Archive

Soros

  

7UU

It has been revealed by a whistleblower who happens to be extremely high ranking at the NSA that the previously reported Russian hacked DNC emails were actually leaked internally by somebody working for the Democratic Party!

Bill Binney, an agent at the NSA states that the DNC emails were transferred much too quickly and that it would have taken hackers much longer.

According To Zerohedge

MEMORANDUM FOR: The President

FROM: Veteran Intelligence Professionals for Sanity (VIPS)

SUBJECT: Was the “Russian Hack” an Inside Job?

Assange-Russian-Hackers-01-600x280

Executive Summary

Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computers, and then doctored to incriminate Russia.

After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device, and that “telltale signs” implicating Russia were then inserted.

Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hack. Of equal importance, the forensics show that the copying and doctoring were performed on the East coast of the U.S. Thus far, mainstream media have ignored the findings of these independent studies [see here and here].

Russia-Did-It

Independent analyst Skip Folden, a retired IBM Program Manager for Information Technology US, who examined the recent forensic findings, is a co-author of this Memorandum. He has drafted a more detailed technical report titled “Cyber-Forensic Investigation of ‘Russian Hack’ and Missing Intelligence Community Disclaimers,” and sent it to the offices of the Special Counsel and the Attorney General. VIPS member William Binney, a former Technical Director at the National Security Agency, and other senior NSA “alumni” in VIPS attest to the professionalism of the independent forensic findings.

The recent forensic studies fill in a critical gap. Why the FBI neglected to perform any independent forensics on the original “Guccifer 2.0” material remains a mystery – as does the lack of any sign that the “hand-picked analysts” from the FBI, CIA, and NSA, who wrote the “Intelligence Community Assessment” dated January 6, 2017, gave any attention to forensics.

NOTE: There has been so much conflation of charges about hacking that we wish to make very clear the primary focus of this Memorandum. We focus specifically on the July 5, 2016 alleged Guccifer 2.0 “hack” of the DNC server. In earlier VIPS memoranda we addressed the lack of any evidence connecting the Guccifer 2.0 alleged hacks and WikiLeaks, and we asked President Obama specifically to disclose any evidence that WikiLeaks received DNC data from the Russians [see here and here].

Addressing this point at his last press conference (January 18), he described “the conclusions of the intelligence community” as “not conclusive,” even though the Intelligence Community Assessment of January 6 expressed “high confidence” that Russian intelligence “relayed material it acquired from the DNC … to WikiLeaks.”

J67JH

Obama’s admission came as no surprise to us. It has long been clear to us that the reason the U.S. government lacks conclusive evidence of a transfer of a “Russian hack” to WikiLeaks is because there was no such transfer. Based mostly on the cumulatively unique technical experience of our ex-NSA colleagues, we have been saying for almost a year that the DNC data reached WikiLeaks via a copy/leak by a DNC insider (but almost certainly not the same person who copied DNC data on July 5, 2016).

From the information available, we conclude that the same inside-DNC, copy/leak process was used at two different times, by two different entities, for two distinctly different purposes:

-(1) an inside leak to WikiLeaks before Julian Assange announced on June 12, 2017, that he had DNC documents and planned to publish them (which he did on July 22) – the presumed objective being to expose strong DNC bias toward the Clinton candidacy; and

-(2) a separate leak on July 5, 2016, to pre-emptively taint anything WikiLeaks might later publish by “showing” it came from a “Russian hack.”

o86,i,m

* * *

Mr. President:

This is our first VIPS Memorandum for you, but we have a history of letting U.S. Presidents know when we think our former intelligence colleagues have gotten something important wrong, and why. For example, our first such memorandum, a same-day commentary for President George W. Bush on Colin Powell’s U.N. speech on March 5, 2003, warned that the “unintended consequences were likely to be catastrophic,” should the U.S. attack Iraq and “justfy” the war on intelligence that we retired intelligence officers could readily see as fraudulent and driven by a war agenda.

