREAM"-ers. The feds reassured them last fall that they wouldn't have to disclose how many and which phony or stolen Social Security numbers they've used.

"Smarter enforcement"? Tell that to the rank-and-file Immigration and Customs Enforcement agents who refused to look the other way at Obama's executive subversion of the law. ICE agent Christopher Crane and eight other officers filed suit against the White House over the DREAM deportation waiver program's usurpation of their ability and authority to do their jobs. The Gang of Eight plan would provide the executive branch "virtually unlimited discretion" to cut off immigration enforcement officers at the knees. As Crane testified in a searing statement on Capitol Hill in April:

"Lawmaking in our nation has indeed taken a strange twist. Senators invite illegal aliens to testify before Congress ... but American citizens working as law enforcement officers within our nation's broken immigration system are purposely excluded from the process and prohibited from providing input. Suffice it to say, following the Boston terrorist attack, I was appalled to hear the Gang of Eight telling America that its legislation was what American law enforcement needs."

In April, a federal judge in Texas agreed with the ICE agents that King Obama could not order them to ignore immigration laws at his whim. A decision on their motion for preliminary injunction is expected any day now.

Kansas Secretary of State and immigration enforcement legal eagle Kris Kobach broke it down for me yesterday:

"The federal judge in Crane v. Napolitano has ruled that the ICE agents are likely to prevail in their argument that the Obama administration is ordering them to violate federal law. Think about that: This administration is ordering career law enforcement personnel to break the law. Now, the administration is pushing for an amnesty bill that contains almost nothing to improve immigration enforcement. All that the American citizens will get in return for the amnesty is the promise from the Obama administration that they will try harder to enforce the law. The administration has already shattered that promise, doing exactly the opposite. This is a stark warning to Congress. I sincerely hope that they hear it."

Will they listen? Suicidal Republicans have supported illegal alien amnesties dating back to the Reagan era. They have paid a steep, lasting price. As bankrupt, multiculti-wracked California goes, so goes the nation. The progs' plan has always been to exploit the massive population of illegal aliens to redraw the political map and secure a permanent ruling majority.

Now, in the wake of nonstop D.C. corruption eruptions, SchMcGRubio and Company want us to trust them with a thousand new pages of phony triggers, left-wing slush-fund spending and make-believe assimilation gestures. Trust them? Hell, no. There's only one course for citizens who believe in upholding the Constitution and protecting the American dream: Stop them.

http://townhall.com/columnists/michellemalkin/2013/06/12/obamas-definition-of-smarter-enforcement-none-n1617828/page/full 

Wake Up!

In 2007, John McCain’s “comprehensive” immigrant-legalization bill failed after opponents flooded the Senate with calls, shutting down the switchboard. Despite considerable press hype, the bill didn’t even muster a majority on the crucial cloture vote.

It won’t be that easy this time. For one thing, they have a better switchboard, I’m told. For another, the Republican consultants–e.g. Gillespie, Rove–who helped Mitt Romney lose the 2012 election have taken their own failure as an excuse to push what they’ve wanted all along–a business-pleasing immigration policy guaranteeing a supply of inexpensive labor from abroad and a stream of campaign donations to pay Republican consultants. It beats rethinking the rest of the GOP agenda.

In fact, despite all the talk of polarization and Citizens United, the big money in the immigration fight almost unanimously favors a bipartisan, legalization-first bill. Kochs included. The GOP donor class is asserting itself, Ross Douthat has noted. It’s spotted what it thinks is an intersection of crude self-interest, high-minded tolerance, partisan strategy and  libertarian philosophy.

One of the more influential members of this “donorist” class is Rupert Murdoch, which means that FOX News has for all intents and purposes switched sides, giving immigration “comprehensivists” a monopoly in the MSM–five networks to none. As goes Murdoch, so goes Hannity.

If you are a Republican who worries that a flood of low-skilled immigrants would drive down wages and make America an uglier place, where the rich have cheap servants but even diligent unskilled work doesn’t afford a life of dignity–well, we’re sorry. We’ve booked our Republican for the panel this week–Senator McCain! A member of the famous Gang of 8! He always puts on a good show, don’t you agree? (If you are a Democrat who worries about immigration and low wages, you probably don’t exist, and certainly don’t hold elective office. In 2007, populist Dems like Senator Byron Dorgan still walked the halls. Now they’ve been driven out–or underground–by the lure of ethnic identity politics).

