Tuesday, 30 July 2013

Black Self-Sabotage


July 30, 2013
Black Self-Sabotage
By Walter E. Williams

If we put ourselves into the shoes of racists who seek to sabotage black upward mobility, we couldn't develop a more effective agenda than that followed by civil rights organizations, black politicians, academics, liberals and the news media. Let's look at it.

First, weaken the black family, but don't blame it on individual choices. You have to preach that today's weak black family is a legacy of slavery, Jim Crow and racism. The truth is that black female-headed households were just 18 percent of households in 1950, as opposed to about 68 percent today. In fact, from 1890 to 1940, the black marriage rate was slightly higher than that of whites. Even during slavery, when marriage was forbidden for blacks, most black children lived in biological two-parent families. In New York City, in 1925, 85 percent of black households were two-parent households. A study of 1880 family structure in Philadelphia shows that three-quarters of black families were two-parent households.

During the 1960s, devastating nonsense emerged, exemplified by a Johns Hopkins University sociology professor who argued, "It has yet to be shown that the absence of a father was directly responsible for any of the supposed deficiencies of broken homes." The real issue, he went on to say, "is not the lack of male presence but the lack of male income." That suggests marriage and fatherhood can be replaced by a welfare check.

The poverty rate among blacks is 36 percent. Most black poverty is found in female-headed households. The poverty rate among black married couples has been in single digits since 1994 and is about 8 percent today. The black illegitimacy rate is 75 percent, and in some cities, it's 90 percent. But if that's a legacy of slavery, it must have skipped several generations, because in the 1940s, unwed births hovered around 14 percent.

Along with the decline of the black family comes anti-social behavior, manifested by high crime rates. Each year, roughly 7,000 blacks are murdered. Ninety-four percent of the time, the murderer is another black person.

There's an organization called NeighborhoodScout. Using 2011 population data from the U.S. Census Bureau, 2011 crime statistics from the FBI and information from 17,000 local law enforcement agencies in the country, it came up with a report titled "Top 25 Most Dangerous Neighborhoods in America." ( http://tinyurl.com/cdqrev4) They include neighborhoods in Detroit, Chicago, Houston, St. Louis and other major cities. What's common to all 25 neighborhoods is that their makeup is described as "Black" or "Mostly Black." The high crime rates have several outcomes that are not in the best interests of the overwhelmingly law-abiding people in these neighborhoods. There can't be much economic development. Property has a lower value, but worst of all, people can't live with the kind of personal security that most Americans enjoy.According to the Bureau of Justice Statistics, between 1976 and 2011, there were 279,384 black murder victims. Using the 94 percent figure means that 262,621 were murdered by other blacks. Though blacks are 13 percent of the nation's population, they account for more than 50 percent of homicide victims. Nationally, the black homicide victimization rate is six times that of whites, and in some cities, it's 22 times that of whites. I'd like for the president, the civil rights establishment, white liberals and the news media, who spent massive resources protesting the George Zimmerman trial's verdict, to tell the nation whether they believe that the major murder problem blacks face is murder by whites. There are no such protests against the thousands of black murders.

Disgustingly, black politicians, civil rights leaders, liberals and the president are talking nonsense about "having a conversation about race." That's beyond useless. Tell me how a conversation with white people is going to stop black predators from preying on blacks. How is such a conversation going to eliminate the 75 percent illegitimacy rate? What will such a conversation do about the breakdown of the black family (though "breakdown" is not the correct word, as the family doesn't form in the first place)? Only black people can solve our problems.

http://www.lewrockwell.com/2013/07/walter-e-williams/black-self-sabotage/

Manning Show Trial Exposes the Fraud of Representative Democracy


Manning Show Trial Exposes the Fraud of Representative Democracy
Kevin Carson | July 30th, 2013

Major Ashlend Fein, US Army prosecutor in Bradley Manning's court martial, caught my attention when he referred to Manning as an "anarchist" in closing arguments. As an anarchist, I'd be proud to share that label with Manning. But I've never heard from any reliable source that he considers himself one.

Manning ­ if indeed guilty of supplying thousands of military and state department documents to Wikileaks ­ has certainly helped to promote anarchism. Exposing the corrupt reality of the state ­ its lies, torture, atrocities and collusion with authoritarian governments against their own people ­ behind all the talk of "peace" and "freedom" is the method of promoting anarchism. But equally deserving of credit, in helping us further the cause of anarchy, are Major Fein himself and everyone else involved in the Manning show trial.