The January 6 “Intelligence Community Assessment” by “hand-picked” analysts from the FBI, CIA, and NSA seems to fit into the same agenda-driven category. It is largely based on an “assessment,” not supported by any apparent evidence, that a shadowy entity with the moniker “Guccifer 2.0” hacked the DNC on behalf of Russian intelligence and gave DNC emails to WikiLeaks.

The recent forensic findings mentioned above have put a huge dent in that assessment and cast serious doubt on the underpinnings of the extraordinarily successful campaign to blame the Russian government for hacking. The pundits and politicians who have led the charge against Russian “meddling” in the U.S. election can be expected to try to cast doubt on the forensic findings, if they ever do bubble up into the mainstream media. But the principles of physics don’t lie; and the technical limitations of today’s Internet are widely understood. We are prepared to answer any substantive challenges on their merits.

You may wish to ask CIA Director Mike Pompeo what he knows about this. Our own lengthy intelligence community experience suggests that it is possible that neither former CIA Director John Brennan, nor the cyber-warriors who worked for him, have been completely candid with their new director regarding how this all went down.

Copied, Not Hacked

As indicated above, the independent forensic work just completed focused on data copied (not hacked) by a shadowy persona named “Guccifer 2.0.” The forensics reflect what seems to have been a desperate effort to “blame the Russians” for publishing highly embarrassing DNC emails three days before the Democratic convention last July. Since the content of the DNC emails reeked of pro-Clinton bias, her campaign saw an overriding need to divert attention from content to provenance – as in, who “hacked” those DNC emails? The campaign was enthusiastically supported by a compliant “mainstream” media; they are still on a roll.

f

“The Russians” were the ideal culprit. And, after WikiLeaks editor Julian Assange announced on June 12, 2016, “We have emails related to Hillary Clinton which are pending publication,” her campaign had more than a month before the convention to insert its own “forensic facts” and prime the media pump to put the blame on “Russian meddling.” Mrs. Clinton’s PR chief Jennifer Palmieri has explained how she used golf carts to make the rounds at the convention. She wrote that her “mission was to get the press to focus on something even we found difficult to process: the prospect that Russia had not only hacked and stolen emails from the DNC, but that it had done so to help Donald Trump and hurt Hillary Clinton.”

Independent cyber-investigators have now completed the kind of forensic work that the intelligence assessment did not do. Oddly, the “hand-picked” intelligence analysts contented themselves with “assessing” this and “assessing” that. In contrast, the investigators dug deep and came up with verifiable evidence from metadata found in the record of the alleged Russian hack.

They found that the purported “hack” of the DNC by Guccifer 2.0 was not a hack, by Russia or anyone else. Rather it originated with a copy (onto an external storage device – a thumb drive, for example) by an insider. The data was leaked after being doctored with a cut-and-paste job to implicate Russia. We do not know who or what the murky Guccifer 2.0 is. You may wish to ask the FBI.

BammieSilentCoup1

The Time Sequence

June 12, 2016: Assange announces WikiLeaks is about to publish “emails related to Hillary Clinton.”

June 15, 2016: DNC contractor Crowdstrike, (with a dubious professional record and multiple conflicts of interest) announces that malware has been found on the DNC server and claims there is evidence it was injected by Russians.

June 15, 2016: On the same day, “Guccifer 2.0” affirms the DNC statement; claims responsibility for the “hack;” claims to be a WikiLeaks source; and posts a document that the forensics show was synthetically tainted with “Russian fingerprints.”

We do not think that the June 12 & 15 timing was pure coincidence. Rather, it suggests the start of a pre-emptive move to associate Russia with anything WikiLeaks might have been about to publish and to “show” that it came from a Russian hack.

imagesfrf

The Key Event

July 5, 2016: In the early evening, Eastern Daylight Time, someone working in the EDT time zone with a computer directly connected to the DNC server or DNC Local Area Network, copied 1,976 MegaBytes of data in 87 seconds onto an external storage device. That speed is many times faster than what is physically possible with a hack.

It thus appears that the purported “hack” of the DNC by Guccifer 2.0 (the self-proclaimed WikiLeaks source) was not a hack by Russia or anyone else, but was rather a copy of DNC data onto an external storage device. Moreover, the forensics performed on the metadata reveal there was a subsequent synthetic insertion – a cut-and-paste job using a Russian template, with the clear aim of attributing the data to a “Russian hack.” This was all performed in the East Coast time zone.