Worst of all are distractions that weren’t around in 2007.  Probably through sheer bad luck, a series of dramatic scandals has captured the attention of both the press (which would ordinarily be celebrating the Gang of Eight’s epic achievement) and conservatives, who would ordinarily be kicking up a fuss. The distraction factor applies with special force to right-wing talk radio hosts, who instead of mobilizing opposition are pontificating in a daze of either overconfidence (i.e., ‘Democrats want this bill to fail’) or fatalism.You’d think Rush Limbaugh–a rare non-Fox conservative star, who understands what is at stake– might have a good deal of time to spend on the Gang of 8 bill the day before its first test vote in the Senate. You would be wrong. Rush talked mainly about the NSA.

If the conservative public were paying attention, the flaws and crude deceptions of the Schumer-Rubio bill would be common knowledge. They are so obvious, especially in the border enforcement area, that even Sen. Rubio pretends to be dissatisfied with his own bill. Byron York reports that many conservatives are shocked when they learn that Rubio’s bill doesn’t secure the border before legalization. It doesn’t!  ”First comes the legalization,”  as Rubio boasted yesterday. That’s been obvious for months, but now it’s news. (The border security requirements, themselves evanescent, would only prevent legalized illegals from moving to upgrade from legal status to getting green cards and citizenship.)

It’s time to wake up! Conservatives–while you are (rightly) excited about NSA snooping and partisan IRS corruption, the Congress is about to change America in a more profound, permanent way right under your noses. In the process it will hand President Obama the major second term achievement that will help him overcome the very scandals that are distracting you–or, rather, make his survival or re-ascendance unimportant. He will have won. Democrats will have shaped the future electorate to their own liking. They’ll have transformed what America is.

You have one weapon in your arsenal that can trump the big money behind the Gang of 8 bill (S.744). That weapon is fear. It’s not as if the Republican elite has suddenly been persuaded that an amnesty-first immigration bill is a good idea, after all. They’ve always preferred amnesty. They were just too scared to pursue it. What stopped them was the prospect of swift retribution from the electorate, not limited to the Republican primary electorate.

This fear hasn’t disappeared. The elites were scared of voters before and they can be scared again. This applies to red state Democrats like Mark Pryor and primary-able Republicans like Lisa Murkowski. It applies to fence-sitters like Lamar Alexander. It even applies to those like Kelly Ayotte who have now committed to supporting instant legalization (despite having campaigned against it). If voters now make their displeasure with Ayotte known–well, politicians at the top have a way of backtracking from unpopular stands. That’s how they got to the top. At the very least Ayotte’s difficulties would serve as a cautionary example to others.

There will probably be several big votes–most likely on a House-Senate conference bill–before any amnesty can become law. Speaker Boehner will have to make a crucial decision on whether to break the “Hastert Rule” and try to pass a bill in the teeth of his own caucus’ strongly held views. In every case, fear will be the crucial factor. If Senators fear losing their office if a bill becoming law–and they tend to be highly risk-aware–it often has a way of dying without any fingerprints on it (which is arguably what happened in 2007).

There’s a list of Senate phone numbers and emails here. Numbers USA has a handy page that lets you send a fax here. The Capitol switchboard is 202 224-3121.

Ignore the f—ing scandals for a few days and save the country from Chuck Schumer.


PK'S NOTE: This, and that he has a Soros drone working for him so this says to me that he's got Progressivism in him or has been compromised.

Marco Rubio is Dead to Me

Young, handsome and Hispanic, Marco Rubio was once hailed as one of the new faces of the Republican Party. But now we learn that he actually brings two new faces to the GOP.
One that says one thing one moment and another that says a different thing at a different moment.

After all, while Rubio appeared in this deceptive ad touting the supposed conservative nature of his amnesty bill, The Examiner tells us the following:


In a Spanish-language interview Sunday with the network Univision, Sen. Marco Rubio, the leading Republican on the Gang of Eight comprehensive immigration reform group, made his strongest statement yet that legalization of the nation's estimated 11 million illegal immigrants must happen before any new border security or internal enforcement measures are in place, and will in no way be conditional on any security requirements.
"Let's be clear," Rubio said. "Nobody is talking about preventing the legalization. The legalization is going to happen. That means the following will happen: First comes the legalization. Then come the measures to secure the border. And then comes the process of permanent residence."