The charges leveled against Manning, and the lengths to which they have gone to have their vengeance against him, have done more than a thousand anarchist tracts could do to show the fraudulent nature of so-called "representative democracy."

The most serious charge against Manning was "aiding the enemy." Although this was the sole charge of which military judge Denise Lind acquitted him, the fact that the entire executive branch brought its full force to bear in pushing such charges in the first place is significant. According to the Obama administration, Manning "indirectly" provided the enemy with classified information, by releasing it to be published in venues where he knew it would be accessible to the enemy.

Now, let's stop to think about who this "enemy" might be. What kind of information did the leaked documents reveal? They revealed
  • war crimes by U.S. military forces, murdering civilians and journalists in cold blood;
  • torture by U.S. military personnel;
  • the corrupt dealings of U.S. State Department and other functionaries with the local authoritarian governments of the Middle East, including secret authorizations by local governments for the use of American drones to carry out extrajudicial killings on their own territory ­ facts that would have resulted in rioting in the streets.

I doubt any of this was surprising to al Qaeda. They almost certainly assumed it to be true. If exposing this stuff "aided" al Qaeda in any way, it did so only by giving them hard evidence of the truth to share with those who weren't already aware of it ­ namely the publics of the Middle East, the U.S. and its allies, and the world. And this would be harmful to the interests of the U.S. government only to the extent that it was true ­ i.e., to the extent that it revealed to the allegedly sovereign people of the allegedly democratic United States the real nature of "their" government's policy, or revealed to the people of the Middle East what kind of sham democracy the U.S. was promoting in their region.

The U.S. government fears an informed American people, and an informed world public opinion, far more than it ever feared al Qaeda. What we've called "representative democracy," since the rise of universal suffrage in the West a century or so ago, has been an elaborate exercise in securing the outcome desired by ruling elites ­ preserving an intersecting alliance of corporate and state oligarchies ­ while maintaining the fiction of popular rule.

This ruling class has maintained its power mainly through what Edward Bernays called "manufacturing consent" ­ carefully restricting the range of alternatives on the table and shaping public consciousness to see that restricted range as exhaustive. The range is bounded, basically, by the preferences of the left and right wings of the corporate elite. It encompasses only measures consistent with, and which can largely be carried out by the people running, the present structure of power. Anything else is deemed "extremist" or "silly," beyond the range of thought of Serious People.

The basic structural presuppositions of this system are justified in terms of inevitability and necessity ­ because it's the only conceivable way of efficiently organizing things. For the American people, a decentralized and horizontally organized society without centralized state power, Fortune 500 corporations, giant banks and millionaire CEOs must be as unthinkable as an Animal Farm without a class of pigs (well fed on apples and milk, of course) to manage problems beyond the competence of mere lower animals. It requires distracting the public from any awareness that "another world is possible," or that the present system exists to serve not the public, but rather the interests of those running things.

Manning committed the one unforgivable sin in a sham representative democracy: He let the "sovereign" people in on what "their" government is really doing, and whose interests it's really serving. For that, the political class will never forgive him.

http://networkedblogs.com/NDXoM

Guilty of aiding the American people


07/30/2013
Guilty of aiding the American people
Anthony Gregory

A military judge has announced a verdict in Bradley Manning's court martial: not guilty of "aiding the enemy," but guilty of 20 other counts, including five offenses against the Espionage Act. The sentencing hearing begins on Wednesday.

The "aiding the enemy" accusation presumed that Manning's distribution of classified material assisted al Qaeda. Actually, the information helps Americans by exposing U.S. war criminality.

In early 2010, WikiLeaks published a video, Collateral Murder, featuring July 2007 footage procured from Manning, showing American troops firing upon a journalist and two Reuters employees in Baghdad and revealing their nonchalance about children in the crossfire. WikiLeaks later published hundreds of thousands of diplomatic cables it obtained from Manning. We learned that in 2006, U.S. troops executed ten Iraqi civilians in Ishaqi, including a five-month-old, and called an airstrike to obliterate the evidence. Other material exposes al-Maliki's corruption in Iraq, hundreds of previously unreported civilian deaths at the hands of U.S. allied forces in Afghanistan, friendly fire incidents, violent covert operations, and detainee mistreatment at Guantánamo.

War criminality ranks among the most important types of government wrongdoing warranting transparency. We cannot debate foreign policy without knowing about its indecencies. What U.S. forces do abroad can endanger Americans at home. Some see the leaks, not the crimes, as the true scandal, but the Muslim and Arab world already know of these atrocities. The American people need to understand what U.S. occupations are like.

