The Homefront is Behind You

    Photo Credit: Asher Schwartz
    IDF, Chareidim, Hareidim

    Previous articleSharks
    Next articleStuff – Parshat Devarim
    Asher is the's incredible cartoonist.


    1. I would like to believe that this is the minority and most Chareidim appreciate the sacrifice of the soldiers spending night and day to enable learning in the Yeshivot.

    2. Another shocking, dictatorial command and the enemedia says nothing; instead, Obama's Ministry of Propaganda goosestep to the drumbeat of dear führer.

      He divides. He creates disharmony among the people. He pits American against American. He is a vicious President.

      Linchpin for Obama’s plan to predict future leakers unproven, isn’t likely to work, experts say McClatchy, July 9, 2013
      WASHINGTON — In an initiative aimed at rooting out future leakers and other security violators, President Barack Obama has ordered federal employees to report suspicious actions of their colleagues based on behavioral profiling techniques that are not scientifically proven to work, according to experts and government documents.

      The techniques are a key pillar of the Insider Threat Program, an unprecedented government-wide crackdown under which millions of federal bureaucrats and contractors must watch out for “high-risk persons or behaviors” among co-workers. Those who fail to report them could face penalties, including criminal charges.

      Obama mandated the program in an October 2011 executive order after Army Pfc. Bradley Manning downloaded hundreds of thousands of documents from a classified computer network and gave them to WikiLeaks, the anti-government secrecy group. The order covers virtually every federal department and agency, including the Peace Corps, the Department of Education and others not directly involved in national security.

      Under the program, which is being implemented with little public attention, security investigations can be launched when government employees showing “indicators of insider threat behavior” are reported by co-workers, according to previously undisclosed administration documents obtained by McClatchy. Investigations also can be triggered when “suspicious user behavior” is detected by computer network monitoring and reported to “insider threat personnel.”

    Loading Facebook Comments ...