“Obfuscation & De-obfuscation”

Mr. President, the disclosure described below may be related. Even if it is not, it is something we think you should be made aware of in this general connection. On March 7, 2017, WikiLeaks began to publish a trove of original CIA documents that WikiLeaks labeled “Vault 7.” WikiLeaks said it got the trove from a current or former CIA contractor and described it as comparable in scale and significance to the information Edward Snowden gave to reporters in 2013.

No one has challenged the authenticity of the original documents of Vault 7, which disclosed a vast array of cyber warfare tools developed, probably with help from NSA, by CIA’s Engineering Development Group. That Group was part of the sprawling CIA Directorate of Digital Innovation – a growth industry established by John Brennan in 2015.

Scarcely imaginable digital tools – that can take control of your car and make it race over 100 mph, for example, or can enable remote spying through a TV – were described and duly reported in the New York Times and other media throughout March. But the Vault 7, part 3 release on March 31 that exposed the “Marble Framework” program apparently was judged too delicate to qualify as “news fit to print” and was kept out of the Times.

g5gr

The Washington Post’s Ellen Nakashima, it seems, “did not get the memo” in time. Her March 31 article bore the catching (and accurate) headline: “WikiLeaks’ latest release of CIA cyber-tools could blow the cover on agency hacking operations.”

The WikiLeaks release indicated that Marble was designed for flexible and easy-to-use “obfuscation,” and that Marble source code includes a “deobfuscator” to reverse CIA text obfuscation.

More important, the CIA reportedly used Marble during 2016. In her Washington Post report, Nakashima left that out, but did include another significant point made by WikiLeaks; namely, that the obfuscation tool could be used to conduct a “forensic attribution double game” or false-flag operation because it included test samples in Chinese, Russian, Korean, Arabic and Farsi.

The CIA’s reaction was neuralgic. Director Mike Pompeo lashed out two weeks later, calling Assange and his associates “demons,” and insisting, “It’s time to call out WikiLeaks for what it really is, a non-state hostile intelligence service, often abetted by state actors like Russia.”

Mr. President, we do not know if CIA’s Marble Framework, or tools like it, played some kind of role in the campaign to blame Russia for hacking the DNC. Nor do we know how candid the denizens of CIA’s Digital Innovation Directorate have been with you and with Director Pompeo. These are areas that might profit from early White House review. 

 

SCROLL DOWN TO “PUTIN ….” AFTER YOU TAKE THIS LINK

ARTICLE CONTINUES HERE AT AMERICAN TRUTH SEEKERS 

ats-logo-284x300

Advertisements

The Common Sense Show

1

by Dave Hodges

America has gone from being annoyed with their government to the point of resisting their government. In my previous article, I have detailed how state governors, veterans, truckers and just average everyday citizens are resisting the tyrannical and egregious abrogation’s of the United States Constitution. The police state crackdown mechanisms are in place which are designed to break the back of any resistance to federal authority, legitimate or not.

The net effect of the establishment of “Police State America” is that it is designed to subjugate the populace and stamp out any remaining vestiges of Constitutional liberties and create a society where the state is all-powerful. With America’s new found spirit of civil liberty being expressed through acts of civil disobedience, martial law is being put into place. When one couples this undeniable fact with the fact that President Obama is under extreme pressure and is struggling to maintain control of the country, these measures are going to be rolled out in a style reminiscent of the Shock and Awe style witnessed in Gulf War I.

2

Obama Is a Wounded Animal

Obama was clearly given a mandate by the central bankers to get the US into a war in the Middle East, first with Syria and Iran. This conflict was designed to temporarily preserve the Petrodollar which Iran is threatening by selling oil for gold to China, Russia and India. The powers that be were hoping that Russia and China would resist and any final resistance to a complete central banking takeover of the planet would be eliminated. Obama’s initiatives, designed to provoke a war with Syria, as a first step, were turned back. Obama has been publicly humiliated by Russian leader, Vladimir Putin. The world and specifically, the alternative media, thwarted Obama and the central bankers on this front.

