Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged property-seizure

Rss Feed Group items tagged

Gary Edwards

Google News - 0 views

  •  
    WOW!!! Incredible presentation concerning the history of Freedom vs. Tyranny. WOW!! If ever there's a MUST Watch, this is it. Very impressive and sweeping comparison of how authoritarian collectivist seize power in a free society and establish their tyrannies. My notes are listed below: How to recognize potential tyrants and keep them from seizing power. The urge to save humanity is always used to justify those who want to rule humanity. - ML Menken Daniel Webster on the Constitution Obstacles to Tyranny : Limited powers of government .... Due Process .... Presumption of Innocence .... Freedom to Dissent .... Armed Populace: The right to be Armed! Due Process .... 5th Amendment .... Emergency powers. there is no authorization in the US Constitution to suspend Due Process or any aspect of the Bill of Rights .... Asset Seizure Laws for criminal activities (alleged - without warrant or court order) .... Eminent Domain: seizure of private property for government uses: 2005 Kelo vs New London seizure based on jobs (economy) and tax revenue possibilities. .... 6th Amendment - right to trial by jury : plea bargaining admonition based on facing the awesome power of the government to prosecute no matter what - intimidation and threat of personal destruction. .... Forced confessions through plea bargaining. .... Indefinite detention without trial or charges: President has power to kill or issue orders without warrant, charges or trial .... Presumption of Innocence: Probable Cause .... Random stops at Border check points. 5th Amendment protections violated .... Sobriety Check Points: 4th and 5th Amendments violated - no presumption of innocence .... Random detention and questioning: airport security pat downs, housing projects, bus transportation .... The Right to Privacy: financial transactions and the IRS audit (without warrant or accusation) .... Warrant-less Spying .... Agents writing their own search warrants .... Snatch and Peek Freedom to Disse
Gary Edwards

The Declaration of Independence Affirms Unalienable Property Rights - 1 views

  •  
    I needed some background regarding the founding documents and their position on individual property rights.  Google came back with this gem!   The basic argument i'm pursuing is that socialism is unconstitutional because it's based on the selective seizure and redistribution of wealth.  Meaning, not all citizens are equal before the law.  The complaints lodged against King George in the Declaration of Independence are very much about the colonist not having the same rights of Englishmen as those whom the King favors. excerpt: the purpose of the Declaration of Independence. "Not to find out new principles, or new arguments, never before thought of, not merely to say things which had never been said before; but to place before mankind the common sense of the subject . . . ."1 The "common sense of the subject" expressed in the Declaration of Independence was that a national civil government must be based upon the "Laws of Nature and of Nature's God." The laws of nature and of nature's God dictate that all men are equally endowed by their Creator with unalienable rights to "Life, Liberty and the pursuit of Happiness." In Jefferson's day, the common sense of the subject was that the pursuit of happiness included the unalienable right of the individual to acquire, possess, protect and dispose of property. Because the purpose of civil governments was to secure unalienable rights, violations of one's unalienable right of property were subject to civil sanction. Today, however, the common sense of the subject is quite the opposite. The modern idea is that civil government properly possesses all power over all subjects of property. Any rights that may exist are derived from the civil government. Any rights to property that a person has may be regulated, limited or revoked by the civil government in order to satisfy the "public interest." Some have advocated that there are no such things as rights, but merely social duties. There is a clear distinction betwee
Gary Edwards

Michael Coffman -- Goodbye Property Rights - How Agenda 21 will destroy the Constitution - 0 views

  •  
    Excellent historical background to the Agenda 21 effort to regulate private property and eventually put all private property under the control of the UN regional governments. "Since the early 1970s there has been a systematic and deliberate effort to destroy private property rights in America through the warm and fuzzy goal of sustainable development. David Rockefeller co-founded the Club of Rome in 1968 as an elite, somewhat occult think tank. The Club of Rome published Limits to Growth in 1972, which called for severe limits on human population and state control of all development in the world to achieve "sustainable development." Sustainable development was eventually formalized into a United Nations global action plan called Agenda 21, which President Bush committed the U.S. to at the 1992 Earth Summit in Rio de Janeiro. President Clinton put into action by the creation of Sustainable America in 1996. If fully implemented, private property rights will be a thing of the past. Concurrent to Limits of Growth, New York's Governor Nelson Rockefeller introduced legislation to create the Adirondack Park Agency in 1971 patterned after Limits of Growth. It was so successful that Nelson's brother-Laurence Rockefeller-commissioned and led a study entitled Use of Land: A Citizen's Policy Guide to Urban Growth as a set of goals for America. Published in 1973, the nationally based Use of Land was a companion to the Club of Rome's internationally based Limits of Growth. The Use of Land was edited by William Reilly, who would later be appointed by George H. W. Bush as the administrator of the Environmental Protection Agency in 1989. Reilly also attended the 1992 Earth Summit in Rio de Janeiro, where he advised President Bush to sign the UN Agenda 21, thereby committing the United States to Agenda 21. Although utterly evil, the Rockefeller's effort to destroy the constitutional basis of property rights was brilliant. The thrust of the Use of Land report sup
Gary Edwards

Peter Beinart: How Ron Paul Will Change the GOP in 2012 - The Daily Beast - 2 views

  •  
    Not a big Peter Beinhart fan, but this article explains a large part of the Ron Paul phenom. After a life time as a big C Goldwater-Reagan Constitutional Conservative, this summer i made a full transition to big C Constitutional Libertarian. The tipping point for me was the GAO audit of the Federal Reserve, where they discovered $16.1 Trillion of taxpayer dollars missing from the Federal Reserve Bankster Cartel management books. It went to a who's who of international Bankster Cartel members. None of the taxpayer funded "financial collapse of 2008" bailout dollars went to the purposes chartered by their legislation. That includees the TARP $850 Billion, the Obama Stimulous $1 Trillion, and the mega FRBC $16.1 Trillion. No bad debts were purchased and retired. No rotting mortgage securities were swept up and restructured. No shovel ready jobs either. And no one in government or banksterism having caused the financial collapse went to jail. Instead, the perps feasted on the bailout dollars. The debt remains on the books of international Banksters, collecting interest, thirsting for foreclosure. The Bankster Cartel members are flush with cash, but not lending. By law (The Federal Reserve Act of December 23rd, 1913), FRBC members must keep a significant amount of their assets on "reserve" at the Federal Reserve, at 6% interest. In exchange for managing this process and the exploding money supply, the taxpayers of the USA are obligated by law to pay the FRBC 1% per year of (assets under management" (the money supply). Take note: the FRBC takes the 1% per year payment for their services in the form of GOLD!! They will not take payment in the form of paper notes labeled legal tender "Federal Reserve Notes". They only take GOLD. My transition to Constitutional Libertarian begins with a strct reading of the Constitution (the How), the Declaration of Independence, (the Why), and belief in the Rule of Law, not man. The concept of achievi
Paul Merrell

