ARTICLES - HOT OFF THE FAGGOT

The TEA PARTY ECONOMIST

The TEA PARTY ECONOMIST
Ron Paul's original staff economist, Dr. Gary North!


Thursday, November 15, 2012

Ron Paul’s Farewell Speech in Congress
Ron Paul was given 60 minutes to present his case for where we are as a nation, where we are headed, and how to restore liberty. The video on C-Span is here. It is on YouTube. There has never been a speech like this in Congress. He presents the case for limited civil government. The... READ MORE


Irrefutable Data: Global Warming Stopped in 1997
London’s Mail Online ran an article on a government report that has received almost no attention. It was released by the Met Office, shorthand for the United Kingdom’s meteorological center. For those of us who have always suspected thatt he global warming movement was based on bad computer models, insufficient evidence, and a desire to... READ MORE


A Major Reversal in America’s Military Chain of Command
Throughout American history, privates have been led by their generals. Today, the reverse is true. ... READ MORE

Futility: 12 Plans to Cut the Federal Budget (in 1986)
If you think there is any way this government will not go bankrupt, stiffing the geezers good and hard, go to this page. Click print PDF. It will not print. It will open. Print out pages 53 to 59. Read them. There are short articles by Art Laffer, Tom DiLorenzo, the late, great Warren Brookes, ... READ MORE


Bernanke’s Cover-Up Lady Blows Smoke at Berkeley
Janet Yellin is Vice Chairman of the Federal Reserve’s Board of Governors.She has been assigned the task of making the FED more transparent. She is the chairman of a new Federal Open Market Committee (FOMC) communications subcommittee. Let me say from the beginning that Janet Yellin makes Ben Bernanke sound like Henny Youngman. Anyone who... READ MORE

Personal Liberty Digest

Personal Liberty Digest: Live Free in an Unfree World

Latest From Wayne Allyn Root November 15, 2012
What Went Wrong? What Went Wrong? »
I predicted Mitt Romney would win big. What went wrong? I've been asked nonstop since Election Day, "Was your prediction based on hope or bias?" My prediction was based on a combination of scientific evidence and common sense that would tell you that in this economy, no President could be re-elected. More »


Outside The Asylum

Gunning For Liberty Gunning For Liberty »
No matter how many affirmative votes it holds on the issue of sovereignty-violating, internationally administered gun programs (the most recent went 157-0 with 18 abstentions), the U.N. has no chance to grab so much as an air rifle from your fists.  More »

Analysis

Marijuana Laws Are A Prime Example Of Broken Federal Government Marijuana Laws Are A Prime Example Of Broken Federal Government »
As the Federal government undoubtedly prepares to pounce on Colorado and Washington after voters in each State opted to legalize recreational marijuana use, it seems the Feds are fighting a losing battle with the American psyche. More »



Personal Liberty News
Israel Engages Neighbors In Military Conflict Israel Engages Neighbors In Military Conflict »
Israel is on the offensive against “terror targets” with a bombing campaign across the Gaza Strip which the nation’s leaders describe as a forward Iranian base. Some defense analysts believe that the offensive against Gaza and Syria is an Israeli ploy to fast-track war with Iran. More »

Russia Asks U.S. To Remove Cuba Sanctions Via U.N. Russia Asks U.S. To Remove Cuba Sanctions Via U.N. »
U.N. officials urged the United States to end certain aspects of the 52-year-old embargo against Cuba, throwing support behind a resolution that asks Washington to lessen trade restrictions. More »

Google: Government Internet Spying On The Rise Google: Government Internet Spying On The Rise »
A new Transparency Report out from Google shows that world governments increasingly ask the search engine to remove content from the Web and to provide information about users. More »


History Lesson Of The Month

Project Paperclip

The Cold War arms race between the United States and the Soviet Union began as the two World War II “allies” were still mopping up in Germany. Both sides wanted to learn all they could about German rocket and atomic technologies, and both wanted to get their hands on the scientists who were developing them.

Joseph Stalin’s forces captured the atomic research labs at the Kaiser Wilhelm Institute in May 1945. U.S. forces removed V-2 missiles from the Nordhausen complex that was built under the Harz Mountains just before the Soviets took possession of the facility. More »

Clash Daily


[EXCLUSIVE VID] Busted: Obama’s Fieldworks Office Admits Funneling Money to Defeat Allen West
Busted: Obama’s Fieldworks Office Admits Funneling Money to Defeat Allen West The progressive left has made no secret of their hatred for Congressman Allen West. It will be months until we fully understand the national coordination and vast resources that were brought to Florida in an attempt to defeat ... READ MORE
Hope & Huh?: One week later, more than 300,000 Ohio votes remain uncountedOne week later, more than 300,000 Ohio votes remain uncounted Byron York- The presidential election results in Ohio were close: According to still-unofficial figures from the Secretary of State, Barack Obama won the state with 2,690,841 votes to Mitt Romney’s 2,583,582 votes — a winning ... READ MORE



HOT OPINIONS
NEWS CLASH
MUST-SEE VIDEOS
ABOUT CLASHDAILY.COM
  • ClashDaily.com is a mosh pit of breaking news, edgy opinion, lots of attitude, and a call to action for God- and country-loving patriots. Yes, ClashDaily.com loves America's founding documents and its Judeo-Christian worldview, and we will defend the aforementioned with an unapologetic zeal and an irreverent sense of humor. Enjoy.

Nun steals beer out of corner store

WND News Alerts



12th-century rabbi predicted Israel's future

A German rabbi in 1217 accurately predicts the Ottoman rule of Jerusalem 300 years before the Turks possess the Holy City.
Pretty good.
He then predicts 1967 for Jerusalem's rule by Jews -- exactly when the entire city and Temple Mount fell to Israel.
Now that's impressive.
Then he predicts what's going to happen between 1967 and 2017 -- and what it all means.
Maybe he's on to something ...
Read the latest now on WND.com

Plus!

Less than a week after Hurricane Sandy plunged much of the mid-Atlantic region into darkness, the Obama administration unveiled a new initiative aimed at mitigating the impact of an "unreliable grid power."
Great news for ravaged coastal New Jersey, New York and Connecticut, right?
Don't bet on it. Wait until you see whom the administration favors over Americans now?
Click here for details

Must Read News



Other Highlights


  • Ron Paul delivers farewell speech to Congress
  • Vegetative patient: 'I'm not in pain'
  • IEA spins oil stats to make U.S. top 'oil' producer
  • Wounded Warrior Project faces fallout after snubbing ‘Gun Talk'

Daily Blessing
Your daily dose of spiritual inspiration

Today's Scripture reading from the Holy Bible

Joke Of The Day


Today's Poll

The Cowboy Byte

CowboyByte
November 15, 2012 News and Thoughts for the day
Today's Cowboy Headlines: Headlines you may have missed: Today's Featured Article:

Obama claims mandate on taxes, warns GOP

Follow Cowboy Byte on TWITTER!

Join Cowboy Byte on FACEBOOK!

Obama secretly signs the most aggressive cybersecurity directive ever

Reuters/Rick WilkingReuters/Rick Wilking

Six years after the White House first started running amok on the computer networks of its adversaries, US President Barack Obama has signed off on a top-secret order that finally offers blueprints for the Pentagon’s cyberwars.

Pres. Obama has autographed an executive order outlining protocol and procedures for the US military to take in the name of preventing cyberattacks from foreign countries, the Washington Post reports, once and for all providing instructions from the Oval Office on how to manage the hush-hush assaults against opposing nation-states that have all been confirmed by the White House while at the same time defending America from any possible harm from abroad.

According to Post’s sources, namely “officials who have seen the classified document and are not authorized to speak on the record,” Pres. Obama signed the paperwork in mid-October. Those authorities explain to the paper that the initiative in question, Presidential Policy Directive 20, “establishes a broad and strict set of standards to guide the operations of federal agencies in confronting threats in cyberspace.”

Confronting a threat may sound harmless, but begs to introduce a chicken-and-the-egg scenario that could have some very serious implications. The Post describes the directive as being “the most extensive White House effort to date to wrestle with what constitutes an ‘offensive’ and a ‘defensive’ action in the rapidly evolving world of cyberwar and cyberterrorism,” but the ambiguous order may very well allow the US to continue assaulting the networks of other nations, now with a given go-ahead from the commander-in-chief. Next in line, the Post says, will be rules of engagement straight from the Pentagon that will provide guidelines for when to carry out assaults outside the realm of what is considered ‘American’ in terms of cyberspace.

“What it does, really for the first time, is it explicitly talks about how we will use cyber operations,” one senior administration official tells the paper of the policy directive. “Network defense is what you’re doing inside your own networks. . . . Cyber operations is stuff outside that space, and recognizing that you could be doing that for what might be called defensive purposes.”

When The New York Times published an exposé on the White House’s so-called Olympics Games program earlier this year, the world became fully aware for once of America’s involvement in international cyberwar, but much to the chagrin of Washington. Officials including members of Pres. Obama’s national security team spoke on condition of anonymity to tell the Times that his predecessor, then-Pres. George W. Bush, began the program in 2006 to target Iran’s nuclear facilities and then passed it along to the current administration to continue under the leadership of the current commander-in-chief.

“From his first months in office,” David Sanger wrote for the Times, Pres. Obama “secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons.”

Congress has fought tooth-and-nail in the months since to plug any leaks that could potentially spill the beans regarding any further secrets with the potential of effecting national security, but those efforts appear unsuccessful given this week’s Post report on Presidential Police Directive 20.
Now take the example of Iran: according to the Post, Pres. Obama’s signature on last month’s directive means the US now has rules and regulations when it comes to protecting its own infrastructure from cyberattack, and can do so by means of launching what appear to be pre-emptive assaults of their own.

“It should enable people to arrive at more effective decisions,” a second senior administration official tells the Post. “In that sense, it’s an enormous step forward.”

That comment echoes US Defense Secretary Leon Panetta’s insistence earlier this year that “defense alone is not enough” in terms of keeping the country safe. But what it also seems to do is put on the books a presidential policy that equates an overzealous offense with a solid defense. While the US has cited Iranian hackers as the key players behind a recent attack on the websites of Capital One Financial Corp. and BB&T Corp., two of the biggest names in the American banking industry, the US has done little — on the record — to reveal any similar assaults from abroad. Instead, rather, it’s relied on fear-mongering to try and convince the country to accept a cybersecurity legislation that will assure American’s safety from foreign hackers, all for the small price of sacrificing their digital-age privacy.

While the Obama White House has failed to acknowledge the Olympic Games program or any involvement in the Stuxnet or Flames viruses linked to the initiative, computer researchers in both the US and Russia have tied Washington to the cripplingly malicious coding. Earlier this month, California-based Chevron, one of the world’s leaders in the oil sector, went public with claims that Stuxnet had infected — but not affected — their computers after the virus was unleashed.

The ability to slow down or speed up centrifuges in nuclear facilities from thousands of miles away made Stuxnet a virus that had very substantial powers. Refusing to speak of the Olympic Games program specifically, former CIA chief Michael Hayden told the Times, “This is the first attack of a major nature in which a cyberattack was used to effect physical destruction.”

According to the Post’s latest, though, future assaults by way of Stuxnet or similar worms could be considered by Washington as defense mechanisms to make sure Iran doesn’t retaliate for what America has long-been lashing out with. One source tells the Times that, before last month’s directive, severing any link between a US-computer and an overseas server by any means possible would be an act that would put America on the offensive. Now even a preemptive attack that disconnects other countries could be considered a defensive ploy according to the president.

“That was seen as something that was aggressive…particularly by some at the State Department,” one defense official tells the Post. With the signing of Pres. Obama’s latest order, though, the paper writes that the directive “effectively enables the military to act more aggressively to thwart cyberattacks on the nation’s web of government and private computer networks.”

It is thought that, through the directive, any systems linked even remotely with America’s can be fair game for an assault. Given the expansion of cloud computing and the ever-expanding interconnection of communities across the globe on the Web, though, that could essentially enable Uncle Sam’s cybersquad to get away with a whole new slew of tricks to try and topple adversaries of any kind that threaten the American way of life. When and where those actions are necessary, of course, remains another topic of discussion. Will those orders be signed in secrecy as well, though?