And then comes the death of the nation.

The Gang of Eight (GOE) scamnesty bill would grant legalization to more than 30 million migrants - and the number could be far higher - over the next 10 years, who will then have further access to taxpayer-funded services, programs and handouts. Moreover, demographic electoral analysis clearly shows that virtually all these new "Americans" would vote for socialist politicians (read: liberal Democrats), just as they did in their native lands. So I understand why GOE-Scam authors Dick Durbin (D-IL), Charles Schumer (D-NY) and Robert Menendez (D-NJ) consider the bill a good idea. I understand why Mexico considers it a good idea. I understand why China, Russia and any other nation that wanted American power and culture neutralized would consider it a good idea. But why, Senator Rubio, do you consider the bill a good idea? You and your politics keep some very strange and alarming bedfellows.

So I have something to say, and this isn't just for Rubio. Any politician - Democrat, Republican or independent - who supports amnesty in any form or by any name is dead to me.

Dead.

Immigration is a deal-breaker issue because it involves forces with the power to reshape your land into a different nation altogether. Thus, I would say that there can be no compromise on it, except that compromise isn't even on the horizon. That is to say, imagine the powers-that-be didn't have the will to punish the current crop of apprehended bank robbers; instead, they wanted to grant them amnesty and let them keep their ill-gotten gains. But they promised that if we agreed to this plan, they would increase police presence and reinforce bank-vault doors in the future. Would you consider this compromise? Would it even be that if we granted amnesty to only 20 percent of bank robbers?

Agreeing to facilitate law-breaking isn't compromise - it's capitulation. In a sane world, you don't allow criminals to reap the benefits of their law-breaking; you punish them. Compromise would be if we were discussing ending all immigration - as we should do - but then agreed to settle for a mere reduction in the numbers.

But it appears that some so-called "conservatives" have taken a high-dose stupid pill. The best predictor of future behavior is past behavior. Ronald Reagan got bitten by his 1986 amnesty (which he called a "mistake") when he agree to legalize the law-breakers in return for a Democrat promise of border enforcement, a promise that wasn't worth the paper it was printed on. And since then we've had six more amnesties.

Fact: the Democrats have never secured the border.

And they never will.

Oh, if the new arrivals had a history of voting GOP, the border would be locked down so tight a bacterium couldn't breach it. There'd be a wall with a fence on top of it, military patrols and Star Wars-type drones with heat-seeking technology buzzing about. But the Democrats have no intention of rejecting their main constituency: anyone who isn't Americanized.       

And that's the point. Allowing immigration doesn't just invite new people into your nation - it invites new voters into your nation. And any Republican who believes that the Hispanic voting bloc can be wooed with Rubioesque pandering is far too ignorant and dangerous to hold office.

If Marco Rubio and his fellow travelers want to hasten the death of traditional America, they are dead to me. Let's ensure that their political careers rest in peace long before the republic does.   

Energy Dep't Spending Millions So You Can Buy a $50K Hydrogen-Powered Car

- See more at: http://www.cnsnews.com/news/article/energy-dept-spending-millions-so-you-can-buy-50k-hydrogen-powered-car#sthash.ZG1avQwi.dpuf
 The Energy Dept Spending Millions So You Can Buy A 50K Hydrogen-Powered Car

The Energy Department has $9 million more taxpayer dollars to spend on projects that may make a very expensive car less expensive and more acceptable to consumers.

The latest round of funding is intended to accelerate the development of hydrogen fuel cell vehicles, backup power systems, and hydrogen refueling stations.

"These investments will strengthen U.S. leadership in cost-effective hydrogen and fuel cell technologies and help industry bring these technologies into the marketplace at lower cost," the news release said.

The cost of making a hydrogen fuel cell-powered car has plummeted, USA Today reported last month. Vehicles that cost around $1 million in past years now cost about $140,000 to produce, and Toyota said it expects the cost to be around $50,000 three years from now, when it plans to begin selling its models in the U.S.

Ironically, the Energy Department credits cheaper fossil fuel with reducing the cost of producing hydrogen fuel cells:

"Recent development of the United States’ tremendous shale gas resources has not only helped directly cut electricity and transportation costs for consumers and businesses, but is also helping to reduce the costs of producing hydrogen and operating hydrogen fuel cells," the Energy Department said.

