Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged homeland

Rss Feed Group items tagged

Paul Merrell

NSA Director Finally Admits Encryption Is Needed to Protect Public's Privacy - 0 views

  • NSA Director Finally Admits Encryption Is Needed to Protect Public’s Privacy The new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. By Carey Wedler | AntiMedia | January 22, 2016 Share this article! https://mail.google.com/mail/?view=cm&fs=1&to&su=NSA%20Director%20Finally%20Admits%20Encryption%20Is%20Needed%20to%20Protect%20Public%E2%80%99s%20Privacy&body=http%3A%2F%2Fwww.mintpress
  • At the same hearing, Comey and Attorney General Loretta Lynch declined to comment on whether they had proof the Paris attackers used encryption. Even so, Comey recently lobbied for tech companies to do away with end-to-end encryption. However, his crusade has fallen on unsympathetic ears, both from the private companies he seeks to control — and from the NSA. Prior to Rogers’ statements in support of encryption Thursday, former NSA chief Michael Hayden said, “I disagree with Jim Comey. I actually think end-to-end encryption is good for America.” Still another former NSA chair has criticized calls for backdoor access to information. In October, Mike McConnell told a panel at an encryption summit that the United States is “better served by stronger encryption, rather than baking in weaker encryption.” Former Department of Homeland Security chief, Michael Chertoff, has also spoken out against government being able to bypass encryption.
  • Rogers cited the recent Office of Personnel Management hack of over 20 million users as a reason to increase encryption rather than scale it back. “What you saw at OPM, you’re going to see a whole lot more of,” he said, referring to the massive hack that compromised the personal data about 20 million people who obtained background checks. Rogers’ comments, while forward-thinking, signify an about face in his stance on encryption. In February 2015, he said he “shares [FBI] Director [James] Comey’s concern” about cell phone companies’ decision to add encryption features to their products. Comey has been one loudest critics of encryption. However, Rogers’ comments on Thursday now directly conflict with Comey’s stated position. The FBI director has publicly chastised encryption, as well as the companies that provide it. In 2014, he claimed Apple’s then-new encryption feature could lead the world to “a very dark place.” At a Department of Justice hearing in November, Comey testified that “Increasingly, the shadow that is ‘going dark’ is falling across more and more of our work.” Though he claimed, “We support encryption,” he insisted “we have a problem that encryption is crashing into public safety and we have to figure out, as people who care about both, to resolve it. So, I think the conversation’s in a healthier place.”
  • ...2 more annotations...
  • Regardless of these individual defenses of encryption, the Intercept explained why these statements may be irrelevant: “Left unsaid is the fact that the FBI and NSA have the ability to circumvent encryption and get to the content too — by hacking. Hacking allows law enforcement to plant malicious code on someone’s computer in order to gain access to the photos, messages, and text before they were ever encrypted in the first place, and after they’ve been decrypted. The NSA has an entire team of advanced hackers, possibly as many as 600, camped out at Fort Meade.”
  • Rogers statements, of course, are not a full-fledged endorsement of privacy, nor can the NSA be expected to make it a priority. Even so, his new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. “So spending time arguing about ‘hey, encryption is bad and we ought to do away with it’ … that’s a waste of time to me,” Rogers said Thursday. “So what we’ve got to ask ourselves is, with that foundation, what’s the best way for us to deal with it? And how do we meet those very legitimate concerns from multiple perspectives?”
Paul Merrell

ICE has struck a deal to track license plates across the US - The Verge - 0 views