Obama’s Motivation for Martial Law Implementation

Richard Nixon was unable to survive one direct hit upon his administration, namely, the Watergate scandal. Conversely, Obama is facing five scandals which dwarfs Watergate in terms of criminality, abuse of power, malfeasance of office and outright treason. The damage inflicted upon the American people by the criminal syndicate occupying the White House, in American History, is unparalleled.

Last May the central bankers, through their corporate controlled press, released five Watergate type scandals in a brief 10 day period designed to force a reluctant President’s hand in the Middle East. America is outraged by (1) Benghazi-Gate; (2) IRS-Gate; (3) AP Spy-Gate; (4) Whistle-blower-Gate; and even (5) Fast and Furious made a second pass. The alternative media is being so effective that it is forcing the MSM to jump off Obama’s ship and claim they do not support him any longer (e.g. MSNBC Chris Mathews). These five events are real threats to this President remaining in office. Unable to get a war started in the Middle East, how can the President survive these five crises? He has no choice but to move from the soft forms of martial law to an all-out implementation of martial law if he wants to remain in power.

The Three Stages of Martial Law Roll-Out

Under martial law, Obama can effectively eliminate all opposition to his administration. Under martial law, Obama can eliminate all media opposition to his presidency. Additionally, under martial law, Obama can remain in power, perhaps indefinitely. The pattern for the implementation of martial law follows three very distinct stages.

obama-narcissism

Stage one of martial law consists of the gradual roll-out of government controls over citizen liberties. Travel is restricted through inland border checkpoints. The internal DHS VIPR programs which randomly search citizens at public events and on the highways  are now in place. Citizens are conditioned by the TSA that they do not control or own their bodies as the flying public is molested by the TSA everyday in our nation’s airports in an extreme violation of our citizens Fourth Amendment rights. Stage one also begins to create an enemies list and we have already seen this in the MIAC report in which Christians, Ron Paul supporters, Second Amendment supporters, Libertarians and Constitutionalists have been branded as domestic terrorists. The enemies list has been created and will be acted upon at a future date. In Stage one, the government elevates itself above any pretense of constitutional liberties. America has been firmly under Stage one martial law governance since the events of 9/11.

In Stage two, martial law implementation becomes obvious to all citizens except for the ones who invoke cognitive dissonance as a psychological coping mechanism. Stage two is marked by restrictions on travel, the loss of free speech and the right to assemble to air grievances against the government.

Press release date: April 4, 2012

Owner: Department of Homeland Security

Project Description:

Shelters Direct provided the Department of Homeland Security with this 4×13 Steel UL 752 Level 3 Bullet Resistant Booth.

This guard building features a standing seam hip roof, a thru-wall HVAC unit, (2) UL 752 BR Level 3 sliding doors, UL 752 Bullet Resistant Level 3 glass and a Low]E coating.

3

National ID

In Stage two, the free internet as we know it, will disappear. Subsequently, the truthful, alternative media will disappear as well. Stage two is also characterized by the total loss of due process of law with regard to detainment, imprisonment or worse. This stage is also marked by limiting participation of members of the society who have been previously identified as enemies of the state (i.e. MIAC Report). This would include the ability to hold certain kinds of employment, a special designation on a form of national ID, the imposition of restrictions on who can marry, where one can live, etc.

5

When the national ID card is implemented, it is time to run for the hills because history shows that nobody will be safe.

4

The Loss of Private Property

Stage two also witnesses the total loss of private property and free will in terms of choice of domicile (i.e. Agenda 21), choice of employment and exercising any form of political choice. In short, Stage two is characterized by creating a political caste system in which the legal rights of certain groups are set in place (i.e. NDAA, Executive Order 13603, etc). The MERS mortgage fraud inspired thievery of legitimate home titles and the MF Global theft of privately secured investment accounts are cases in point. Stage two is often preceded by a false flag attack (e.g. burning of the Reichstag) designed to create a perceived enemy which serves as the excuse for the encroachment of  “necessary” tyranny in a society in which “we must trade our liberty for security” approach to governance.