Hydrogen vehicles emit only heat and water as byproducts. But it takes energy to produce hydrogen, and if that energy does not come from renewable sources, then fuel-cell cars are not as green as they seem, Business Insider reported in May.

The projects selected for the new round of funding will "demonstrate, deploy, and validate" hydrogen and fuel cell technologies in real-world environments.

H2USA

The funding announcement, aimed at industry, academia, and national labs, comes four weeks after the Energy Department announced a new public-private partnership to "deploy hydrogen infrastructure."

Called H2USA, the new partnership brings together automakers, government agencies, gas suppliers, and the hydrogen and fuel cell industries to coordinate research and identify cost-effective solutions to deploy infrastructure that can deliver hydrogen fuel in the United States. 

Current members of the H2USA partnership include the American Gas Association, Association of Global Automakers, the California Fuel Cell Partnership, the Electric Drive Transportation Association, the Fuel Cell and Hydrogen Energy Association, Hyundai Motor America, ITM Power, Massachusetts Hydrogen Coalition, Mercedes-Benz USA, Nissan North America Research and Development, Proton OnSite, Toyota Motor North America, and Honda.

The push to develop hydrogen fuel vehicles began under President George W. Bush and has accelerated under President Obama.

Major barriers to mass production include the high cost of production and a lack of infrastructure to support the vehicles.

There also are safety concerns about the possibility of hydrogen leaks stemming from crashes or refueling. Hydrogen gas is extremely flammable.

In 2008, Honda began leasing its FCX Clarity Fuel Cell Electric Vehicle (FCEV) to selected customers in California, where a few hydrogen fueling stations and service centers are located.

Honda says its FCX Clarity has a driving range of approximately 240 miles.

http://www.cnsnews.com/news/article/energy-dept-spending-millions-so-you-can-buy-50k-hydrogen-powered-car#sthash.ZG1avQwi.dpuf

Hot Mic Catches Egyptian Politician Discussing ‘War’ with ‘Enemies’ Israel and America


Just last month, Secretary of State John Kerry quietly sent Egypt an additional $1.3 billion, even though Egypt has failed to live up to democracy standards. That largesse didn’t stop a prominent Egyptian politician from talking about Egypt’s “enemy” the United States in what some pundits are classifying as a classic and embarrassing “hot mic” moment.

President Mohammed Morsi gathered a group of politicians last week who thought they were speaking privately at a parliamentary meeting. But as seen in an Egyptian television video of the meeting — excerpts of which were later translated by the Middle East Media and Research Institute (MEMRI) — they were actually on live television, cringingly discussing secret ways to stop Ethiopia’s Nile River dam project which threatens water flowing to Egypt.

The New York Times blog reports:
Unaware that their words were being broadcast live on a state-owned television channel, many of those seated around the table said the dam was in fact a secret American and Israeli plot to undermine Egypt that must be stopped at all costs.
The participants learned they were on live TV only after Magdi Ahmad Hussein, chairman of the Islamic Labor Party, suggested that all present vow not to leak any information to the media. Before being told he was on television, Hussein described the U.S. as an enemy [emphasis added]:
I’m very fond of battles. With the enemies, of course – with America and Israel, but this battle must be waged with maximum judiciousness and calm. Even though this is a secret meeting, we must all take an oath not to leak anything to the media, unless it is done officially by sister Pakinam [el-Sharkawy, a Morsi aide]. We need an official plan for popular national security, even if we…
The viewer sees him being handed a note, which presumably points out that his words are not confined to the room. Hussein laughs, then continues with the anti-American and anti-Israel rhetoric: “Okay… Fine… The principles behind what I’m saying are not really secret… Our war is with America and Israel, not with Ethiopia. Therefore, engaging in a war… This is my opinion…”

President Morsi says out for the benefit of all in the room, “This meeting is being aired live on TV,” a comment which prompts laughter all around.

In damage control mode, as if he knew all along that he was on camera, Hussein followed up by saying, “I am not presenting a secret plan or anything. All the countries do what I am saying and what has been said by others. All countries with regional conflicts do that.”

“I say to the Egyptian people: Nobody can turn off your water supply – unless they want to turn the Egyptians into the world’s most extremist people. Imagine what this people would do if its water were turned off – what all 80 million of us would do to Israel and America if our water were turned off,” Hussein concluded [emphasis added].

According to the New York Times, someone afterwards could be heard off camera saying, “Why didn’t you tell me that earlier?”