Running for president in 2008, Barack Obama promised unprecedented transparency and protection for government whistleblowers "willing to speak out," hailing their "courage and patriotism, which can sometimes save lives." Recently, this language was removed from his website.

Indeed, in response to the leaks, the Obama administration has detained Manning since May 2010 -- for almost three years before the private pled guilty to 10 charges this February. For eleven months, Manning endured a particularly cruel form of solitary confinement in a windowless 6'x12' cell for 23 hours a day under constant surveillance, where an official asked the question "Are you OK?" every five minutes. Over 250 legal scholars protested this treatment in an open letter.

Nearly a year of draconian solitary confinement followed by two years of pre-trial detention does not satisfy due process, constitutional speedy trial guarantees, and prohibitions against cruel treatment. Some attorneys have cited the exclusion of exculpatory evidence and denial of relevant defense witnesses as indications of the "railroading" of Manning. At the last minute, the judge even assisted the prosecutor in modifying the charges. The aggressiveness has suggested a political motive to silence those who expose government wrongdoing.

As for the Espionage Act, it passed months after U.S. entry into World War I, America's low point for civil liberties. The law could ensnare anyone who has spread along information tenuously related to national defense. Along with its sister legislation the Sedition Act, which doomed people to prison merely for criticizing the war, the Espionage Act is an embarrassing relic from a dark time.

Daniel Ellsberg, who leaked the Pentagon Papers, exposing numerous administrations of lying about their Vietnam War intentions and revealing the secret bombing of Laos and Cambodia, faced non-espionage charges under the Espionage Act. A judge dismissed the charges. Ellsberg has identified Manning as his modern counterpart. He has said he's "sure that President Obama would have sought a life sentence in" his own case, and called the president an "elected monarch." In an interview with Scott Horton, Ellsberg reacted to the "aiding the enemy" acquittal positively, warning that if leaking information to the Internet is a capital crime, it would spell the "death knell" for investigative journalism.

Aside from Ellsberg, two other men faced Espionage Act charges before Obama -- one under Reagan and another under George W. Bush.

The current administration is in its own class. In charging Edward Snowden, the former NSA contractor who, inspired by Manning, revealed the near unlimited nature of warrantless spying on Americans and foreigners, the Obama executive branch has now charged eight people of leaking information under the Espionage Act -- more than twice the number of people so charged in earlier presidencies combined.

Obama's crusade against leakers, as well as against, in at least one case, a journalist for normal journalistic behavior, creates an ominous chilling effect. James Goodale, the counsel for the New York Times in its Supreme Court struggle over the Pentagon Papers, predicts that "President Obama will surely pass President Richard Nixon as the worst president ever on issues of national security and press freedom."

This is the administration: Nearly unparalleled secrecy, daily scandals, a surveillance state unbound by law, unilateral presidential wars, indefinite detention, the power to kill any terrorist suspect anywhere without a hint of due process, a politicized regulatory state collecting limitless data and harassing political opponents at home, and the persecution of whistleblowers using an anachronistic law from the darkest days of American civil liberty.

The national security state and its leader demand scrutiny. In the long term, Americans should fear their own government more than foreign terrorists. The federal government is a menace not just to life but to liberty. None too soon, a poll shows more Americans worried about civil liberties violations than terrorism.

http://dailycaller.com/2013/07/30/guilty-of-aiding-the-american-people/#ixzz2aZp6afaS

Commercial Drones Are Now Approved for Aerial Surveillance






http://gizmodo.com/commercial-drones-are-now-approved-for-aerial-surveilla-965953836?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+gizmodo%2Ffull+%28Gizmodo%29

Commercial Drones Are Now Approved for Aerial Surveillance

Creepy drone spying is no longer just the purview of the military in the United States. The Federal Aviation Administration recently cleared two unmanned aerial vehicles (UAVs) for commercial use surveilling the Alaskan coast, marking a sharp turn for the future of domestic drone use.

One of the drones, an Insitu Scan Eagle 200, will be used by a "major energy company" for monitoring migrating whales and icebergs off the Alaskan coast, while the other one, an AeroVironment PUMA, will monitor oil spills up in the Beaufort Sea. These are the first of what will surely be a significant number of commercial drones use for aerial surveillance around the country.

The arrival of certified commercial surveillance drones comes as a first step to measures in the FAA Reauthorization Act that President Obama renewed last year calling for new regulations to govern the use of commercial drones by 2015. Until now, drones could only fly with an experimental airworthiness and not for commercial purposes. Although that didn't stop photographers or journalists from using the machines for specialized purposes. It did kickstart an entire industry of commercial drone manufacturing to make sure there are UAVs ready for purchase when the FAA gives the go ahead.