United States v. United States Dist. Court for Eastern Dist. of Mich., 407 US 297 - Sup... - 0 views

  • But a recognition of these elementary truths does not make the employment by Government of electronic surveillance a welcome development—even when employed with restraint and under judicial supervision. There is, understandably, a deep-seated uneasiness and apprehension that this capability will be used to intrude upon cherished privacy of law-abiding citizens.[13] We 313*313 look to the Bill of Rights to safeguard this privacy. Though physical entry of the home is the chief evil against which the wording of the Fourth Amendment is directed, its broader spirit now shields private speech from unreasonable surveillance. Katz v. United States, supra; Berger v. New York, supra; Silverman v. United States, 365 U. S. 505 (1961). Our decision in Katz refused to lock the Fourth Amendment into instances of actual physical trespass. Rather, the Amendment governs "not only the seizure of tangible items, but extends as well to the recording of oral statements . . . without any `technical trespass under . . . local property law.'" Katz, supra, at 353. That decision implicitly recognized that the broad and unsuspected governmental incursions into conversational privacy which electronic surveillance entails[14] necessitate the application of Fourth Amendment safeguards.
  • National security cases, moreover, often reflect a convergence of First and Fourth Amendment values not present in cases of "ordinary" crime. Though the investigative duty of the executive may be stronger in such cases, so also is there greater jeopardy to constitutionally protected speech. "Historically the struggle for freedom of speech and press in England was bound up with the issue of the scope of the search and seizure 314*314 power," Marcus v. Search Warrant, 367 U. S. 717, 724 (1961). History abundantly documents the tendency of Government—however benevolent and benign its motives —to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the Government attempts to act under so vague a concept as the power to protect "domestic security." Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent. Senator Hart addressed this dilemma in the floor debate on § 2511 (3):
  • "As I read it—and this is my fear—we are saying that the President, on his motion, could declare— name your favorite poison—draft dodgers, Black Muslims, the Ku Klux Klan, or civil rights activists to be a clear and present danger to the structure or existence of the Government."[15] The price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power. Nor must the fear of unauthorized official eavesdropping deter vigorous citizen dissent and discussion of Government action in private conversation. For private dissent, no less than open public discourse, is essential to our free society.
  • ...8 more annotations...
  • As the Fourth Amendment is not absolute in its terms, our task is to examine and balance the basic values at stake in this case: the duty of Government 315*315 to protect the domestic security, and the potential danger posed by unreasonable surveillance to individual privacy and free expression. If the legitimate need of Government to safeguard domestic security requires the use of electronic surveillance, the question is whether the needs of citizens for privacy and free expression may not be better protected by requiring a warrant before such surveillance is undertaken. We must also ask whether a warrant requirement would unduly frustrate the efforts of Government to protect itself from acts of subversion and overthrow directed against it. Though the Fourth Amendment speaks broadly of "unreasonable searches and seizures," the definition of "reasonableness" turns, at least in part, on the more specific commands of the warrant clause. Some have argued that "[t]he relevant test is not whether it is reasonable to procure a search warrant, but whether the search was reasonable," United States v. Rabinowitz, 339 U. S. 56, 66 (1950).[16] This view, however, overlooks the second clause of the Amendment. The warrant clause of the Fourth Amendment is not dead language. Rather, it has been
  • "a valued part of our constitutional law for decades, and it has determined the result in scores and scores of cases in courts all over this country. It is not an inconvenience to be somehow `weighed' against the claims of police efficiency. It is, or should 316*316 be, an important working part of our machinery of government, operating as a matter of course to check the `well-intentioned but mistakenly overzealous executive officers' who are a part of any system of law enforcement." Coolidge v. New Hampshire, 403 U. S., at 481. See also United States v. Rabinowitz, supra, at 68 (Frankfurter, J., dissenting); Davis v. United States, 328 U. S. 582, 604 (1946) (Frankfurter, J., dissenting). Over two centuries ago, Lord Mansfield held that common-law principles prohibited warrants that ordered the arrest of unnamed individuals who the officer might conclude were guilty of seditious libel. "It is not fit," said Mansfield, "that the receiving or judging of the information should be left to the discretion of the officer. The magistrate ought to judge; and should give certain directions to the officer." Leach v. Three of the King's Messengers, 19 How. St. Tr. 1001, 1027 (1765).
  • Lord Mansfield's formulation touches the very heart of the Fourth Amendment directive: that, where practical, a governmental search and seizure should represent both the efforts of the officer to gather evidence of wrongful acts and the judgment of the magistrate that the collected evidence is sufficient to justify invasion of a citizen's private premises or conversation. Inherent in the concept of a warrant is its issuance by a "neutral and detached magistrate." Coolidge v. New Hampshire, supra, at 453; Katz v. United States, supra, at 356. The further requirement of "probable cause" instructs the magistrate that baseless searches shall not proceed. These Fourth Amendment freedoms cannot properly be guaranteed if domestic security surveillances may be conducted solely within the discretion of the Executive 317*317 Branch. The Fourth Amendment does not contemplate the executive officers of Government as neutral and disinterested magistrates. Their duty and responsibility are to enforce the laws, to investigate, and to prosecute. Katz v. United States, supra, at 359-360 (DOUGLAS, J., concurring). But those charged with this investigative and prosecutorial duty should not be the sole judges of when to utilize constitutionally sensitive means in pursuing their tasks. The historical judgment, which the Fourth Amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and protected speech.[17]
  • It may well be that, in the instant case, the Government's surveillance of Plamondon's conversations was a reasonable one which readily would have gained prior judicial approval. But this Court "has never sustained a search upon the sole ground that officers reasonably expected to find evidence of a particular crime and voluntarily confined their activities to the least intrusive means consistent with that end." Katz, supra, at 356-357. The Fourth Amendment contemplates a prior judicial judgment,[18] not the risk that executive discretion may be reasonably exercised. This judicial role accords with our basic constitutional doctrine that individual freedoms will best be preserved through a separation of powers and division of functions among the different branches and levels of Government. Harlan, Thoughts at a Dedication: Keeping the Judicial Function in Balance, 49 A. B. A. J. 943-944 (1963). The independent check upon executive discretion is not 318*318 satisfied, as the Government argues, by "extremely limited" post-surveillance judicial review.[19] Indeed, post-surveillance review would never reach the surveillances which failed to result in prosecutions. Prior review by a neutral and detached magistrate is the time-tested means of effectuating Fourth Amendment rights. Beck v. Ohio, 379 U. S. 89, 96 (1964).
  • But we do not think a case has been made for the requested departure from Fourth Amendment standards. The circumstances described do not justify complete exemption of domestic security surveillance from prior judicial scrutiny. Official surveillance, whether its purpose be criminal investigation or ongoing intelligence gathering, risks infringement of constitutionally protected privacy of speech. Security surveillances are especially sensitive because of the inherent vagueness of the domestic security concept, the necessarily broad and continuing nature of intelligence gathering, and the temptation to utilize such surveillances to oversee political dissent. We recognize, as we have before, the constitutional basis of the President's domestic security role, but we think it must be exercised in a manner compatible with the Fourth Amendment. In this case we hold that this requires an appropriate prior warrant procedure. We cannot accept the Government's argument that internal security matters are too subtle and complex for judicial evaluation. Courts regularly deal with the most difficult issues of our society. There is no reason to believe that federal judges will be insensitive to or uncomprehending of the issues involved in domestic security cases. Certainly courts can recognize that domestic security surveillance involves different considerations from the surveillance of "ordinary crime." If the threat is too subtle or complex for our senior law enforcement officers to convey its significance to a court, one may question whether there is probable cause for surveillance.
  • Nor do we believe prior judicial approval will fracture the secrecy essential to official intelligence gathering. The investigation of criminal activity has long 321*321 involved imparting sensitive information to judicial officers who have respected the confidentialities involved. Judges may be counted upon to be especially conscious of security requirements in national security cases. Title III of the Omnibus Crime Control and Safe Streets Act already has imposed this responsibility on the judiciary in connection with such crimes as espionage, sabotage, and treason, §§ 2516 (1) (a) and (c), each of which may involve domestic as well as foreign security threats. Moreover, a warrant application involves no public or adversary proceedings: it is an ex parte request before a magistrate or judge. Whatever security dangers clerical and secretarial personnel may pose can be minimized by proper administrative measures, possibly to the point of allowing the Government itself to provide the necessary clerical assistance.
  • Thus, we conclude that the Government's concerns do not justify departure in this case from the customary Fourth Amendment requirement of judicial approval prior to initiation of a search or surveillance. Although some added burden will be imposed upon the Attorney General, this inconvenience is justified in a free society to protect constitutional values. Nor do we think the Government's domestic surveillance powers will be impaired to any significant degree. A prior warrant establishes presumptive validity of the surveillance and will minimize the burden of justification in post-surveillance judicial review. By no means of least importance will be the reassurance of the public generally that indiscriminate wiretapping and bugging of law-abiding citizens cannot occur.
  • As the surveillance of Plamondon's conversations was unlawful, because conducted without prior judicial approval, the courts below correctly held that Alderman v. United States, 394 U. S. 165 (1969), is controlling and that it requires disclosure to the accused of his own impermissibly intercepted conversations. As stated in Alderman, "the trial court can and should, where appropriate, place a defendant and his counsel under enforceable orders against unwarranted disclosure of the materials which they may be entitled to inspect." 394 U. S., at 185.[21]
Paul Merrell

