Obama Inc. Pays JIZYA To Fort Hood’s ‘Soldier For Allah’ (‘Workplace Violence’ Aside), Spitting In America’s Face…Commentary By Adina Kutnicki

NO one should be foolish enough to believe that military regs can’t be altered by orders from the Commander-in-Chief. Take a peek within, and you tell this blogger if protocol and regs aren’t under his ‘umbrella’. Besides, and in actual fact, the military is subordinate to the dictates of the person who sits in the White House. Therefore, let us take it off the table from the get go: The spurious claim that (jizya) payments, to the Fort Hood jihadist, can’t be ceased is sheer balderdash. It is a lie of monumental anti-American proportions.

Not only that, but such a ‘bitch slap’ has become par for the course, demonstrating, once again, the contempt the Islamist-in-Chief holds for the military, as well as America in general. All of this is aside from the fact that Hassan is guilty and may receive the death penalty for ‘workplace violence’ ! As Texas Senator Ted Cruz contends…GO Texas…one of the few sane members of Congress – “But if we ever hope to defeat the ongoing threat from radical Islamism, we need to start by calling this terrorist attack on our armed forces by its name. Hiding behind “workplace violence” and excluding evidence on Hasan’s pursuit of jihad will not make terrorism go away or properly honor the American heroes who were slain at Fort Hood on November 5, 2009,” said Cruz.

Tragically, proofs to the above are too lengthy to delineate, yet a few will suffice to place the onus where it belongs – atop Obama Inc. and the red/green alliance. Bear in mind, special dispensation is only afforded to Islamic jihadists, and not to ‘garden variety’ American killers, albeit held in military detention. Simply put, Islamic killers are a protected group. How so? Let us count the ways…

The hunt against vets, yet bypassing Muslims, who served is off and runningAnd, even though ‘Mama Janet’ resigned the pursuit against vets is non-stop ‘Putinesque’. But those who believe that Pentagon heads are bucking the Islamist-in-Chief’s ‘protectzia’ (a word coined in Israel/Hebrew for those who gain special privileges due to knowing/greasing the right palms) of Islamic jihadists, think again. The U.S. military high command is full frontal, as they serve as a shield for Muslim terrorists, and on American soil too! Need more heartburn? Should there be any doubt as to why Chuckie-boy Hagel was tasked as Sec of Defense

As such, why shouldn’t they treat the Fort Hood ‘Soldier for Allah’ as a rock star? Damn him for all eternity – and his enablers – to hell.

THE PAMPERED, GOOD LIFE OF FORT HOOD SHOOTER

Army killer gets $80,000 a year, helicopter rides while victims suffer

Published: August 2013

NIdal_Hasan

Nearly four years after Islamist Maj. Nidal Malik Hasan shouted “Allahu akbar!” (“Allah is greater!”) and brutally murdered 14 people (including an unborn baby) and injured 30 others at Fort Hood, Texas, he now receives free helicopter rides from the local jail nearly every day, lives in a private room built to accommodate his medical needs, wears a beard against Army regulations, travels with his own security detail, has received numerous trial delays and collects a full salary of about $80,000 a year – all while many of his victims say they’ve been forgotten.

According to KXAS-TV, the NBC News affiliate in Dallas, the Army psychiatrist has been paid more than $278,000 since the Nov. 5, 2009, shooting because the military has said it cannot suspend his pay without a conviction.

Hasan, 42, is facing 13 counts of premeditated murder and 32 counts of attempted premeditated murder as his trial begins Tuesday. The New York Times reported the Army has spent more than $5 million on Hasan’s case and secured the courthouse with massive sand-packed barriers to protect him from explosions.

The Army has paid for Hasan’s military defense lawyers, paralegals and experts for his defense. Hasan also enjoys a heavily guarded trailer near the courthouse. The court-martial is expected to last at least a month.

No other inmate at the Bell County jail is treated the same way.

After struggling to cope with the tragedy, Staff Sgt. Josh Berry, 36, a soldier who survived Hasan’s attack committed suicide on Feb 13.