7

Stage three martial law has given history some of its darkest days. Warrantless detentions become common place in which suspected political dissidents are removed from society, usually in the middle of the night. In modern terminology, these would be referred to as the “Red list” tagged citizens who are detained and normally executed. These include outspoken preachers, outspoken talk show hosts, people who have any kind of history of civil disobedience.

The remainder of this article will exclusively focus on the establishment of Stage two martial law.

Police State Measures

From unconstitutional border checkpoints which are  dozens of miles inland, America has been under a soft form of martial law for some time. The TSA conducts illegal and unconstitutional sexual assault, everyday, upon the flying public. The TSA has expanded their illegal detention and search operations through Operation VIPR on highways, malls and even a high school prom in Santa Fe, New Mexico. The NSA spies on your every electronic communication and has created a threat matrix database on every American. Why? What have Americans done that is so bad that our federal agencies have to invade rodeos, NASCAR events and the I-40 highway in Tennessee to pull over Americans without probable cause and molest their bodies in the name of national security? These unwarranted actions are the preliminary event to the roll out of Stage two martial law.

8

Creating the “Reichstag Fire” Justification

I do not look for one false flag event designed to move the country into martial law, it is likely that several false flag events will take place, in different regions of the country. The pattern is almost always the same in which the authorities conduct a drill related to terrorism. The drill is used to mask a false flag attack arising from the drill. This happened on 9/11, the 7/7 bombings and most recently, at the Boston Marathon. These drills combined with resulting false flag events will give the administration the ability to incrementally implement martial law in a fashion similar to what happened in with the implementation of  illegal martial law in Boston following the Boston Marathon bombing on April 15th. The roll out of Boston’s martial law was clearly a beta test for what is coming all across the country. And who could ever forget the images of the federal subjugation of an American city in which we saw troops in the street, curfews imposed and free travel eliminated.

Recently, DHS sponsored a self-study entitled, “Homeland Security and Intelligence: Next Steps in Evolving the Mission“, in which DHS proclaims that they are no longer concerned with foreign inspired terrorism. They are only going to focus on domestic terrorism, ostensibly, against the American people. Does the DHS purchase of 2.2 billion rounds of ammo, the acquisition of 2700 armored personnel carriers and the beta test of martial law in Boston last April begins to make a great deal of sense. Total control over the country, through a false flag event scenario seems entirely likely given the pre-positioning of assets by DHS.

The real purpose behind the creation of this American version of the East German Stasi secret police was to monitor and control the American population. Unfortunately, DHS has shared its high tech toys with most local police departments and Sheriff’s Departments and has, as a result, co-opted their local function. In other words, the federalization of local police forces, in violation of the 10th Amendment, is well underway. The early returns on this process are in and the results are extremely ugly, and through the federalization of local police departments, DHS is acquiring the manpower to enforce its soon-to-be martial law edicts.

The Importance of PDD 51 Cannot Be Overstated

Further support comes from Presidential Decision Directive 51 which handed President Obama dictator status in times of declared, and not necessarily real, national emergency. PDD 51 is a Bush era executive order that gives the President dictatorial power in times of national emergency, eliminates any roadblock to declaring martial law in the United States. It gives Obama the power to suspend elections. Under this arrangement, Obama could have 50 Watergate type of scandals hanging over his head and he does not have to worry about leaving office.

0

Stage Two and the Abrogation of Civil Liberties

When the first false flag event occurs, America will witness the implementation of Obama’s Executive Order 13603. In Section 601 of Executive Order 13603 signals the most Orwellian aspect of this executive order in which “upon request by the Director of Selective Service, and in coordination with the Secretary of Defense, assist the Director of Selective Service in development of policies regulating the induction and deferment of persons for duty in the armed services” (paragraph 2). What is particularly troubling is that the Secretary of Labor will possess oversight over the Selective Service process, instead of the Secretary of Defense. This revelation left me scratching my head as I wondered why would the Department of Labor be in charge of the coming military draft? Then it dawned upon me that we were not just talking about military conscription. I refer to the 2008 Presidential campaign in which Obama stated that “we need to construct a national civilian security force that is just as powerful, just as strong, just as well funded” (as the military).