The Ron Paul Institute for Peace and Prosperity : Against Ukraine War? Obama May Seize ... - 0 views

  • Do you, like 56 percent of the US population, believe that the US should "not get too involved" in the Ukraine situation? Do you think that the US administration putting us on a war footing with Russia is a bad idea? Are you concerned that the new, US-backed leaders of Ukraine -- not being elected -- might lack democratic legitimacy? Are you tempted to speak out against US policy in Ukraine; are you tempted to criticize the new Ukrainian regime?Be careful what you say. Be careful what you write. President Obama has just given himself the authority to seize your assets.According to the president's recent Executive Order, "Blocking Property of Certain Persons Contributing to the Situation in Ukraine" (first reported by WND's Aaron Klein), the provisions for seizure of property extend to "any United States person." That means "any United States citizen, permanent resident alien, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person in the United States."
  • Declaring a "national emergency" over the planned referendum in Crimea to determine whether or not to join Russia, the US president asserts that asset seizure is possible for any US person "determined by the Secretary of the Treasury, in consultation with the Secretary of State": (i) to be responsible for or complicit in, or to have engaged in, directly or indirectly, any of the following:  (A) actions or policies that undermine democratic processes or institutions in Ukraine;  (B) actions or policies that threaten the peace, security, stability, sovereignty, or territorial integrity of Ukraine; or  (C) misappropriation of state assets of Ukraine or of an economically significant entity in Ukraine; The Executive Order is, as usual, so broadly written that it leaves nearly everything open to interpretation.
  • For example, what are "direct or indirect...actions or policies that threaten the peace, security, stability, sovereignty, or territorial integrity of Ukraine"? Could that be someone writing an article that takes issue with the US policy that the Crimea referendum is illegal and illegitimate? Could it be standing up in a public meeting and expressing the view that Ukraine would be better off with nationwide referenda to determine whether other regions should become autonomous or joined to neighboring countries? What if a Polish-American appears on a radio or television program suggesting that parts of Poland incorporated into Ukraine after WWII should be returned to Polish authority?Probably the president will not seize the assets of Americans in the scenarios above. But he says he can.As the US government moves ever-closer to war with Russia, it is reasonable to expect these attempts to squash dissent and to remove "threats" to the administration's position. The historical pattern is clear.
  • ...1 more annotation...
  • Recall Eugene V. Debs sentenced to ten years in prison for his opposition to US involvement in WWI. Recall Japanese-Americans interned in camps during WWII because their loyalty to the United States was deemed suspect. The stage is being set to silence dissent. It sounds alarmist to read this, agreed. Probably the president will not use his Executive Order to seize the assets of Americans who disagree with his Ukraine policy. But he says he can.Careful what you say.
Gary Edwards

Articles: A Property Rights Revolution for 2013 - 0 views

  •  
    Very interesting article on property rights in Virgina, and the how local citizens are fighting against government politicians and their kleptocracy to protect those rights......... excerpt: "A previously apolitical organic farmer in Virginia has set off a property rights revolution that would make Founders Thomas Jefferson, James Madison, and author of Virginia's Declaration of Rights George Mason proud. Martha Boneta had a business license for her tiny farm store in scenic Paris, Virginia, yet she was threatened with fines of up to $5,000 per violation per day for selling organic tea and wool products crafted from her rescued animals, and for hosting a birthday party for eight 10-year-old girls. Officials from Fauquier County using zoning ordinances to bully Mrs. Boneta never obtained a warrant nor set foot on her property to gather actual evidence.  Instead a county bureaucrat relied on unscrupulous, unlawful methods to make these charges against Mrs. Boneta.  Her store remains closed out of fear of further uncertain charges carrying even criminal penalties.  The bullying bureaucrat ignored due process of law and American rules of evidence because she thinks she is the law, which is a common phenomenon used to intimidate citizens into forfeiting their rights. The county also tried to cite Martha for having a boarding facility without a permit.  It appears that the county did not like the fact that she and Christian college students interning on Spring Break openly prayed over the crops and farm animals.  To cure this government lawbreaking and protect farm rights, Delegate Scott Lingamfelter introduced H.B. 1430, the Boneta Bill, to amend the Virginia Right to Farm Act.  As introduced, the bill would have done three things: (1) clarify that the flawed, toothless Right to Farm Act protects farmers' commerce, (2) expressly protect constitutional rights on farms, and (3) provide remedies against local government officials who violate the Right to Farm Act."
Paul Merrell

