Pastor Paul Begley Update, Benghazi Panel, Super Typhoon Koppu Leaves 2 Dead 16000 Displaced,Typhoon Lando / Koppu Lashes Philippines, Fugitive Drug Lord Joaquin “El Chapo” Guzman, & Arrested For Refusing Forced Vaccinations

Pastor Paul Begley Update,

Benghazi Panel,

Super Typhoon Koppu Leaves 2 Dead 16000 Displaced,

Typhoon Lando / Koppu Lashes Philippines,

Fugitive Drug Lord Joaquin “El Chapo” Guzman,


Arrested For Refusing Forced Vaccinations


Pastor Paul Update in Canada

Gowdy to fellow Republicans not on Benghazi panel: Shut up

“Washington (CNN)The chairman of the House BenghaziGowdy, Trey tells fellow republicans shut up on Benghazi Panel committee is telling other Republicans to “shut up” about Hillary Clinton.

Rep. Trey Gowdy, R-South Carolina, defended the panel’s work ahead of Clinton’s politically charged appearance this week.

He said comments from top Republicans like House Majority Leader Kevin McCarthy are wrong and that the panel isn’t interested in denting the poll numbers of Clinton, the 2016 Democratic presidential front-runner who is set to testify publicly on Thursday.”  More…{source:}

 Super Typhoon Koppu Leaves 2 Dead, 16,000 Displaced in Philippines

Typhoon Koppu Leaves 2 Dead“Slow-moving Typhoon Koppu weakened after blowing ashore with fierce winds in the northeastern Philippines on Sunday, leaving at least two people dead, displacing 16,000 villagers and knocking out power in entire provinces, officials said.

Army troops and police were deployed to rescue residents trapped in flooded villages in the hard-hit provinces of Aurora, where the typhoon made landfall early Sunday, and Nueva Ecija, a nearby rice-growing province where floodwaters swamped rice farmlands at harvest time.”  More…{source:}

Typhoon Lando / Koppu Lashes Philippines – Flooding & Strong Winds Breaking News Footage

Mexican Drug Lord Flown to Sinaloa Mountains After Escape

“MEXICO CITY — Fugitive drug lord Joaquin “El Chapo” Guzman, Joaquin El Chapo 10 18 2015Guzman was flown to a mountainous region of his home state of Sinaloa after his daring July 11 escape from prison through a mile-long tunnel, a federal official said Saturday.

Based on this information, the search for the world’s most wanted drug boss has focused in recent weeks on a rugged area that stretches from Sinaloa into neighboring Durango state, part of Mexico’s infamous Golden Triangle drug-producing region that is considered Guzman’s home turf, said the official, who asked not to be named.”  More…{source:}

Arrested For Refusing Forced Vaccinations


Jesus Christ is the answer to all of our problems.  Are you saved?  Do you know Jesus Christ as your Lord & Savior?

“I am the vine, you are the branches.
He who abides in Me, and I in him, bears much fruit;
for without Me you can do nothing.”
{John 15:5 NKJV}

Pray to the One who saves man’s soul from eternal darkness separated from the giver of Life, Jesus Christ.  Ask Him into your heart, repent of your wrongdoings (sin) and accept Him into your daily lives.  He is faithful, He is forgiving, He will save you.

Stay safe. Be blessed.



 …if the watchman sees the sword coming and does not blow the trumpet,
and the people are not warned,
and the sword comes and takes any person from among them,
he is taken away in his iniquity;
but his blood I will require at the watchman’s hand.”
{Ezequiel 33:6}

11 thoughts on “Pastor Paul Begley Update, Benghazi Panel, Super Typhoon Koppu Leaves 2 Dead 16000 Displaced,Typhoon Lando / Koppu Lashes Philippines, Fugitive Drug Lord Joaquin “El Chapo” Guzman, & Arrested For Refusing Forced Vaccinations

  1. I don’t know why I seem to receive “good” news late or after I publish my post for the day but this is going here because I’m not going to wait!

    October 18, 1939, was Lee Harvey Oswald’s birthday. So…vindication comes on his birthday.

    So many areas indicating he never shot President Kennedy but was in fact working for the CIA aka: CIA Asset.

    Proof! Lee Harvey Oswald Was A CIA Asset
    William Mount

    Happy birthday Lee Harvey Oswald! The truth has set you “free.”

  2. This AP & ABC report below obscures the information security system that has strict criminal penalties for negligence and beach.

    Ranking Officials: Cyber Savvy vs. Cyber Sorry — vice Criminally Liable

    Based on audits by Linick and his predecessor, Harold Geisel, State scored a 42 out of 100 on the federal government’s latest cybersecurity report card, earning far lower marks than the Office of Personnel Management, which suffered a devastating breach last year….

    Under Clinton and Kerry, the State Department’s networks were a ripe target for foreign intelligence services, current and former government officials say, echoing the situation at OPM, which last year saw sensitive personnel data on 21 million people stolen by hackers linked to China.

    see refs here:

      • Let’s make this easy. If you had detailed information on the travel route and timing of a leader or their family. Whether marked classified or not. Whether transmitted by email, on paper, by word of mouth, or picture. And you put that information someplace less secure than it merits — then you’d be guilty. And the consequences would be extreme.

        But you object, a leader’s itinerary is public knowledge. What about the locations of their security personnel along a route? Or intelligence about security risks. Such information is controlled for a reason.

        It’s reasonable to expect that anyone with decades of “living around” and “working with” classified information, would exercise precautions instead of folly. (Even moreso when it jeopardizes those they’re responsible for.)

        And those in the media that claim expertise in intelligence — should know the difference between classified information controls, encryption protections, and network computer security.


      18 U.S.C.
      United States Code, 2011 Edition
      Sec. 1924 – Unauthorized removal and retention of classified documents or material
      From the U.S. Government Printing Office,

      §1924. Unauthorized removal and retention of classified documents or material

      (a) Whoever, being an officer, employee, contractor, or consultant of the United States, and, by virtue of his office, employment, position, or contract, becomes possessed of documents or materials containing classified information of the United States, knowingly removes such documents or materials without authority and with the intent to retain such documents or materials at an unauthorized location shall be fined under this title or imprisoned for not more than one year, or both.

      (b) For purposes of this section, the provision of documents and materials to the Congress shall not constitute an offense under subsection (a).

      (c) In this section, the term “classified information of the United States” means information originated, owned, or possessed by the United States Government concerning the national defense or foreign relations of the United States that has been determined pursuant to law or Executive order to require protection against unauthorized disclosure in the interests of national security.

      (Added Pub. L. 103–359, title VIII, §808(a), Oct. 14, 1994, 108 Stat. 3453; amended Pub. L. 107–273, div. B, title IV, §4002(d)(1)(C)(i), Nov. 2, 2002, 116 Stat. 1809.)

      2002—Subsec. (a). Pub. L. 107–273 substituted “under this title” for “not more than $1,000,”.

  3. Besides emails, there are protected server based storage systems like SharePoint. I wonder how many of those have to be presumed compromised?

    Here’s a rules manual from Hillary Clinton’s time at State.

    7.8 Internet DMZ users may not use personal, non-Government email accounts associated with user account (e.g., Gmail, Yahoo, other service provider accounts) to communicate with the Internet DMZ website. Only valid U.S. Government-issued email accounts will be recognized (e.g., .gov, .mil, etc.).

    And besides emails, did HC & crew have their own SharePoint or file servers?

  4. I believe this skewers Hillary Clinton.

    The restrictions on “Online tools, such as blogs, wikis, and collaboration software” carries strict rules of compliance. The reasons are given. The protections are cited. The authorizations are spelled out. Even if was considered a public email portal — there’s a long list of requirements.

    It’s the kind of situation where termination, suit for damages, and even criminal penalties arise. Basically theft for not getting the proper authorizations.

  5. The security breaches keep cascading… Que up the song “One thing leads to another!”

    [A pro-palestinian hacktivist that compromised] the personal email account of Central Intelligence Agency Director John Brennan has released a purported contact list of 2,611 email and instant message addresses, including information for top intelligence and national security officials.

    The current plot of “Homeland” deals with CIA emails and data breached exposing intelligence agencies subverting German laws. In the US, laws are subverted for political gain.

    And it’s no surprise.

    The NSA compromise exposed US spying on the personal conversations of heads of state of allies. There’s a price to pay for that.

    The OPM breach exposed the personal connections and vulnerabilities of the very backbone of the US security establishment. There’s a price to pay for that.

    Where’s the accountability?

    For every Assange or Snowden in the open there are many more anonymous all too willing to trade in secrets for personal gain. And this in a legal climate where even those charged with upholding the law — shortcut it instead. There is no accountability at the highest levels. The so-called leaders, lax in the execution of their duties, are reaping the result of their own ineptitude.

    The damned won’t listen, can’t see, and are too jaded to feel the flames as they jump head long into hell.

  6. Here’s the wrap…

    U.S. Department of State Foreign Affairs Manual Volume 5
    — Information Management

    Cites policies and points to penalties.
    – including ultimately the handling of records

    36 CFR 1220 & CFR 2011 title36 vol3 part1230 § 1230.1

    18 U.S. Code § 641 – Public money, property or records

    Whoever embezzles, steals, purloins, or knowingly converts to his use or the use of another, or without authority, sells, conveys or disposes of any record, voucher, money, or thing of value of the United States or of any department or agency thereof, or any property made or being made under contract for the United States or any department or agency thereof; or

    Whoever receives, conceals, or retains the same with intent to convert it to his use or gain, knowing it to have been embezzled, stolen, purloined or converted—

    Shall be fined under this title or imprisoned not more than ten years, or both; but if the value of such property in the aggregate, combining amounts from all the counts for which the defendant is convicted in a single case, does not exceed the sum of $1,000, he shall be fined under this title or imprisoned not more than one year, or both.

    I’ll assert that the value of anything also includes it’s cost in security controls and storage.

    The review of US Govt. Dept. of State records handled through unmonitored, unaudited private servers — and improperly disposed of — without appropriate authority, is extremely costly in terms of damage control and minimizing risks, easily exceeding $1,000.

    So, it’s not just about…
    – classified information
    – insecure data servers
    – and cyber compromises
    – but also official records
    – both in terms of access
    – and improper handling
    – and wrongful disposal

    Multiple Counts with long prison terms.

    Not the kind of person that should have any security clearances, nor even access to protected public records. Hillary Clinton is an admitted and proven risk to National Security — and should be prosecuted.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s