Morsi later appeared to try to send a calming message to Ethiopia, even though other participants in the parliamentary session were openly discussing sabotaging their southern neighbor, including via covert operations, supporting rebel groups or destroying the dam altogether.

“We have a lot of respect for the Sudanese people in the north and the south, and we respect their decisions, and the same is true with regard to the Ethiopian people. We are not about to start any aggression against anyone whatsoever, or affront anyone whatsoever,” Morsi said.

“But we have very serious measures to protect every single drop of Nile water – every single drop of water,” Morsi added.

Middle East analyst Barry Rubin of the Global Research in International Affairs (GLORIA) tells TheBlaze, “Here we have possibly the most embarrassing open microphone scandal in history.”

In an article which discussed the scene, Rubin wrote: “Egyptian leaders discussed covert operations to destroy the dam or giving covert support to rebel groups. This gives some hints of what longer-term policy toward Israel might well be. Advocates of aggressive action included moderate politicians.”

Before it was revealed that they were on camera, liberal politician Ayman Nour, chairman of the Ghad Al-Thawra Party suggested leaking a false story to the media suggesting Egypt might be preparing for war. He said:
The Ethiopian newspapers say that Egypt has no military option. They say that Egypt does not possess the capabilities – no airplanes, no missiles – and that Sudan would not allow this… Indeed, Sudan’s position is nauseating. It is much weaker than it should be. But we could leak intelligence information. We could leak that Egypt is trying to buy planes for aerial refueling, and so on. Even if this is unrealistic, it would bring results on the diplomatic track.
The water issue is so sensitive in Egypt, because the country’s agriculture is completely dependent on the Nile River. According to the New York Times, Ethiopian officials say the dam will not be used for agriculture, just for the production of electricity and therefore it should not substantially decrease the amount of water flowing to Egypt.

http://www.theblaze.com/stories/2013/06/12/im-very-fond-of-battles-egyptian-cabinet-minister-caught-on-hot-mic-discussing-war-with-enemies-israel-and-america/

Mali manual suggests al-Qaida has feared weapon
The photocopies of the manual lay in heaps on the floor, in stacks that scaled one wall, like Xeroxed, stapled handouts for a class.
Except that the students in this case were al-Qaida fighters in Mali. And the manual was a detailed guide, with diagrams and photographs, on how to use a weapon that particularly concerns the United States: A surface-to-air missile capable of taking down a commercial airplane.

The 26-page document in Arabic, recovered by The Associated Press in a building that had been occupied by al-Qaida in the Islamic Maghreb in Timbuktu, strongly suggests the group now possesses the SA-7 surface-to-air missile, known to the Pentagon as the Grail, according to terrorism specialists. And it confirms that the al-Qaida cell is actively training its fighters to use these weapons, also called man-portable air-defense systems, or MANPADS, which likely came from the arms depots of ex-Libyan strongman Col. Moammar Gadhafi.

"The existence of what apparently constitutes a 'Dummies Guide to MANPADS' is strong circumstantial evidence of al-Qaida in the Islamic Maghreb having the missiles," said Atlantic Council analyst Peter Pham, a former adviser to the United States' military command in Africa and an instructor to U.S. Special Forces. "Why else bother to write the guide if you don't have the weapons? ... If AQIM not only has the MANPADS, but also fighters who know how to use them effectively," he added, "then the impact is significant, not only on the current conflict, but on security throughout North and West Africa, and possibly beyond."

This is not the first al-Qaida-linked group thought to have MANPADS - they were circulating in Afghanistan and Iraq, and a terror cell in Somalia recently claimed to have the SA-7 in a video. But the U.S. desperately wanted to keep the weapons out of the hands of al-Qaida's largest affiliate on the continent, based in Mali. In the spring of 2011, before the fighting in Tripoli had even stopped, a U.S. team flew to Libya to secure Gadhafi's stockpile of thousands of heat-seeking, shoulder-fired missiles.

By the time they got there, many had already been looted.

"The MANPADS were specifically being sought out," said Peter Bouckaert, emergencies director for Human Rights Watch, who catalogued missing weapons at dozens of munitions depots and often found nothing in the boxes labeled with the code for surface-to-air missiles.

The manual is believed to be an excerpt from a terrorist encyclopedia edited by Osama bin Laden. It adds to evidence for the weapon found by French forces during their land assault in Mali earlier this year, including the discovery of the SA-7's battery pack and launch tube, according to military statements and an aviation official who spoke on condition of anonymity because he wasn't authorized to comment.