Related

Well, the agency's now got that ball rolling, and 2015 will be here before we know it. In the meantime, it's good to know that a couple of flying robots have their eyes on the Alaskan coast for us. At least, it's better than knowing a couple of flying robots have their eyes on us.

 



__._,_





   
__,_._,___


--
--
Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see http://groups.google.com/group/PoliticalForum
 
* Visit our other community at http://www.PoliticalForum.com/
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.
 
---
You received this message because you are subscribed to the Google Groups "PoliticalForum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to politicalforum+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
 
 

Welcome to the new Muslim America Allahu Akbar!









 


 

 

 

 

 

 

Look who's new in the white house!

 

Arif Alikhan - Assistant Secretary for Policy Development

 

for the U.S. Department of Homeland Security

 

Mohammed Elibiary - Homeland Security Adviser

 

Rashad Hussain - Special Envoy to the

 

Organization of the Islamic Conference (OIC) 

 

Salam al-Marayati - Obama Adviser and

 

founder of the Muslim Public Affairs Council

 

and is its current executive director

 

Imam Mohamed Magid - Obama's Sharia Czar from

 

the Islamic Society of North America

 

Eboo Patel - Advisory Council on Faith-Based

 

Neighborhood Partnerships

 

This is flat-out scary!!!

 

 

The foxes are now officially living in the hen house...

 

Now ask me why I am very concerned!!!

 

Do you feel OK with this???

 

How can this happen, and when will we wake up???

 

We are quiet while our Country is being drastically changed!!!

 

If you're not CONCERNED, DELETE this. Go to bed tonight...sleep well!

 

Otherwise, pass it on—get the word out!

 

We've got to have some relief starting with the 2014 Elections!

 

 

 



__._,_.___





   
__,_._,___


--
--
Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see http://groups.google.com/group/PoliticalForum
 
* Visit our other community at http://www.PoliticalForum.com/
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.
 
---
You received this message because you are subscribed to the Google Groups "PoliticalForum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to politicalforum+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
 
 

Cyber Crime: Whose Side is the Gov't on, Anyway?





http://www.wallstreetdaily.com/2013/07/29/cyber-attacks-criminals/

 

Cyber Crime: Whose Side is the Gov't on, Anyway?

By Karen Canella

Try to wrap your brain around these numbers…

Cyber criminals launched 1.5 billion web attacks in 2012, infiltrating 6.5 million unique domains. Malicious codes corrupted servers in the internet zones of 202 countries, just 20 of which accounted for 96.1% of all of those detected by IT security vendor, Kaspersky Labs.

The United States earned the dubious distinction of holding the No. 1 spot. We've been a victim of 413,622,459 attacks.

Think we have a big problem on our hands? The scary thing is, sometimes I'm not so sure whose side our government is on.

On one hand, the Department of Homeland Security acknowledges that public and private sectors need to share information intimately to advance the fight against cyber security. After all, private companies own the majority of critical infrastructure in the United States.

On the other hand, since March, the DHS has cancelled two training and networking conferences that teach utility companies how to defend against cyber attacks. The reason? Budget cuts.

And not to rub salt in any cyber victims' wounds, but the Cyber Intelligence Sharing and Protection Act (CISPA) is barely limping along. As of April 18, the Senate refused to vote on it and is in the process of drafting its own version of the legislature.

Besides, CISPA – a law that would allow for information sharing by opening the gates of internet traffic between the U.S. government and some private sectors to beef up security – is hardly an adequate, long-term fix.

I seriously doubt it would have prevented what the Pentagon called "the largest leak of classified documents in its history." (If you recall, WikiLeaks posted 400,000 pages on the Iraq War two years ago, and 4.8 million people had access to Top Secret information.)

As big a concern as national security is, it doesn't even scrape the surface. For criminals, there's really no limit to the havoc they can wreak on countries, businesses and individuals.

In fact, this headline just popped up on my computer screen: "Leak Exposed Securities and Exchange Commission Workers' Data." Apparently information on SEC employees kept appearing on federal agency computers after a former worker downloaded names, birthdays, and Social Security numbers and transferred them to another network.

On the heels of that news – and the recent Nasdaq community website hacking – the International Organization of Securities Commissions (IOSCO) released a report saying that "half the world's financial exchanges suffered cyber attacks in the past year."

Like I said, nothing is sacred.