Obama is clearly planning to conscript civilians, train them and send them where they are needed and will pay them whatever wage the Secretary of Commerce determines (Section 601; paragraphs 3, 4-Section 801; paragraph C). In one fell swoop, Obama has sidestepped the 13th Amendment as we are talking about the introduction of forced labor (i.e. indentured servitude).

Under Executive Order 13603, the Secretary of Transportation has been given control over civil transportation which “includes movement of persons and property by all modes of transportation in interstate, intrastate, or foreign commerce within the United States, its territories and possessions, and the District of Columbia, and related public storage and warehousing, ports, services,equipment and facilities, such as transportation carrier shop and repair facilities.” “Civil transportation” also shall include direction, control, and coordination of civil transportation capacity regardless of ownership” (Section 801 part A). Can there be any doubt that the expanded surveillance program of the TSA, in their unconstitutional practices of hands down our pants VIPER program, is designed to control all travel in the United States? The former Soviet Union used to have checkpoints every 20 miles in order to restrict travel and to prevent the congregation of “revolutionary forces” for purposes of opposing government control as well as to limit the ability of political dissidents to flee from their governmental pursuers. I feel compelled to ask, what is the government going to do that is so nefarious and so intrusive that they are seeking to set up a control grid which will accomplish these same goals? The present day Border Patrol checkpoints are part of a conditioning process designed to get Americans used to the fact that they have no constitutional liberties (e.g. Fourth Amendment).

Under EO 13603, the Secretary of Energy will have control over all “Energy” (which) means all forms of energy including petroleum, gas (both natural and manufactured), electricity, solid fuels (including all forms of coal, coke, coal chemicals, coal liquification, and coal gasification), solar, wind, other types of renewable energy, atomic energy, and the production, conservation, use, control, and distribution (including pipelines) of all of these forms of energy…” This means the government will have total control over all utility prices, the installation of smart meters along with the implementation of the smart grid and the amount of energy which can be consumed by average Americans will be severely curtailed under this new system of energy feudalism which will be imposed on the new American serfs. Obama, in the 2008 Presidential Campaign, stated that “under my plan of a cap and trade system, electricity rates would necessarily skyrocket.” Previously ignorant Americans will soon come to know the true meaning and the prophetic meaning of these words (Section 801, part b).

9        Stalin did it, Hitler did it and now Obama has the ability to do it. In Stage two martial law, if you want to eat, you must obey.

The Secretary of Agriculture will possess control over “fertilizer” (which) means any product or combination of products that contain one or more of the elements nitrogen, phosphorus, and potassium for use as a plant nutrient.” The Secretary of Agriculture will also control “food resource facilities “(which) means plants, machinery, vehicles (including on farm), and other facilities required for the production, processing, distribution, and storage (including cold storage) of food resources, and for the domestic distribution of farm equipment and fertilizer.” This is the total control of all food. This will allow Monsanto which demonstrably controls the Department of Agriculture, the FDA and EPA to move forward, unabated, for the total GMO takeover of our food supply. Even more disturbing is that a few men will have total control over all food production and the dissenting masses who oppose this fascist takeover can be effectively starved into submission or starved to death (Section 801, parts c-f).

There can be no doubt as the Secretary of Defense will be placed in charge of all water resources Section 801, part n). I can draw no other conclusion that placing the control of water under the DOD represents the weaponizing of water and the intended target of this full frontal assault are the American people for the purpose of imposing population control and complete compliance. I hearken back to the movie, The Hunger Games, this is exactly what lies in our future with regard to a martial law roll out which reaches Stage two.

What Will It Be Like to Live Under Martial Law?

