Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Number

Rss Feed Group items tagged

Gary Edwards

75 Economic Numbers From 2012 That Are Almost Too Crazy To Believe - 0 views

  •  
    Thanks to Marbux we have this extraordinary collection of facts and figures describing the economic catastrophe that has hit the USA.  excerpt: "What a year 2012 has been!  The mainstream media continues to tell us what a "great job" the Obama administration and the Federal Reserve are doing of managing the economy, but meanwhile things just continue to get even worse for the poor and the middle class.  It is imperative that we educate the American people about the true condition of our economy and about why all of this is happening.  If nothing is done, our debt problems will continue to get worse, millions of jobs will continue to leave the country, small businesses will continue to be suffocated, the middle class will continue to collapse, and poverty in the United States will continue to explode.  Just "tweaking" things slightly is not going to fix our economy.  We need a fundamental change in direction.  Right now we are living in a bubble of debt-fueled false prosperity that allows us to continue to consume far more wealth than we produce, but when that bubble bursts we are going to experience the most painful economic "adjustment" that America has ever gone through.  We need to be able to explain to our fellow Americans what is coming, why it is coming and what needs to be done.  Hopefully the crazy economic numbers that I have included in this article will be shocking enough to wake some people up. The end of the year is a time when people tend to gather with family and friends more than they do during the rest of the year.  Hopefully many of you will use the list below as a tool to help start some conversations about the coming economic collapse with your loved ones.  Sadly, most Americans still tend to doubt that we are heading into economic oblivion.  So if you have someone among your family and friends that believes that everything is going to be "just fine", just show them these numbers.  They are a good summary of the problems that the U
Gary Edwards

Sandy Hook and Obama's Connecticut Social Security number | Fellowship of the Minds - 1 views

  • In May 2011, blogger The Obama Hustle conducted a database pull for SSN 042-68-4425 and got the names of Harrison J. Bounel and Barack Obama (see below), indicating that one SSN was being used by both men.
  •  
    "Sandy Hook and Obama's Connecticut Social Security number Posted on December 27, 2014 by Dr. Eowyn | 18 Comments One of the many curiosities about the sitting President of the United States is the fact that, unlike us, he has not one, but multiple Social Security numbers (SSN). In 2010, two licensed private investigators, Susan Daniels and Neal Sankey, found that multiple SS numbers are associated with Barack Obama's name. Daniels and Sankey put their findings in sworn affidavits. Dr. Orly Taitz further verified their information with a third source, a retired Department of Homeland Security senior investigator named John Sampson. In May 2010, the mystery deepened when it was determined that the SSN Obama is currently using (042-68-4425) has a Connecticut prefix, 042, but Obama had never lived in nor had associations with the state of Connecticut. Obama has been using that 042 SS number since 1979 when he was 18 years old. In an article for Western Journalism, Stephen Baldwin writes: All told, there are 49 addresses and 16 different Social Security numbers listed for a person whose name is spelled "Barack Obama." […] the one Social Security number Obama most frequently used, the one beginning with 042, is a number issued in Connecticut sometime during 1976-1977, yet there is no record of Obama ever living or working in Connecticut. Indeed, during this time period Obama would have been 15-16 years old and living in Hawaii at the time. In late February 2011, the mystery further deepened when retired US Air Force Col. Gregory Hollister, the litigant in an Obama eligibility lawsuit, conducted a search for Obama's Connecticut SSN in the Social Security Number Verification System used by small businesses to verify employment eligibility. The results came back as: Failed: SSN not in file (never issued) To the question of why Obama obtained a Connecticut-issued SSN instead of one by Hawaii, Joel Gilbert, maker of the documentary Dreams from
Paul Merrell

U.S. Says It Spied on 89,000 Targets Last Year, But the Number Is Deceptive | Threat Le... - 0 views

  • About 89,000 foreigners or organizations were targeted for spying under a U.S. surveillance order last year, according to a new transparency report. The report was released for the first time Friday by the Office of the Director of Intelligence, upon order of the president, in the wake of surveillance leaks by NSA whistleblower Edward Snowden. But the report, which covers only surveillance orders issued in 2013, doesn’t tell the whole story about how many individuals the spying targeted or how many Americans were caught in the surveillance that targeted foreigners. Civil liberties groups say the real number is likely “orders of magnitude” larger than this. “Even if it was an honest definition of ‘target’—that is, an individual instead of a group—that also is not encompassing those who are ancillary to a target and are caught up in the dragnet,” says Kurt Opsahl, deputy general counsel of the Electronic Frontier Foundation.
  • In its report, the government indicated that the 423 selectors involved just 248 “known or presumed” Americans whose information was collected by the agency in the database. But Opsahl says that both of these numbers are deceptive given what we know about the database and how it’s been used. “We know it’s affecting millions of people,” he points out. But “then we have estimated numbers of affected people [that are just] in the three digits. That requires some effort [on the government's part] to find a way to do the definition of the number [in such a way] to make it as small as possible.”
  • “If you’re actually trying to get a sense of the number of human beings affected or the number of Americans affected, the number of people affected is vastly, vastly larger,” says Julian Sanchez, senior fellow at the Cato Institute. “And how many of those are Americans is impossible to say. But [although] you may not think you are routinely communicating with foreign persons, [this] is not any kind of assurance that your communications are not part of the traffic subject to interception.” Sanchez points out that each individual targeted is likely communicating with dozens or hundred of others, whose communications will be picked up in the surveillance. “And probably a lot of these targets are not individuals but entire web sites or companies. While [a company like the Chinese firm] Huawei might be a target, thousands of emails used by thousands of employees will be swept up.” How many of those employees might be American or communicating with Americans is unknown.
  • ...5 more annotations...
  • Also revealed in today’s report is the number of times the government has queried the controversial phone records database it created by collecting the phone records of every subscriber from U.S. providers. According to the report, the government used 423 “selectors” to search its massive phone records database, which includes records going back to at least 2006 when the program began. A search involves querying a specific phone number or device ID that appears in the database. The government has long maintained that its collection of phone records isn’t a violation of its authority, since it only views the records of specific individuals targeted in an investigation. But such searches, even if targeted at phone numbers used by foreigners, would include calls made to and from Americans as well as calls exchanged with people two or three hops out from the targeted number.
  • The report, remarkably, shows that the government obtained just one order last year under Section 702 of FISA—which allows for bulk collection of data on foreigners—and that this one order covered 89,138 targets. But, as the report notes, “target” can refer to “an individual person, a group, an organization composed of multiple individuals or a foreign power that possesses or is likely to communicate foreign intelligence information.” Furthermore, Section 702 orders are actually certificates issued by the FISA Court that can cover surveillance of an entire facility. And since, as the government points out in its report, the government cannot know how many people use a facility, the figure only “reflects an estimate of the number of known users of particular facilities (sometimes referred to as selectors) subject to intelligence collection under those Certifications,” the report notes.
  • One additional figure today’s report covers is the number of National Security Letters the government issued last year to businesses to obtain data on accountholders and users—19,212. NSLs are written demands from the FBI that compel internet service providers, credit companies, financial institutions and others to hand over confidential records about their customers, such as subscriber information, phone numbers and e-mail addresses, websites visited, and more. These letters are a powerful tool because they do not require court approval, and they come with a built-in gag order, preventing recipients from disclosing to anyone that they have received an NSL. An FBI agent looking into a possible anti-terrorism case can self-issue an NSL to a credit bureau, ISP, or phone company with only the sign-off of the Special Agent in Charge of their office. The FBI has merely to assert that the information is “relevant” to an investigation into international terrorism or clandestine intelligence activities.
  • The FBI has issued hundreds of thousands of NSLs over the years and has been reprimanded for abusing them. Last year a federal judge ruled that the use of NSLs is unconstitutional, due to the gag order that accompanies them, and ordered the government to stop using them. Her ruling, however, was stayed pending the government’s appeal.
  • According to the government’s report today, the 19,000 NSLs issued last year involved more than 38,000 requests for information.
Paul Merrell

Stanford Researchers: It Is Trivially Easy to Match Metadata to Real People - Rebecca J... - 0 views