  • The Immigration and Customs Enforcement (ICE) agency has officially gained agency-wide access to a nationwide license plate recognition database, according to a contract finalized earlier this month. The system gives the agency access to billions of license plate records and new powers of real-time location tracking, raising significant concerns from civil libertarians. The source of the data is not named in the contract, but an ICE representative said the data came from Vigilant Solutions, the leading network for license plate recognition data. “Like most other law enforcement agencies, ICE uses information obtained from license plate readers as one tool in support of its investigations,” spokesperson Dani Bennett said in a statement. “ICE is not seeking to build a license plate reader database, and will not collect nor contribute any data to a national public or private database through this contract.”
  • While it collects few photos itself, Vigilant Solutions has amassed a database of more than 2 billion license plate photos by ingesting data from partners like vehicle repossession agencies and other private groups. Vigilant also partners with local law enforcement agencies, often collecting even more data from camera-equipped police cars. The result is a massive vehicle-tracking network generating as many as 100 million sightings per month, each tagged with a date, time, and GPS coordinates of the sighting.
  • ICE agents would be able to query that database in two ways. A historical search would turn up every place a given license plate has been spotted in the last five years, a detailed record of the target’s movements. That data could be used to find a given subject’s residence or even identify associates if a given car is regularly spotted in a specific parking lot. “Knowing the previous locations of a vehicle can help determine the whereabouts of subjects of criminal investigations or priority aliens to facilitate their interdiction and removal,” an official privacy assessment explains. “In some cases, when other leads have gone cold, the availability of commercial LPR data may be the only viable way to find a subject.” ICE agents can also receive instantaneous email alerts whenever a new record of a particular plate is found — a system known internally as a “hot list.” (The same alerts can also be funneled to the Vigilant’s iOS app.) According to the privacy assessment, as many as 2,500 license plates could be uploaded to the hot list in a single batch, although the assessment does not detail how often new batches can be added. With sightings flooding in from police dashcams and stationary readers on bridges and toll booths, it would be hard for anyone on the list to stay unnoticed for long. Those powers are particularly troubling given ICE’s recent move to expand deportations beyond criminal offenders, fueling concerns of politically motivated enforcement. In California, state officials have braced for rumored deportation sweeps targeted at sanctuary cities. In New York, community leaders say they’ve been specifically targeted for deportation as a result of their activism. With automated license plate recognition, that targeting would only grow more powerful. For civil liberties groups, the implications go far beyond immigration.
  • ...1 more annotation...
  • The new license plate reader contract comes after years of internal lobbying by the agency. ICE first tested Vigilant’s system in 2012, gauging how effective it was at locating undocumented immigrants. Two years later, the agency issued an open solicitation for the technology, sparking an outcry from civil liberties group. Homeland Security secretary Jeh Johnson canceled the solicitation shortly afterward, citing privacy concerns, although two field offices subsequently formed rogue contracts with Vigilant in apparent violation of Johnson’s policy. In 2015, Homeland Security issued another call for bids, although an ICE representative said no contract resulted from that solicitation. As a result, this new contract is the first agency-wide contract ICE has completed with the company, a fact that is reflected in accompanying documents. On December 27th, 2017, Homeland Security issued an updated privacy assessment of license plate reader technology, a move it explained was necessary because “ICE has now entered into a contract with a vendor.” The new system places some limits on ICE surveillance, but not enough to quiet privacy concerns. Unlike many agencies, ICE won’t upload new data to Vigilant’s system but simply scan through the data that’s already there. In practical terms, that means driving past a Vigilant-linked camera might flag a car to ICE, but driving past an ICE camera won’t flag a car to everyone else using the system. License plates on the hot list will also expire after one year, and the system retains extensive audit logs to help supervisors trace back any abuse of the system. Still, the biggest concern for critics is the sheer scale of Vigilant’s network, assembled almost entirely outside of public accountability. “If ICE were to propose a system that would do what Vigilant does, there would be a huge privacy uproar and I don’t think Congress would approve it,” Stanley says. “But because it’s a private contract, they can sidestep that process.”
Paul Merrell

New Leak Puts "Stake In The Heart" Of Trump's Muslim Ban Rationale - 0 views

  • In a major scoop said to put a “stake in the heart of the Muslim ban,” MSNBC‘s Rachel Maddow reported Thursday evening on a new leaked Department of Homeland Security (DHS) analysis which essentially shreds the Trump administration’s rationale for banning travel from seven Muslim-majority nations. The document, prepared by DHS’ internal intelligence agency, the Office of Intelligence and Analysis, concludes that the majority of foreign-born, U.S.-based violent extremists were radicalized several years after their entry into the U.S.
  • The Washington Post‘s Greg Sargent on Friday suggested that the leaked analysis could be part of the “real reason for the delay,” rather than the stated reason of not wanting to sully the warm reception received by the president after his joint-session speech Tuesday evening. “The Trump administration can’t solve the problem that has always bedeviled this policy, which is that there isn’t any credible national security rationale for it,” he wrote. “Unlike on the campaign trail, when you’re governing, you actually have to have justification for what you’re proposing, or you often run into trouble.” Similarly, Maddow observed that “they really do have a problem here,” pointing to the document’s key finding, which states that “most foreign-born, U.S.-based violent extremists are likely radicalized several years after their entry to the United States, limiting the ability of screening and vetting officials to prevent their entry because of national security concerns.” “The national security justification for this whole ban—this setting up of extreme vetting—is bull-pucky,” Maddow said. “There’s nothing they can set up at the border to tell you years down the road who might become…a radical and violent person years from now.” This latest leak follows the release of another DHS analysis last week that similarly undermined the Trump administration’s claim that people traveling from Syria, Iran, Iraq, Yemen, Sudan, Libya, and Somalia pose a severe threat to the United States. That document, obtained by the Associated Press, concluded that “citizenship is an ‘unlikely indicator’ of terrorism threats to the United States and that few people from the countries Trump listed in his travel ban have carried out attacks or been involved in terrorism-related activities in the U.S. since Syria’s civil war started in 2011,” as AP reported. Taken together, the two documents throw cold water on most of the administration’s stated justification for the pending executive order.
  •  
    Sounds like the document and the earlier one via Associated Press may put an end to Trump's Muslim ban campaign promise, if not voluntarily then by court order.
Gary Edwards

DHS insider update: "It has begun" « Northeast Intelligence NetworkNortheast ... - 1 views

  •  
    The forced confiscation of citizen savings held in Cypress bank accounts is a test by the International Bank to see if people will roll over or fight.  The Global elites are ready to pull the trigger on world wide economic collapse, and they're testing to see what the response will be. clip: "According to the most recent information provided to me from my source within the Department of Homeland Security known as "Rosebud," the final preparations are being made to deploy heavily armed federalized forces onto the streets of America. They will be deployed under the pretext of "restoring and maintaining order from the chaos brought about by the economic collapse," adding that "many will demand and embrace their deployment on the streets of America. They will get what they ask for, and more." Much like the security theater we have seen following the attacks of 9/11, we will be subjected to the jack-booted control of a federal army whose allegiance is not to the American people, but to the very architects of the chaos. "This is the reason that drones are flying over U.S. cities and farmland, and gun control legislation is on the fast track for complete implementation," stated this source. "How can people look at the situation in Cyprus and not think it won't happen here? It will, and the blowback will be unlike this country has ever seen. Surveillance, disarming the public, and conditioning the people to believe it's for their own safety is and has been  part of the plan all along. Anyone owing a gun will be demonized and described as contributing to the problem." "What happens when the middle class loses much of their wealth, or it is confiscated, by the stroke of a pen or a keyboard? What will the stores look like when people, unprepared due to the damn lies of the corporate media and the shills for the ruling elite, run to empty out everything they can get their hands on as the world, as they know it, collapses around them?" It was
Gary Edwards

Boston And More Government Lies : Personal Liberty Digest™ - 0 views

  •  
    "However, now we - at least those of us who pay attention - know, thanks to Glenn Beck, the Saudi person of interest is not just some innocent bystander after all. Just hours after the April 15 bombing, Abdul Rahman Ali Alharbi was put on a terror watch list and had an event file created that indicated he was armed and dangerous; and actions began that would lead to his deportation. Alharbi, who is related to a number of terrorists now residing in Gitmo and/or listed as part of al-Qaida, was admitted to the United States under a "special advisory opinion," indicating someone pulled some strings for him. His strings go a long way - all the way to the White House, where Alharbi was a frequent visitor (seven times since 2009). His file contained one prior event, indicating he was already in the terrorism watch list system. Yet even though he's marked as a terrorist, he was allowed in. Perhaps that explains Michelle Obama's hospital visit. Alharbi and the Obamas are friends. After news of his possible deportation leaked, government officials backtracked. Homeland Security Secretary Janet Napolitano refused to answer questions from a Congressman about Alharbi. An Immigration and Customs Enforcement official told Beck a different Saudi was in custody but not connected to the bombing. Someone altered Alharbi's file on April 17 in a way that disassociated him from the bombing, according to Beck, but an original had been printed out and saved. The change happened around the time that first Secretary of State John Kerry and then President Barack Obama met with the Saudi foreign minister - a meeting that wasn't on Obama's schedule. There are photographs on the Internet that purport to show Alharbi with two other Saudis near the bomb site. If the government will lie about who Alharbi is and whether his is a suspect, what else about the official narrative is a lie? Despite initial claims by the FBI that included a request to help identify the two men
Gary Edwards

Secret White House Email Accounts Uncover IRS-Obama Smoking Gun : palookavillepost.com - 0 views

  • During an investigation of President Barack Hussein Obama’s political appointees and White House aides, FBI agents discovered secret government email accounts they say were used as primary means for Obama’s staff to interact with IRS officials for day-to-day business.
  • Investigators became curious about the possibility of such accounts after Congress requested all emails from the White House regarding the Benghazi, IRS and other scandals, and the White House could only produce a handful of emails that discussed those topics.
  • “We had one of our hackers get into a White House intern’s computer, and that’s where we located a slew of private email accounts not associated with Federal government accounts,” said a spokesman for the powerful federal police agency.
  • ...6 more annotations...
  • Emails sent to people outside of the secret network of White House email accounts were programmed to automatically be deleted five minutes after opening the message, just like on Mission Impossible. This explains the absence of White House emails received by IRS officials.
  • “The content of the emails is still being reviewed, but it is clear that people inside the White House knew about the IRS targeting conservatives, and that somebody with the nickname “Basketball Jones” was the person who told American forces to stand down during the attacks in Benghazi.”
  • “The White House tried to cover their tracks by saying that former IRS Commissioner Douglas Shulman visited the White House 157 times, and that they never used email to communicate,” said the FBI spokesman.
  • Only a few of the emails have been reviewed, but already several of them indicate that President Obama not only knew about the scheme, but he himself ordered the IRS to flood the Tea Party with paperwork and fees.
  • Here is one transcript of a hidden email from an unknown White House aide in April, 2011:
  • “Hey Shulman… What’s up?… Don’t forget BJ(Basketball Jones) wants you to kick up the fees on anyone with Tea Party or Conservative in their names… try to see if you can make them hire expensive tax attorneys too… bog them down with paperwork so they can’t campaign for milk boy(Mitt Romney) or Ru Paul(Ron Paul)… sorry you missed the Easter Egg Hunt… maybe next year… I’d invite you to stay in the Lincoln bedroom but that costs real money… send me a report on how many Tea Party groups quit because of being jerked around…ASAP… Chow!”
  •  
    Although this article has zero credibility and even less reference checking, everyone in America knows that Obama ordered the IRS hit on Tea Party Patriots, Conservatives and Jewish Homeland organizations.  That the IRS admits to violating the Constitutional civil rights of tens of millions of law abviding Americans, and did so in ways that only benefit the Obama re-election campaign is proof enough for anyone who loves liberty.
Gary Edwards