A recent report by the Ponemon Institute, 2012 Cost of Cyber Crime Study: United States, paints an even uglier picture:

  • The average annualized cost of cyber crime for 56 organizations is $8.9 million per year, with a range of $1.4 million to $46 million. In 2011, the average annualized cost was $8.4 million.
  • Companies in the study experienced 102 successful attacks per week and 1.8 successful attacks per company each week. This represents an increase of 42% from last year's successful attack experience.
  • The most costly cyber crimes are those caused by denial of service, malicious insiders and web-based attacks. Mitigation of such attacks requires enabling technologies such as security information and event management (SIEM), intrusion prevention systems, application security testing and enterprise governance, risk management and compliance solutions.

And as the costs of these attacks continue to mount, companies that provide theses "enabling technologies" will continue to thrive.

Our Chief Investment Strategist, Louis Basenese, recommended just such a company to WSD Insiders – KEYWAVE Holdings (KEYW [1]). They're already up by double digits with the position. But that's not the only cyber security opportunity he's recommended in the portfolio. Go here [2] to upgrade your subscription now.

Ahead of the tape,

Karen Canella


Article printed from | Wall Street Daily: http://www.wallstreetdaily.com

URL to article: http://www.wallstreetdaily.com/2013/07/29/cyber-attacks-criminals/

URLs in this post:

[1] KEYW: https://www.google.com/finance?q=NASDAQ%3AKEYW&ei=5-zyUaD0N8SF0QGBHQ

[2] here: http://pro1.wsdinsider.com/135429/?email={emailaddress}

 



__._,_.___
 




   
__,_._,___


--
--
Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see http://groups.google.com/group/PoliticalForum
 
* Visit our other community at http://www.PoliticalForum.com/
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.
 
---
You received this message because you are subscribed to the Google Groups "PoliticalForum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to politicalforum+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
 
 

The 14 Most Awesome Convertibles Ever Built








--
--
Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see http://groups.google.com/group/PoliticalForum
 
* Visit our other community at http://www.PoliticalForum.com/
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.
 
---
You received this message because you are subscribed to the Google Groups "PoliticalForum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to politicalforum+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
 
 

The Mocker-in-Chief MOCKS Republicans for Having No Jobs Plan, Laughs at Keystone Pipeline [Video]





Sard posted: "From TRP: Freedom Works reported back in 2011 that Senate Leader Harry Reid had stalled 15 real jobs bills the Republican-led House had passed, yet the president and his minions keep blaming the Republicans. This is getting really old: (AP)—President Ob"

New post on therightplanet.com

The Mocker-in-Chief MOCKS Republicans for Having No Jobs Plan, Laughs at Keystone Pipeline [Video]

by Sard

From TRP: Freedom Works reported back in 2011 that Senate Leader Harry Reid had stalled 15 real jobs bills the Republican-led House had passed, yet the president and his minions keep blaming the Republicans. This is getting really old: (AP)—President Obama MOCKS Republicans For Having No Jobs Plan. Economy Speech 7/29/13. CHATTANOOGA, Tenn. -- Seeking […]

Read more of this post

Sard | July 30, 2013 at 5:57 pm | Tags: Barack Hussein Obama, Democrats, Jobs Bill, Keystone XL Pipeline, Obama Regime, Republicans | Categories: American Culture, American Sovereignty, Bill of Rights, Calumny, Communications, Communism, Conservatism, Cultural Marxism, Debt Ceiling, Economy, elitism, Fascism, Federal Budget, First Amendment, GOP, Health Care Bill, History, House of Representatives, Indoctrination, Legal/Judicial, Liberal Crap, Libertarianism, Main-Stream Media, Marxism, Monetary Policy, National Debt, National Security, Obama Lies, Plantation Liberalism, Politics, Prejudice, Presidential Campaign, Progressive Movement, Senate, Social Engineering, Social Justice, Socialism, Taxation, Tea Party, Totalitarianism, Tyranny, U.S. Constitution, Union Actions, United Nations | URL: http://wp.me/p1SHGG-apM

Comment    See all comments

Unsubscribe or change your email settings at Manage Subscriptions.

Trouble clicking? Copy and paste this URL into your browser:
http://www.therightplanet.com/2013/07/the-mocker-in-chief-mocks-republicans-for-having-no-jobs-plan-laughs-at-keystone-pipeline-video/




--
--
Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see http://groups.google.com/group/PoliticalForum
 
* Visit our other community at http://www.PoliticalForum.com/
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.
 