  • In defending the NSA's telephony metadata collection efforts, government officials have repeatedly resorted to one seemingly significant detail: This is just metadata—numbers dialed, lengths of calls. "There are no names, there’s no content in that database," President Barack Obama told Charlie Rose in June. No names; just metadata. New research from Stanford demonstrates the silliness of that distinction. Armed with very sparse metadata, Jonathan Mayer and Patrick Mutchler found it easy—trivially so—to figure out the identity of a caller. <div><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drebecca-j-rosen%26title%3Dstanford-researchers-it-is-trivially-easy-to-match-metadata-to-real-people%26pos%3Din-article&sz=300x185&c=387748957&tile=3" title=""><img src="http://pubads.g.doubleclick.net/gampad/ad?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drebecca-j-rosen%26title%3Dstanford-researchers-it-is-trivially-easy-to-match-metadata-to-real-people%26pos%3Din-article&sz=300x185&c=387748957&tile=3" alt="" /></a></div> Mayer and Mutchler are running an experiment which works with volunteers who agree to use an Android app, MetaPhone, that allows the researchers access to their metadata. Now, using that data, Mayer and Mutchler say that it was hardly any trouble at all to figure out who the phone numbers belonged to, and they did it in just a few hours.
  • They write: We randomly sampled 5,000 numbers from our crowdsourced MetaPhone dataset and queried the Yelp, Google Places, and Facebook directories. With little marginal effort and just those three sources—all free and public—we matched 1,356 (27.1%) of the numbers. Specifically, there were 378 hits (7.6%) on Yelp, 684 (13.7%) on Google Places, and 618 (12.3%) on Facebook. What about if an organization were willing to put in some manpower? To conservatively approximate human analysis, we randomly sampled 100 numbers from our dataset, then ran Google searches on each. In under an hour, we were able to associate an individual or a business with 60 of the 100 numbers. When we added in our three initial sources, we were up to 73. How about if money were no object? We don’t have the budget or credentials to access a premium data aggregator, so we ran our 100 numbers with Intelius, a cheap consumer-oriented service. 74 matched.1 Between Intelius, Google search, and our three initial sources, we associated a name with 91 of the 100 numbers.
  • Their results weren't perfect (and they note that the Intelius data was particularly spotty), but they didn't even try all that hard. "If a few academic researchers can get this far this quickly, it’s difficult to believe the NSA would have any trouble identifying the overwhelming majority of American phone numbers," they conclude. It's also difficult to believe they wouldn't try. As federal district judge Richard Leon wrote in his decision last week, "There is also nothing stopping the Government from skipping the [National Security Letter] step altogether and using public databases or any of its other vast resources to match phone numbers with subscribers."
  •  
    Another Obama/NSA lie exposed. 
Paul Merrell

Feds operated yet another secret metadata database until 2013 | Ars Technica - 0 views

  • In a new court filing, the Department of Justice revealed that it kept a secret database of telephone metadata—with one party in the United States and another abroad—that ended in 2013. The three-page partially-redacted affidavit from a top Drug Enforcement Agency (DEA) official, which was filed Thursday, explained that the database was authorized under a particular federal drug trafficking statute. The law allows the government to use "administrative subpoenas" to obtain business records and other "tangible things." The affidavit does not specify which countries records were included, but specifically does mention Iran. This database program appears to be wholly separate from the National Security Agency’s metadata program revealed by Edward Snowden, but it targets similar materials and is collected by a different agency. The Wall Street Journal, citing anonymous sources, reported Friday that this newly-revealed program began in the 1990s and was shut down in August 2013.
  • The criminal case involves an Iranian-American man named Shantia Hassanshahi, who is accused of violating the American trade embargo against Iran. His lawyer, Mir Saied Kashani, told Ars that the government has clearly abused its authority. "They’ve converted this from a war on drugs to a war on privacy," he said. "[Hassanshahi] is not accused of any drug crime but they used this drug enforcement information to gather information against him, that's contrary to the law, and we will revisit that. We will bring motions in the court and we will appeal if necessary." Neither the DEA nor the Department of Justice immediately responded to Ars' query as to whether this program is continuing under a different authority.
  • The story begins in 2011, when a Department of Homeland Security (DHS) agent received a tip about someone who might be in violation of American sanctions against Iran. The source provided an e-mail from an Iranian businessman, Manoucher Sheiki, who was involved in acquiring power grid equipment. A second Homeland Security agent, Joshua Akronowitz, wrote in a 2013 affidavit that he searched Sheiki’s Iranian phone number in this database, but declined to explain exactly what kind of database it was. Akronowitz found that the Iranian number came up exactly one time in the database, and was linked to an 818 number, based in Los Angeles County. That number turned out to be the Google Voice number of Hassanshahi. DHS then subpoenaed Google, and got Hassanshahi’s call log and later, metadata on his Gmail account. By early 2012, the agency found out that he was set to return to Los Angeles from Iran. At LAX Airport, customs agents seized his phone, laptop, thumb drives, camcorder, and SIM cards and sent them to Homeland Security. Last year, Kashani, Hassanshahi’s lawyer, argued that this evidence should be suppressed on account that it was the "fruit of the poisonous tree"—obtained via illicit means. In support of his arguments, Kashani cited an important ongoing NSA-related lawsuit, Klayman v. Obama, which remains the only instance where a judge has order the NSA metadata program to be shut down—that order was stayed pending an appeal. (Earlier this month, Ars explored Klayman and other pending notable surveillance cases.)
  • ...3 more annotations...
  • In a December 2014 opinion in the Hassanshahi case, US District Judge Rudolph Contreras allowed the evidence, but also required that the government provide a "declaration summarizing the contours of the law enforcement database used by Homeland Security Investigations to discover Hassanshahi’s phone number, including any limitations on how and when the database may be used." To comply with the judge’s order, Robert Patterson, the assistant special agent in charge of the DEA, wrote in the Thursday filing: As noted, this database was a federal law enforcement database. It could be used to query a telephone number where federal law enforcement officials had a reasonable articulable suspicion that the telephone number at issue was related to an ongoing federal criminal investigation. The Iranian number was determined to meet this standard based on specific information indicating that the Iranian number was being used for the purpose of importing technological goods to Iran in violation of United States law. Previously, the government had not revealed exactly how it began its investigation of Hassanshahi, and only referred cryptically to "[DHS]-accessible law enforcement databases," in Akronowitz’ 2013 and  2014 affidavits.
  • Similarly, other privacy-minded legal experts questioned the government’s tactics in this new revelation. "We just don’t know about the scope of these things, and that’s what’s disturbing," Andrew Crocker, a legal fellow at the Electronic Frontier Foundation, told Ars. His colleague, Hanni Fakhoury, an EFF attorney who used to be a federal public defender, added that he was "not surprised." "Bulk surveillance technologies and the dangerous legal theories that are used to support them trickle down, and here's a prime example of that," he wrote by e-mail. "The DEA's mandate is of course important but not at the level of national security where as you know there are serious legal questions about the propriety of this collection of phone metadata. And if the DEA has a program like this, it wouldn't surprise me if other agencies do too for other sorts of records the government has claimed it can collect with a subpoena (like bank records)."
  • Patrick Toomey, an attorney with the American Civil Liberties Union, chimed in to say that this indeed was a clear example of government overreach. "This disclosure underscores how the government has expanded its use of bulk collection far beyond the NSA and the national-security context, to rely on mass surveillance in ordinary criminal investigations," he said by e-mail. "It’s now clear that multiple government agencies have tracked the calls that Americans make to their parents and relatives, friends, and business associates overseas, all without any suspicion of wrongdoing," Toomey continued. "The DEA program shows yet again how strained and untenable legal theories have been used to secretly justify the surveillance of millions of innocent Americans using laws that were never written for that purpose."
  •  
    The authorizing statute clearly limits the scope of the administrative subpoena authority to drug related criminal investigations. "In any investigation relating to his functions under this subchapter with respect to controlled substances, listed chemicals, tableting machines, or encapsulating machines, the Attorney General may subpena witnesses, compel the attendance and testimony of witnesses, and require the production of any records (including books, papers, documents, and other tangible things which constitute or contain evidence) which the Attorney General finds relevant or material to the investigation."
Paul Merrell

Virtual Economy's Phantom Job Gains Are Based on Statistical Fraud. And More Fraud Is i... - 0 views