Is The US Finally Ready For Revolution? - Democratic Underground - 1 views

  •  
    Written in June of 2012, before the national elections, this commentary remains the ringing truth.  Maybe more Americans are ready to listen this fourth of July? ........................... "Is America Ready For Revolution? I have always strongly believed that it's not possible to be a good Christian without standing up against social injustice and government corruption in all its forms. As I take a look around me today I find a lot of things wrong with our country. In fact, I have been a proponent for radical change for several years now, and I have written and published 2 books on this very topic. Where shall I begin? In God-blessed America, the land of the free where everyone is an economic slave, our founding fathers' sacred idea of a government "of the people, by the people, for the people" has become but a cruel joke. Former president George W. Bush has notoriously called our Constitution - our supreme law of the land - "that (expletive) piece of paper". The federal government is currently spending at least $60 billion per month on military excursions in Afghanistan, the Middle East, and northern and western Africa - including operating between 800 and 1,000 foreign military bases all over the world. Our country's over-used flying drone aircraft kills hundreds daily overseas, many of whom are only innocent bystanders. Meanwhile here on the home front, one in seven people are on food stamps, and at any given time one in four American children are going hungry today. Our country spends more money incarcerating people than it does on education. What's up with that? Our political system is openly rigged against the best interests of the American people. A massive market mechanism is securely entrenched in our political system where political influence is openly bought and sold. Tens of thousands of highly-paid middlemen called "lobbyists" facilitate the legal transfer of billions between moneyed special interests and our so-called "representatives" i
Paul Merrell

Casetext - 0 views

  • As reported by the Washington Post, yesterday President Trump signed an Executive Order ( full text) suspending for 90 days immigrant and non-immigrant entry into the U.S. of aliens from seven Muslim-majority countries-- Iraq, Iran, Syria, Yemen, Sudan, Libya and Somalia. (It should be noted that the countries to which the Executive Order is applicable is discoverable only by elaborate cross references in Sec. 3(c) of the Order that ultimately lead to this list developed last year by the Department of Homeland Security under the Visa Waiver Program Improvement and Terrorist Travel Prevention Act of travelers not eligible to participate in the visa waiver program). The Executive Order does not apply to those entering under various diplomatic visas. The Executive Order also suspends admission of all refugees for 120 days, and of Syrian refugees for an indefinite period. It provides that when refugee admissions are resumed: the Secretary of State, in consultation with the Secretary of Homeland Security, is further directed to make changes, to the extent permitted by law, to prioritize refugee claims made by individuals on the basis of religious-based persecution, provided that the religion of the individual is a minority religion in the individual's country of nationality. Following up on this provision, Trump told the Christian Broadcasting Network that priority will be given to persecuted Christians in the Middle East, particularly Syria. The Legal Director of the ACLU in a post earlier today argued that the Executive Order's targeting of Muslims and favoring of Christians violates the Establishment Clause. Meanwhile CAIR announced that it will be holding a news conference Monday on a lawsuit that it will file in federal district court in Virginia to "challenge the constitutionality of the order because its apparent purpose and underlying motive is to ban people of the Islamic faith from Muslim-majority countries from entering the United States."
Gary Edwards

