U.S. scrambling to find thousands of missing surface-to-air missiles

U.S. scrambling to find thousands of missing surface-to-air missiles

Special to WorldTribune.com Backgrounder, Compiled by Bill Gertz U.S. officials are stepping up efforts in North Africa and the Middle East to account for thousands of shoulder-fired surface-to-air missiles that have been dispersed around the region as the result of the Libyan civil war.The officials said the missiles are beginning to show up on the […]

A few observations about Occupy Wall Street

A few observations about Occupy Wall Street

By Sumantra Maitra, FreePressers.com Almost twenty years back, when the Soviet and East European states crumbled, who would have thought that socialism would make such a comeback? Here are a few ground truths about the Occupy Wall Street movement and the various spinoffs it has started.   They are not democratic: No surprise there, really. […]

Woefully unprepared for an EMP attack

Woefully unprepared for an EMP attack

Whenever the left-wing media wants to conjure up an image of Republican failure and incompetence, they point to Hurricane Katrina? and the days it took the Federal Emergency Management Agency? (FEMA) to respond in any effective manner. Forget for the moment the fact that President Bush and his team were hampered in their efforts to […]

Not backing down: Buchanan’s warning to America

Not backing down: Buchanan’s warning to America

By Jeffrey Kuhner Is America in its twilight years? Patrick J. Buchanan argues it is. Americans, especially conservatives, should heed his warnings. The very future of our republic is at stake. Mr. Buchanan has written the political book of the year — and maybe of our time. In “Suicide of a Superpower” (Thomas Dunne Books, […]

FBI ‘Insider threats’ guidelines details damage by major China spies

FBI ‘Insider threats’ guidelines details damage by major China spies

Backgrounder, Compiled by Bill Gertz The FBI has produced a brochure to help identify what it calls “insider threats,” spies who use their access to obtain secrets or company proprietary information. ‘A company can often detect or control when an outsider (non-employee) tries to access company data either physically or electronically, and can mitigate the […]

1 94 95 96