  • Washington can’t stop lying.  Don’t be convinced by last Thursday’s job report that it is your fault if you don’t have a job. Those 288,000 jobs and 6.1% unemployment rate are more fiction than reality.  In his analysis of the June Labor Data from the Bureau of Labor Statistics, John Williams (www.ShadowStats.com) wrote that the 288,000 June jobs and 6.1% unemployment rate  are “far removed from common experience and underlying reality.” Payrolls were overstated by “massive, hidden shifts in seasonal adjustments,” and the Birth-Death model added the usual phantom jobs.  Williams reports that “the seasonal factors are changed each and every month as part of the concurrent seasonal-adjustment process, which is tantamount to a fraud,” as the changes in the seasonal factors can inflate the jobs number.  While the headline numbers always are on a new basis, the prior reporting is not revised so as to be consistent.
  • The monthly unemployment rates are not comparable, so one doesn’t know whether the official U.3 rate (the headline rate that the financial press reports) went up or down. Moreover, the rate does not count discouraged workers who, unable to find a job, cease looking. To be counted among the U.3 unemployed, the person must have actively looked for work during the four weeks prior to the survey. The U.3 rate automatically declines as people who have been unable to find jobs cease trying to find one and thereby cease to be counted as unemployed. There is a second official measure of unemployment that includes people who have been discouraged for less than one year. That rate, known as U.6, is seldom reported and is double the 6.1% rate. Since 1994 there has been no official measure than includes discouraged people who have not looked for a job for more than a year. Including all discouraged workers produces an unemployment rate that currently stands at 23.1%, almost four times the rate that the financial press reports.
  • What you can take away from this is the opposite of what the presstitute media would have you believe.  The measured rate of unemployment can decline simply because large numbers of the unemployed become discouraged workers, cease looking for work, and cease to be counted in the U.3 and U.6 measures of the unemployment rate.   The decline in the employment-population ratio from 63% prior to the 2008 downturn to 59% today reflects the growth in discouraged workers.  Indeed, the ratio has not recovered its previous level during the alleged recovery, an indication that the recovery is an illusion created by the understated measure of inflation that is used to deflate nominal GDP growth.
  • ...8 more annotations...
  • Insurance (most likely the paperwork of Obamacare) contributed 8,500 jobs. As so few can purchase homes, “real estate rental and leasing” contributed 8,500 jobs. Professional and business services contributed 67,000 jobs, but 57% of these jobs were in employment services, temporary help services, and services to buildings and dwellings.   That old standby, education and health services, accounted for 33,700 jobs consisting mainly of ambulatory health care services jobs and social assistance jobs of which three-quarters are in child day care services.   The other old standby, waitresses and bartenders, gave us 32,800 jobs, and amusements, gambling, and recreation gave us 3,500 jobs.
  • In other words, the economy did not gain 288,000 new jobs last month.   But let’s assume the economy did gain 288,000 jobs and exam where the claimed jobs are reported to be. Of the alleged 288,000 new jobs, 16,000, or 5.5 percent are in manufacturing, which is not very promising for engineers and blue collar workers.  Growth in goods producing jobs has almost disappeared from the US economy.  As explained below, to alter this problem the government is going to change definitions in order to artificially inflate manufacturing jobs. In June private services account for 82 percent of the supposed new jobs.  The jobs are found mainly in non-tradable domestic services that pay little and cannot be exported to help to close the large US trade deficit. Wholesale and retail trade account for 55,300 jobs.  Do you believe sales are this strong  when retailers are closing stores and when shopping malls are closing?
  • Another indication that there has been no recovery is that Sentier Research’s index of real median household income continued to decline for two years after the alleged recovery began in June 2009.   There has been a slight upturn in real median household income since June 2011, but income remains far below the pre-recession level.   The Birth-Death model adds an average of 62,000 jobs to the reported payroll jobs numbers each month. This arbitrary boost to the payroll jobs numbers is in addition to the Bureau of Labor Statistics’ underlying assumption that unreported jobs lost to business failures are matched by unreported new jobs from new business startups, an assumption that does not well fit an economy that fell into recession and is unable to recover.   John Williams concludes that in current BLS reporting, “the aggregate average overstatement of employment change easily exceeds 200,000 jobs per month.”
  • Local government, principally education, gave us 22,000 jobs.   So, where are the jobs for university graduates?  They are practically non-existent. Think of all the MBAs, but June had only 2,300 jobs for management of companies and enterprises. Think of the struggle to get into law and medical schools.  There’s no job payoff. June had jobs for 1,200 in legal services, which includes receptionists and para-legals.  Where are all the law school graduates finding jobs? Offices of physicians (mainly people who fill out the mandated paperwork and comply with all the regulations, which have multiplied under ObamaCare) hired 4,000 people.  Outpatient care centers hired 700 people.  Nursing care facilities hired 2,400 people.  So where are the jobs for the medical school graduates? Aside from all the exaggerations in the jobs numbers of which ShadowStats.com has informed us, just taking the jobs as reported, what kind of economy do these jobs indicate:  a superpower whose pretensions are to exercise hegemony over the world or an economy in which opportunities are disappearing and incomes are falling?
  • Do you think that this jobs picture would be the same if the government in Washington cared about you instead of the mega-rich? Some interesting numbers can be calculated from table A.9 in the BLS press release.  John Williams advises that the BLS is inconsistent in the methods it uses to tabulate the data in table A.9 and that the data is also afflicted by seasonal adjustment problems.  However, as the unemployment rate and payroll jobs are reported regardless of their problems, we can also report the BLS finding that in June 523,000 full-time jobs disappeared and 800,000 part time jobs appeared. Here, perhaps, we have yet another downside of the misnamed Obama “Affordable Care Act.”  Employers are terminating full-time employment and replacing the jobs with part-time employment in order to come in under the 50-person full time employment that makes employers responsible for fringe benefits such as health care. Americans are already experiencing difficulties making ends meet, despite the alleged “recovery.”  If yet another half million Americans have been forced onto part-time pay with consequent loss of health care and other benefits, consumer demand is further compressed, with the consequence, unless hidden by statistical trickery, of a 2nd quarter negative GDP and thus officially the reappearance of recession.
  • What will the government do if a recession cannot be hidden?  If years of unprecedented money printing and Keynesian fiscal deficits have not brought recovery, what will bring recovery?  How far down will US living standards fall for the 99% in order that the 1% can become ever more mega-rich while Washington wastes our diminishing substance exercising hegemony over the world? Just as Washington lied to you about Saddam Hussein’s weapons of mass destruction, Assad’s use of chemical weapons, Russian invasion of Ukraine, Waco, and any number of false flag or nonexistent attacks such as Tonkin Gulf, Washington lies to you about jobs and economic recovery.  Don’t believe the spin that you are unemployed because you are shiftless and prefer government handouts to work.  The government does not want you to know that you are unemployed because the corporations offshored American jobs to foreigners and because economic policy only serves the oversized banks and the one percent. Just as the jobs and inflation numbers are rigged and the financial markets are rigged, the corrupt Obama regime is now planning to rig US manufacturing and trade statistics in order to bury all evidence of offshoring’s adverse impact on our economy.
  • The federal governments Economic Classification Policy Committee has come up with a proposal to redefine fact as fantasy in order to hide offshoring’s contribution to the US trade deficit, artificially inflate the number of US manufacturing jobs, and redefine foreign-made manufactured products as US manufactured products.  For example, Apple iPhones made in China and sold in Europe would be reported as a US export of manufactured goods. Read Ben Beachy’s important report on this blatant statistical fraud in CounterPunch’s July 4th weekend edition: http://www.counterpunch.org/2014/07/04/we-didnt-offshore-manufacturing/ China will not agree that the Apple brand name means that the phones are not Chinese production. If the Obama regime succeeds with this fraud, the iPhones would be counted twice, once by China and once by the US, and the double-counting would exaggerate world GDP. For years I have exposed the absurd claim that offshoring is merely the operation of free trade, and I have exposed the incompetent studies by such as Michael Porter at Harvard and Matthew Slaughter at Dartmouth that claimed to prove that the US was benefitting from offshoring its manufacturing.  My book published in 2012 in Germany and in 2013 in the US, The Failure of Laissez Faire Capitalism and Economic Dissolution of the West, proves that offshoring has dismantled the ladders of upward mobility that made the US an opportunity society and is responsible for the decline in US economic growth. The lost jobs and decline in the middle class has contributed to the rise in income inequality, the destruction of tax base for cities and states, and loss of population in America’s once great manufacturing centers.
  • For the most part economists have turned a blind eye. Economists serve the globalists.  It pays them well. The corruption in present-day America is total. Psychologists and anthropologists serve war and torture. Economists serve globalism and US financial hegemony. Physicists and chemists serve the war industries. Physicists and computer geeks serve NSA. The media serves the government and the corporations. The political parties serve the six powerful private interest groups that rule the country. No one serves truth and liberty. I predict that within ten years truth and liberty will be forbidden words uttered only by “domestic extremists” who are a threat that must be exterminated without due process of law. America has left us.  We now have the tyranny of the Orwellian state that rules, not by the ballot box and Constitution, but by force and propaganda.
Paul Merrell

NSA Whistleblower: Snowden Never Had Access to the "Juiciest" Intelligence Documents | ... - 0 views

