Obama Planning To Silence Snowden, Or To Snatch Him?

Obama “concerned” Edward Snowden could leak more

cbsnews

 

President Obama speaks during a press conference at the presidential palace in Dakar, Senegal, June 27, 2013.

President Obama speaks during a press conference at the presidential palace in Dakar, Senegal, June 27, 2013. / Getty

 

DAKAR, Senegal President Obama said Thursday he won’t engage in “wheeling and dealing and trading” to get NSA leaker Edward Snowden extradited to the U.S., but he remains “concerned” over what other classified information Snowden may still try to disseminate.

Advertisements

“Sanctimonious” Guardian Report Distorts Chinese Editorial Slamming US Cyberwar

[In a subtle twisting of words, the Guardian reporter turns honest Chinese complaint about Snowden spying revelations, into mass of lies and distortions that resembles playground name-calling more than it does actual journalism (SEE:  China’s state newspaper praises Edward Snowden for ‘tearing off Washington’s sanctimonious mask’).]
“In a sense, the United States has gone from ‘human rights model’ transformed into personal privacy ‘eavesdropper’ Internet centralization ‘manipulators’ and for his country network crazy ‘invaders.’ World remember Edward Snowdon, it was his bravery, tore off Washington pious mask.”–“Prism” program who should express their dissatisfaction?, Wang Xinjun

” ‘In a sense, the United States has gone from a ‘model of human rights’ to ‘an eavesdropper on personal privacy’, the ‘manipulator’ of the centralised power over the international internet, and the mad ‘invader’ of other countries’ networks,’ the People’s Daily said.”–Guardian

 

 

Definition of SANCTIMONIOUS
1:  hypocritically pious or devout <a sanctimonious moralist>

Definition of PIOUS
1 a : marked by or showing reverence for deity and devotion to divine worship
b : marked by conspicuous religiosity <a hypocrite

“Prism” program who should express their dissatisfaction? 

Wang Xinjun

America ‘Prism’ program broke man Edward Snowden has itself left Hong Kong. Snowdon in handling the issue of the Hong Kong SAR Government’s approach is consistent with the relevant laws, and the Chinese central government has always respected the HKSAR Government law. Media reports, U.S. White House, Hong Kong and China expressed dissatisfaction with the government to allow Snowdon departure and ‘strongly disagree.’ This dissatisfaction and opposition, China can not accept it.

According to the U.S. foreign policy >> << sites and Snowdon revealed that the U.S. National Security Agency on the Chinese mainland and Hong Kong, China’s networking and communications systems, carried out for 15 years organized and planned targeted intrusions, attacks, theft, monitoring and other actions. US authorities not only did not give an explanation and an apology, but instead run by the HKSAR things according to the law to express their dissatisfaction. Touliaodongxi was exposed, not only did not apologize for the robber, but also on stolen legitimate behavior expressed dissatisfaction (or even frame )(http://www.best-news.us/)(Technology News http://www.best-news.us/). This logic is probably not a big country with international principles to be followed by it?

For a long time, in its media, business representatives, academics, government officials, the mouth, the United States seems to network security, ‘the biggest victim.’ For this reason, today accused the country tomorrow, the United States condemned the organization became commonplace, especially for China aggressive accusations until this month, former U.S. National Security Agency employee Snowdon leaving Hong Kong, the United States was only laid bare the lies.

With the ‘prism’ insider gradually reveal more and more facts prove that: China is a great victim of cyber attacks a long time, people in the United States, although some knowledge of China’s Internet attacks, but never realized the situation so serious ! More intolerable is that the U.S. one face of China’s large-scale network intrusion, theft of political, economic, technological, military intelligence, the other side was frequently in the international community to take ‘Chinese hackers’ that matter, in the absence of empirical premise, slander the Chinese government and military, to discredit the image of China.

Strong technological advantages for the United States to provide the background cyber attacks its count on the core of computer hardware, operating systems, Internet technologies to develop standards and protocols such as the development of core intellectual property holds control over the well-known software vulnerabilities, network intrusion on other countries to launch and intelligence theft emboldened – seemed to another country it is difficult to seize evidence.

Human rights and freedoms ‘condescending moral sense’ for the United States to provide a coat. U.S. claim to want in the 21st century when the world leader in human rights and other aspects of the country accusing him, but did not think of taking the lead on action to maintain international security, the Internet, and its intelligence institutions and even set their constitutional and fundamental disregard of international law, not only to launch cyber attacks on other countries, but also for its own citizens but also for peeping phone and email, for allies citizen monitoring the implementation of telephone and e-mail.

In a sense, the United States has gone from ‘human rights model’ transformed into personal privacy ‘eavesdropper’ Internet centralization ‘manipulators’ and for his country network crazy ‘invaders.’ World remember Edward Snowdon, it was his bravery, tore off Washington pious mask.

As AP President Pruitt warned Americans that: ‘Faced with a too like to engage in covert action of government, we must remain vigilant.’ ‘Prism door’ also solemnly warn the people and the world: You must give up the fantasy, maintain long-term vigilance.

(The author is a researcher at Academy of Military Science Military Strategy)

DHS Purchases 2,700 Light-Armored Tanks To Go With Their 1.6 Billion Bullet Stockpile

DHS Purchases 2,700 Light-Armored Tanks To Go With Their 1.6 Billion Bullet Stockpile

488x325xhomeland-security-mrap.jpg.pagespeed.ic.tN6C46J1W4

[Milwaukee police purchased this armored car conversion that has been aptly described as a civilian “tank.”]

Related Links


DHS To Buy All Ammo: In The Market For 50 Billion .223 Shell Casings

Michael Savage Talks To Expert About DHS Buying Massive Amount Of Ammunition

DHS Purchases 21.6 Million More Rounds Of Ammunition

DHS Buys 200,000 More Rounds Of Ammunition

(Gateway Pundit)  This is getting a little creepy.

According to one estimate, since last year the Department of Homeland Security has stockpiled more than 1.6 billion bullets, mainly .40 caliber and 9mm.

DHS also purchased 2,700 Mine Resistant Armor Protected Vehicles (MRAP).

Modern Survival Blog reported:

The Department of Homeland Security (through the U.S. Army Forces Command) recently retrofitted 2,717 of these ‘Mine Resistant Protected’ vehicles for service on the streets of the United States.

Although I’ve seen and read several online blurbs about this vehicle of late, I decided to dig slightly deeper and discover more about the vehicle itself.

The new DHS sanctioned ‘Street Sweeper’ (my own slang due to the gun ports) is built by Navistar Defense (NavistarDefense.com), a division within the Navistar organization. Under the Navistar umbrella are several other companies including International Trucks, IC Bus (they make school buses), Monaco RV (recreational vehicles), WorkHorse (they make chassis), MaxxForce (diesel engines), and Navistar Financial (the money arm of the company).

DHS even released a video on their newly purchased MRAPs.
Via Pat Dollard:

 
The MRAP featured in this video is was in Albuquerque, New Mexico for Law Enforcement Day which was held at a local area Target Store. This MRAP is stationed in El Paso, Texas at The Homeland Security Investigations Office. MRAP is a Mine Resistant Armor Protected Vehicle.

This article first appeared @ the gatewaypundit