The planned re-election of Obama, revolutionary style - 0 views

  •  
    Obama administration, including his czars and his closest Progressive supporters, are planning a manufactured insurgency against America. Using the media to garner both sympathy and support for his unfinished goals
    The ambition to re-elect Obama is nothing short of the plan to overthrow the US Constitutional Republic and replace it with a new world order. The article explains the carefully planned re-election of Obama, concluding that it's counting on chaos, rebellion, anger, fear and rioting. Author Doug Hagmann calls this "re-election via revolutionary style". He identifies three areas of aggressively planned chaos: economic, racial, and class warfare. Doug has a source inside the Department of HomeLand Security (DHS), which seems to be the main instrument of overthrow. The model is that of 1968 anti-war, anti-establishment, pro marxist movement. Hagmann and his inside source predict the destruction of the dollar, the seeming breakup and fall of the European Union, riots in the streets of America, and a failed attempt on Obama's life that will result in a horrific crackdown and roundup of Tea Party members. This is truly frightening stuff. Yet, Reagan era Conservative leaders like Mark Levin, Sean Hannity, and Rush Limbaugh - the guys with the megaphone - have no idea what the Federal Reserve Bankster Cartel and their Globalist cronies have pulled off here. Obama is just a stooge carrying out the final stages of a plan that has been in place at least since 1875, when Freemason Albert Pike slipped up with the aging blueprint known to insiders as the "Luciferian Document", inadvertently leaking into the public through a series of letters to a trusted American henchman. Obama himself cut his marxist - new world order teeth, teaching the Alinsky "Rules for Radicals" plan of street revolution and overthrow. Alinsky dedicated his marxist handbook to that first revolutionary, Lucifer. Amazing. And here we are, wondering what mechanisms
Paul Merrell

Homeland Battlefield Act Portion Found Unconstitutional By New York Judge - 0 views

  • WASHINGTON -- A day before Congress weighs an amendment to end indefinite military detentions in the U.S., a federal judge Wednesday ruled the law that allows the practice unconstitutional. Saying the measure has "chilling impact on First Amendment rights," U.S. District Judge Katherine Forrest, of New York's Eastern District, found that a group of reporters and activists who brought the lawsuit had no way of knowing whether they could be subjected to it. That makes it an unconstitutional infringement on the First Amendment's free speech right and the Fifth Amendment's right to due process, Forrest said in a written opinion.
  • Reps. Adam Smith (D-Wash.) and Justin Amash (R-Mich.) are offering an amendment on Thursday to the 2013 Defense Authorization Act that would end the law. Amash sent an appeal to fellow lawmakers soon after the ruling, asking them to pass it. "The amendment I’m offering with Rep. Adam Smith is the ONLY amendment that ensures that persons arrested on U.S. soil aren’t detained indefinitely without charge or trial," Amash wrote. "Voting against the Smith-Amash amendment allows the government to retain the power to detain persons, picked up in the U.S., for life, on the suspicion that they 'substantially supported' forces 'associated' with our enemies." "If our constituents haven’t sent a clear enough message, tonight’s ruling surely does: Congress must act now to guarantee the constitutional right to a charge and a trial," Amash wrote.
Gary Edwards

Google News - 0 views

  •  
    An incredible story is unfolding in Egypt where the new military government is digging through volumes of documents seized in raids on the Muslim Brotherhood. The documents are said to show that Barak Obama has been funneling Billions of dollars into the Muslim Brotherhood. excerpt: "Bare Naked Islam has done extensive reporting on the "bribes." The ... Evidence we have obtained lends credibility to the charges of "gifts" (bribes) being taken in U.S. dollars from the U.S. Embassy in Cairo" that were distributed to top ministerial level officials in the Mursi government. Via Almesryoon: "A judicial source stated that over the past few days, a number of complaints have beenfiled with the Attorney General Hisham Barakat. These complaints accuse the leaders of the Muslim Brotherhood and leaders of the centrist party of receiving gifts from the American embassy in Cairo. The sponsors of these complaints stated that among these leaders are Mohamed Badie, General Guide of the Muslim Brotherhood, Khairat Al-Shater, deputy leader and businessman, Mohamed Beltagy leading the group, Essam el-Erian, deputy head of the Freedom and Justice Party of, and Abu Ela Mady, head of the Wasat Party, Essam Sultan, deputy head of the Wasat Party." The strength of these allegations is seemingly bolstered by another case alluded to by the newspaper in which a document is referenced. This document reportedly reveals monthly "gifts" being paid to Muslim Brotherhood leaders in Egypt by the Prime Minister Hamad bin Jassim bin Jabor Al Thani, Minister of Foreign Affairs to the Mursi government. These monthly payments were said to be denominated in U.S. dollars to each leader. Evidence for such allegations are substantiated by a document we have obtained. It includes the names of several recipients of funds and even includes their signatures acknowledging receipt of the funds. This ledger, obtained from inside the Mursi government, lends additional credibility to the rep
Gary Edwards

How World War I Paved the Way for the Warfare State :: The Mises Economics Blog: The Ci... - 0 views

  •  
    Part ONE "by David Stockman Remarks To The Committee For The Republic, Washington DC, February 2014 (Part 1 of 6 Parts) [From David Stockman's Contra Corner.] Flask in hand, Boris Yelstin famously mounted a tank outside the Soviet Parliament in August 1991. Presently, the fearsome Red Army stood down-an outcome which 45 years of Cold War military mobilization by the West had failed to accomplish. At the time, the U.S. Warfare State's budget- counting the pentagon, spy agencies, DOE weapons, foreign aid, homeland security and veterans--was about $500 billion in today's dollars.  Now, a quarter century on from the Cold War's end, that same metric stands at $900 billion. This near doubling of the Warfare State's fiscal girth is a tad incongruous.  After all, America's war machine was designed to thwart a giant, nuclear-armed industrial state, but, alas, we now have no industrial state enemies left on the planet. The much-shrunken Russian successor to the Soviet Union, for example, has become a kleptocracy run by a clever thief who prefers stealing from his own citizens. Likewise, the Red Chinese threat consists of a re-conditioned aircraft carrier bought second-hand from a former naval power--otherwise known as the former Ukraine. China's bubble-ridden domestic economy would collapse within six weeks were it to actually bomb the 4,000 Wal-Mart outlets in America on which its mercantilist export machine utterly depends. On top of that, we've been fired as the world's policeman, al Qaeda has splintered among warlords who inhabit the armpits of the world from Yemen to Somalia and during last September's Syria war scare the American people even took away the President's keys to the Tomahawk missile batteries.  In short, the persistence of America's trillion dollar Warfare State budget needs some serious "splainin". The Great War and Its Aftermath My purpose tonight is to sketch the long story of how it all happened, starti
Gary Edwards

GOP immigration plan devised by Communist Party - 0 views

  • Republican support
  • But why would Republicans get behind such a plan? Some astute political observers advise that when politicians appear to be promoting agendas against their own interest, follow the money.
  • t’s no surprise that the Republicans supporting this thing are the ones with ties to the Chamber of Commerce, not ordinary voters.”
  • ...8 more annotations...
  • But even if big business benefits, the cheap labor advantages are only temporary. Once illegal aliens are fully legalized, businesses will be required to provide just as much in pay and benefits as they pay American workers.
  • In the meantime, however, it is widely assumed those workers will take jobs from American citizens, depress wages and increase unemployment. Moreover, in many key swing states, projected amnesties will swamp the rolls of the unemployed (see table)
  • So, illegal aliens would be granted legal status immediately, but five years down the road, if the fence still isn’t built and e-verify still isn’t being used, then their legal status would be revoked. Given that the Department of Homeland Security is already allegedly ignoring border security –with immigration and customs agents suing their own agency for failing to enforce the law – many voters place little confidence in political promises of future enforcement.
  • In the meantime, Senate and House opponents have been painstakingly highlighting what they consider to be glaring flaws in these proposals: Every single border security provision in the Senate bill, including the hire of 20,000 Border Patrol agents, denying amnesty to criminals, building fences and installing surveillance devices, can be waived by the Homeland Security secretary. Both the House and Senate proposals emphasize the path to citizenship – the centerpiece of communist efforts – while making border security both vague and secondary. Both bills provide a $5,000 incentive for companies to hire the newly legalized illegal aliens instead of Americans, since the aliens would not be subject to the Obamacare coverage mandate.
  • Although politicians and the media have settled on the claim that there are 11 million illegal aliens, the actual number may well be closer to 20 million to 30 million. There were 10 million in 1996, a mere 10 years after Reagan’s amnesty, and it is doubtful only one million more have been added in the ensuing 17 years. Since 1990, Border agents have apprehended on average more than 1 million illegal aliens per year, almost all from Mexico.
  • When the Reagan amnesty became law, the intention was to naturalize only 1.2 million people, but the actual figure turned out to be 2.7 million. Statistics on illegal immigration have longed tended to be underestimated, sometimes vastly so.
  • Thus, current proposals provide a path to citizenship for as many as 20 to 30 million illegal aliens here now, plus relatives who will be brought in through chain migration and at least 75 percent of those who will come in the future – virtually endless amnesty – while efforts to secure the border are almost certain to be insufficient.
  • With polls showing more than two-thirds of Americans don’t believe “immigration laws would be enforced in the future if illegal aliens were given amnesty,” it is clear that passage of the current Republican-backed bill may indeed fulfill the agenda of its communist originators – the creation of a permanent Democrat voting majority, guaranteeing permanent control of the United States government by leftist progressives.
  •  
    Wow.  Documentation up the ying yang .......... "The U.S. Senate's "Gang of Eight" immigration-reform plan, as well as a strikingly similar plan now being backed by Rep. Paul Ryan, R-Wis., and a bi-partisan House "Gang," both offer the "roadmap to citizenship" originally conceived and carefully developed by members of the Communist Party USA working within the Democratic Party and the radical left activist network for the purpose of using amnestied illegals to build a "permanent progressive majority." That is the inescapable conclusion readers will draw after reading the forthcoming book by acclaimed researcher and blogger Trevor Loudon, titled "The Enemies Within: Communists, Socialists and Progressives in the U.S. Congress." Although not yet published, Loudon agreed to allow WND readers to preview one chapter, titled "Latino Immigrants: Tools to Ensure a 'Governing Coalition' for the Left." Ads by Google Marriage Visa Lawyer $195 Get Your Fiance/Spouse to the USA. Free Consultation. (888) 902-9285 EasyFianceVisa.com/SpousalVisa Canadian Rockies By Train Experience the Rockies By Train. Luxury Mountain Travel By Rail TravelAlberta.us/Train In the book, Loudon exhaustively documents the Left's longtime agenda regarding illegal aliens and how its activists have gone about implementing it. He provides irrefutable proof that the entire immigration-reform movement was the brainchild of American communists and that their goal has long been to establish unchallengeable political supremacy. According to Loudon, the Communist Party USA has influenced U.S. policy toward illegals since at least the 1960s. He traces the history, showing how communists and communist-founded organizations slowly built the movement from the ground up. While other groups certainly joined the effort, the communists were always at the center. For example, he tells the story of CPUSA member Bert Corona, the "Communist Father of the 'Immigrants Rights' move
Gary Edwards

Google News - 0 views

  •  
    WOW!!! Incredible presentation concerning the history of Freedom vs. Tyranny. WOW!! If ever there's a MUST Watch, this is it. Very impressive and sweeping comparison of how authoritarian collectivist seize power in a free society and establish their tyrannies. My notes are listed below: How to recognize potential tyrants and keep them from seizing power. The urge to save humanity is always used to justify those who want to rule humanity. - ML Menken Daniel Webster on the Constitution Obstacles to Tyranny : Limited powers of government .... Due Process .... Presumption of Innocence .... Freedom to Dissent .... Armed Populace: The right to be Armed! Due Process .... 5th Amendment .... Emergency powers. there is no authorization in the US Constitution to suspend Due Process or any aspect of the Bill of Rights .... Asset Seizure Laws for criminal activities (alleged - without warrant or court order) .... Eminent Domain: seizure of private property for government uses: 2005 Kelo vs New London seizure based on jobs (economy) and tax revenue possibilities. .... 6th Amendment - right to trial by jury : plea bargaining admonition based on facing the awesome power of the government to prosecute no matter what - intimidation and threat of personal destruction. .... Forced confessions through plea bargaining. .... Indefinite detention without trial or charges: President has power to kill or issue orders without warrant, charges or trial .... Presumption of Innocence: Probable Cause .... Random stops at Border check points. 5th Amendment protections violated .... Sobriety Check Points: 4th and 5th Amendments violated - no presumption of innocence .... Random detention and questioning: airport security pat downs, housing projects, bus transportation .... The Right to Privacy: financial transactions and the IRS audit (without warrant or accusation) .... Warrant-less Spying .... Agents writing their own search warrants .... Snatch and Peek Freedom to Disse
Gary Edwards

Judge Napolitano: NSA Data Used By IRS For Tax Fraud - Liberty Crier - 0 views

  •  
    The NSA is sharing personal data with the DEA, IRS and Homeland Security. the new Diigo SUCKS!!!! Whenever you click off the diigo dialog, either to the page being bookmarked, or, another browser window, the diigo dialog closes!!! Who is the damn MORON behind this god awful design???????? MORON!! Three times I have tried to bookmark the Judge Napolitano interview, with notes on his comments. And three times the dialog blew up and disappeared. The morons at diigo don't seem to have a clue as to how end users collect information into a dialog. No clue whatsoever!
Gary Edwards

Coup d'etat -- Paul Craig Roberts - PaulCraigRoberts.org - 1 views

  •  
    Wow! excerpt: "The American people have suffered a coup d'etat, but they are hesitant to acknowledge it. The regime ruling in Washington today lacks constitutional and legal legitimacy. Americans are ruled by usurpers who claim that the executive branch is above the law and that the US Constitution is a mere "scrap of paper." An unconstitutional government is an illegitimate government. The oath of allegiance requires defense of the Constitution "against all enemies, foreign and domestic." As the Founding Fathers made clear, the main enemy of the Constitution is the government itself. Power does not like to be bound and tied down and constantly works to free itself from constraints. The basis of the regime in Washington is nothing but usurped power. The Obama Regime, like the Bush/Cheney Regime, has no legitimacy. Americans are oppressed by an illegitimate government ruling, not by law and the Constitution, but by lies and naked force. Those in government see the US Constitution as a "chain that binds our hands." The South African apartheid regime was more legitimate than the regime in Washington. The apartheid Israeli regime in Palestine is more legitimate. The Taliban are more legitimate. Muammar Gaddafi and Saddam Hussein were more legitimate. The only constitutional protection that the Bush/Obama regime has left standing is the Second Amendment, a meaningless amendment considering the disparity in arms between Washington and what is permitted to the citizenry. No citizen standing with a rifle can protect himself and his family from one of the Department of Homeland Security's 2,700 tanks, or from a drone, or from a heavily armed SWAT force in body armor. Like serfs in the dark ages, American citizens can be picked up on the authority of some unknown person in the executive branch and thrown in a dungeon, subject to torture, without any evidence ever being presented to a court or any information to the person's relatives of his/her wherea
Gary Edwards

Articles of Impeachment Against Obama - 0 views

  •  
    Sarasota, FL ( August 12, 2013) - The National Black Republican Association (NBRA) based in Sarasota, FL, headed by Chairman Frances Rice, filed Articles of Impeachment against President Barack Obama with the following language.   We, black American citizens, in order to free ourselves and our fellow citizens from governmental tyranny, do herewith submit these Articles of Impeachment to Congress for the removal of President Barack H. Obama, aka, Barry Soetoro, from office for his attack on liberty and commission of egregious acts of despotism that constitute high crimes and misdemeanors.   On July 4, 1776, the founders of our nation declared their independence from governmental tyranny and reaffirmed their faith in independence with the ratification of the Bill of Rights in 1791.   Asserting their right to break free from the tyranny of a nation that denied them the civil liberties that are our birthright, the founders declared:   "When a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security."  -  Declaration of Independence, July 4, 1776.   THE IMPEACHMENT POWER   Article II, Section IV of the United States Constitution provides: "The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors."   THE ARTICLES OF IMPEACHMENT   In his conduct of the office of President of the United States, Barack H. Obama, aka Barry Soetoro, personally and through his subordinates and agents, in violation or disregard of the constitutional rights of citizens and in violation of his constitutional duty to take care that the laws be faithfully executed, has prevented, obstructed, and impeded the administration of justice, in that:   ARTICL
Gary Edwards

What the hell just happened? 'Tyranny By Executive Order' | by Constitutional Attorney ... - 0 views

  •  
    "What the hell just happened? That is the question that many Americans should be asking themselves following the news conference where Obama unveiled his plan for destroying the Bill of Rights to the U.S. Constitution. At first glance it appeared to be a case of Obama shamelessly using the deaths of innocents, and some live children as a backdrop, to push for the passage of radical gun control measures by Congress. Most of these have no chance of passing, yet, Obama's signing of Executive orders initiating 23 so called Executive actions on gun control seemed like an afterthought. Unfortunately, that is the real story, but it is generally being overlooked. The fact is that with a few strokes of his pen Obama set up the mechanisms he will personally use to not only destroy the Second Amendment to the Constitution, but also the First, Fourth, and Fifth Amendments. It will not matter what Congress does, Obama can and will act on his own, using these Executive actions, and will be violating both the Constitution and his oath of office when he does it. Here are the sections of the Executive Order that he will use: "1. Issue a Presidential Memorandum to require federal agencies to make relevant data available to the federal background-check system." What exactly is relevant data? Does it include our medical records obtained through Obamacare, our tax returns, our political affiliations, our military background, and our credit history? I suggest that all of the above, even if it violates our fourth Amendment right to privacy will now be relevant data for determining if we are allowed to purchase a firearm. "2. Address unnecessary legal barriers, particularly relating to the Health Insurance Portability and Accountability Act, that may prevent states from making information available to the background-check system." This should be read in conjunction with section 16 of the order that says: "16. Clarify that the Affordable Care Act does not prohibit doctors
Paul Merrell

Post 9/11 security boom spells jobs and controversy | Al Jazeera America - 0 views

  • And in the years since the September 11 attacks, the security market is booming. The government spends nearly six times what it did in 2001 in the fight against terrorism, fueling a growing security apparatus that has added thousands of private contractors to its payrolls, with new levels of funding for both legacy security firms and new-fangled start-ups. Homeland security funding totaled more than half a trillion dollars over the past decade, providing new jobs for those with specialized skills.
  •  
    And growing right along with it is the government security/industrial establishment that will lobby Congress incessantly to continue the politics of fear and to grow its government spending. Bad politics is a lot like the regulation of toxic substances. Better to delay the introduction of new synthetic substances into the market than to try to get them off the market on public health or environmental grounds once they've become profitable. In 1966, the Mrak Commission identified 166 marketed pesticides that caused cancer or cell mutations in animal studies. Lots of them are still on the market, largely because they are so profitable that industry is willing to spend the money to lobby down their regulation. Meanwhile, some 10,000 new synthetic substances come onto the market each year without adequate testing. Bad politics are like that. Better to nip the problem in the bud than wait until an entire industry has been built around the government spending based on the bad politics. The politics of fear is particularly bad because it has already turned the U.S. into an Orwellian surveillance state and it's getting worse by the day.    
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
‹ Previous 21 - 40 of 152 Next › Last »
Showing 20 items per page