  • NSA whistleblower Russel Tice was a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping. Tice told PBS and other media that the NSA is spying on – and blackmailing – top government officials and military officers, including Supreme Court Justices, highly-ranked generals, Colin Powell and other State Department personnel, and many other top officials:
  • He says the NSA started spying on President Obama when he was a candidate for Senate:
  • Many of Tice’s allegations have been confirmed by other government whistleblowers. And see this. Washington’s Blog called Tice to find out more about what he saw when he was at NSA.
  • ...8 more annotations...
  • NSA Has Hidden Its Most Radical Surveillance Operations … Even from People Like Snowden Who Had General “Code Word” Clearance WASHINGTON’S BLOG: Glenn Greenwald – supposedly, in the next couple of days or weeks – is going to disclose, based on NSA documents leaked by Snowden, that the NSA is spying on all sorts of normal Americans … and that the spying is really to crush dissent.  [Background here, here and here.] Does Snowden even have documents which contain the information which you’ve seen? RUSSELL TICE:  The answer is no. WASHINGTON’S BLOG: So you saw handwritten notes. And what Snowden was seeing were electronic files …?
  • RUSSELL TICE: Think of it this way.  Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden? Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing? They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA.  They made the reports look like they were Humint (human intelligence) reports.  They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago.  [The NSA and other agencies are still doing "parallel construction", "laundering" information to hide the fact that the information is actually from mass NSA surveillance.] Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level.  It’s called “ECI” - Exceptionally Controlled Information  – and it’s called the black program … which I was a specialist in, by the way. I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations  It’s highly unlikely Mr. Snowden had any access to these.
  • Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it.  It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System.  The JWICS system is what everybody at NSA has access to.  Mr Snowden had Sys Admin [systems administrator] authority for the JWICS. And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information - also known as “code word” - clearance] to get on the JWICS. But the ECI/VRK systems are much higher [levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance]. ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks. These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them.  [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.]
  • It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency. When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times –   that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up. There was no such thing beforehand. It was made up … to try to placate the American people. The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of. So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.
  • Snowden’s Failure To Understand the Most Important Documents RUSSELL TICE: Now, if Mr. Snowden were to find the crossover, it would be those documents that were downgraded to the NSA’s IG. The stuff that I saw looked like a bunch of alphanumeric gobbledygook.  Unless you have an analyst to know what to look for – and believe me, I think that what Snowden’s done is great – he’s not an intelligence analyst.  So he would see something like that, and he wouldn’t know what he’s looking at. But that would be “the jewels”. And the key is, you wouldn’t know it’s the jewels unless you were a diamond miner and you knew what to look for. Because otherwise, there’s a big lump of rock and you don’t know there’s a diamond in there. I worked special programs. And the way I found out is that I was working on a special operation, and I needed information from NSA … from another unit. And when I went to that unit and I said “I need this information”, and I dealt with [satellite spy operations], and I did that in the black world. I was a special operations officer. I would literally go do special missions that were in the black world where I would travel overseas and do spooky stuff.
  • Cheney Was Running the Show WASHINGTON’S BLOG: You said in one of your interviews that Dick Cheney ordered the intercepts that you found in the burn bags [the bags of documents which were slated to be destroyed because they were so sensitive]. Is that right … and if so, how do you know that? RUSSELL TICE: I did not know one way or the other until I talked to a very senior person at NSA who – much later – wanted to have a meeting with me. And we had a covert, clandestine style meeting. And that’s when this individual told me that the whole thing was being directed and was coming from the vice president’s office … Cheney, through his lawyer David Addington. WASHINGTON’S BLOG:  It sounds like it wasn’t going through normal routes?  It’s not like Cheney or Addington made formal requests to the NSA … through normal means? RUSSELL TICE: No, not normal at all. All on the sly … all “sneaky pete” under the table, in the evening when most NSA employees are gone for the day. This is all being done in the evenings … between like 7 [at night] and midnight.
  • NSA Is Spying On CONTENT as Well as Metadata WASHINGTON’S BLOG: And from what you and others have said, it’s content as well as metadata? RUSSELL TICE: Of course it is. Of course. [Background. But see this.] NSA Spying On Journalists, Congress, Admirals, Lawyers … RUSSELL TICE: In 2009, I told [reporters] that they were going after journalists and news organizations and reporters and such. I never read text of Congressman’s conversations. What I had was information – sometimes hand-written – of phone numbers of Congressmen, their wives, their children, their staffers, their home numbers, their cellphone numbers, their phone numbers of their residence back in Oregon or whatever state they’re from, and their little offices back in their state. Or an Admiral and his wife, and his kids and his staffers …
  • The main thing I saw more than anything else were lawyers and law firms. I saw more lawyers or law firms being wiretapped than anything else. These are the phone numbers I saw written. And then I would see those numbers incorporated into those lists with the columns of information about the phone number, and the serial number and the banks of recorders and digital converters and the data storage devices. I could see handwritten phone numbers and notes, sometimes with names, sometimes not.
  •  
    Whistleblower Russell Tice says that there are super-classified domestic surveillance records that Edward Snowden, Congressional oversight committees, and the NSA Inspector-General did not have access to. Must-read.
Paul Merrell

FindLaw | Cases and Codes - 0 views

  • SMITH v. MARYLAND, 442 U.S. 735 (1979)
  • The telephone company, at police request, installed at its central offices a pen register to record the numbers dialed from the telephone at petitioner's home. Prior to his robbery trial, petitioner moved to suppress "all fruits derived from" the pen register. The Maryland trial court denied this motion, holding that the warrantless installation of the pen register did not violate the Fourth Amendment. Petitioner was convicted, and the Maryland Court of Appeals affirmed. Held: The installation and use of the pen register was not a "search" within the meaning of the Fourth Amendment, and hence no warrant was required. Pp. 739-746. (a) Application of the Fourth Amendment depends on whether the person invoking its protection can claim a "legitimate expectation of privacy" that has been invaded by government action. This inquiry normally embraces two questions: first, whether the individual has exhibited an actual (subjective) expectation of privacy; and second, whether his expectation is one that society is prepared to recognize as "reasonable." Katz v. United States, 389 U.S. 347 . Pp. 739-741.
  • (b) Petitioner in all probability entertained no actual expectation of privacy in the phone numbers he dialed, and even if he did, his expectation was not "legitimate." First, it is doubtful that telephone users in general have any expectation of privacy regarding the numbers they dial, since they typically know that they must convey phone numbers to the telephone company and that the company has facilities for recording this information and does in fact record it for various legitimate business purposes. And petitioner did not demonstrate an expectation of privacy merely by using his home phone rather than some other phone, since his conduct, although perhaps calculated to keep the contents of his conversation private, was not calculated to preserve the privacy of the number he dialed. Second, even if petitioner did harbor some subjective expectation of privacy, this expectation was not one that society is prepared to recognize as "reasonable." When petitioner voluntarily conveyed numerical information to the phone company and "exposed" that information to its equipment in the normal course of business, he assumed the risk that the company would reveal the information [442 U.S. 735, 736]   to the police, cf. United States v. Miller, 425 U.S. 435 . Pp. 741-746. 283 Md. 156, 389 A. 2d 858, affirmed.
  •  
    The Washington Post has reported that "on July 15 [2001], the secret surveillance court allowed the NSA to resume bulk collection under the court's own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as "pen register, trap and trace," that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line." .  The seminal case on pen registers is the Supreme Court's 1979 Smith v. Maryland decision, bookmarked here and the Clerk's syllabus highlighted, with the Court's discussion on the same web page. We will be hearing a lot about this case decision in the weeks and months to come.  Let it suffice for now to record a few points of what my antenna are telling me:  -- Both technology and the law have moved on since then. We are 34 years down the line from the Smith decision. Its pronouncements have been sliced and diced by subsequent decisions. Not a single Justice who sat on the Smith case is still on the High Bench.   -- In Smith, a single pen register was used to obtain calling information from a single telephone number by law enforcement officials. In the present circumstance, we face an Orwellian situation of a secret intelligence agency with no law enforcement authority forbidden by law from conducting domestic surveillance perusing and all digital communications of the entire citizenry. -- The NSA has been gathering not only information analogous to pen register results but also the communications of American citizens themselves. The communications themselves --- the contents --- are subject to the 4th Amendment warrant requirement. Consider the circuitous route of the records ordered to be disclosed in the Verizon FISA order. Verizon was ordered to disclose them to the FBI, not to the NSA. But then the FBI apparently forwards the records to the NSA, who has both the "pen register
Paul Merrell

Reuters Investigates - UNACCOUNTABLE: The Pentagon's bad bookkeeping - 0 views

  • MILES OF AISLES: At the Defense Logistics Agency's giant storage facility outside Harrisburg, Pennsylvania, lack of reliable information on what's there makes it hard to throw out excess inventory. REUTERS/TIM SHAFFER
  • Part 2: For two decades, the U.S. military has been unable to submit to an audit, flouting federal law and concealing waste and fraud totaling billions of dollars
  • At the DFAS offices that handle accounting for the Army, Navy, Air Force and other defense agencies, fudging the accounts with false entries is standard operating procedure, Reuters has found. And plugging isn’t confined to DFAS (pronounced DEE-fass). Former military service officials say record-keeping at the operational level throughout the services is rife with made-up numbers to cover lost or missing information.
  • ...2 more annotations...
  • Linda Woodford spent the last 15 years of her career inserting phony numbers in the U.S. Department of Defense’s accounts. Every month until she retired in 2011, she says, the day came when the Navy would start dumping numbers on the Cleveland, Ohio, office of the Defense Finance and Accounting Service, the Pentagon’s main accounting agency. Using the data they received, Woodford and her fellow DFAS accountants there set about preparing monthly reports to square the Navy’s books with the U.S. Treasury’s - a balancing-the-checkbook maneuver required of all the military services and other Pentagon agencies. And every month, they encountered the same problem. Numbers were missing. Numbers were clearly wrong. Numbers came with no explanation of how the money had been spent or which congressional appropriation it came from. “A lot of times there were issues of numbers being inaccurate,” Woodford says. “We didn’t have the detail … for a lot of it.”
  • The data flooded in just two days before deadline. As the clock ticked down, Woodford says, staff were able to resolve a lot of the false entries through hurried calls and emails to Navy personnel, but many mystery numbers remained. For those, Woodford and her colleagues were told by superiors to take “unsubstantiated change actions” - in other words, enter false numbers, commonly called “plugs,” to make the Navy’s totals match the Treasury’s. Jeff Yokel, who spent 17 years in senior positions in DFAS’s Cleveland office before retiring in 2009, says supervisors were required to approve every “plug” - thousands a month. “If the amounts didn’t balance, Treasury would hit it back to you,” he says.
  •  
    Nothing new here. Remember when Donald Rumsfeld announced the day before 9-11 that the Pentagon could not account for $2.3 trillion? https://www.youtube.com/watch?v=oj1rT4bszWg It was the same way in Viet Nam. During my entire 27 months there, we could not be issued socks. We had to write home to ask family or friends to buy socks and send them to us. They could buy them at military surplus stores in the U.S., regulation Army field socks with cushion soles, but we couldn't get them from the Army. "An army travels on its feet," but no socks. Socks were not the only supply chain failures, of course. If you can't manage to get socks to your soldiers because they've been declared surplus, maybe you'd have problems accounting for expenditures too, ya' think? 
Gary Edwards

Roger L. Simon » Is America in a Pre-Revolutionary State this July 4th? - 0 views

  •  
    As we approach July 4, 2013, is America in a pre-revolutionary state? Are we headed for a Tahrir Square of our own with the attendant mammoth social turmoil, possibly even violence. Could it happen here? We are two-thirds of the way into the most incompetent presidency in our history. People everywhere are fed up. Even many of the so-called liberals who propelled Barack Obama into office have stopped defending him in the face of an unprecedented number of scandals coming at us one after the other like hideous monsters in some non-stop computer game. And now looming is the monster of monsters, ObamaCare, the healthcare reform almost no one wanted and fewer understood. It will be administered by the Internal Revenue Service, an organization that has been revealed to be a kind of post-modern American Gestapo, asking not just to examine our accounting books but the books we read . What could be more totalitarian than that? Meanwhile, the Wall Street Journal warns the costs of ObamaCare are close to tripling what were promised , and the number of doctors in our country is rapidly diminishing. No more "My son, the doctor!" It doesn't pay. And young people most of all will not be able to afford escalating health insurance costs and will end up paying the fine to the IRS, simultaneously bankrupting the health system and enhancing the brutal power of the IRS - all this while unemployment numbers remain near historical highs. No one knows how many have given up looking for work while crony capitalist friends of the administration enrich themselves on mythological clean-energy projects. In fact, everywhere we look on this July Fourth sees a great civilization in decline. And much of that decline can be laid at the foot of the incumbent. Especially his own people, African Americans, have suffered.  Their unemployment numbers are catastrophic, their real needs ignored while hustlers like Sharpton, Jackson, and, sadly, even the president fan the flames of non-exi
Gary Edwards

How can Obama say the economy is getting better? | Western Free Press - 0 views

  •  
    Devastating charts comparing the percentage of Americans in the work force from January 2000 through February 2012.  The most interesting numbers show that the recession began in December of 2007, and ended in June of 2009 - yet it is after that June 2009 date that the % of Americans in the workforce begins to drop like a rock!  This is after the Obmaulous stimulous $1.2 Trillion, the Federal Reserve Bankster Cartels secret $16.1 Trillion, and, the magnificent cash-for-clunkers crap. Meanwhile, back in la la land, Obama thinks the problem is that we all need free contraceptives, free abortions and free sex-change coverage in our health insurance.  The Obama Spend-Borrow-Bail train has left the station.  Next stop?  War with Iran.  More powerful a phony narrative than contraceptives, abortions, and fear of a conservative repubican praying in the White House.  Besides, those bastards are refusing to use the dollar as the settlement currency for their oil sales!  Time to put them in the dirt along with that rogues gallery of tyrants who also defied the Federal Reserve International Bankster Cartel, demanding settlement currencies measured in GOLD instead of paper dollars; gallery includes notables such as Saddam Hussein, Muammar Gaddafi, and the Shah of Iran. Nothing like the Marines and the Seventh Fleet being unleashed to turn around the dismal poll numbers stubbornly connected to the even more dismal disaster known throughout the hinterland of bitter clingers as the economic truth. excerpt: Is President Obama relying on the Bureau of Labor statistics to manipulate the unemployment numbers to make them look better than they are? The real rate is probably more like 11.5%, and we have seen analyses that indicate that unemployment hasn't actually fallen at all under Obama: So what is going on here? The big problem is that people are giving up. Obama and the Democrats' job-killing regulations and climate of uncertainty are stifling innovation and inv
Paul Merrell

Researchers Connect 91% of Numbers With Names In Metadata Probe - Slashdot - 0 views

  • "One of the key tenets of the argument that the National Security Agency and some lawmakers have constructed to justify the agency's collection of phone metadata is that the information it's collecting, such as phone numbers and length of call, can't be tied to the callers' names. However, some quick investigation by some researchers at Stanford University who have been collecting information voluntarily from Android users found that they could correlate numbers to names with very little effort. The Stanford researchers recently started a program called Metaphone that gathers data from volunteers with Android phones. They collect data such as recent phone calls and text messages and social network information. The goal of the project, which is the work of the Stanford Security Lab, is to draw some lines connecting metadata and surveillance. As part of the project, the researchers decided to select a random set of 5,000 numbers from their data and see whether they could connect any of them to subscriber names using just freely available Web tools. The result: They found names for 27 percent of the numbers using just Google, Yelp, Facebook and Google Places. Using some other online tools, they connected 91 of 100 numbers with names."
Paul Merrell

FBI, CIA Use Backdoor Searches To Warrentlessly Spy On Americans' Communications | Tech... - 0 views

  • The other shoe just dropped when it comes to how the federal government illegally spies on Americans. Last summer, the details of the NSA's "backdoor searches" were revealed. This involved big collections of content and metadata (so, no, not "just metadata" as meaningless as that phrase is) that were collected under Section 702 of the FISA Amendments Act (FAA). This is part of the program that the infamous PRISM effort operates under, and which allows the NSA to collect all sorts of content, including communications to, from or about a "target" -- where a "target" can be incredibly loosely defined (i.e., it can include groups or machines or just about anything). The "backdoor searches" were a special loophole added in 2011 allowing the NSA to make use of "US person names and identifiers as query terms." In the past, it had been limited (as per the NSA's mandate) to only non-US persons.
  • This morning, James Clapper finally responded to a request from Senator Ron Wyden concerning the number of such backdoor searches using US identifiers that were done by various government agencies. And, surprisingly, it's redaction free. The big reveal is... that it's not just the NSA doing these searches, but the CIA and FBI as well. This is especially concerning with regards to the FBI. This means that the FBI, who does surveillance on Americans, is spying on Americans communications that were collected by the NSA and that they're doing so without anything resembling a warrant. Oh, and let's make this even worse: the FBI isn't even tracking how often it does this. It's just doing it willy nilly:
  • Got that? Basically, the FBI often asks the NSA for a big chunk of data that the NSA probably shouldn't have in the first place -- including tons of Americans' communications, and the FBI gets to dump it into the same database that it is free to query. And the FBI tracks none of this, other than to say that it believes that there are a "substantial" number of such queries. This would seem to be a pretty blatant attempt to end run around the 4th Amendment, giving the FBI broad access to searching through the communications of Americans with what appears to be almost no oversight. Yikes! Oh, and it's not just the NSA, but the CIA as well. Remember, the CIA is not supposed to be doing any surveillance on US persons (like the NSA), but that's not what's happening at all. At least the CIA tracks some (but not all) of its abuse of backdoor searches:
  • ...5 more annotations...
  • The FBI does not track how many queries it conducts using U.S. person identifiers. The FBI is responsible for identifying and countering threats to the homeland, such as terrorism pilots and espionage, inside the U.S. Unlike other IC agencies, because of its domestic mission, the FBI routinely deals with information about US persons and is expected to look for domestic connections to threats emanating from abroad, including threats involving Section 702 non-US. person targets. To fulfill its mission and avoid missing connections within the information lawfully in its possession, the FBI does not distinguish between U.S. and non- U.S. persons for purposes of querying Section 702 collection. It should be noted that the FBI does not receive all of Section 702 collection; rather, the FBI only requests and receives a small percentage of total Section 702 collection and only for those selectors in which the FBI has an investigative interest. Moreover, because the FBI stores Section 702 collection in the same database as its "traditional" FISA collection, a query of "traditional" FISA collection will also query Section 702 collection. In addition, the FBI routinely conducts queries across its databases in an effort to locate relevant information that is already in its possession when it opens new national security investigations and assessments. Therefore, the FBI believes the number of queries is substantial. However, only FBI personnel trained in the Section 702 minimization procedures are able to View any Section 702 collection that is responsive to any query.
  • In calendar year 2013, CIA conducted fewer than 1900 queries of Section 702-acquired communications using specific U.S. person identifiers as query terms or other more general query terms if they are intended to return information about a particular U.S. person. Of that total number approximately 40% were conducted as a result of requests for counterterrorism-related information from other U.S. intelligence agencies. Approximately 27% of the total number are duplicative or recurring queries conducted at different times using the same identifiers but that CIA nonetheless counts as separate queries. CIA also uses U.S. person identifiers to conduct metadata-only queries against metadata derived from the FISA Section 702 collection. However, the CIA does not track the number of metadata-only queries using U.S. person identifiers.
  • So, the CIA is doing these kinds of warrantless fishing expeditions into the communications of Americans as well, but at least the CIA tracks how often it's doing so. Of course, when it comes to metadata searches, the CIA doesn't bother. It's also a bit bizarre that the CIA is apparently carrying out a bunch of those searches for "other U.S. intelligence agencies," when the CIA should be especially limited in its ability to do these searches in the first place. Senator Wyden has responded to these revelations by pointing out how "flawed" the oversight system is that these have been allowed:
  • When the FBI says it conducts a substantial number of searches and it has no idea of what the number is, it shows how flawed this system is and the consequences of inadequate oversight. This huge gap in oversight is a problem now, and will only grow as global communications systems become more interconnected. The findings transmitted to me raise questions about whether the FBI is exercising any internal controls over the use of backdoor searches including who and how many government employees can access the personal data of individual Americans. I intend to follow this up until it is fixed.
  • Hopefully, now you are starting to recognize what a big deal it was last week when the House of Representatives recently voted to defund the ability to do these kinds of backdoor searches. Still, much more needs to be done. Oh, and in case you're wondering why Clapper finally 'fessed up to the FBI and CIA making use of these data to warrantlessly spy on Americans, it's worth noting that the Privacy and Civil Liberties Oversight Board (PCLOB) is expected to come out with its report on the Section 702 surveillance program on July 2nd (7/02, get it?). It seems likely that the report will discuss these backdoor searches on Americans and how other agencies besides the NSA has been involved in the practice.
  •  
    Note to self: Look for the new PCLOB report in the morning. 
Gary Edwards

Possible Constitutional Amendments in the event of an Article V Convention of States - ... - 0 views

  • NUMBER ONE: "Section One:   The Constitution of the United States shall be read and interpreted literally.   No words or phrases shall be changed or substituted and no part of the Constitution shall be used to expand or increase Federal Power or Authority beyond that EXPRESSLY granted and enumerated in the Constitution.   The language of the Constitution shall be interpreted according to the definition of words at the time of their inclusion in the Constitution. Section Two:    Congress shall have, by two thirds vote of both the House of Representatives and the Senate, the power to override individual rulings of the Supreme Court of the United States and/or subordinate Federal Courts.   The President shall not have veto authority over Congressional overrides of Federal Court decisions."
  • NUMBER TWO: "Section One:    No person shall be elected to Congress more than once unless serving in Congress at the time of the ratification of this amendment, in which case members of Congress shall be eligible for re-election to their respective seats one time. Section Two:     In the event the Seventeenth Amendment to the Constitution of the United States is repealed members of the Senate of the United States shall serve at the pleasure and discretion of the Legislature of their respective State. Section Three:  Neither Congress, the President, nor any Federal Court shall make any law, rule, regulation, or order that does not apply equally to themselves and all citizens of the United States.   Nor shall Congress, the President, or any Federal Court cause or allow any law, rule, regulation, or order to be made by any agent or agency of the Federal Government that does not apply equally to themselves and all citizens of the United States.
  • Section Four:    Neither Congress nor the President shall receive any publically-funded retirement or benefit beyond appropriate pay not available to all citizens of the United States. Section Five:    Section Four shall not apply to members of Congress or Presidents, serving or retired, at the time of the ratification of this amendment. Section Six:      The President shall be subject to popular recall by his/her constituency.   Within 90 days of the ratification of this amendment Congress shall pass legislation governing the recall of the President.   In the event Congress fails to pass the required legislation within the required 90 days, the President shall be considered to have been recalled and a new election held within 60 days. Section Seven: Members of Congress shall be subject to popular recall by their respective constituencies, unless the Seventeenth Amendment to the Constitution of the United States is repealed, in which case only members of the House of Representatives shall be subject to popular recall.   Within 90 days of the ratification of this amendment each State shall pass legislation governing the recall of its Congressional Delegation.   In the event a State fails to pass the required legislation within the required 90 days, that State's Congressional Delegation shall be considered to have been recalled and new elections held within 60 days."
  • ...6 more annotations...
  • NUMBER THREE: "Congress shall make and the President shall sign a Balanced Federal Budget every year and before the beginning of the ensuing fiscal year.   In the event Congress and the President fail to make said Balanced Federal Budget before the beginning of the ensuing fiscal year, the last Constitutionally passed and signed Federal Budget shall go into effect and shall be the Federal Budget for the entirety of the ensuing fiscal year.   Balanced shall be defined as expenditures not to exceed revenues except in time of war as declared by Congress.   Revenues shall be defined as monies received; not monies predicted, anticipated, or forecasted.   Unfunded liabilities, obligations, and/or mandates shall be included in the calculation of the Balanced Federal Budget."
  • NUMBER FOUR: "The Fourteenth, Sixteenth, and Seventeenth Amendments to the Constitution of the United States are hereby repealed.   All Federal agencies, programs, laws, rules, regulations, and/or orders created, passed, or handed down as a direct or indirect result of the Fourteenth, Sixteenth, and/or Seventeenth Amendments are hereby stricken from Law, declared null and void, and have no force of effect."
  • NUMBER FIVE: "Section One:     Only persons born of two parents, both of whom are citizens of the United States at the time of the birth of the person, shall be citizens of the United States unless naturalized under the terms and conditions of the Constitution of the United States. Section Two:      Only United States Citizens shall enjoy or receive all rights, benefits, and privileges of United States Citizenship. Section Three:   Non-citizens shall not receive, directly or indirectly, Federal or Constitutional benefits, privileges, or protections."
  • NUMBER SIX:   "The several States are hereby empowered, individually or collectively, to enforce the Constitution of the United States and Federal Law, within their respective borders, regardless of Federal resistance or objections."
  • NUMBER SEVEN:   "Section One:   The Second Amendment to the Constitution of the United States shall be interpreted to mean the FUNDAMENTAL right of individual citizens and/or groups of citizens to keep and bear arms; in their homes and/or other properties, in public and private, and on their persons. Section Two:    Non-citizens and persons convicted of a violent felony by a jury of their peers do not have this right."
  • NUMBER EIGHT: "The First Amendment to the Constitution of the United States shall not be interpreted to prohibit or restrict the peaceful, free exercise or expression of religion, in public or private, or in or on public property."
  •  
    "Possible Constitutional Amendments in the event of an Article V Convention of States Posted by Oren Long on January 12, 2015 at 3:42am in Tea PartyView Discussions ARTICLE V CONVENTION OF STATES; ARE YOU WILLING TO CHANGE THE STATUS QUO IN D.C.?   One of our astute and true conservative members of this site has drafted suggested changes to the Constitution to be proposed in an Article V, Convention of States. I know many of you have seen his postings on here about this issue. Mr. Oren Long is very knowledgeable and well educated and has honorably served our country. He has put a tremendous amount of time and thought into ways to, in his words, "armor and reinforce" the Constitution and return it to its Original Intent, as envisioned by the Founders. Therefore, because I agree with every one of his suggested changes, I am publishing it for him, with his permission. I truly hope that we, as a group, as conservatives and as a people who believe that our country is heading toward disaster, because of the course we are on, I fully endorse his recommended suggestions. I believe that we must take any and every course of action we can to "stop the madness" It is quite long, so PLEASE take the time to read each and every one of them. I am sure that some or many, may have suggestions to this document and they are welcome and open to discussion. If you agree with this, please call your State elected officials and urge them to get on board with an Article V Convention of States. To review or obtain more information of this process, please visit one of these sites:    http://www.conventionofstates.com/           http://www.cosaction.com/              To Whom It May Concern, The following is neither sanctioned by nor proposed by the Article V Convention of States Project.   Rather, it is entirely my work as a volunteer for the Convention of States Project.   To give you an overview of the kinds of amendments that may or may not be consid
Paul Merrell

Gallup CEO: Number of Full-Time Jobs as Percent of Population Is Lowest It's Ever Been ... - 0 views

  •     Gallup CEO and Chairman Jim Clifton doubled-down on his comments earlier in the week on the misleading Obama unemployment rate. Obama says the unemployment rate is 5.6% which is very misleading.
  • Clifton went on America’s Newsroom today to explain the misleading government numbers. “The number of full-time jobs, and that’s what everybody wants, as a percent of the total population, is the lowest it’s ever been… The other thing that is very misleading about that number is the more people that drop out, the better the number gets. In the recession we lost 13 million jobs. Only 3 million have come back. You don’t see that in that number. “
Paul Merrell

Little consensus within administration on how to stop fall of Aleppo to Assad - The Was... - 0 views

  • There is no consensus within the administration about what the United States can or should do to try to bring a halt to the killing and stop what appears to be the increasingly inevitable fall of Aleppo, Syria’s largest city, to government forces.
  • But last Thursday, as the discussion moved up the chain to a contentious White House meeting of national security principals, top defense officials made clear that their position had not changed. They advised a possible increase in weapons aid to opposition fighters but said the United States should focus its own military firepower on the anti-Islamic State mission rather than risk a direct confrontation with Russia. Asked about the perception of a double shift, a senior defense official said the Pentagon’s position had not changed. “We still believe there are a number of ways to bolster the opposition and not compromise the anti-Islamic State mission,” this official said.
  • But others felt that they had been spun by the defense leadership. Amid increasing internal tension, one senior administration official insisted that both the Syrian opposition and U.S. allies have pressed for a continuation of negotiations and discouraged talk of military intervention. Obama’s position on the subject, this official said, has been “consistent. We do not believe there is a military solution to this conflict. There are any number of challenges that come with applying military force in this context.” In Obama’s recent speech at the United Nations, the official noted, Obama repeated that “there’s no ultimate military victory to be won” in Syria. Instead, Obama said, “we’re going to have to pursue the hard work of diplomacy that aims to stop the violence, and deliver aid to those in need, and support those who pursue a political settlement.” No proposals have been presented to Obama for a decision, and some in the administration think the White House is willing to let time run out on Aleppo, in part to preserve options for a new administration.
  • ...6 more annotations...
  • De Mistura has predicted that if Russian and Syrian air attacks and artillery bombardment do not stop, the city will fall before the end of the year; the U.S. intelligence community assesses that it could be a matter of weeks.
  • An estimated 275,000 civilians, one-third of them children, and 10,000 rebels are surrounded in the eastern side of the city, now under constant aerial attack
  • While Aleppo is the proximate prize sought by the government and its Russian backers, at least 50,000 opposition fighters — many of whom owe their training, weapons and inspiration in large part to the United States — remain in pockets spread across western Syria. Many of those forces have been advised and supplied by the CIA, whose director, John Brennan, is said to favor military action or, at the very least, dispatching more and better weapons to the opposition, particularly if Aleppo is lost. That decision, which would allow the rebels to continue to fight a guerrilla war, or to defend those pockets of the country still in opposition hands, might not be the administration’s to make. Allied governments in the region, including Qatar, Turkey and, to a lesser extent, Saudi Arabia, have long advocated for increased support for the rebels and could decide on their own to send more sophisticated armaments — some of which, including shoulder-launched antiaircraft weapons, the United States has refused to make available on the grounds that they could end up in the wrong hands.
  • As they assess Russian President Vladi­mir Putin’s goals in Syria, intelligence officials think he is less interested in an outright military victory than in being able to set the terms for a settlement that ensures Assad’s survival. But at least in the short term, they believe, the big winner may be the Front for the Conquest of Syria, the al-Qaeda affiliate formerly known as Jabhat al-Nusra. The jihadist group, which U.S. officials have said is planning “external operations” against the United States, has grown in strength and respect as a formidable, well-equipped fighting force against Assad. While senior White House aides are said to be opposed to U.S. military action, one other official who is said to have argued in favor of a military response is Samantha Power, the U.S. ambassador to the United Nations,
  • Echoing the arguments for accountability in the book, “A Problem From Hell,” Kerry last week publicly called for Russia and Syria to be investigated for war crimes for the targeted killing of civilians and wanton destruction in Aleppo and beyond. On Friday, Moscow described Kerry’s call as “propaganda” and repeated its assertion that the United States, by failing to separate rebel forces from the targetable terrorists it insists control Aleppo, is to blame for the failure of the cease-fire. According to international-law experts, however, the likelihood of a war crimes prosecution of either country is virtually nonexistent. Neither Russia nor Syria belongs to the treaty-based International Criminal Court, and a referral to its jurisdiction would require a resolution by the U.N. Security Council, a body in which Russia holds a veto. At the same time, both the ICC and the International Court of Justice, the United Nations’ judicial branch, are designed to prosecute individuals rather than states.
  • “The law of war crimes is individual and personal,” said Kenneth Anderson, a law professor at American University. “Talk of war crimes trials by itself is not serious,” Anderson said. “It’s an evasion of policy by a state that does not want to have to respond to the concerted actions of another state, another two states.”
  •  
    The WaPo statistics on the number of people surrounded in East Aleppo are way off. Most of the city is government controlled, but WaPo uses the city's entire population as the number of surrounded people. Best estimates for the number surrounded in the cauldron are in the neighborhood of 10,000 fighters and 20,000 of their camp followers. Let's hope that Obama has a sane moment and doesn't buckle to the chickenhawk pressure.
Paul Merrell

The Media Is Lying To You About Unemployment In America - 0 views

  • Did you know that the percentage of the U.S. labor force that is employed has continually been falling since 2006 according to the Bureau of Labor Statistics?  Did you know that the increase in the number of Americans "not in the labor force" during Barack Obama's first four years in the White House was more than three times greater than the increase in the number of Americans "not in the labor force" during the entire decade of the 1980s?  The mainstream media would have us believe that 157,000 jobs were added to the U.S. economy in January.  Based on that news, the Dow broke the 14,000 barrier for the first time since October 2007.  But if you actually look at the "non-seasonally adjusted" numbers, the number of Americans with a job actually decreased by 1,446,000 between December and January.
  • But nowhere in the mainstream media did you hear that the U.S. economy lost more than 1.4 million jobs between December and January.  It is amazing the things that you can find out when you actually take the time to look at the hard numbers instead of just listening to the media spin.  Back in 2007, more than 146 million Americans were employed.  Today, only 141.6 million Americans are employed even though our population has grown steadily since then.  When the government and the media tell you that we are in a "recovery" and that unemployment is lower than it was a couple of years ago, I encourage you to dig deeper.  The truth is that even the government's own numbers tell us that the percentage of the U.S. labor force that is employed continues to fall and that the U.S. economy is heading into a recession.  The Obama administration and the media have been lying to you about unemployment and about the true condition of our economy.  After you see the numbers that I have compiled in this article, I think that you will agree with me.
Gary Edwards

Arnold Ahlert: Liberty at Risk - The Patriot Post - 1 views

  •  
    "The American Left's desire to crush Liberty and dissent in order to "fundamentally transform the United States of America" has reached metastatic levels. In the last three weeks alone, the following stories have surfaced. All of which indicate we are well on our way toward relinquishing our birthright. Even worse, millions of Americans are apparently more than willing to do so. First, this week the Supreme Court heard arguments in the United States v. Texas case that will determine whether a president can unilaterally rewrite immigration law. If SCOTUS rules in Barack Obama's favor, the separation of powers outlined in the first three articles of the Constitution will be rendered moot and, as political analyst Charles Krauthammer wryly observed, "you can send Congress home." And the Left is not content to stop there. A coalition of 118 cities and counties have filed a legal brief asserting they will lose up to $800 million in economic benefits if large numbers of illegal aliens remain subject to deportation. Second, the IRS has admitted it abides the use of fraudulent Social Security numbers used by illegal aliens to process tax payments - and refunds. Third, in New York and California, Democratic attorneys general Eric Schneiderman and Kamala Harris are pursuing fraud investigations against Exxon, based on the premise they can "prosecute persons and institutions with nonconforming views on global warming," writes National Review's Kevin Williams. "Prosecuting political institutions and businesses for political activism is brown-shirt business." Fourth, the Obama administration, already under fire for its determination to flood America with Syrian "refugees," announced it will reduce its vetting process to three months, instead of 18-24 months. They claim the reduced time is necessary to handle a sped-up "surge operation" whose population is 99% Sunni Muslim. Even more insulting, Gina Kassem, the regional refugee coordinator at t
  •  
    I'll leave well enough alone on Mr. Ahert's positions regarding the U.S. v. Texas case and IRS reliance on fraudulent Social Security numbers; I have not studied those issues. But Mr. Ahert has not done his homework on the Exxon investigations and on the law governing the Syrian refugee situation. Re Exxon, the criminal investigations are to determine whether Exxon committed fraud against *investors* by concealing its knowledge of climate change the company was contributing to --- and knew of decades ago. We don't yet know the outcome of those investigations, but this is a far cry from prosecuting "persons and institutions with nonconforming views on global warming." If pursued, it will be a prosecution of a company -- and conceivably its managers -- who damned well knew through in-house scientific studies it sponsored that global warming was man-made and that their own company was a major causative agent. On the Syrian refugee situation, the right of war refugees to refuge in the U.S. and all other nations is, under the U.S. Constitution's Treaty Clause, "the law of this land." There is nothing in that body of international law created by treaty that permits the U.S. or any other nation to delay providing refuge for purposes of vetting refugees for possible terrorists among them. Vetting can, however, proceed lawfully after refugees are admitted while being held in refugee camps. One need only ask how one would feel were the tables turned and it was yourself fleeing from U.S. violence? Would you want to be forced to linger in the war zone while your anti-terrorism bona fides were established over a period of months? Refuge must be granted when it is needed, not months or years later, regardless of how much "terrorist" hysteria our mainstream media and the military-industrial complex drums up to fan the flames of war and industry profits. And this is all the more a moral case because it is the U.S. and its allies' illegal proxy war in Syria that is creating
Paul Merrell

NSA collects millions of text messages daily in 'untargeted' global sweep | World news ... - 0 views

  • The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The untargeted collection and storage of SMS messages – including their contacts – is revealed in a joint investigation between the Guardian and the UK’s Channel 4 News based on material provided by NSA whistleblower Edward Snowden. The documents also reveal the UK spy agency GCHQ has made use of the NSA database to search the metadata of “untargeted and unwarranted” communications belonging to people in the UK.
  • The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity. An agency presentation from 2011 – subtitled “SMS Text Messages: A Goldmine to Exploit” – reveals the program collected an average of 194 million text messages a day in April of that year. In addition to storing the messages themselves, a further program known as “Prefer” conducted automated analysis on the untargeted communications.
  • The Prefer program uses automated text messages such as missed call alerts or texts sent with international roaming charges to extract information, which the agency describes as “content-derived metadata”, and explains that “such gems are not in current metadata stores and would enhance current analytics”. On average, each day the NSA was able to extract:
  • ...6 more annotations...
  • • More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someone’s social network from who they contact and when) • Details of 1.6 million border crossings a day, from network roaming alerts • More than 110,000 names, from electronic business cards, which also included the ability to extract and save images.
  • • Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users The agency was also able to extract geolocation data from more than 76,000 text messages a day, including from “requests by people for route info” and “setting up meetings”. Other travel information was obtained from itinerary texts sent by travel companies, even including cancellations and delays to travel plans.
  • Communications from US phone numbers, the documents suggest, were removed (or “minimized”) from the database – but those of other countries, including the UK, were retained. The revelation the NSA is collecting and extracting personal information from hundreds of millions of global text messages a day is likely to intensify international pressure on US president Barack Obama, who on Friday is set to give his response to the report of his NSA review panel.
  • While US attention has focused on whether the NSA’s controversial phone metadata program will be discontinued, the panel also suggested US spy agencies should pay more consideration to the privacy rights of foreigners, and reconsider spying efforts against allied heads of state and diplomats. In a statement to the Guardian, a spokeswoman for the NSA said any implication that the agency’s collection was “arbitrary and unconstrained is false”. The agency’s capabilities were directed only against “valid foreign intelligence targets” and were subject to stringent legal safeguards, she said.
  • “In contrast to [most] GCHQ equivalents, DISHFIRE contains a large volume of unselected SMS traffic,” it states (emphasis original). “This makes it particularly useful for the development of new targets, since it is possible to examine the content of messages sent months or even years before the target was known to be of interest.” It later explains in plain terms how useful this capability can be. Comparing Dishfire favourably to a GCHQ counterpart which only collects against phone numbers that have specifically been targeted, it states “Dishfire collects pretty much everything it can, so you can see SMS from a selector which is not targeted”.
  • The document also states the database allows for broad, bulk searches of keywords which could result in a high number of hits, rather than just narrow searches against particular phone numbers: “It is also possible to search against the content in bulk (e.g. for a name or home telephone number) if the target’s mobile phone number is not known.” Analysts are warned to be careful when searching content for terms relating to UK citizens or people currently residing in the UK, as these searches could be successful but would not be legal without a warrant or similar targeting authority. However, a note from GCHQ’s operational legalities team, dated May 2008, states agents can search Dishfire for “events” data relating to UK numbers – who is contacting who, and when.
Paul Merrell

Dropbox - Goverment Data Requests Principles - 0 views

  • Dropbox's Government Data Requests PrinciplesWe understand that when you entrust us with your digital life, you expect us to keep your stuff safe. Like most online services, we sometimes receive requests from governments seeking information about our users. These principles describe how we deal with the requests we receive and how we’ll work to try to change the laws to make them more protective of your privacy.Be transparent:  Online services should be allowed to report the exact number of government data requests received, the number of accounts affected by those requests, and the laws used to justify the requests. We’ll continue to advocate for the right to provide this important information. Learn more.Our Transparency Report discloses the number of law enforcement requests we receive and the number of accounts affected. Currently, our report doesn’t include specific details about the number of national security requests we receive from the US government, if any. We’ve urged the courts and the government to allow services like Dropbox to disclose the precise number of national security requests they receive and the number of accounts affected. We’ll continue this fight. In the meantime, we’re providing as much information about national security requests received and accounts affected as allowed.Fight blanket requests:  Government data requests should be limited to specific people and investigations. We’ll resist requests directed to large groups of people or that seek information unrelated to a specific investigation. Learn more.
  • Protect all users:  Laws authorizing governments to request user data from online services shouldn’t treat people differently based on their citizenship or where they live. We’ll work hard to reform these laws. Learn more.Certain laws give people different protections based on where they live or their citizenship. These laws don’t reflect the global nature of online services. We’re committed to extending fundamental privacy protections to all users: government data requests shouldn’t be in bulk, they should relate to specific individuals and investigations, and a neutral third party should evaluate and sign off on requests for content before they issue.Provide trusted services:  Governments should never install backdoors into online services or compromise infrastructure to obtain user data. We’ll continue to work to protect our systems and to change laws to make it clear that this type of activity is illegal. Learn more.
  •  
    Remember the first PRISM documents? They said that Dropbox was next in line to be added to NSA's data collection. Evidently Dropbox execs have been feeling some customer heat from that. Notice of this new policy was sent to all Dropbox users tonight.
1 - 20 of 1011 Next › Last »
Showing 20 items per page