EFF to Court: U.S. Warrants Don't Apply to Overseas Emails | Electronic Frontier Founda... - 0 views

  • The Electronic Frontier Foundation (EFF) has urged a federal court to block a U.S. search warrant ordering Microsoft to turn over a customer's emails held in an overseas server, arguing that the case has dangerous privacy implications for Internet users everywhere. The case started in December of last year, when a magistrate judge in New York signed a search warrant seeking records and emails from a Microsoft account in connection with a criminal investigation. However, Microsoft determined that the emails the government sought were on a Microsoft server in Dublin, Ireland. Because a U.S. judge has no authority to issue warrants to search and seize property or data abroad, Microsoft refused to turn over the emails and asked the magistrate to quash the warrant. But the magistrate denied Microsoft's request, ruling there was no foreign search because the data would be reviewed by law enforcement agents in the U.S.
  • Microsoft appealed the decision. In an amicus brief in support of Microsoft, EFF argues the magistrate's rationale ignores the fact that copying the emails is a "seizure" that takes place in Ireland. "The Fourth Amendment protects from unreasonable search and seizure. You can't ignore the 'seizure' part just because the property is digital and not physical," said EFF Staff Attorney Hanni Fakhoury. "Ignoring this basic point has dangerous implications – it could open the door to unfounded law enforcement access to and collection of data stored around the world."
  • For the full brief in this case:https://www.eff.org/document/eff-amicus-brief-support-microsoft
Gary Edwards

Member List - ICLEI Local Governments for Sustainability USA - 0 views

  •  
    ICLEI is a UN Agenda 21 initiative.  It's a direct assault on property ownership rights.  I had my own first hand view of these Marxists at work in the small town of Belmont California, when the Fire Chief presented a plan to turn 2/3rd's of the cities land over to the State by declaring it "a risk fire hazard zone".  The declaration would move the 2/3rds to State control and regulation, dramatically increasing the costs of building codes compliance and insurance, while effectively ending development and property improvement.  It would also end the sale of homes in these sectors since Home Owners insurance and property compliance would be prohibitively expensive.  Agenda 21 at work.  Right next door.   From TeaPartyORG:  http://goo.gl/QHIOS ......   "The International Council for Local Environmental Initiatives (ICLEI) is a conglomerate of 600 national, regional, and local government associations who promote "sustainable development" and protection of the environment because of man-made global warming that does not exist. "Sustainable development" is the United Nations effort to contain and limit economic development in developed countries and thus control population growth. It is "sustainable de-growth," plain and simple. The focus is "low-income agriculture" and to set limits on the developed world. United Nations and its affiliates believe that first world countries polluted significantly during their development while urging third world countries to reduce pollution thus impeding their growth. Implementation of"sustainable development" would revert our society to a pre-modern lifestyle. ICLEI wants to keep the environment as pristine as possible through "ideal-seeking behavior." These euphemisms are not clearly defined in terms of what or who will evaluate or set the standards for this "ideal-seeking behavior." Agenda 21 sets up the global infrastructure to manage, count, and control assets. It is not concerned with
Gary Edwards

The Farce-Hole Gets Deeper: Obama's "Bankster Robo-Settlement For Votes" Cost To Taxpay... - 1 views

  •  
    Incredible.  The Banksters were caught perpetrating a massive fraud on mortgage holders in default.  They set up document mills packed with "robo" signers forging legal documents to prove in a foreclosure procedure that they are in fact the mortgage provider for that property.  The fraud itself revelas the essentials of what went wrong with the entire mortgage securities scam that brought down the worlds financial structures in 2008. The MERS (Mortgage Electronic Registration systems, Inc.) electronic database was set up in 1995 as a means to enable participating Banksters to side step the quilt of State and County laws governing real estate transactions, non judicial foreclosure rights, and property ownership recording requirements.  MERS was essential to the bundling and trade in mortgage-backed securities.  In essence, MERS replaced public recordation requirements with a private, Bankster owned one. This all sounded good until waves of home owners facing default began to take their banksters to court.  Turns out that MERS mortgages lacked the legal documentation to establish a legal chain of ownership.  Realizing their mistake, and with thousands upon thousands of foreclosures hanging in the balance, the Banksters created the robo document industry, forging millions of foreclosure documents overnight.  Criminal fraud on steroids. The banksters got caught, with State Attorney Generals launching massive consumer protection law suits against the big banksters.  This put a halt to the illegal foreclosures, forcing banksters to turn to short sales on homes in default.  The short sale industry rocketed in 2011, but the to perfect a short sale, the banksters were taking the loss; sometimes as much as $100K to $250K per home.  But the real estate market inventory was effectively being cleared and market pricing corrected. The Banksters were unhappy.  Seeking to get back on the foreclosure track but facing what amounted to across the boards class action la
Gary Edwards

California Government Hides Billions From Taxpayers « REALITY BLOG - 0 views

  •  
    This must read post from Clint Richardson is a Bay Area Patriots catch.  Stunning stuff.  Clint walks us through the CAFR - Comprehensive Annual Rinancial Report - for the State of California.  Governor Moonbeam is claiming that the State has a $16 Trillion dollar debt, and he's threatening to shut down public education unless California citizens agree to massive tax hikes.  Clint rips through the entire annual report discovering that Gov Moonbeam is not only lying, but that there is an official "debt increase" methodology in place to deceive citizens into voting for government seizure of their property and prosperity.  Note also that this local-state-federal "debt bomb" methodology involves conversion of tax dollars into hard assets.  Like property and productive assets.  Awful, reprehensible stuff.  Brace yourselves. excerpt: the Government is lying to you.  It promotes debt and hides assets. This should not be construed as the only hidden wealth in the California State government… just the wealth we have uncovered today. And you must understand that this is only the State government's CAFR. Each County, city, district, and other local governments and pension funds have their own CAFR's with their own funds and hidden wealth - hidden in plain sight. Totals for Los Angeles, San Francisco, and other counties and municipalities in California will, when combined together, dwarf the investment wealth of the State government alone. They will tell you that some of these investments are restricted and not able to be used for taxpayer services. And as a taxpayer, that should really piss you off! They will also tell you that laws are in place that don't allow these funds to be transferred for other purposes other than what they are designated for. And yet Obama and State legislators continuously speak of raiding the pension funds for their own benefit. In their opinion, it's government's money after all, not the employees or the taxpayers. But of
Gary Edwards

The worst rise to the top - Mises Economic Blog - 0 views

  •  
    Very interesting post from Douglas French concerning the repubican primaries and F.A. Hayek's "Road to Serfom" comments on modern politics. Fascinating stuff. Hayek argues that, in politics, "the worst rise to the top", and he outlines three reasons why: .... Choosing is the problem. Informed people are more "nuanced" - they have many divergent opinions and views. Uniformity however drives the group dynamics behind a democratic process. Uniformity of opinion rules, and the less informed a person is, the more uniform and drawn to larger groups they will be. The "lowest common denominator" rule rules the democratic process. Mobocracy at work. .... Those on top, pursuing the political leadership positions, must appeal to the masses and weave together the groups driven by the "lowest common denominator" rule. The docile and gullible "are ready to accept whatever values and ideology drummed into them". Advantage to big media, the socialist assemblage ruling public education, and public workers unions. ..... Third, political leaders "don't promote a positive agenda, but a negative one of hating an enemy and envy of the wealthy. To appeal to the masses, leaders preach an "us" against "them" program." The great unwashed and uninformed being guided and driven "by emotion and passion rather than critical thinking." Not sure i agree with any of this, much as i admire and recognize the importance of Hayek and his seminal, game changing "Road to Serfdom". One reason is that some of the most informed people i know are goose stepping socialist hell bent on ending individual liberty - as in "life, liberty and the pursuit of happiness", in exchange for Marxist social equality. Another reason i would disagree is that the salt of the earth "bitter clingers" Reagan Conservatives that rock the Tea Party movement are exactly what the establishment elites call the "uninformed masses". Not sure if that's what Hayek meant, but his viewpoint does look a
Gary Edwards

PETER SCHIFF: The Housing Bust Was Just A Preview For The Coming Catastrophe - Business... - 0 views

  •  
    Peter Schiff talks about his new book "The Real Crash: America's Coming Bankruptcy, How to Save Yourself and Your Country".  I caught the Coast-to-Coast "Financial Crisis Special" interview with Peter earlier this week where he spoke on the "Real Crash" issues.  Stunning stuff.  His hour on Coast was followed by Lindsey Williams who pointed out that the New World Order - Illuminati - Bankster trigger point would be signaled by a collapse in the derivatives market. The derivatives market is now over a quadrillion dollars of  casino style gambling.  This is where Banksters make huge bets on things like whether or not interest rates will go up or down.  Then they take out insurance to cover their bets, which further compounds the cost.  Recent events like the Jon Corzine MF Global gamble that the Federal Reserve Bankster Cartel would backstop explosive European sovereign bankster debt are the first indications of collapse in the derivatives market.  We now know that JP Morgan placed similar bets on a European bailout by the Federal Reserve and World Bank, and lost big.  The only difference is that Corzine robbed his clients personal accounts to cover his bets. While Schiff argues the facts on the table, the "what", Lindsay argued the "why"; claiming that this escalating debt mess is all by design.  Lindsay claims that an operational fundamental of the New World Order elites is to first overturn the USA Constitution.  Using a Machiavellian Principle known as, "out of chaos comes order", they seek to de-stabilize and overthrow the USA Constitutional Republic using massive and crushing debt to first destroy the dollar currency.  This will create massive chaos requiring martial law and government seizure of private property and production. Peter Schiff warns that the government is driving us deeper into debt at exactly the time we should be saving and investing those savings in future private sector productivity.  Lindsay argues that this is all by desig
Gary Edwards

The Libertarian View: Are Tariffs Bad? - 1 views

  •  
    As many know, i spent quite a bit of time working for a Chinese Company seeking to enter the USA-European software market.  My task was to research the market, discover and define a market opportunity, design the product, and then work as product manager to get that service to market.  I took this job to better understand the Chinese marketplace and how sovereign Chinese companies work.  What i learned is how the Chinese seek to exploit and totally dominate open markets.  Software is just a category whose time has come.  and there are thousands of Chinese companies lining up.  The first step though is to fine tune the existing blueprint used by other Sina sovereigns.  amazing stuff. My take away from this experience is that the USA MUST set up a 30% tariff on ALL imports, and do so IMMEDIATELY!!!  Yesterday is not soon enough! As a newly minted libertarian, i wondered about the obvious conflict with Austrian Economics and their dedication to free markets and free trade?  I found the answer at this Libertarian forum, where many members were in heated discussion.  Comment #7 sums it up best i think.  Including a link to Ron Paul's Tariff-NAFTA speech. The thing is, the 30% Tariff should be part of an overall TAX REDUCTION PLAN.  I support the FAIR TAX and the Balanced Budget Amendment.  As an alternative to the Fair Tax, I would also support a 17% flat tax with no exceptions.  The ideal situation being an immediate, uncompromising, no exceptions 30% tariff on ALL imports coupled with the Fair Tax and the Balanced Budget Amendment.   And yes, i do believe this plan is consistent with the Founding Fathers Constitution.  But it took some kind of research to establish that opinion.   I've also concluded that "conservatism" is a convenient philosophical vehicle for the corrupt crony corporatism of both the military-industrial-complex, banksters and, international corporations.  Free trade and open markets concepts are perverted to become a thin veil
Gary Edwards

Bill of Rights: Alexander Hamilton, Federalist, no. 84, 575--81 - 0 views

  • The most considerable of these remaining objections is, that the plan of the convention contains no bill of rights. Among other answers given to this, it has been upon different occasions remarked, that the constitutions of several of the states are in a similar predicament.
  • It has been several times truly remarked, that bills of rights are in their origin, stipulations between kings and their subjects, abridgments of prerogative in favor of privilege, reservations of rights not surrendered to the prince.
  • It is evident, therefore, that according to their primitive signification, they have no application to constitutions professedly founded upon the power of the people, and executed by their immediate representatives and servants.
  • ...6 more annotations...
  • the people surrender nothing, and as they retain every thing, they have no need of particular reservations.
  • I will not contend that such a provision would confer a regulating power; but it is evident that it would furnish, to men disposed to usurp, a plausible pretence for claiming that power.
  • I go further, and affirm that bills of rights, in the sense and in the extent in which they are contended for, are not only unnecessary in the proposed constitution, but would even be dangerous. They would contain various exceptions to powers which are not granted; and on this very account, would afford a colourable pretext to claim more than were granted.
  • For why declare that things shall not be done which there is no power to do? Why for instance, should it be said, that the liberty of the press shall not be restrained, when no power is given by which restrictions may be imposed?
  • "We the people of the United States, to secure the blessings of liberty to ourselves and our posterity, do ordain and establish this constitution for the United States of America."
  • The truth is, after all the declamation we have heard, that the constitution is itself in every rational sense, and to every useful purpose, A BILL OF RIGHTS
  •  
    University of Chicago publication on the Web of all Federalist Papers.  The question i was researching had to do with Michael Hickens comparison of Hamilton to FDR (Franklin Delano Roosevelt).  I was looking for some are where there might be some measure of "agreement" between Hamilton and FDR. Hamilton of course is known as a great defender of personal liberty, LIMITED government, and the importance of ENUMERATED powers in the Constitution.  In this paper he argues that the call for a Bill of Rights added to the proposed Constitution is uneccessary exactly because the people did not grant to the government the powers to infringe or take away any freedoms/rights to begin with.  He further argues that enumerating these "rights" would suggest that somehow the federal government would have this power!  Even though it's enumerated in the Constitution.  So why write an enumerated Constitution if you have to further enumerate the rights of the people beyond the limits of government? FDR of course is the great statist/socialist who believed that the Constitution doesn't go far enough in it's obligations to CARE for the people's needs.  So FDR proposed a second Bill of Rights that expanded the governments responsibilities and POWER to provide for damn near every physical and material need a person might ever have.   Two interesting "value statements" to consider.  Guess which one would be supported by that great Federalist, Hamilton.  And which by that great statist/socialist, FDR? Karl Marx: "From each, according to his ability; to each, according to his need" The Declaration of Independence: "We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness. - That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, " And then there's t
Paul Merrell

Secret to Prism program: Even bigger data seizure - 0 views

  • The revelation of Prism this month by the Washington Post and Guardian newspapers has touched off the latest round in a decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is essential to keep the nation safe. But interviews with more than a dozen current and former government and technology officials and outside experts show that, while Prism has attracted the recent attention, the program actually is a relatively small part of a much more expansive and intrusive eavesdropping effort. Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA effort that snatches data as it passes through the fiber optic cables that make up the Internet's backbone. That program, which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for analysis.
  • Whether by clever choice or coincidence, Prism appears to do what its name suggests. Like a triangular piece of glass, Prism takes large beams of data and helps the government find discrete, manageable strands of information. The fact that it is productive is not surprising; documents show it is one of the major sources for what ends up in the president's daily briefing. Prism makes sense of the cacophony of the Internet's raw feed. It provides the government with names, addresses, conversation histories and entire archives of email inboxes.
  • The NSA is prohibited from spying on Americans or anyone inside the United States. That's the FBI's job and it requires a warrant. Despite that prohibition, shortly after the Sept. 11 terrorist attacks, President George W. Bush secretly authorized the NSA to plug into the fiber optic cables that enter and leave the United States, knowing it would give the government unprecedented, warrantless access to Americans' private conversations. Tapping into those cables allows the NSA access to monitor emails, telephone calls, video chats, websites, bank transactions and more. It takes powerful computers to decrypt, store and analyze all this information, but the information is all there, zipping by at the speed of light. "You have to assume everything is being collected," said Bruce Schneier, who has been studying and writing about cryptography and computer security for two decades. The New York Times disclosed the existence of this effort in 2005. In 2006, former AT&T technician Mark Klein revealed that the company had allowed the NSA to install a computer at its San Francisco switching center, a key hub for fiber optic cables.
  • ...11 more annotations...
  • Many of the people interviewed for this report insisted on anonymity because they were not authorized to publicly discuss a classified, continuing effort. But those interviews, along with public statements and the few public documents available, show there are two vital components to Prism's success. The first is how the government works closely with the companies that keep people perpetually connected to each other and the world. That story line has attracted the most attention so far. The second and far murkier one is how Prism fits into a larger U.S. wiretapping program in place for years.
  • The government has said it minimizes all conversations and emails involving Americans. Exactly what that means remains classified. But former U.S. officials familiar with the process say it allows the government to keep the information as long as it is labeled as belonging to an American and stored in a special, restricted part of a computer. That means Americans' personal emails can live in government computers, but analysts can't access, read or listen to them unless the emails become relevant to a national security investigation. The government doesn't automatically delete the data, officials said, because an email or phone conversation that seems innocuous today might be significant a year from now. What's unclear to the public is how long the government keeps the data. That is significant because the U.S. someday will have a new enemy. Two decades from now, the government could have a trove of American emails and phone records it can tap to investigative whatever Congress declares a threat to national security.
  • The Bush administration shut down its warrantless wiretapping program in 2007 but endorsed a new law, the Protect America Act, which allowed the wiretapping to continue with changes: The NSA generally would have to explain its techniques and targets to a secret court in Washington, but individual warrants would not be required. Congress approved it, with Sen. Barack Obama, D-Ill., in the midst of a campaign for president, voting against it.
  • That's one example of how emails belonging to Americans can become swept up in the hunt. In that way, Prism helps justify specific, potentially personal searches. But it's the broader operation on the Internet fiber optics cables that actually captures the data, experts agree. "I'm much more frightened and concerned about real-time monitoring on the Internet backbone," said Wolf Ruzicka, CEO of EastBanc Technologies, a Washington software company. "I cannot think of anything, outside of a face-to-face conversation, that they could not have access to."
  • When the Protect America Act made warrantless wiretapping legal, lawyers and executives at major technology companies knew what was about to happen.
  • For years, the companies had been handling requests from the FBI. Now Congress had given the NSA the authority to take information without warrants. Though the companies didn't know it, the passage of the Protect America Act gave birth to a top-secret NSA program, officially called US-98XN. It was known as Prism. Though many details are still unknown, it worked like this:
  • Facebook said it received between 9,000 and 10,000 requests for data from all government agencies in the second half of last year. The social media company said fewer than 19,000 users were targeted.
  • Every company involved denied the most sensational assertion in the Prism documents: that the NSA pulled data "directly from the servers" of Microsoft, Yahoo, Google, Facebook, AOL and more. Technology experts and a former government official say that phrasing, taken from a PowerPoint slide describing the program, was likely meant to differentiate Prism's neatly organized, company-provided data from the unstructured information snatched out of the Internet's major pipelines. In slide made public by the newspapers, NSA analysts were encouraged to use data coming from both Prism and from the fiber-optic cables. Prism, as its name suggests, helps narrow and focus the stream. If eavesdroppers spot a suspicious email among the torrent of data pouring into the United States, analysts can use information from Internet companies to pinpoint the user. With Prism, the government gets a user's entire email inbox. Every email, including contacts with American citizens, becomes government property. Once the NSA has an inbox, it can search its huge archives for information about everyone with whom the target communicated. All those people can be investigated, too.
  • What followed was the most significant debate over domestic surveillance since the 1975 Church Committee, a special Senate committee led by Sen. Frank Church, D-Idaho, reined in the CIA and FBI for spying on Americans. Unlike the recent debate over Prism, however, there were no visual aids, no easy-to-follow charts explaining that the government was sweeping up millions of emails and listening to phone calls of people accused of no wrongdoing.
  • A few months after Obama took office in 2009, the surveillance debate reignited in Congress because the NSA had crossed the line. Eavesdroppers, it turned out, had been using their warrantless wiretap authority to intercept far more emails and phone calls of Americans than they were supposed to. Obama, no longer opposed to the wiretapping, made unspecified changes to the process. The government said the problems were fixed.
  • Schneier, the author and security expert, said it doesn't really matter how Prism works, technically. Just assume the government collects everything, he said. He said it doesn't matter what the government and the companies say, either. It's spycraft, after all. "Everyone is playing word games," he said. "No one is telling the truth."
  •  
    Associated Press is now doing its job with a masterful overview of NSA capabilities, discussing how NSA scoops up all "backbone" telecommunications, then uses PRISM to narrow down the specific communications they decide to look at. This one is a "must read" article if you're interested in the NSA scandal. It ties a lot of the pieces together.  
Gary Edwards

The Golden Calf of Increased Tax Rates | RedState - 0 views

  • Economics and a degree of common sense also tells us that we will always be more cautious in spending our money than a third party will be.
  • Milton Friedman used this brief explanation to drive home the point. There are four ways to spend money.
  • You can spend your money on yourself, and when you do both the cost of the product and the quality matters.
  • ...7 more annotations...
  • Finally, the most inefficient method to spend money of the four is other people, spending other people’s money, on other people. Cost doesn’t matter because it is not your money and quality doesn’t matter because it is not your product or service either.
  • Other people can spend other people’s money on themselves, in this case cost doesn’t matter, as it is not your money, but quality does as you are buying the product or service for yourself.
  • You can spend your money on someone else, in this case cost matters but quality is not as important.
  • In the final case, I just described to you government spending. And, to be clear, government spending is
  • taxation, while deficit spending is future taxation plus interest. It cannot be any other way.
  • Finally, we are frequently rhetorically assaulted by the “fair share” moralists on the left.
  • The paradoxical truth is that the tax rates are too high today and tax revenues are too low and the soundest way to raise revenues in the long run is to cut rates now.
  •  
    Good argument explaining the relationship between tax rates and tax receipts. excerpt: Economics and a degree of common sense also tells us that we will always be more cautious in spending our money than a third party will be. Milton Friedman used this brief explanation to drive home the point. There are four ways to spend money. You can spend your money on yourself, and when you do both the cost of the product and the quality matters. You can spend your money on someone else, in this case cost matters but quality is not as important. Other people can spend other people's money on themselves, in this case cost doesn't matter, as it is not your money, but quality does as you are buying the product or service for yourself. Finally, the most inefficient method to spend money of the four is other people, spending other people's money, on other people. Cost doesn't matter because it is not your money and quality doesn't matter because it is not your product or service either. In the final case, I just described to you government spending. And, to be clear, government spending is taxation, while deficit spending is future taxation plus interest. It cannot be any other way. Arguing that accumulating debt on your personal credit card is not going to require you to take money from your account in the future to pay the debt is foolish, therefore, why would you think that the national credit card would obey a different set of economic rules? Finally, we are frequently rhetorically assaulted by the "fair share" moralists on the left. ....................... This is an argument where they are correct on principle and completely devoid of substance regarding evidence...........
Paul Merrell

Whistleblowers File $100 Million Suit against NSA, FBI - WhoWhatWhy - 0 views

  • In a $100 million lawsuit that has garnered virtually no public attention, five National Security Agency (NSA) whistleblowers are accusing the federal government of illegally retaliating against them for alerting the NSA and Congress to a waste of taxpayer funds that benefitted a well-connected contractor.The lawsuit tells the story of the infancy of the NSA’s efforts to surveil the Internet. Back then, there were two programs for the spying agency to choose from — and the first was called ThinThread. It had been developed internally, was comparatively inexpensive, had been tested and proven to be effective, and included safeguards preventing the spying on Americans without a court warrant. The other was called Trailblazer. It did not include such safeguards, had not yet been shown to be effective, and cost 1,000 times more than ThinThread. Instead of being developed internally, it was to be outsourced to Science Applications International Corporation (SAIC), a politically connected contractor.The NSA chose Trailblazer.
  • In response, four NSA employees who had worked on ThinThread, as well as a congressional staffer, alerted Congress and the Office of the Inspector General of the NSA that the agency was wasting taxpayer funds. That is when their troubles began, according to the lawsuit.It alleges that the defendants, which include the NSA, FBI, and the Department of Justice, as well as individuals associated with them, “knowingly and intentionally fabricated” a claim that the plaintiffs leaked classified information to New York Times reporters Eric Lichtblau and James Risen.“[The defendants] used this fabricated claim for retaliation, illegal searches and seizures, physical invasion of their residences and places of business, temporary false imprisonment, the confiscation of their property, cancellation of security clearances leading to the loss of their jobs and employment, intentional infliction of emotional distress, harassment and intimidation,” the lawsuit alleges.It also states that the defendants should have known that the plaintiffs were not the leaks because the NSA “was tracking all domestic telephone calls for the supposed purpose of protecting national security.”
  • The plaintiffs are former NSA employees Thomas Drake, Ed Loomis, J. Kirk Wiebe, William Binney, and former congressional staffer Diane Roark. They seek “punitive damages in excess of $100 million because of Defendants [sic] callous and reckless indifference and malicious acts …” as well as well as an additional $15 million for lost wages and to cover costs.Larry Klayman, the prominent conservative public interest attorney and founder of Judicial Watch, filed the suit on August 20th. However, it is expected to be amended this week, and it is possible that additional publicity for the case will be sought then.
Paul Merrell

FBI demands new powers to hack into computers and carry out surveillance | US news | Th... - 0 views

  • The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement in order to seize significant new powers to hack into and carry out surveillance of computers throughout the US and around the world. Civil liberties groups warn that the proposed rule change amounts to a power grab by the agency that would ride roughshod over strict limits to searches and seizures laid out under the fourth amendment of the US constitution, as well as violate first amendment privacy rights. They have protested that the FBI is seeking to transform its cyber capabilities with minimal public debate and with no congressional oversight. The regulatory body to which the Department of Justice has applied to make the rule change, the advisory committee on criminal rules, will meet for the first time on November 5 to discuss the issue. The panel will be addressed by a slew of technology experts and privacy advocates concerned about the possible ramifications were the proposals allowed to go into effect next year.
  • “This is a giant step forward for the FBI’s operational capabilities, without any consideration of the policy implications. To be seeking these powers at a time of heightened international concern about US surveillance is an especially brazen and potentially dangerous move,” said Ahmed Ghappour, an expert in computer law at University of California, Hastings college of the law, who will be addressing next week’s hearing. The proposed operating changes related to rule 41 of the federal rules of criminal procedure, the terms under which the FBI is allowed to conduct searches under court-approved warrants. Under existing wording, warrants have to be highly focused on specific locations where suspected criminal activity is occurring and approved by judges located in that same district. But under the proposed amendment, a judge can issue a warrant that would allow the FBI to hack into any computer, no matter where it is located. The change is designed specifically to help federal investigators carry out surveillance on computers that have been “anonymized” – that is, their location has been hidden using tools such as Tor.
  • Were the amendment to be granted by the regulatory committee, the FBI would have the green light to unleash its capabilities – known as “network investigative techniques” – on computers across America and beyond. The techniques involve clandestinely installing malicious software, or malware, onto a computer that in turn allows federal agents effectively to control the machine, downloading all its digital contents, switching its camera or microphone on or off, and even taking over other computers in its network.
  • ...2 more annotations...
  • Civil liberties and privacy groups are particularly alarmed that the FBI is seeking such a huge step up in its capabilities through such an apparently backdoor route. Soghoian said of next week’s meeting: “This should not be the first public forum for discussion of an issue of this magnitude.” Jennifer Granick, director of civil liberties at the Stanford center for internet and society, said that “this is an investigative technique that we haven’t seen before and we haven’t thrashed out the implications. It absolutely should not be done through a rule change – it has to be fully debated publicly, and Congress must be involved.” Ghappour has also highlighted the potential fall-out internationally were the amendment to be approved. Under current rules, there are no fourth amendment restrictions to US government surveillance activities in other countries as the US constitution only applies to domestic territory.
  • Another insight into the expansive thrust of US government thinking in terms of its cyber ambitions was gleaned recently in the prosecution of Ross Ulbricht, the alleged founder of the billion-dollar drug site the Silk Road. Experts suspect that the FBI hacked into the Silk Road server, that was located in Reykjavik, Iceland, though the agency denies that. In recent legal argument, US prosecutors claimed that even if they had hacked into the server without a warrant, it would have been justified as “a search of foreign property known to contain criminal evidence, for which a warrant was not necessary”.
  •  
    This rule change has been in the works during the last year.  "The change is designed specifically to help federal investigators carry out surveillance on computers that have been "anonymized" - that is, their location has been hidden using tools such as Tor."  Are we dizzy yet? The State Department is pushing the use of TOR by dissidents in nations whose governments State and the CIA intends to overthrow. Meanwhile, Feed Bag, Inc. wants use of TOR to be sufficient grounds for installing malware on anyone using it to make their systems and all their systems can see or hear be an open book. Let's see. There's the First Amendment right to anonymous speech just to begin with. McIntyre v. Ohio Elections Comm'n, 514 US 334 (1995). ("Under our Constitution, anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent. Anonymity is a shield from the tyranny of the majority. It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation-and their ideas from suppression-at the hand of an intolerant society. The right to remain anonymous may be abused when it shields fraudulent conduct. But political speech by its nature will sometimes have unpalatable consequences, and, in general, our society accords greater weight to the value of free speech than to the dangers of its misuse.") (Internal citation omitted.) And of course there's the Natural Law liberty to whisper, to utter words in a way that none but the intended recipient can hear. So throw on the violation of the Fifth Amendment's Liberty clause. Then there's the plain language of the Fourth Amendment warrant clause, "particularly describing the *place* to be searched." Not to mention the major reason for the Fourth Amendment, to abolish the "general warrant" that had enabled the Crown to search wherever the warrant's executor's little heart desired.  And th
Paul Merrell

A Snapshot of a Multipolar World in Action « LobeLog - 0 views

  • In the strangest election year in recent American history — one in which the Libertarian Party’s Gary Johnson couldn’t even conjure up the name of a foreign leader he “admired” while Donald Trump remained intent on building his “fat, beautiful wall” and “taking” Iraq oil — the world may be out of focus for many Americans right now.  So a little introduction to the planet we actually inhabit is in order.  Welcome to a multipolar world.  One fact stands out: Earth is no longer the property of the globe’s “sole superpower.” If you want proof, you can start by checking out Moscow’s recent role in reshaping the civil war in Syria and frustrating Washington’s agenda to overthrow President Bashar al-Assad.  And that’s just one of a number of developments that highlight America’s diminishing power globally in both the military and the diplomatic arenas.  On a peaceable note, consider the way China has successfully launched the Asian Infrastructure Investment Bank as a rival to the World Bank, not to speak of its implementation of a plan to link numerous countries in Asia and Europe to China in a vast multinational transportation and pipeline network it grandly calls the One Belt and One Road system, or the New Silk Road project.  In such developments, one can see ways in which the previously overwhelming economic power of the U.S. is gradually being challenged and curtailed internationally.
  •  
    Yes. We have an empire in decline. Isn't it about time that our politicians address that reality rather than exchanging barbs about "making America great again" or "America is still great?" The western economic system needs a rework to accommodate the reality that western economies will not continually expand and will instead contract. We need to address the reality that there are no longer enough living wage jobs; is it time to recognize that we don't need for everyone to work and flip to an economic model where the rich subsidize the poor instead of vice versa? And it's past time to recognize that the Cold War is over, downsize the military drastically, and refocus our military on defense rather than projection of power. We have enough nukes to melt down the entire planet; why do we need a large military force to defend the Homeland? No conventional force would dare invade while we still have the nukes. Defense could probably be handled with two ground divisions, one for the continental U.S. and the other dispersed among Hawaii, Alaska, and U.S. territories. Get rid of the aircraft carrier groups; they've been obsoleted by Russia's advanced hypersonic carrier killer missiles, which it has shared with China and looks to be soon sharing with India. Maybe it's time for a new Diigo group, "The Empire in Decline?"
1 - 20 of 21 Next ›
Showing 20 items per page