In what his father described as the “his absolute proudest moment in the United States Army,” Berry met President Obama at a service for victims of the brutal attack. During the memorial service, Obama never once used the word terrorism.

Berry, who had suffered from post-traumatic stress in Afghanistan, injured his shoulder as he leaped for cover in the storm of bullets at Fort Hood.

“He was in a war zone 24/7,” his father, Howard Berry, told NBC. “He honestly was.”

After he survived the worst shooting on an American military installation, the Army sent Berry to receive treatment at a VA hospital in Cincinnati, but his condition worsened as he no longer felt safe at home.

“He was never at peace,” Howard said. “He was never at peace. Every day, since the Fort Hood shooting, he suffered.”

According to his father, Sgt. Berry felt the Obama administration had forgotten the victims of that tragic day. The victims were denied Purple Heart medals and combat-related benefits because the Army determined the shooting was not an act of terrorism – despite Hasan’s own admission that he killed innocent Americans to defend the Taliban.

Here’s video of the KXAS-TV investigation of the case:

As WND reported, for years, the Obama administration has maintained that the victims of the 2009 shooting simply were in the crosshairs of “workplace violence.”

“He felt that there were considerations being given to the shooter that weren’t being given to the victims, and he couldn’t understand,” Howard Berry said.

Maj. Greg Majewski, Berry’s former commander, said the government’s delays and treatment of the victims “weighed heavily” on Berry.

“It affected his ability to cope because he would definitely get obsessive about it,” Majewski said. “It was something that was constantly on his mind. … I just cannot imagine Josh taking his life if the events at Fort Hood had not happened that day.”

Howard Berry said, “I can understand why [Josh] did what he did, because he felt that our country left a wounded soldier on the battlefield. And he felt that he wasn’t given the same consideration that our enemies were, and he didn’t understand.”

Hasan had been on federal officials’ radar screen for at least six months prior to the shooting over postings he made on the Internet. He likened a suicide bomber who kills women and children to a soldier who throws himself on a grenade to give his life in a “noble cause.”

Intelligence officials also intercepted at least 18 emails between Hasan and the radical American-born cleric Anwar al-Awlaki. Hasan told al-Awlaki in one of the emails, “I can’t wait to join you” in paradise. He also asked al-Awlaki whether it was appropriate to kill innocents in a suicide attack, when jihad was acceptable and how to transfer funds without attracting government notice.

Staff Sgt. Shawn Manning was shot six times in the attack, yet he is denied the same benefits a soldier shot in a similar action overseas would receive.

Fellow soldiers that day “were killed and wounded by … somebody who was there that day to kill soldiers, to prevent them from deploying,” Manning said. “And if that’s not an act of war, an act of terrorism, I don’t know what is.”

Staff Sgt. Alonzo M. Lunsford Jr. was shot once in the head and six times in the body. He pretended to be dead and then tried to get out of the building, but Hasan shot him again in the back.

Now, according to the New York Times, Lunsford will face Hasan in court Tuesday when he testifies at the trial. Lunsford told the Times the Army garnished his pay when he sought treatment at a military post-traumatic stress disorder program and rejected his request to pay for an operation to remove a bullet still lodged in his back.

“We don’t get passes the way Major Hasan got passes,” Lunsford said. “Each one of us has gotten a raw deal somewhere down the line.”

Spc. Logan Burnett, another survivor of the attack who was shot three times, said he feels the Army has catered to the needs of Hasan but forgotten his victims. Burnett told NBC he was particularly disturbed by the government’s refusal to designate the shooting as a terror attack.

“The day that came out was the day the government looked at every single one of the victims of the Fort Hood shooting and spit in our faces.”

It merits repeating: Special dispensation is only afforded to Islamic jihadists because The Islamist-in-Chief’s roots take precedence over American interests. That’s for sure. Simply put, Islamic killers are offered American protection, at least under the umbrella of Obama Inc.!