The knowledge that the terrorists have the weapon has already changed the way the French are carrying out their five-month-old offensive in Mali. They are using more fighter jets rather than helicopters to fly above its range of 1.4 miles (2.3 kilometers) from the ground, even though that makes it harder to attack the jihadists. They are also making cargo planes land and take off more steeply to limit how long they are exposed, in line with similar practices in Iraq after an SA-14 hit the wing of a DHL cargo plane in 2003.

And they have added their own surveillance at Mali's international airport in Bamako, according to two French aviation officials and an officer in the Operation Serval force. All three spoke on condition of anonymity because they were not authorized to comment.

"There are patrols every day," said the French officer. "It's one of the things we have not entrusted to the Malians, because the stakes are too high."
 ...
An SA-7 tracks a plane by directing itself toward the source of the heat, the engine. It takes time and practice, however, to fire it within range. The failure of the jihadists in Mali so far to hit a plane could mean that they cannot position themselves near airports with commercial flights, or that they are not yet fully trained to use the missile.

"This is not a 'Fire and forget' weapon," said Bruce Hoffman, director of the Center for Security Studies at Georgetown University. "There's a paradox here. One the one hand it's not easy to use, but against any commercial aircraft there would be no defenses against them. It's impossible to protect against it. ... If terrorists start training and learn how to use them, we'll be in a lot of trouble."
 ...
Neighbors say they saw foreign fighters running laps each day, carrying out target practice and inhaling and holding their breath with a pipe-like object on their shoulder. The drill is standard practice for shoulder-held missiles, including the SA-7.

As the jihadists fled ahead of the arrival of French troops who liberated Timbuktu on Jan. 28, they left the manual behind, along with other instructional material, including a spiral-bound pamphlet showing how to use the KPV-14.5 anti-aircraft machine gun and another on how to make a bomb out of ammonium nitrate, among other documents retrieved by the AP. Residents said the jihadists grabbed reams of paper from inside the building, doused them in fuel and set them alight. The black, feathery ash lay on top of the sand in a ditch just outside the building's gate.

However, numerous buildings were still full of scattered papers.

"They just couldn't destroy everything," said neighbor Mohamed Alassane. "They appeared to be in a panic when the French came. They left in a state of disorder."

The manual is illustrated with grainy images of Soviet-looking soldiers firing the weapon. Point-by-point instructions explain how to insert the battery, focus on the target and fire.

The manual also explains that the missile will malfunction above 45 degrees Celsius, the temperature in the deserts north of Timbuktu. And it advises the shooter to change immediately into a second set of clothes after firing to avoid detection.

Its pages are numbered 313 through 338, suggesting they came from elsewhere. Mathieu Guidere, an expert on Islamic extremists at the University of Toulouse, believes the excerpts are lifted from the Encyclopedia of Jihad, an 11-volume survey on the craft of war first compiled by the Taliban in the 1990s and later codified by Osama bin Laden. Bin Laden, who led a contingent of Arab fighters in Afghanistan at the time, paid to have the encyclopedia translated into Arabic, according to Guidere, author of a book on al-Qaida's North African branch.

However, the cover page of the manual boasts the name of al-Qaida in the Islamic Maghreb.

"It's a way to make it their own," said Guidere. "It's like putting a logo on something. ... It shows the historic as well as the present link between al-Qaida core and AQIM."

Bin Laden later assembled a team of editors to update the manual, put it on CD-ROMs and eventually place it on the Internet, in a move that lay the groundwork for the globalization of jihad, according to terrorism expert Jarret Brachman, who was the director of research at the Combating Terrorism Center when the al-Qaida encyclopedia was first found.

N.R. Jenzen-Jones, an arms expert in Australia, confirmed that the information in the manual in Timbuktu on the missile's engagement range, altitude and weight appeared largely correct. He cautions though that the history of the SA-7 is one of near-misses, specifically because it takes training to use.

"Even if you get your hands on an SA-7, it's no guarantee of success," he said. "However, if someone manages to take down a civilian aircraft, it's hundreds of dead instantly. It's a high impact, low-frequency event, and it sows a lot of fear."

http://www.wtop.com/289/3354224/Mali-manual-suggests-al-Qaida-has-feared-weapon

No comments: