Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged citizens

Rss Feed Group items tagged

Gary Edwards

Obama's Occidental College transcripts provides concrete evidence to annul his presiden... - 1 views

  • f Obama didn’t legally have his name changed from Barry to Barack then the birth certificate he passed to Congress is a fake, a forgery.
  • If his name was registered as Barry Soetoro even though Obama claims his real name is Barack Obama then Obama defrauded the state of California in order to receive college funding. 
  • Obama knowingly presented a false document to the state wherein he claimed to be a foreign student in order to illegally acquire financial aid.
  •  
    Interesting update on Obama.  His Occidental College Registration records are on file with the State of California.  They reveal that he is indeed ineligible to President of the US. The registration form shows that he is an Indonesian national (citizen), and his religion is Islam.   There is no record of a Barack Obama or Barry Soetoro having applied for US Citizenship, or even attempting to renew/re file his citizenship claim of having been born in Hawaii.  Either way though, Obama fails the Constitutional "natural born Citizen" test, as his father was a British colonial citizen of Kenya.  The term "natural born Citizen" requires that both parent be US Citizens. The Occidental College Registration also shows that Obama, aka Barry Soetoro, applied for financial aid and was awarded a fellowship for foreign students from Fulbright Foundation Scholarship program. "Occidental Registration transcript states ~ Name: Barry Soetoro - Religion: Islam - Nationality: Indonesian The smoking gun evidence that annuls Obama's presidency is Obama's college transcripts regarding his application for and receiving of foreign student aid.  Obama's college transcripts from Occidental College indicates that Obama, under the name Barry Soetoro, received financial aid as a foreign student from Indonesia as an undergraduate at the school. The transcript from Occidental College shows that Obama (Barry Soetoro) applied for financial aid and was awarded a fellowship (scholarship) for foreign students from the Fulbright Foundation Scholarship program - an international educational exchange program sponsored by the U.S. government.  Grants are available for U.S. citizens to go abroad and for non-U.S. citizens with no U.S. permanent residence to come to the U.S.  To qualify, for the non-US citizen scholarship to study in the U.S., a student applicant must claim and provide proof of foreign citizenship. This document would seem to provide the smoking gun that many of Obama
Gary Edwards

About Americans for Prosperity | Americans for Prosperity - 0 views

  •  
    AFP is an excellent branch of the American Tea Party Movement.  The Grassroots tools are very good, and the group leadership effective, trustworthy and patriotic.  "The Great One", Mark Levin is a founder of AFP and remains very involved with the day to day operation.  Although i'm a contributing member, one of the things i most appreciate about AFP is that when they launch a contact/letter surge, unlike many other "grassroots" operations, there is no charge for the contact.  AFP is an easy and affordable way to contact those who took an oath to represent us and defend our Constitution.  Good group! excerpt: Americans for Prosperity™ (AFP) and Americans for Prosperity Foundation (AFP Foundation) are committed to educating citizens about economic policy and mobilizing those citizens as advocates in the public policy process. AFP is an organization of grassroots leaders who engage citizens in the name of limited government and free markets on the local, state, and federal levels. The grassroots activists of AFP advocate for public policies that champion the principles of entrepreneurship and fiscal and regulatory restraint. AFP Foundation is committed to educating citizens about economic policy and a return of the federal government to its Constitutional limits. AFP Foundation's educational programs and analyses help policymakers, the media, and individual citizens understand why policies that promote the American enterprise system are the best way to ensure prosperity for all Americans. To that end, AFP and AFP Foundation support: Cutting taxes and government spending in order to halt the encroachment of government in the economic lives of citizens by fighting proposed tax increases and pointing out evidence of waste, fraud, and abuse. Tax and Expenditure Limitations to promote fiscal responsibility. Removing unnecessary barriers to entrepreneurship and opportunity by sparking citizen involvement in the regulatory process early on in order to reduce red tap
Gary Edwards

Articles of Impeachment Against Obama - 0 views

  •  
    Sarasota, FL ( August 12, 2013) - The National Black Republican Association (NBRA) based in Sarasota, FL, headed by Chairman Frances Rice, filed Articles of Impeachment against President Barack Obama with the following language.   We, black American citizens, in order to free ourselves and our fellow citizens from governmental tyranny, do herewith submit these Articles of Impeachment to Congress for the removal of President Barack H. Obama, aka, Barry Soetoro, from office for his attack on liberty and commission of egregious acts of despotism that constitute high crimes and misdemeanors.   On July 4, 1776, the founders of our nation declared their independence from governmental tyranny and reaffirmed their faith in independence with the ratification of the Bill of Rights in 1791.   Asserting their right to break free from the tyranny of a nation that denied them the civil liberties that are our birthright, the founders declared:   "When a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security."  -  Declaration of Independence, July 4, 1776.   THE IMPEACHMENT POWER   Article II, Section IV of the United States Constitution provides: "The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors."   THE ARTICLES OF IMPEACHMENT   In his conduct of the office of President of the United States, Barack H. Obama, aka Barry Soetoro, personally and through his subordinates and agents, in violation or disregard of the constitutional rights of citizens and in violation of his constitutional duty to take care that the laws be faithfully executed, has prevented, obstructed, and impeded the administration of justice, in that:   ARTICL
Paul Merrell

Fresno Police Roll Out Dystopian 'Threat Ranking' System - 0 views

  • “On 57 monitors that cover the walls of the center, operators zoomed and panned an array of roughly 200 police cameras perched across the city. They could dial up 800 more feeds from the city’s schools and traffic cameras, and they soon hope to add 400 more streams from cameras worn on officers’ bodies and from thousands from local businesses that have surveillance systems.” Though the intricate surveillance apparatus described above seems straight from a dystopic novel, it is actually the Washington Post’s recent description of the the visual data collection system employed by a local California police department. The police department in Fresno, California, has taken extreme measures to combat high rates of crime in the city. As the Post reports, Fresno’s Real Time Crime Center, buried deep in the police station’s headquarters, has developed as a response to what many police call increasing threats. The system, according to police officials, can “provide critical information that can help uncover terrorists or thwart mass shootings, ensure the safety of officers and the public, find suspects, and crack open cases” — a feature they say is increasingly important in the wake of events like the November terror attack in Paris and the San Bernardino shooting last month.
  • “Our officers are expected to know the unknown and see the unseen,” Fresno Chief of Police Jerry Dyer said. “They are making split-second decisions based on limited facts. The more you can provide in terms of intelligence and video, the more safely you can respond to calls.” Programs similar to the Real Time Crime Center have launched in New York, Houston, and Seattle over the course of the last decade. Nationwide, the use of Stingrays, data fusion centers, and aerial drone surveillance have broadened the access local police have to private information. In another example, the FBI is continually developing a comprehensive biometric database that local police access every day. “This is something that’s been building since September 11,” says Jennifer Lynch, a senior attorney at the Electronic Frontier Foundation. Like the problem of police militarization, Lynch traces the trend back to the Pentagon: “First funding went to the military to develop this technology, and now it has come back to domestic law enforcement. It’s the perfect storm of cheaper and easier-to-use technologies and money from state and federal governments to purchase it.”
  • While many of these programs may fail to shock Americans, one new software program takes police scrutiny of private citizens to a new level. Beware, a software tool produced by tech firm Intrado, not only surveils the data of the citizens of Fresno, the first city to test it — it calculates threat levels based on what it discovers. The software scours arrest records, property records, Deep Web searches, commercial databases, and social media postings. By this method, it was able to designate a man with a firearm and gang convictions involved in a real-time domestic violence dispute as the highest of three threat levels: a bright red ranking. Fresno police say the intelligence from Beware aided them, as the man eventually surrendered and officers found he was armed with a gun. Beware scours billions of data points to develop rankings for citizens, and though few recoil at the thought of catching criminals and miscreants, the program provides particular cause for concern because of both its invasiveness and its fallibility.
  • ...3 more annotations...
  • These shortcomings have sparked concern among Fresno’s city council members, who discussed the issue at a meeting in November. At that meeting, one council member cited an incident where a girl who posted on social media about a card game called “Rage” was consequently given an elevated threat ranking — all because “rage” could be a triggering keyword for Beware. At that same meeting, libertarian-leaning Republican councilman Clinton J. Olivier asked Chief Dyer to use the technology to calculate his threat level. In real-time, Olivier was given a green, or non-threatening ranking, but his home received a yellow, or medium, threat ranking. It was likely due to the record of his home’s prior occupant. “Even though it’s not me that’s the yellow guy, your officers are going to treat whoever comes out of that house in his boxer shorts as the yellow guy,” Olivier told Dyer. “That may not be fair to me.” He added later, “[Beware] has failed right here with a council member as the example.” “It’s a very unrefined, gross technique,” Fresno civil rights attorney, Rob Nabarro, has said of Beware’s color-coded levels. “A police call is something that can be very dangerous for a citizen,” he noted, echoing Olivier’s worries.
  • Further, though Fresno police use Beware, they are left in the dark about how it determines rankings. Intrado designates the method a “trade secret,” and as such, will not share it with the officers who use it. This element of the software’s implementation has concerned civil rights advocates like Nabarro. He believes the secrecy surrounding the technology may result in unfair, unchecked threat rankings. Nabarro cautioned that between the software’s secrecy and room for error, Beware could accidentally rank a citizen as dangerous based on, for example, posts on social media criticizing police. This potential carries with it the ability for citizens to be punished not for actual crimes, but for exercising basic constitutional rights. Further, it compromises the rights of individuals who have been previously convicted of crimes, potentially using past behavior to assume guilt in unrelated future incidents. Chief Dyer insists concerns are exaggerated and that a particular score does not guarantee a particular police response. Police maintain the tools are necessary to fight crime. Nevertheless, following the heated November meeting, Dyer suggested he would work to turn off the color-coded threat ranking due to citizens’ concerns. “It’s a balancing act,” he admitted.
  • It remains to be seen if Fresno police and residents will move forward with the technology or shut it down over privacy concerns. City officials in Oakland, California, for example, recently scaled back plans to establish a Real Time Crime Center after outraged citizens protested. At the very least, as Northern California ACLU attorney Matt Cagle said, “[W]henever these surveillance technologies are on the table, there needs to be a meaningful debate. There needs to be safeguards and oversight.”
  •  
    Claiming trade secrecy for the software's selection criteria for threat ranking actually constitutes policy policy, the trade secrecy claim would probably not survive judical review. It's at least arguably an unconstitutional delegation of a government function (ranking citizens as threats) to a private company. Police departments in Florida were sued to produce records of how a related surveillance device, the Stingray IMSI device that intercepts cell phone calls by mimicking a cell-phone tower, and only averted court-ordered disclosure of its trade secret workings by the FBI swooping in just before decision to remove all the software documentation from local police possession, custody, and control.    There is a long chain of case law holding that information that is legitimately trade secret and proprietary loses that protection if adopted by local or federal government as law. With a software program that classifies citizens as threats for governmental purposes if they meet the program's selection criteria, the software is performing a strictly governmental function that is in reality law. 
Gary Edwards

Columbine Survivor Pens Bold Open Letter to Obama Rejecting Gun Control: 'Whose Side Ar... - 0 views

  •  
    Amazing letter from Columbine survivor, Evan Todd, to Obama, explaining why Obama's gun control proposals are non sense. Evan Todd's open letter to Obama, below. - Mr. President, As a student who was shot and wounded during the Columbine massacre, I have a few thoughts on the current gun debate. In regards to your gun control initiatives: Universal Background Checks First, a universal background check will have many devastating effects. It will arguably have the opposite impact of what you propose. If adopted, criminals will know that they can not pass a background check legally, so they will resort to other avenues. With the conditions being set by this initiative, it will create a large black market for weapons and will support more criminal activity and funnel additional money into the hands of thugs, criminals, and people who will do harm to American citizens. Second, universal background checks will create a huge bureaucracy that will cost an enormous amount of tax payers dollars and will straddle us with more debt. We cannot afford it now, let alone create another function of government that will have a huge monthly bill attached to it. Third, is a universal background check system possible without universal gun registration? If so, please define it for us. Universal registration can easily be used for universal confiscation. I am not at all implying that you, sir, would try such a measure, but we do need to think about our actions through the lens of time. It is not impossible to think that a tyrant, to the likes of Mao, Castro, Che, Hitler, Stalin, Mussolini, and others, could possibly rise to power in America. It could be five, ten, twenty, or one hundred years from now - but future generations have the natural right to protect themselves from tyrannical government just as much as we currently do. It is safe to assume that this liberty that our forefathers secured has been a thorn in the side of would-be tyrants ever since the Second Amendmen
Gary Edwards

The Public-Private Surveillance Partnership - Bloomberg - 1 views

  •  
    Incredible must read article by Bruce Schneier, author of "Liars and Outliers: Enabling the Trust Society Needs to Thrive." Bruce makes the argument that the Government and big Corporations are locked in a parasitical symbiotic relationship, with the citizen being the host they feed on.   He argues that modern citizens need Internet communications and data services.  The corporate service providers need to "collect" massive amounts of citizen data to further their profit models. So the corporations need continuing government consent to use the personal citizen information.  The government seeks to control citizens, and needs access to the personal information the corporations are collecting.  The mutually beneficial symbiosis is formed.  One that will prove very difficult for citizens to turn back. Great piece of thinking!!!  Must read.
Paul Merrell

Public Citizen Press Room - 0 views

  • Public Citizen Defends Merchant From Unconstitutional Interference by NSA, Department of Homeland Security In Lawsuit Filed Against Agencies, Public Citizen Argues That Attempts to Stop Production of Parody Merchandise Are Inconsistent With First Amendment BALTIMORE, Md. – A Minnesota activist who uses images and names of government agencies on satirical merchandise is entitled to do so under the First Amendment, Public Citizen argued in a lawsuit filed today against the National Security Agency (NSA) and the Department of Homeland Security (DHS) on behalf of the merchant. The suit, filed in the U.S. District Court for the District of Maryland, targets cease-and-desist letters sent to the merchant’s producer by the NSA and DHS. On his website LibertyManiacs.com, Sauk Rapids, Minn., resident Dan McCall sells T-shirts, hats, bumper stickers and other items with his designs, printed by Zazzle.com – for example, a mug with the NSA seal above the words “Spying On You Since 1952” and a parodied NSA seal that says “Peeping While You’re Sleeping” above the words “The NSA: The only part of government that actually listens.”
  • On March 15, 2011, Zazzle received a warning letter from the NSA, and on Aug 11, 2011, it received one from DHS. The NSA said that Zazzle, by selling the merchandise, was in violation of a provision of the National Security Agency Act of 1959 that prohibits the “use [of] the words ‘National Security Agency,’ the initials, ‘NSA,’ the seal of the National Security Agency, or any colorable imitation of such words … in connection with any merchandise, impersonation, solicitation, or commercial activity in a manner reasonably calculated to convey the impression that such use is approved, endorsed, or authorized by the National Security Agency” without the permission of the NSA. DHS said that Zazzle, by selling McCall’s DHS parody items, was in violation of a law making it a crime to “mutilate or alter the seal of any department or agency of the United States,” among other provisions. In the lawsuit filed in defense of McCall, Public Citizen points out that the graphics did not create any likelihood of confusion about source or sponsorship, and no reasonable person would believe that the agencies themselves produced merchandise with those messages. The complaint also asserts that the First Amendment protects McCall and Zazzle’s right to use the seals to accurately identify the agencies he is criticizing. “The agencies’ attempts to forbid McCall from displaying and selling his merchandise are inconsistent with the First Amendment,” said Paul Alan Levy, the Public Citizen attorney handling the case. “It’s bad enough that these agencies have us under constant surveillance; forbidding citizens from criticizing them is beyond the pale.”
  • Public Citizen is asking the court to declare that several provisions of the National Security Agency Act cannot be enforced to forbid McCall from displaying his merchandise, and that two other laws are unconstitutionally overbroad because they violate the First Amendment by saying no one can “mutilate or alter the seal of any department or agency of the United States.” McCall is now selling his merchandise at CafePress.com. See the full complaint for declaratory relief here.
Gary Edwards

Senate Democrats Pushed for IRS Tea Party Snooping Before Criticizing It - Brian Walsh ... - 0 views

  •  
    Democrats caught red handed pushing the IRS to audit, harass and delay efforts to establish Constitutional Patriot and Jewish Homeland non profit groups.   The Democrats political efforts behind the IRS's blatant violation of these American citizens 4th Amendment Right to organize and assemble dates back to the 2009 Supreme Court decision known as "Citizens United". In "Citizens Untied", the court ruled that corporations are people, and thus are entitled to 1st Amendment Rights.  Including full participation and monetary contributions in political campaigns. this ruling was further confirmed when the Supreme Court overturned a century old Montana Law prohibiting corporate spending in that State's elections.   The "Citizens United" ruling so upset Obama and the Socialist Party that he publicly scolded the Supreme Court justices during a State of the Union address.  The Progressives rightfully feared that corporations would ppour "unregulated independent expenditures" into newly formed Tea Party Patriot based non profits.  Unable to overturn Citizens United, the Dems called on the IRS and a host of other government bureaucracies to block, harass and slow down the funding of their political opposition. this article exposes the same Dem clowns who are now crying foul as the same tyrants who kicked off the IRS led effort to slow down the Tea Party Patriot opposition movement.   How the Jewish Homeland groups got into the IRS gun sights is still a mystery, but one thing is known:  With the election of Obama in 2008, the IRS moved from targeting non profit Muslim Groups as possible terrorist funding organizations, to targeting Tea Party Patriot movements.  Maybe that's also when they took on Jewish Homeland groups?  excerpt: "With Washington gripped by a trio of exploding scandals this week - from Benghazi to government spying on news outlets to thug tactics by the Internal Revenue Service - Senate Democrats seem to be hoping that if they just yell lou
Gary Edwards

Chilling legal memo from Obama DOJ justifies assassination of US citizens - Tea Party - 0 views

  • Chilling legal memo from Obama DOJ justifies assassination of US citizens
  • The president’s partisan lawyers purport to vest him with the most extreme power a political leader can seize (The Guardian) – The most extremist power any political leader can assert is the power to target his own citizens for execution without any charges or due process, far from any battlefield. The Obama administration has not only asserted exactly that power in theory, but has exercised it in practice. In September 2011, it killed US citizen Anwar Awlaki in a drone strike inYemen, along with US citizen Samir Khan, and then, in circumstances that are still unexplained, two weeks later killed Awlaki’s 16-year-old American son Abdulrahman with a separate drone strike in Yemen.
  • a Washington Post article from October reported that the administration is formally institutionalizing this president’s power to decide who dies under the Orwellian title “disposition matrix”.
  • ...15 more annotations...
  • What has made these actions all the more radical is the absolute secrecy with which Obama has draped all of this. Not only is the entire process carried out solely within the Executive branch - with no checks or oversight of any kind – but there is zero transparency and zero accountability. The president’s underlings compile their proposed lists of who should be executed, and the president – at a charming weekly event dubbed by White House aides as “Terror Tuesday” – then chooses from “baseball cards” and decrees in total secrecy who should die. The power of accuser, prosecutor, judge, jury, and executioner are all consolidated in this one man, and those powers are exercised in the dark.
  • The Most Transparent Administration Ever™ has been so fixated on secrecy that they have refused even to disclose the legal memoranda prepared by Obama lawyers setting forth their legal rationale for why the president has this power.
  • During the Bush years, when Bush refused to disclose the memoranda from his Office of Legal Counsel (OLC) that legally authorized torture, rendition, warrantless eavesdropping and the like, leading Democratic lawyers such as Dawn Johnsen (Obama’s first choice to lead the OLC) vehemently denounced this practice as a grave threat, warning that “the Bush Administration’s excessive reliance on ‘secret law’ threatens the effective functioning of American democracy” and “the withholding from Congress and the public of legal interpretations by the [OLC] upsets the system of checks and balances between the executive and legislative branches of government.”
  • But when it comes to Obama’s assassination power, this is exactly what his administration has done. It has repeatedly refused to disclose the principal legal memoranda prepared by Obama OLC lawyers that justified his kill list. It is, right now, vigorously resisting lawsuits from the New York Times and the ACLU to obtain that OLC memorandum. In sum, Obama not only claims he has the power to order US citizens killed with no transparency, but that even the documents explaining the legal rationale for this power are to be concealed. He’s maintaining secret law on the most extremist power he can assert.
  • Last night, NBC News’ Michael Isikoff released a 16-page “white paper”prepared by the Obama DOJ that purports to justify Obama’s power to target even Americans for assassination without due process (the memo is embedded in full below). This is not the primary OLC memo justifying Obama’s kill list – that is still concealed – but it appears to track the reasoning of that memo as anonymously described to the New York Times in October 2011.
  • there are numerous points that should be emphasized about the fundamentally misleading nature of this new memo:
  • 2. Creating a ceiling, not a floor
  • 1. Equating government accusations with guilt
  • 3. Relies on the core Bush/Cheney theory of a global battlefield
  • 4. Expanding the concept of “imminence” beyond recognition
  • The memo is authorizing assassinations against citizens in circumstances far beyond this understanding of “imminence”. Indeed, the memo expressly states that it is inventing “a broader concept of imminence” than is typically used in domestic law. Specifically, the president’s assassination power “does not require that the US have clear evidence that a specific attack . . . will take place in the immediate future”. The US routinely assassinates its targets not when they are engaged in or plotting attacks but when they are at home, with family members, riding in a car, at work, at funerals, rescuing other drone victims, etc.
  • “This is a chilling document” because “it argues that the government has the right to carry out the extrajudicial killing of an American citizen” and the purported limits “are elastic and vaguely defined, and it’s easy to see how they could be manipulated.”
  • 6. Making a mockery of “due process”
  • Stephen Colbert perfectly mocked this theory when Eric Holder first unveiled it to defend the president’s assassination program. At the time, Holder actually said: “due process and judicial process are not one and the same.” Colbert interpreted that claim as follows: “Trial by jury, trial by fire, rock, paper scissors, who cares?Due process just means that there is a process that you do. The current process is apparently, first the president meets with his advisers and decides who he can kill. Then he kills them.”
  • here we are almost a full decade later. And we have the current president asserting the power not merely to imprison or eavesdrop on US citizens without charges or trial, but to order them executed – and to do so in total secrecy, with no checks or oversight.
Gary Edwards

Coup d'etat -- Paul Craig Roberts - PaulCraigRoberts.org - 1 views

  •  
    Wow! excerpt: "The American people have suffered a coup d'etat, but they are hesitant to acknowledge it. The regime ruling in Washington today lacks constitutional and legal legitimacy. Americans are ruled by usurpers who claim that the executive branch is above the law and that the US Constitution is a mere "scrap of paper." An unconstitutional government is an illegitimate government. The oath of allegiance requires defense of the Constitution "against all enemies, foreign and domestic." As the Founding Fathers made clear, the main enemy of the Constitution is the government itself. Power does not like to be bound and tied down and constantly works to free itself from constraints. The basis of the regime in Washington is nothing but usurped power. The Obama Regime, like the Bush/Cheney Regime, has no legitimacy. Americans are oppressed by an illegitimate government ruling, not by law and the Constitution, but by lies and naked force. Those in government see the US Constitution as a "chain that binds our hands." The South African apartheid regime was more legitimate than the regime in Washington. The apartheid Israeli regime in Palestine is more legitimate. The Taliban are more legitimate. Muammar Gaddafi and Saddam Hussein were more legitimate. The only constitutional protection that the Bush/Obama regime has left standing is the Second Amendment, a meaningless amendment considering the disparity in arms between Washington and what is permitted to the citizenry. No citizen standing with a rifle can protect himself and his family from one of the Department of Homeland Security's 2,700 tanks, or from a drone, or from a heavily armed SWAT force in body armor. Like serfs in the dark ages, American citizens can be picked up on the authority of some unknown person in the executive branch and thrown in a dungeon, subject to torture, without any evidence ever being presented to a court or any information to the person's relatives of his/her wherea
Paul Merrell

Show Us the Drone Memos - NYTimes.com - 0 views

  • I BELIEVE that killing an American citizen without a trial is an extraordinary concept and deserves serious debate. I can’t imagine appointing someone to the federal bench, one level below the Supreme Court, without fully understanding that person’s views concerning the extrajudicial killing of American citizens.But President Obama is seeking to do just that. He has nominated David J. Barron, a Harvard law professor and a former acting assistant attorney general, to a seat on the United States Court of Appeals for the First Circuit.
  • I believe that all senators should have access to all of these opinions. Furthermore, the American people deserve to see redacted versions of these memos so that they can understand the Obama administration’s legal justification for this extraordinary exercise of executive power. The White House may invoke national security against disclosure, but legal arguments that affect the rights of every American should not have the privilege of secrecy.I agree with the A.C.L.U. that “no senator can meaningfully carry out his or her constitutional obligation to provide ‘advice and consent’ on this nomination to a lifetime position as a federal appellate judge without being able to read Mr. Barron’s most important and consequential legal writing.” The A.C.L.U. cites the fact that in modern history, a presidential order to kill an American citizen away from a battlefield is unprecedented.The Bill of Rights is clear. The Fifth Amendment provides that no one can be “deprived of life, liberty, or property, without due process of law.” The Sixth Amendment provides that “the accused shall enjoy the right to a speedy and public trial, by an impartial jury,” as well as the right to be informed of all charges and have access to legal counsel. These are fundamental rights that cannot be waived with a presidential pen.
  • In battle, combatants engaged in war against America get no due process and may lawfully be killed. But citizens not in a battlefield, however despicable, are guaranteed a trial by our Constitution.
  • ...3 more annotations...
  • While he was an official in the Justice Department’s Office of Legal Counsel, Mr. Barron wrote at least two legal memos justifying the execution without a trial of an American citizen abroad. Now Mr. Obama is refusing to share that legal argument with the American people. On April 30, I wrote to the Senate majority leader, Harry Reid, urging him to delay this nomination, pending a court-ordered disclosure of the first memo I knew about. Since that letter, I have learned more. The American Civil Liberties Union sent a letter to all senators on May 6, noting that in the view of the Senate Intelligence Committee chairwoman, Dianne Feinstein, “there are at least eleven OLC opinions on the targeted killing or drone program.” It has not been established whether Mr. Barron wrote all those memos, but we do know that his controversial classified opinions provided the president with a legal argument and justification to target an American citizen for execution without a trial by jury or due process.
  • No one argues that Americans who commit treason shouldn’t be punished. The maximum penalty for treason is death. But the Constitution specifies the process necessary to convict.Continue reading the main story Continue reading the main story AdvertisementAnwar al-Awlaki was an American citizen who was subject to a kill order from Mr. Obama, and was killed in 2011 in Yemen by a missile fired from a drone. I don’t doubt that Mr. Awlaki committed treason and deserved the most severe punishment. Under our Constitution, he should have been tried — in absentia, if necessary — and allowed a legal defense. If he had been convicted and sentenced to death, then the execution of that sentence, whether by drone or by injection, would not have been an issue. Continue reading the main story 526 Comments But this new legal standard does not apply merely to a despicable human being who wanted to harm the United States. The Obama administration has established a legal justification that applies to every American citizen, whether in Yemen, Germany or Canada.
  • Defending the rights of all American citizens to a trial by jury is a core value of our Constitution. Those who would make exceptions for killing accused American citizens without trial should give thought to the times in our history when either prejudice or fear allowed us to forget due process. During World War I, our nation convicted and imprisoned Americans who voiced opposition to the war. During World War II, the government interned Japanese-Americans.The rule of law exists to protect those who are minorities by virtue of their skin color or their beliefs. That is why I am fighting this nomination. And I will do so until Mr. Barron frankly discusses his opinions on executing Americans without trial, and until the American people are able to participate in one of the most consequential debates in our history. Rand Paul is a Republican senator from Kentucky.
Paul Merrell

Turkish court issues "historic" arrest warrants for Israeli army commanders | The Elect... - 0 views

  • A court in Istanbul has issued arrest warrants against four Israeli military officials for their role in authorizing and carrying out the attacks on the Mavi Marmara, the Turkish humanitarian aid boat bound for Gaza on 31 May 2010. Israeli forces attacked and raided the boat, which was part of a flotilla in international waters and was attempting to break the siege on Gaza. Israeli commandos killed nine civilians and wounded dozens of others. Speaking to The Electronic Intifada, Rabia Yurt, a Turkish attorney for the families of the victims, says the ruling is unprecedented. Yurt says it is “the first [time] in history” that arrest warrants have been issued against Israeli officials, who have never been held responsible in an international court for the army’s “uncountable crimes.”
  • The judges presiding at the Istanbul Çağlayan Courthouse on 26 May ordered arrest warrants against former Israeli army Chief General Gabi Ashkenazi, Naval Forces commander Vice Admiral Eliezer Marom, Israeli military intelligence chief Major General Amos Yadlin and Air Forces Intelligence head Brigadier General Avishai Levi. It is now up to Interpol, the international police agency, to follow the Turkish court’s directives and arrest the four commanders, who were tried in absentia. This was the sixth trial so far in the case against the Israeli leaders for their role in the deadly attacks on the flotilla.
  • After the deadly raid on the Mavi Marmara, Israeli forces kidnapped the crew and hundreds of the flotilla’s passengers, bringing the boats and all aboard to an Israeli port, where the human rights activists were arrested, detained and deported. One of the civilians killed was Furkan Doğan, a 19-year-old dual citizen of Turkey and the US. The Center for Constitutional Rights stated that “Israeli commandos shot Furkan five times, including one shot to the head at point-blank range. At the time of the attack, it is believed Furkan was filming with a small video camera on the top deck of the Mavi Marmara.” A tenth activist, 51-year-old Turkish citizen Uğur Süleyman Söylemez, died on 23 May — days before the court’s decision, and nearly four years after Israeli forces shot him in the head. Söylemez was in a coma ever since his injury.
  • ...3 more annotations...
  • “The court argued that an arrest warrant had become necessary for the legal procedure as the defendants had neither attended the trial nor responded to an invitation sent to them through the related department of the Turkish justice ministry,” reported Turkish daily Hurriyet on 30 May. The Turkish humanitarian group IHH (Humanitarian Relief Foundation), which sponsored and helped organize the aid flotilla in 2010 and has been helping to represent the families of those killed, stated in a press release last week that the ruling was a “positive outcome” for the relatives and loved ones of the ten Turkish citizens who were killed by Israeli attacks. Last year, as The Electronic Intifada reported, the prosecutor of Spain’s national court formally requested a judge to begin steps to refer a case against Israeli leaders for the attack to the International Criminal Court (ICC). Three Spanish citizens, Manuel Tapial, Laura Arau and David Segarra, were aboard the Mavi Marmara when it was attacked and commandeered. Tapial, Arau and Segarra filed the case against Israeli Prime Minister Benjamin Netanyahu, six ministers and Vice Admiral Eliezer Marom of the Israeli navy who led the attack.
  • However, we are optimistic, because Turkey is a democratic country. It is part of and is a signatory to the European extradition convention and signed to Interpol, and therefore all other countries who are also signatories to these conventions and institution have an obligation to indeed arrest these Israeli officials for whom the arrest warrants were issued. So we have to trust [this] and we have to keep our faith in this. And we also know that — remember that this trial started way back in 2012 — the Israeli soldiers wouldn’t travel around too much, especially not go to Turkey. We know that Israeli soldiers were complaining about this. For instance, there was a case of an Israeli soldier who filed a claim against the State of Israel because he wanted to study in the United States, but because he took part in this operation he could not set foot out of Israel. So because we know this, we are quite optimistic about the arrest warrants, that they will be in fact implemented by other countries.
  • NBF: Finally, what’s next in this case on behalf of now ten victims of Israel’s raid, how are you pushing forward in this case? RY: In December, there is going to be another hearing, and we’re just going to make sure that the entire world will know about this arrest warrant, that we will follow whether any of these four defendants steps foot outside of Israel. We have lawyers in different countries also working together, and in South Africa, in the UK, many, many countries more — they will also closely follow whether these four defendants will travel in these countries. And then if this is the case, we will immediately take action and make sure that if the country in which one of the four defendants steps foot refuses, or neglects to fulfill its obligation to arrest [the defendant], then we will make sure that that country will not get away with it. And we will push for it, and publicize this as much as we can.
  •  
    A historic day indeed. Turkey is a member of both NATO and INTERPOL. Four high-ranking Israeli military officers will be on the INTERPOL arrest list soon, with a network of human rights lawyers around the world on the watch and ready to enforce INTERPOL arrest obligations. In other words, these officers' travel outside Israel will be very unlikely to include INTERPOL treaty nations and European extradition convention nations as either destinations or waypoints. The deterrent effect on Israeli government officials is considerable, particularly with another criminal prosecution pending in Spain. Fittingly, the Turkish court has aimed its message at high military officials who directed the assassinations rather than at the low-ranking soldiers who committed them. Message to high Israeli officials: be nice to Turkish citizens if you want to ever travel outside Israel.  One can only wish that the same message had been delivered about American citizens. The victim shot five times including a point blank shot to the head was an American citizen. Many of the kidnaped human rights people on the Navi Marmara and accompanying boats were Americans. One of the boats was American-flagged. Under international law, these actions were casus belli, a sufficient cause for military retaliation against the government of Israel. But the cowardly Obama and Secretary of State Hillary Clinton did not so much as lodge a diplomatic protest, so fearful they are of the powerful Israel Lobby. 
Gary Edwards

Possible Constitutional Amendments in the event of an Article V Convention of States - ... - 0 views

  • NUMBER ONE: "Section One:   The Constitution of the United States shall be read and interpreted literally.   No words or phrases shall be changed or substituted and no part of the Constitution shall be used to expand or increase Federal Power or Authority beyond that EXPRESSLY granted and enumerated in the Constitution.   The language of the Constitution shall be interpreted according to the definition of words at the time of their inclusion in the Constitution. Section Two:    Congress shall have, by two thirds vote of both the House of Representatives and the Senate, the power to override individual rulings of the Supreme Court of the United States and/or subordinate Federal Courts.   The President shall not have veto authority over Congressional overrides of Federal Court decisions."
  • NUMBER TWO: "Section One:    No person shall be elected to Congress more than once unless serving in Congress at the time of the ratification of this amendment, in which case members of Congress shall be eligible for re-election to their respective seats one time. Section Two:     In the event the Seventeenth Amendment to the Constitution of the United States is repealed members of the Senate of the United States shall serve at the pleasure and discretion of the Legislature of their respective State. Section Three:  Neither Congress, the President, nor any Federal Court shall make any law, rule, regulation, or order that does not apply equally to themselves and all citizens of the United States.   Nor shall Congress, the President, or any Federal Court cause or allow any law, rule, regulation, or order to be made by any agent or agency of the Federal Government that does not apply equally to themselves and all citizens of the United States.
  • Section Four:    Neither Congress nor the President shall receive any publically-funded retirement or benefit beyond appropriate pay not available to all citizens of the United States. Section Five:    Section Four shall not apply to members of Congress or Presidents, serving or retired, at the time of the ratification of this amendment. Section Six:      The President shall be subject to popular recall by his/her constituency.   Within 90 days of the ratification of this amendment Congress shall pass legislation governing the recall of the President.   In the event Congress fails to pass the required legislation within the required 90 days, the President shall be considered to have been recalled and a new election held within 60 days. Section Seven: Members of Congress shall be subject to popular recall by their respective constituencies, unless the Seventeenth Amendment to the Constitution of the United States is repealed, in which case only members of the House of Representatives shall be subject to popular recall.   Within 90 days of the ratification of this amendment each State shall pass legislation governing the recall of its Congressional Delegation.   In the event a State fails to pass the required legislation within the required 90 days, that State's Congressional Delegation shall be considered to have been recalled and new elections held within 60 days."
  • ...6 more annotations...
  • NUMBER THREE: "Congress shall make and the President shall sign a Balanced Federal Budget every year and before the beginning of the ensuing fiscal year.   In the event Congress and the President fail to make said Balanced Federal Budget before the beginning of the ensuing fiscal year, the last Constitutionally passed and signed Federal Budget shall go into effect and shall be the Federal Budget for the entirety of the ensuing fiscal year.   Balanced shall be defined as expenditures not to exceed revenues except in time of war as declared by Congress.   Revenues shall be defined as monies received; not monies predicted, anticipated, or forecasted.   Unfunded liabilities, obligations, and/or mandates shall be included in the calculation of the Balanced Federal Budget."
  • NUMBER FOUR: "The Fourteenth, Sixteenth, and Seventeenth Amendments to the Constitution of the United States are hereby repealed.   All Federal agencies, programs, laws, rules, regulations, and/or orders created, passed, or handed down as a direct or indirect result of the Fourteenth, Sixteenth, and/or Seventeenth Amendments are hereby stricken from Law, declared null and void, and have no force of effect."
  • NUMBER FIVE: "Section One:     Only persons born of two parents, both of whom are citizens of the United States at the time of the birth of the person, shall be citizens of the United States unless naturalized under the terms and conditions of the Constitution of the United States. Section Two:      Only United States Citizens shall enjoy or receive all rights, benefits, and privileges of United States Citizenship. Section Three:   Non-citizens shall not receive, directly or indirectly, Federal or Constitutional benefits, privileges, or protections."
  • NUMBER SIX:   "The several States are hereby empowered, individually or collectively, to enforce the Constitution of the United States and Federal Law, within their respective borders, regardless of Federal resistance or objections."
  • NUMBER SEVEN:   "Section One:   The Second Amendment to the Constitution of the United States shall be interpreted to mean the FUNDAMENTAL right of individual citizens and/or groups of citizens to keep and bear arms; in their homes and/or other properties, in public and private, and on their persons. Section Two:    Non-citizens and persons convicted of a violent felony by a jury of their peers do not have this right."
  • NUMBER EIGHT: "The First Amendment to the Constitution of the United States shall not be interpreted to prohibit or restrict the peaceful, free exercise or expression of religion, in public or private, or in or on public property."
  •  
    "Possible Constitutional Amendments in the event of an Article V Convention of States Posted by Oren Long on January 12, 2015 at 3:42am in Tea PartyView Discussions ARTICLE V CONVENTION OF STATES; ARE YOU WILLING TO CHANGE THE STATUS QUO IN D.C.?   One of our astute and true conservative members of this site has drafted suggested changes to the Constitution to be proposed in an Article V, Convention of States. I know many of you have seen his postings on here about this issue. Mr. Oren Long is very knowledgeable and well educated and has honorably served our country. He has put a tremendous amount of time and thought into ways to, in his words, "armor and reinforce" the Constitution and return it to its Original Intent, as envisioned by the Founders. Therefore, because I agree with every one of his suggested changes, I am publishing it for him, with his permission. I truly hope that we, as a group, as conservatives and as a people who believe that our country is heading toward disaster, because of the course we are on, I fully endorse his recommended suggestions. I believe that we must take any and every course of action we can to "stop the madness" It is quite long, so PLEASE take the time to read each and every one of them. I am sure that some or many, may have suggestions to this document and they are welcome and open to discussion. If you agree with this, please call your State elected officials and urge them to get on board with an Article V Convention of States. To review or obtain more information of this process, please visit one of these sites:    http://www.conventionofstates.com/           http://www.cosaction.com/              To Whom It May Concern, The following is neither sanctioned by nor proposed by the Article V Convention of States Project.   Rather, it is entirely my work as a volunteer for the Convention of States Project.   To give you an overview of the kinds of amendments that may or may not be consid
Gary Edwards

Sheriff…Time to arrest members of Congress! | Scanned Retina Blog - 0 views

  • Title 26, USC, is a private law that applies to “U.S. corporate ‘citizens’”, all employees of the corporation identified at 28 USC, section 3002.
    • Gary Edwards
       
      There is no explanation or quote to explain Title 26 and 28 USC, section 3002!  At the least we should be provided with a link here.
  • When the Sheriff seizes property from a Citizen under the non-authority of the IRS agent, the Sheriff has committed a Second Degree Felony, Conversion of Property.
  • Tyranny is defined as:
  • ...26 more annotations...
  • Dominance through threat of punishment and violence, oppressive rule, abusive government, cruelty and injustice. What better definition than this fits the abusive IRS.
  • Title 12, USC
  • The Federal Reserve Notes in use are mere evidence of a debt.
  • The legal definition of “dollar” is “a gold or silver coin of a specific weight and with specific markings
  • The Federal Reserve Banking system is a private cartel that has usurped the authority of the Congress to coin Money.
  • Article I, section 8, we find that only Congress was given the authority “To coin money, regulate the Value thereof, and of foreign Coin, and fix the Standard of Weights and Measures”.
  • The Federal Reserve Act is a “private law” passed by four Congressmen after the Congressional session closed in December of 1913.
  • The “Killing Blow”, the coup de grace[pronounced gra] was delivered upon the American People by Franklin D. Roosevelt in 1933 by removing the Gold Standard from the American economy.  FDR assisted the FRB in heisting the gold supply from this country right out from under our noses. 
  • If you still refuse to pay, the IRS will file a document called a “Notice of Federal Tax Lien” in the local County Clerk’s office.
  • a “Notice” is not the “Lien” itself. The “Lien” is a totally separate and distinct document from the “Notice”.
  • The County Clerk, through abysmal ignorance files the “Notice of Federal Tax Lien” as if it was an actual “Lien”. These are two separate and distinct documents. The County Clerk never requests the actual “Lien” from the IRS agent.
  • The Seventh Amendment of the Bill of Rights of this Constitution for the united States of America guarantees you the Right of Trial by Jury in any controversy where the amount shall exceed twenty dollars.
  • You have never owed any money to the IRS. The IRS is simply the enforcer, the debt collector for the Federal Reserve Banking System. However, because you are using a private credit system, wherein the medium of exchange are fancy pieces of paper called Federal Reserve Notes, you owe the Federal Reserve Bank a “user fee”.
  • All the current paycheck garnishments in the entire country could be stopped by having your employer request the above mentioned documents, to wit:
  • A copy of the Driver’s License of the IRS agent A copy of the “Pocket Commission” showing the authority of the IRS agent A copy of the assessment shown on form 23C against the American Citizen A copy of the “Abstract of the Court Judgment” that verifies that you had a trial by jury.
  • As Sheriff of San Miguel County, I will provide educational classes to the County Clerk and the employers who are currently garnishing wages and paychecks to identify areas where they may have broken the law and unwittingly stolen their employees Federal Reserve Notes and thus committed “Conversion of Property”, a second degree felony. Furthermore, I will work closely with the County Clerk through education and knowledge so that the Clerk can stop breaking the law and committing financial terrorism against the Citizens of San Miguel County.
  • When the Citizens of San Miguel County elect me as their new Sheriff in town, I will ban the IRS from San Miguel County, and if I catch an IRS agent within the boundaries of the county, without my permission, I will arrest them for TRESPASSING.
  • In the 1950’s, with the stroke of the pen, the BIR was transformed into the current notorious IRS and brought onto the 50 united States.
  • The IRS is formerly the Bureau of Internal Revenue (BIR) situated in and with authority only in the Philippine Islands (Trust Fund # 61), and moved into Puerto Rico (Trust Fund # 62).
  • Here it is in a nutshell. The IRS is a private, debt collection agency for the private banking system known as the Federal Reserve Bank. The IRS is not a government agency. I repeat, the IRS is not a government agency. Never has been, never will be.
  • This was done without any Congressional authority whatsoever.
  • the IRS is the “Private, debt collection agency for the private banking system known as the Federal Reserve Banks”.
  • Title 26, Internal Revenue Code, is the “Debt Collection Manual” for the IRS.  This manual has nothing with “Constitutitonal Rights”.
  • The IRS does not collect an “income tax”.  The IRS is simply collecting a user fee due to the Federal Reserve Banks because we, Americans, are using a private credit systeem.
  • Title 26, United States Code, is “non-positive” law, which means that no American Citizen is subject to it.  However, all “U.S. citizens” are subject to it.  In order to understand “U.S. citizen” you must go to 28 USC, section 3002.
  • Most American Citizens have voluntarily given up their Sovereignty in exchange for “immunities and privileges” of the 14th Amendment.
  •  
    On accessing federal law, two sites to bookmark: Legal Information Institute, Cornell University, http://www.law.cornell.edu/lii/get_the_law Justia.com, http://www.justia.com/ A further resource, the Jureeka extension for Chrome and Firefox will automatically link legal citations in your brower's display to the corresponding web pages on the LII site. http://www.law.cornell.edu/jureeka/download/
Gary Edwards

Obama's Occidental College transcripts provides concrete evidence to annul his presiden... - 1 views

  •  
    Occidental Registration transcript states ~ Name: Barry Soetoro - Religion: Islam - Nationality: Indonesian The smoking gun evidence that annuls Obama's presidency is Obama's college transcripts regarding his application for and receiving of foreign student aid.  Obama's college transcripts from Occidental College indicates that Obama, under the name Barry Soetoro, received financial aid as a foreign student from Indonesia as an undergraduate at the school. The transcript from Occidental College shows that Obama (Barry Soetoro) applied for financial aid and was awarded a fellowship (scholarship) for foreign students from the Fulbright Foundation Scholarship program - an international educational exchange program sponsored by the U.S. government.  Grants are available for U.S. citizens to go abroad and for non-U.S. citizens with no U.S. permanent residence to come to the U.S.  To qualify, for the non-US citizen scholarship to study in the U.S., a student applicant must claim and provide proof of foreign citizenship. This document would seem to provide the smoking gun that many of Obama's detractors have been seeking.  The United States Constitution requires that Presidents (and Vice Presidents) of the United States be natural born citizens of the United States.
Paul Merrell

US websites should inform EU citizens about NSA surveillance, says report - 0 views

  • All existing data sharing agreements between Europe and the US should be revoked, and US web site providers should prominently inform European citizens that their data may be subject to government surveillance, according to the recommendations of a briefing report for the European Parliament. The report was produced in response to revelations about the US National Security Agency (NSA) snooping on internet traffic, and aims to highlight the subsequent effect on European Union (EU) citizens' rights.
  • The report warns that EU data protection authorities have failed to understand the “structural shift of data sovereignty implied by cloud computing”, and the associated risks to the rights of EU citizens. It suggests “a full industrial policy for development of an autonomous European cloud computing capacity” should be set up to reduce exposure of EU data to NSA surveillance that is undertaken by the use of US legislation that forces US-based cloud providers to provide access to data they hold.
  • To put pressure on the US government, the report recommends that US websites should ask EU citizens for their consent before gathering data that could be used by the NSA. “Prominent notices should be displayed by every US web site offering services in the EU to inform consent to collect data from EU citizens. The users should be made aware that the data may be subject to surveillance by the US government for any purpose which furthers US foreign policy,” it said. “A consent requirement will raise EU citizen awareness and favour growth of services solely within EU jurisdiction. This will thus have economic impact on US business and increase pressure on the US government to reach a settlement.”
  • ...2 more annotations...
  • Other recommendations include the EU offering protection and rewards for whistleblowers, including “strong guarantees of immunity and asylum”. Such a move would be seen as a direct response to the plight of Edward Snowden, the former NSA analyst who leaked documents that revealed the extent of the NSA’s global internet surveillance programmes. The report also says that, “Encryption is futile to defend against NSA accessing data processed by US clouds,” and that there is “no technical solution to the problem”. It calls for the EU to press for changes to US law.
  • “It seems that the only solution which can be trusted to resolve the Prism affair must involve changes to the law of the US, and this should be the strategic objective of the EU,” it said. The report was produced for the European Parliament committee on civil liberties, justice and home affairs, and comes before the latest hearing of an inquiry into electronic mass surveillance of EU citizens, due to take place in Brussels on 24 September.
  •  
    Yee-haw! E.U. sanctuary and rewards for NSA whistle-blowers. Mandatory warnings for customers of U.S. cloud services that their data may be turned over to the NSA. Pouring more gasoline on the NSA diplomatic fire. 
Gary Edwards

The Ultimate Net Monitoring Tool: NARUS - 0 views

  •  
    Chilling stuff.  Note that Mark Klien is an important whistleblower whose testimony has helped expose the  Federal Government - NSA domestic dragnet that has violated the constitutional rights of hundreds of thousands of law abiding American citizens.  The question I have concerns cooperation between NSA NARUS spying and the IRS. We know that the IRS used key words such as "TEA PARTY", "PATRIOT", "Constitution", and "Tenth Amendment" to target American citizens.  Does the NSA NARUS target Americans in the same way?  Are there political enemy lists with background surveillance information now circulating through different government agencies based on this targeted and illegal spying? The first thing we need to do is protect whistle blowers who are risking it all to protect the constitutional rights of American citizens and save our country.   "The equipment that technician Mark Klein learned was installed in the National Security Agency's "secret room" inside AT&T's San Francisco switching office isn't some sinister Big Brother box designed solely to help governments eavesdrop on citizens' internet communications. Rather, it's a powerful commercial network-analysis product with all sorts of valuable uses for network operators. It just happens to be capable of doing things that make it one of the best internet spy tools around. "Anything that comes through (an internet protocol network), we can record," says Steve Bannerman, marketing vice president of Narus, a Mountain View, California, company. "We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on, we can reconstruct their (voice over internet protocol) calls."" Narus' product, the Semantic Traffic Analyzer, is a software application that runs on standard IBM or Dell servers using the Linux operating system. It's renowned within certain circles for its ability to inspect traffic in real time on high-bandwidth pipes, identifying packets of interest as they r
Gary Edwards

Google News - 1 views

  •  
    Ten Articles of Impeachment have been drawn up and submitted to the House Judiciary Committee for consideration. Very well written, the articles are a clear indictment of Obama, listing his offenses in the most concise and clear manner I've seen to date. Excellent stuff. "The National Black Republican Association (NBRA) based in Sarasota, FL, headed by Chairman Frances Rice, filed Articles of Impeachment against President Barack Obama with the following language: We, black American citizens, in order to free ourselves and our fellow citizens from governmental tyranny, do herewith submit these Articles of Impeachment to Congress for the removal of President Barack H. Obama, aka, Barry Soetoro, from office for his attack on liberty and commission of egregious acts of despotism that constitute high crimes and misdemeanors. On July 4, 1776, the founders of our nation declared their independence from governmental tyranny and reaffirmed their faith in independence with the ratification of the Bill of Rights in 1791.  Asserting their right to break free from the tyranny of a nation that denied them the civil liberties that are our birthright, the founders declared: "When a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security."  -  Declaration of Independence, July 4, 1776. THE IMPEACHMENT POWER Article II, Section IV of the United States Constitution provides: "The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors." THE ARTICLES OF IMPEACHMENT In his conduct of the office of President of the United States, Barack H. Obama, aka Barry Soetoro, personally and through his subordinates and agents, in violation or disre
Gary Edwards

U.S. reverses stance on treaty to regulate arms trade | Reuters - 0 views

  •  
    This article is more than 2-1/2 months old yet this is the first I've heard of it.  Pretty frightening "end-run" the administration is trying. Obama Finds Legal Way Around The 2nd. Amendment and Uses It. http://www.reuters.com/article/politicsNews/idUSTRE59E0Q920091015 On Wednesday the Obama administration took its first major step in a plan to ban all firearms in the United States . The Obama administration intends to force gun control and a complete ban on all weapons for US citizens through the signing of international treaties with foreign nations. By signing international treaties on gun control, the Obama administration can use the US State Department to bypass the normal legislative process in Congress. Once the US Government signs these international treaties, all US citizens will be subject to those gun laws created by foreign governments. These are laws that have been developed and promoted by organizations such as the United Nations and individuals such as George Soros and Michael Bloomberg. The laws are designed and intended to lead to the complete ban and confiscation of all firearms.  The Obama administration is attempting to use tactics and methods of gun control that will inflict major damage to our 2nd Amendment before US citizens even understand what has happened. Obama can appear before the public and tell them that he does not intend to pursue any legislation (in the United States) that will lead to new gun control laws, while cloaked in secrecy, his Secretary of State, Hillary Clinton is committing the US to international treaties and foreign gun control laws. Does that mean Obama is telling the truth? What it means is that there will be no publicized gun control debates in the media or votes in Congress. We will wake up one morning and find that the United States has signed a treaty that prohibits firearm and ammunition manufacturers from selling to the public. We will wake up another morning and find that the US has signed a treaty that pro
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
1 - 20 of 720 Next › Last »
Showing 20 items per page