The NSA: Caught, Dead To Rights…Commentary By Adina Kutnicki

From the get go, be rest assured, this blog makes no pretense in pretending to understand anything which necessitates computer-based expertise. Such a claim would be more than a hoot…can even hear some nearest and dearest emitting quite a few chuckles, as this is being written. Indeed, this science/math based specialty is best left in the capable hands of software/hardware engineers – you know who you are – as they sift through all the highly technical mumbo jumbo aspects of the NSA. It is the most advanced, illegal (domestically-speaking) spying system in the world. Most intrinsically, outside efforts (hack-wise or not…whatever it takes…beating NSA’s spies at their own game, as they dare pry, EN MASSE, into the privacy of Americans) to uncover the manifest abuses conducted under the purview of Obama Inc. may very well save the greatest Constitutional Republic in the world. Get cracking. Cat and mouse.

Nevertheless, the expertise herein absolutely lies in geo-politics, Islamic jihad and the Mid East, including its politics, religion and culture. And it doesn’t take a computer scientist to wade through the non-technical muck, in turn, internalizing what constitutes unfettered spying. This is for sure.

To be exact, when one is immersed in the dogged pursuit of those who dare to mess with liberty and freedom – chiefly, creatures belonging to the red/green alliance – anything smacking of squelching said freedoms, well, it doesn’t go unnoticed or non- pursued.

In this regard, in tandem with all the explosive scandals due to Obama Inc., including NSAgateas well as IRSgate, Benghazigate, DOJgate, Fast & Furious, etc, the notion that any move a U.S. citizen makes is open to monitoring, well, few Americans are okay with living in a police statejust ask the Catalanos (Michele Catalano, a long time blogger at PJ Media and elsewhere…holy smokes) and countless others, whose homes were invaded, all for the ‘crime’ of internet searches! In fact, being that this blogger’s searches covers a gambit of hot range issues…burning up the long distance telephone wires in the process…can’t imagine how dangerous it would be to still live in the U.S. And this (very disturbing) sentiment is coming from someone who lives within missile range of Al Qaeda, Hezbollah, Hamas and many other jihadi terrorist groups! No kidding.

Most egregiously, the exception to their blanket spying is the Muslim American community, and their ‘hands off’ policy is evinced herein – Homeland Insecurity: The White House assures that tracking our every phone call and keystroke is to stop terrorists, and yet it won’t snoop in mosques, where the terrorists are.

That’s right, the government’s sweeping surveillance of our most private communications excludes the jihad factories where homegrown terrorists are radicalized.

Since October 2011, mosques have been off-limits to FBI agents. No more surveillance or undercover string operations without high-level approval from a special oversight body at the Justice Department dubbed the Sensitive Operations Review Committee.

Who makes up this body, and how do they decide requests? Nobody knows; the names of the chairman, members and staff are kept secret.

We do know the panel was set up under pressure from Islamist groups who complained about FBI stings at mosques. Just months before the panel’s formation, the Council on American-Islamic Relations teamed up with the ACLU to sue the FBI for allegedly violating the civil rights of Muslims in Los Angeles by hiring an undercover agent to infiltrate and monitor mosques there.”

IF Obama and gang truly believe that domestic spying on ALL Americans, yet excluding those who are the gravest threat – Muslim Americans – is going to pass muster, well, it is doubtful that patriots will continue to stand still.

XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’

• XKeyscore gives ‘widest-reaching’ collection of online data
• NSA analysts require no prior authorization for searches
• Sweeps up emails, social media activity and browsing history
• NSA’s XKeyscore program – read one of the presentations

XKeyscore map
One presentation claims the XKeyscore program covers ‘nearly everything a typical user does on the internet’

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from theinternet.

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisasurveillance court oversight.

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as theirmetadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

Under US law, the NSA is required to obtain an individualized Fisawarrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst’s ability to query the databases at any time.

KS1

The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a “selector” in NSAparlance) associated with the individual being targeted.

Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.

One document notes that this is because “strong selection [search by email address] itself gives us only a very limited capability” because “a large amount of time spent on the web is performing actions that are anonymous.”

The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.

Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use themetadata also stored in the databases to narrow down what to review.

A slide entitled “plug-ins” in a December 2012 document describes the various fields of information that can be searched. It includes “every email address seen in a session by both username and domain”, “every phone number seen in a session (eg address book entries or signature block)” and user activity – “the webmail and chat activity to include username, buddylist, machine specific cookies etc”.

Email monitoring

In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual’s email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.

One top-secret document describes how the program “searches within bodies of emails, webpages and documents”, including the “To, From, CC, BCC lines” and the ‘Contact Us’ pages on websites”.

To search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.

KS2

KS3edit2

The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.

The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, “communications that transit the United States and communications that terminate in the United States”.

One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:

KS4

Chats, browsing history and other internet activity

Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.

An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.

KS55edit

An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.

KS6

Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.

KS7

As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls “nearly everything a typical user does on the internet”.

KS8

The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.

KS9

The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn “call events” collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.

William Binney, a former NSA mathematician, said last year that the agency had “assembled on the order of 20tn transactions about US citizens with other US citizens”, an estimate, he said, that “only was involving phone calls and emails”. A 2010 Washington Post article reported that “every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications.”

The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.”

To solve this problem, the NSA has created a multi-tiered system that allows analysts to store “interesting” content in other databases, such as one named Pinwale which can store material for up to five years.

It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.

KS10

In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.

KS11

Legal v technical restrictions

While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA’s foreign targets.

The ACLU’s deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans’ communications without individualized warrants.

“The government doesn’t need to ‘target’ Americans in order to collect huge volumes of their communications,” said Jaffer. “The government inevitably sweeps up the communications of many Americans” when targeting foreign nationals for surveillance.

An example is provided by one XKeyscore document showing an NSAtarget in Tehran communicating with people in Frankfurt, Amsterdam and New York.

KS12

In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.

Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.

Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. “It’s very rare to be questioned on our searches,” Snowden told the Guardian in June, “and even when we are, it’s usually along the lines of: ‘let’s bulk up the justification’.”

In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.

Acknowledging what he called “a number of compliance problems”, Clapper attributed them to “human error” or “highly sophisticated technology issues” rather than “bad faith”.

However, Wyden said on the Senate floor on Tuesday: “These violations are more serious than those stated by the intelligence community, and are troubling.”

In a statement to the Guardian, the NSA said: “NSA’s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.

“XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system.

“Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.”

“Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.

“These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad.”

Are you dizzy yet? Hope not. After all, despite their spin that FULL frontal spying is mandatory to keep America safe (just ask Boston’s victims if they feel safer, knowing full well that the Chechen bombers WERE monitoredbut only once Russia’s security forces gave U.S. security the heads up…not due to anything the NSA uncovered) we know better. Certainly expect so. 

The Red/Green Alliance,The Ties That Bind: Hillary Clinton & Huma Abedin Compromise US National Security….Commentary By Adina Kutnicki

As is said, where there is smoke there (usually) is fire. After all, smoke doesn’t appear out of thin air-magic-like….poof….now you see it, now you don’t. You think? Besides, most parents teach their young children not to play with matches, otherwise they will start a fire, possibly burning their house down! Nevertheless, the house fire I am reporting on is not yours or mine (I too own a home in the US, thus having a dog in this fight), but the collective edifice of the United States!

Make no mistake. The Muslim Brotherhood/Sisterhood is dead set on the above goal (destroying the ‘miserable house’ from within), and they operate in concert with radical leftists throughout the US administration, via their surrogates nation-wide and worldwide.They have patiently planted their seeds-of stealth jihad-for decades, and they taste/smell victory. They may very well succeed.

Not one to beat a dead horse ( I do have other interests!), but I have very sound reasons for spending an inordinate amount of time on the Brotherhood, as evidenced by my most recent commentaries. Re-reading them is crucial, especially in relation to today’s commentary . ‘Muslim Brotherhood’s Supreme Leader Calls For Jihad On Israel….’  https://adinakutnicki.com/2012/07/09/muslim-brotherhoods-supreme-leader-calls-for-jihad-on-israel-an-addendum-to-connecting-the-brotherhood-dots-commentary-by-adina-kutnicki-52-2/ plus, ‘Connecting The Brotherhood Dots’ – https://adinakutnicki.com/2012/07/08/connecting-the-brotherhood-dots-courtesy-of-the-us-commander-in-chief-his-islamic-outreach-commentary-by-adina-kutnicki-34-2/ should be viewed as building blocks for my readership.

In any case, the Brotherhood makes no bones about their plans (total world domination) therefore, a deep understanding of their thinking/reasoning is efficacious – https://docs.google.com/viewer?a=v&q=cache:OalRE3f9cecJ:palwatch.org/STORAGE/special%2520reports/Jihad_is_the_way_by_Mustafa_Mashhur.pdf+muslim+brotherhood+goals&hl=en&gl=il&pid=bl&srcid=ADGEESg-gf40vGfo7DS8HI_jFwqxtnUi1xqNz2ayQigi_4Sqrx061CPEo0wVFUVzEqhiHRLMORNEFZdXHZDXgo5XZClFfhm1FR2w5xDdRzPb66IP7GW8JQtyXiehl73aB6ZS2mCSxJXF&sig=AHIEtbQ_cYymysvzc88rBBKj6khAVBX_0w .

Back to the radical left. Some of my readers may recall the much reported buss-kissing between Hillary and Suha Arafat, ‘wife’ of the Mafia-like godfather of modern terrorism, ‘Chairman Arafat’, also a Brother (in fact, an Egyptian Brother, having been born in Egypt ! ). While many were repulsed by this odious display (it was akin to kissy-face with Hitler’s significant other) of affection, those in the know weren’t shocked. Not at all. After all, both women (let’s not call them ladies) heart the same overarching vision; a future whereby America will no longer be the world’s superpower. At the same time, a castration of Israel to indefensible borders is required, in order for the Arabs to (eventually) get rid of the Jews in the Middle East.This is the superceding goal of radical leftists and their Islamic counterparts. No ifs, ands or buts.

As such, one of my previous commentaries comes full circle with a recently released report by one of the Middle East’s most solid sources – Walid Shoebat . Whereas, my commentary ‘Six Degrees of Separation’ – https://adinakutnicki.com/2012/06/25/six-degrees-of-separation-48-2/ , ties Hillary & Huma Abedin into very close knots, the following report is more circumspect in certain delicate matters, but no less alarming in the urgency of its message – ‘Muslim Congressman targets Michele Bachmann for raising questions about Huma and Hillary’ http://www.shoebat.com/2012/07/13/muslim-congressman-targets-michele-bachmann-for-raising-questions-about-huma-and-hillary/. Nothing to see here….moving right along….according to those who really do know how deep the infiltration goes. Readers, I do not mean to appear crude by exposing (in my above commentary) the heat between Hillary and Huma. It is what it is. Besides, I wasn’t their matchmaker !

The fact of the matter is that US national security has been deeply penetrated by the Muslim Brotherhood/Sisterhood (amply demonstrated by Barack Hussein Obama’s invite to the newly elected Egyptian President, a Muslim Brotherhood devotee – read here – http://www.jpost.com/Opinion/Columnists/Article.aspx?id=277318) via ways that have been kept under wraps-until now. Now, as is also said, the crap is hitting the fan, and much credit is due to those in Washington who still care whether or not the US survives, not as a shell of itself, but as a beacon of liberty, freedom and hope, thus leading the way for western civilization.

I referred to the (irrefutable) morphing of the Red/Green alliance in my About tab. If you haven’t read it, please do –    https://adinakutnicki.com/about/.

Let us pray it is not too late. Let us all do our part to keep them from realizing their dream, and our collective nightmare!