---
You received this message because you are subscribed to the Google Groups "PoliticalForum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to politicalforum+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
 
 

Fwd: [TrinidadDC] Mentor middle schoolers in SE!

Can you help government schools?

They have a 41% drop out rate

-------------------------------------------------------------------------------------------------------------------------------------------
 

Close the opportunity gap for middle school students! Be a Mentor! www.higherachievement.org/volunteer

We are in need of Mentors and Study Hall Aides at 3 of our Achievement Centers in DC (Petworth, Benning Road, Anacostia) and Alexandria. The greatest need is in Anacostia and Benning Road – and we provide shuttles to and from Metro! The commitment is one evening per week, Monday, Tuesday, or Thursday; Study Hall Aides- 4:00-6:00pm, Mentors- 6:00-8:00pm.

100% of Higher Achievement graduates finish high school, and 93% go on to college. In a city where 59% finish high school and only 9% get a college degree, these results are astounding – and desperately needed. Higher Achievement is creating lasting change in the lives of youth – and you can be a part of that change in the DC Metro area!

By leveraging the power of communities, Higher Achievement's proven model provides a rigorous summer and afterschool learning environment, caring role models, and a culture of high expectations, resulting in college-bound scholars with the character, confidence, and skills to succeed. Scholars commit to 4 years of the program, and are committed to their academics.

For more information or to fill out an application please go to www.higherachievement.org/volunteer. Please call or email Alexis Davis with questions, 202-375-7724 or adavis@higherachievement.org.

__._,_.___
Reply via web post Reply to sender Reply to group Start a New Topic Messages in this topic (1)
Recent Activity:
This email list is a service brought to you by the:

Trinidad Neighborhood Association
trinidadneighborhood.org
Telephone: (202) 596-TNA1
Email: TrinidadNeighborhood@gmail.com

.

__,_._,___

--
--
Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see http://groups.google.com/group/PoliticalForum
 
* Visit our other community at http://www.PoliticalForum.com/
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.
 
---
You received this message because you are subscribed to the Google Groups "PoliticalForum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to politicalforum+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
 
 

China's Military Preparing for 'People's War' in Cyberspace, Space




http://freebeacon.com/china-military-preparing-for-peoples-war-in-cyberspace-space/

 

China's Military Preparing for 'People's War' in Cyberspace, Space

Translated report reveals high-tech plans for cyber attacks, anti-satellite strikes

AP

BY: Bill GertzFollow @BillGertz
July 30, 2013 5:00 am

China's military is preparing for war in cyberspace involving space attacks on satellites and the use of both military and civilian personnel for a digital "people's war," according to an internal Chinese defense report.

"As cyber technology continues to develop, cyber warfare has quietly begun," the report concludes, noting that the ability to wage cyber war in space is vital for China's military modernization.

According to the report, strategic warfare in the past was built on nuclear weapons. "But strategic warfare in the information age is cyber warfare," the report said.

"With the reliance of information warfare on space, cyberspace will surely become a hot spot in the struggle for cyberspace control," the report said.

The new details of Chinese plans for cyber and space warfare were revealed in a report "Study on Space Cyber Warfare" by four engineers working at a Chinese defense research center in Shanghai.

The report presents a rare inside look of one of Beijing's most secret military programs: Cyber warfare plans against the United States in a future conflict.

"Cyber warfare is not limited to military personnel. All personnel with special knowledge and skills on information system may participate in the execution of cyber warfare. Cyber warfare may truly be called a people's warfare," the report says.

People's War was first developed by China's Communist founder Mao Zedong as a Marxist-Leninist insurgency and guerrilla warfare concept. The article provides evidence that Chinese military theorists are adapting Mao's peasant uprising stratagem for a future conflict with the United States.

A defense official said the report was recently circulated in military and intelligence circles. Its publication came as a surprise to many in the Pentagon because in the past, U.S. translations of Chinese military documents on similar warfighting capabilities were not translated under a directive from policy officials seeking to prevent disclosure of Chinese military writings the officials feared could upset U.S.-China relations.

A Chinese government spokesman could not be reached for comment. However, Chinese spokesmen in the past have denied reports that China engages in cyber attacks.

The study links China's space warfare development programs with its extensive cyber warfare capabilities. Both programs are considered "trump card" weapons that would allow a weaker China to defeat a militarily stronger United States in a conflict.

"Cyber warfare is an act of war that utilizes space technology; it combines space technology and cyber technology and maintains and seizes the control of cyberspace," the study says.

Because cyberspace relies on satellites, "space will surely be the main battlefield of cyber warfare," the report said.

Satellites and space vehicles are considered the "outer nodes" of cyber space and "are clear targets for attack and may be approached directly," the report said, adding that ground-based cyberspace nodes are more concealed and thus more difficult to attack.

Additionally, satellites have limited defenses and anti-jamming capabilities, leaving them very vulnerable to attack.

The report reveals that China's military, which controls the country's rapidly growing space program, is preparing to conduct space-based cyber warfare—"cyber reconnaissance, jamming, and attack"—from space vehicles.

Space-based cyber warfare will include three categories: space cyber attack, space cyber defense, and space cyber support. The space cyber support involves reconnaissance, targeting, and intelligence gathering.

"A space cyber-attack is carried out using space technology and methods of hard kill and soft kill," the report said. "It ensures its own control at will while at the same time uses cyberspace to disable, weaken, disrupt, and destroy the enemy's cyber actions or cyber installations."

Soft-kill methods are designed to disrupt or damage cyberspace links using jamming, network cyber attacks, and "deceit" in the electromagnetic domain.

The cyber attacks include launching computer viruses, theft and tampering of data, denial of service attacks, and "detonation of [a] network bomb that can instantaneously paralyze or destroy enemy's information network."

"Soft kill measures are well concealed, fast in action, and the attack can be accomplished before the enemy even has time to discover it," the report said. "Soft kill measures are deceptive and well hidden; they are difficult to detect and monitor."

Hard-kill cyber attack weapons include missiles and other "kinetic" weapons along with directed energy, including lasers, radio frequency weapons, and particle beam weapons.

Chinese cyber warfare capabilities are one of the People's Liberation Army's (PLA) most closely guarded secrets, along with its anti-satellite missile and jamming program.

The topic of military cyber warfare was recently discussed by U.S. and Chinese military and defense officials at a meeting earlier this month of the U.S.-China Strategic and Economic Dialogue in Washington.

The Washington Free Beacon obtained a copy of the recently translated report, dated December 2012 and published in the journal Aerospace Electronic Warfare.

The journal is a bimonthly publication of the Institute 8511, part of the China Aerospace Science and Industry Corp. (CASIC), a state-run missile manufacturer and high-technology aerospace research center.

Institute 8511 develops electronic warfare offense and defense weapons, countermeasure technologies, and command and control systems for aircraft and missiles.

The institute in the past also developed China's DF-21D anti-ship ballistic missile, a unique weapon that uses precision guidance to attack U.S. aircraft carriers at sea.

The defense official said Institute 8511 is located close to the PLA's premier cyber warfare headquarters in Shanghai, known as Unit 61398. That unit was identified in a report last February by the security firm Mandiant as the main origin of widespread military cyber attacks on the West.

According to the report, China's goal for cyber war calls for using high-technology weapons in cyberspace to achieve military objectives.

"Since cyberspace is boundless and transcends land, sea, air, and space, cyber warfare is not constrained by territorial land or territorial sea, and there is no difference between the front and the rear of the battlefield," the report said. "The advantage of cyber warfare is its global nature; it has global alert, global resources, and global access."

Additionally, war in cyberspace is not constrained by nighttime, weather, or geography and can be conducted at any time, key factors that have limited conventional warfighting in the past.

In line with Chinese military doctrine that calls for sudden attacks and the element of surprise, the report said cyberwarfare is ideal for rapid attacks that are difficult for an enemy to identify.

"This suddenness can often leave cyber warfare without a trace and without damaging the physical installation or personnel, and yet it can change the trend and outcome of war by affecting the operational effectiveness in an instance."

A second recently translated military report by two PLA colonels calls for China to adopt a new military doctrine called "trump card and data link-centric warfare" that is based on the U.S. war fighting doctrine called "network-centric warfare."

The two colonels, Sr. Col. Du Wenlong and Sr. Col. Xie Zhaohui, call for a new strategic concept designed to attack and defeat the United States using advanced command, control, communications, computers, intelligence, surveillance, and reconnaissance, what the military calls C4ISR and the key to conducting combined arms warfare.

The colonels call for new weapons and other military capabilities "to penetrate and to strike as quickly as possible … and ensure that our military will win the warfare under the informatized conditions."

"Should the United States military's transformation model of 'network-centric warfare' become a success, it will undoubtedly and completely change the mode and means of warfare, making warfare even more sudden and its outcome even quicker to come, generating unmatched asymmetrical advantages," the colonels said. "This will inevitably greatly strengthen its arrogance, enabling it to have its own way to an even bigger extent and to promote its politics of hegemony."

Publication of the new cyber warfare report provides a more recent example of the contradiction between internal Chinese military writings and public statements. A 1999 book produced for the Pentagon's Office of Net Assessment and edited by China specialist Michael Pillsbury first reveals the contradiction.

The book, "Chinese Views of Future Warfare," influenced many senior Pentagon and military leaders' views of China by showing that internal Chinese military writings discussed plans for war with the United States, considered China's main enemy. The writings contrasted sharply with frequent public statements by China that its arms buildup is purely defensive and not directed at any country.

Richard Fisher, a Chinese military affairs expert, said the Chinese report reveals China's merger of cyber warfare and space warfare efforts.

Fisher said the Chinese military understands that U.S. satellites are critical to relaying computer data traffic and are vulnerable to direct attack.

"China has already demonstrated two anti-satellite weapons: ground based lasers in 2006 and then the SC-19 [anti-satellite] missile in 2007. A higher Medium Earth Orbit (MEO) capable ASAT called DN02 may have been tested recently," Fisher said.

China also is pressing for a space arms agreement at the same time it is building up its space forces, Fisher said.

"The bottom line today is that China's first priority is building the means to win wars in space while using space diplomacy to disarm its potential enemies," he said.

U.S. cyber warfare strategy was recently disclosed in a top-secret Presidential Policy Directive-20 that was made public by former National Security Agency contractor Edward Snowden.

The directive outlines the use of military cyber attacks that "can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging."

A third Chinese document from 2005 that was translated recently by the U.S. government reveals that Chinese military planners are preparing to destroy or disable up to eight Global Positioning System satellites. The satellites are critical for U.S. military precision guided missiles and bombs.

"Eliminating two groups of GPS satellites can prevent GPS satellites from providing navigation service around the clock," the study stated. "The effect of dropping these GPS satellites on the navigation accuracy of GPS satellites is quite obvious," the study, "Research on Voidness of GPS," said.

 



__._,_.__





   
__,_._,___


--
--
Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see http://groups.google.com/group/PoliticalForum
 
* Visit our other community at http://www.PoliticalForum.com/
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.
 
---
You received this message because you are subscribed to the Google Groups "PoliticalForum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to politicalforum+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
 
 

Texas Rattlesnake Logic




Texas Rattlesnake Logic

 

After the Boston bombing the news media has spent days and weeks trying to determine why these men did what they did.  They  want to know what America  did to make these brothers so angry with us.  They want to know why these men were not arrested before they did something so terrible. The media is in a tizzy about this new era of home grown radicals, and about why they could live among u s and still hate us.

 

A friend of mine from Texas explained it all to me:

 

"Here in west Texas I have rattlesnakes on my place, living among us.  I have killed a rattlesnake on the front porch.   I have  killed a rattlesnake on the back porch. I have killed rattlesnakes in  the barn, in the shop and on the driveway.  In fact, I kill every rattlesnake I encounter.

 

I kill  rattlesnakes because I know a rattlesnake will bite me and inject me  with poison. I don't stop to wonder why a rattlesnake will bite me; I know:  It will bite me because it's a rattlesnake and that's what rattlesnakes  do.  I don't try to reason with a rattlesnake…I just kill it.  I don't  try to get to know the rattlesnake better so I can find a way to live  with the rattlesnakes and convince them not to bite me…I just kill them.  I don't  quiz a rattlesnake to see it I can find out where the other snakes are,  because (a) it won't tell me, and (b) I already know they live on my  place.  So, I  just kill the rattlesnake and move on to the next one.

 

I don't  look for ways I might be able to change the rattlesnake to a non-poisonous rat snake...I just kill it. Oh, and on occasion,  I accidentally kill a rat snake because I thought it was a rattlesnake at  the time.  Also, I know, for every rattlesnake I kill, two more  are lurking out there in the brush.  In my lifetime I will never be  able to rid my place of rattlesnakes.  Do I fear them?  No!

 

Do I  respect what they can do to me? Yes!  And because of that respect I give them the fair justice they deserve...I get rid of them...."

 

Maybe as a country we should start giving more thought to the fact that these jihadists' are just like rattlesnakes, and act accordingly!

 

 

In God We Trust!

 

"I love this country, it's some of the people running our government I'm afraid of"

 



__._,_.__





   
__,_._,___


--
--
Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see http://groups.google.com/group/PoliticalForum
 
* Visit our other community at http://www.PoliticalForum.com/
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.
 
---
You received this message because you are subscribed to the Google Groups "PoliticalForum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to politicalforum+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.