In summary, Stage two martial law will follow a false flag event in which the internet will be taken down. All bank accounts, pension funds and 401K’s will be frozen and stolen. Extreme travel restrictions will be put in place. Random house to house searches will be conducted (Don’t forget about the 386,000 foreign troops which just completed their training on American soil). What will they be looking for? Of course, they will be looking for guns and the false flag events will give them the pretext to do so. And they will also be looking for known trouble makers. We will all be living in a society where we can be singled out for persecution, or worse. We will all have to watch every word we say. As it was in the Soviet Union, your young children will be used to spy upon and tattle on you at their school. And of course, you will be totally dependent upon the government for food, water and shelter. Traveling will be so onerous, that you will be content just to huddle in your home. When the false flag events commence, we will look at these days as the good ‘ole days.

http://thecommonsenseshow.com/2013/10/11/the-three-stages-of-us-martial-law/

nafta

This news is just horrendous …Obama has been negotiating and now supports this new trade agreement called the Transpacific Trade Partnership which is so bad for this country and so good for the corporations that own Obama that it boggles the mind. This treaty signs over american sovereignty to the corporations in such a profound way that they will even be allowed to privately police any violations of their rules. This is the part where we lose our freedoms and liberties and become corporate slaves.

– Internet restrictions up the wazoo

– Natural resources can be pillaged and we will no longer have any say over them

– Financial protection laws will be non existent

– Food safety laws …gone

The list goes on and on …the treay is 29 chapters and only 5 deal with free trade and the other 24 sign away our country to the corporations …get involved …Get vocal and get loud! This is the klind of garbage that tools like Wyden and Merkely and Charlie Rangel will vote for because they are told too … Here is the article

Rick MacArthur, publisher of Harper’s Magazine, and author of the book “The Selling of “Free Trade: NAFTA, Washington, and the Subversion of American Democracy,” discusses what’s been happening behind closed doors on Capitol Hill and why many environmentalists, AIDS activists, American labor unions, and social movements in Latin America oppose the deal. [includes rush transcript]

It was an unexpected announcement from Washington — and one many are still trying to figure out. Earlier this month, the White House and Democratic leaders announced they had reached a historic agreement on trade.

It’s the first bipartisan economic agreement since Democrats took control of Congress this year. Democrats say they’ve won guarantees to protect labor rights and environmental standards in all future trade deals, starting with Peru, Panama, Columbia and South Korea. Labor rights would include union organizing, collective bargaining and bans on child labor and workplace discrimination. On the environment, countries trading with the U.S. would be forced to comply with existing laws and international accords.

But critics say Democratic leaders have fallen far short of what they claim. The negotiations were conducted in near secrecy, and the details haven’t been fully disclosed. Criticism has come from many circles — environmentalists, AIDS activists, American labor unions, and social movements in countries including Colombia and Peru. Meanwhile, groups representing major U.S. corporations have supported the plan. The U.S. Chamber of Commerce is the world’s largest business federation. Chamber president Tom Donohue said: “We are encouraged by assurances that the labor provisions cannot be read to require compliance with [International Labor Organization] Conventions.”

Democrats are anything but united on the issue. Democratic caucus members are reportedly meeting today about the deal to avoid an internal split. That may be hard to overcome. As the agreement was announced, the New York Times reported at least half of Democratic Congressmembers were prepared to oppose it. In such a case, Democratic leaders would be forced to count on Republican support to pass final legislation.

As scrutiny grows, Rep. Charles Rangel, the Democratic chair of the House Ways and Means Committee, defended the deal in an interview Monday with CNN”s Lou Dobbs.

Continued Here Click

http://www.democracynow.org/2007/5/22/a_subversion_of_american_democracy_white

The Car Guyz

Auto Industry Experts Playing for the Other Team ...You!

FOX News

Stomping out Liberal Lunacy Whereever it's Found ...Which lately has been like playing Whack -A- Mole

The Rush Limbaugh Show

Stomping out Liberal Lunacy Whereever it's Found ...Which lately has been like playing Whack -A- Mole

Breitbart News

Stomping out Liberal Lunacy Whereever it's Found ...Which lately has been like playing Whack -A- Mole

Drudge Retort

Stomping out Liberal Lunacy Whereever it's Found ...Which lately has been like playing Whack -A- Mole

Fathers' Rights Blog

by Jeffery M. Leving

therightwingextremist

Stomping out Liberal Lunacy Whereever it's Found ...Which lately has been like playing Whack -A- Mole

The WordPress.com Blog

The latest news on WordPress.com and the WordPress community.

%d bloggers like this: