Archive

unconstitutional

  

7UU

It has been revealed by a whistleblower who happens to be extremely high ranking at the NSA that the previously reported Russian hacked DNC emails were actually leaked internally by somebody working for the Democratic Party!

Bill Binney, an agent at the NSA states that the DNC emails were transferred much too quickly and that it would have taken hackers much longer.

According To Zerohedge

MEMORANDUM FOR: The President

FROM: Veteran Intelligence Professionals for Sanity (VIPS)

SUBJECT: Was the “Russian Hack” an Inside Job?

Assange-Russian-Hackers-01-600x280

Executive Summary

Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computers, and then doctored to incriminate Russia.

After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device, and that “telltale signs” implicating Russia were then inserted.

Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hack. Of equal importance, the forensics show that the copying and doctoring were performed on the East coast of the U.S. Thus far, mainstream media have ignored the findings of these independent studies [see here and here].

Russia-Did-It

Independent analyst Skip Folden, a retired IBM Program Manager for Information Technology US, who examined the recent forensic findings, is a co-author of this Memorandum. He has drafted a more detailed technical report titled “Cyber-Forensic Investigation of ‘Russian Hack’ and Missing Intelligence Community Disclaimers,” and sent it to the offices of the Special Counsel and the Attorney General. VIPS member William Binney, a former Technical Director at the National Security Agency, and other senior NSA “alumni” in VIPS attest to the professionalism of the independent forensic findings.

The recent forensic studies fill in a critical gap. Why the FBI neglected to perform any independent forensics on the original “Guccifer 2.0” material remains a mystery – as does the lack of any sign that the “hand-picked analysts” from the FBI, CIA, and NSA, who wrote the “Intelligence Community Assessment” dated January 6, 2017, gave any attention to forensics.

NOTE: There has been so much conflation of charges about hacking that we wish to make very clear the primary focus of this Memorandum. We focus specifically on the July 5, 2016 alleged Guccifer 2.0 “hack” of the DNC server. In earlier VIPS memoranda we addressed the lack of any evidence connecting the Guccifer 2.0 alleged hacks and WikiLeaks, and we asked President Obama specifically to disclose any evidence that WikiLeaks received DNC data from the Russians [see here and here].

Addressing this point at his last press conference (January 18), he described “the conclusions of the intelligence community” as “not conclusive,” even though the Intelligence Community Assessment of January 6 expressed “high confidence” that Russian intelligence “relayed material it acquired from the DNC … to WikiLeaks.”

J67JH

Obama’s admission came as no surprise to us. It has long been clear to us that the reason the U.S. government lacks conclusive evidence of a transfer of a “Russian hack” to WikiLeaks is because there was no such transfer. Based mostly on the cumulatively unique technical experience of our ex-NSA colleagues, we have been saying for almost a year that the DNC data reached WikiLeaks via a copy/leak by a DNC insider (but almost certainly not the same person who copied DNC data on July 5, 2016).

From the information available, we conclude that the same inside-DNC, copy/leak process was used at two different times, by two different entities, for two distinctly different purposes:

-(1) an inside leak to WikiLeaks before Julian Assange announced on June 12, 2017, that he had DNC documents and planned to publish them (which he did on July 22) – the presumed objective being to expose strong DNC bias toward the Clinton candidacy; and

-(2) a separate leak on July 5, 2016, to pre-emptively taint anything WikiLeaks might later publish by “showing” it came from a “Russian hack.”

o86,i,m

* * *

Mr. President:

This is our first VIPS Memorandum for you, but we have a history of letting U.S. Presidents know when we think our former intelligence colleagues have gotten something important wrong, and why. For example, our first such memorandum, a same-day commentary for President George W. Bush on Colin Powell’s U.N. speech on March 5, 2003, warned that the “unintended consequences were likely to be catastrophic,” should the U.S. attack Iraq and “justfy” the war on intelligence that we retired intelligence officers could readily see as fraudulent and driven by a war agenda.

The January 6 “Intelligence Community Assessment” by “hand-picked” analysts from the FBI, CIA, and NSA seems to fit into the same agenda-driven category. It is largely based on an “assessment,” not supported by any apparent evidence, that a shadowy entity with the moniker “Guccifer 2.0” hacked the DNC on behalf of Russian intelligence and gave DNC emails to WikiLeaks.

The recent forensic findings mentioned above have put a huge dent in that assessment and cast serious doubt on the underpinnings of the extraordinarily successful campaign to blame the Russian government for hacking. The pundits and politicians who have led the charge against Russian “meddling” in the U.S. election can be expected to try to cast doubt on the forensic findings, if they ever do bubble up into the mainstream media. But the principles of physics don’t lie; and the technical limitations of today’s Internet are widely understood. We are prepared to answer any substantive challenges on their merits.

You may wish to ask CIA Director Mike Pompeo what he knows about this. Our own lengthy intelligence community experience suggests that it is possible that neither former CIA Director John Brennan, nor the cyber-warriors who worked for him, have been completely candid with their new director regarding how this all went down.

Copied, Not Hacked

As indicated above, the independent forensic work just completed focused on data copied (not hacked) by a shadowy persona named “Guccifer 2.0.” The forensics reflect what seems to have been a desperate effort to “blame the Russians” for publishing highly embarrassing DNC emails three days before the Democratic convention last July. Since the content of the DNC emails reeked of pro-Clinton bias, her campaign saw an overriding need to divert attention from content to provenance – as in, who “hacked” those DNC emails? The campaign was enthusiastically supported by a compliant “mainstream” media; they are still on a roll.

f

“The Russians” were the ideal culprit. And, after WikiLeaks editor Julian Assange announced on June 12, 2016, “We have emails related to Hillary Clinton which are pending publication,” her campaign had more than a month before the convention to insert its own “forensic facts” and prime the media pump to put the blame on “Russian meddling.” Mrs. Clinton’s PR chief Jennifer Palmieri has explained how she used golf carts to make the rounds at the convention. She wrote that her “mission was to get the press to focus on something even we found difficult to process: the prospect that Russia had not only hacked and stolen emails from the DNC, but that it had done so to help Donald Trump and hurt Hillary Clinton.”

Independent cyber-investigators have now completed the kind of forensic work that the intelligence assessment did not do. Oddly, the “hand-picked” intelligence analysts contented themselves with “assessing” this and “assessing” that. In contrast, the investigators dug deep and came up with verifiable evidence from metadata found in the record of the alleged Russian hack.

They found that the purported “hack” of the DNC by Guccifer 2.0 was not a hack, by Russia or anyone else. Rather it originated with a copy (onto an external storage device – a thumb drive, for example) by an insider. The data was leaked after being doctored with a cut-and-paste job to implicate Russia. We do not know who or what the murky Guccifer 2.0 is. You may wish to ask the FBI.

BammieSilentCoup1

The Time Sequence

June 12, 2016: Assange announces WikiLeaks is about to publish “emails related to Hillary Clinton.”

June 15, 2016: DNC contractor Crowdstrike, (with a dubious professional record and multiple conflicts of interest) announces that malware has been found on the DNC server and claims there is evidence it was injected by Russians.

June 15, 2016: On the same day, “Guccifer 2.0” affirms the DNC statement; claims responsibility for the “hack;” claims to be a WikiLeaks source; and posts a document that the forensics show was synthetically tainted with “Russian fingerprints.”

We do not think that the June 12 & 15 timing was pure coincidence. Rather, it suggests the start of a pre-emptive move to associate Russia with anything WikiLeaks might have been about to publish and to “show” that it came from a Russian hack.

imagesfrf

The Key Event

July 5, 2016: In the early evening, Eastern Daylight Time, someone working in the EDT time zone with a computer directly connected to the DNC server or DNC Local Area Network, copied 1,976 MegaBytes of data in 87 seconds onto an external storage device. That speed is many times faster than what is physically possible with a hack.

It thus appears that the purported “hack” of the DNC by Guccifer 2.0 (the self-proclaimed WikiLeaks source) was not a hack by Russia or anyone else, but was rather a copy of DNC data onto an external storage device. Moreover, the forensics performed on the metadata reveal there was a subsequent synthetic insertion – a cut-and-paste job using a Russian template, with the clear aim of attributing the data to a “Russian hack.” This was all performed in the East Coast time zone.

“Obfuscation & De-obfuscation”

Mr. President, the disclosure described below may be related. Even if it is not, it is something we think you should be made aware of in this general connection. On March 7, 2017, WikiLeaks began to publish a trove of original CIA documents that WikiLeaks labeled “Vault 7.” WikiLeaks said it got the trove from a current or former CIA contractor and described it as comparable in scale and significance to the information Edward Snowden gave to reporters in 2013.

No one has challenged the authenticity of the original documents of Vault 7, which disclosed a vast array of cyber warfare tools developed, probably with help from NSA, by CIA’s Engineering Development Group. That Group was part of the sprawling CIA Directorate of Digital Innovation – a growth industry established by John Brennan in 2015.

Scarcely imaginable digital tools – that can take control of your car and make it race over 100 mph, for example, or can enable remote spying through a TV – were described and duly reported in the New York Times and other media throughout March. But the Vault 7, part 3 release on March 31 that exposed the “Marble Framework” program apparently was judged too delicate to qualify as “news fit to print” and was kept out of the Times.

g5gr

The Washington Post’s Ellen Nakashima, it seems, “did not get the memo” in time. Her March 31 article bore the catching (and accurate) headline: “WikiLeaks’ latest release of CIA cyber-tools could blow the cover on agency hacking operations.”

The WikiLeaks release indicated that Marble was designed for flexible and easy-to-use “obfuscation,” and that Marble source code includes a “deobfuscator” to reverse CIA text obfuscation.

More important, the CIA reportedly used Marble during 2016. In her Washington Post report, Nakashima left that out, but did include another significant point made by WikiLeaks; namely, that the obfuscation tool could be used to conduct a “forensic attribution double game” or false-flag operation because it included test samples in Chinese, Russian, Korean, Arabic and Farsi.

The CIA’s reaction was neuralgic. Director Mike Pompeo lashed out two weeks later, calling Assange and his associates “demons,” and insisting, “It’s time to call out WikiLeaks for what it really is, a non-state hostile intelligence service, often abetted by state actors like Russia.”

Mr. President, we do not know if CIA’s Marble Framework, or tools like it, played some kind of role in the campaign to blame Russia for hacking the DNC. Nor do we know how candid the denizens of CIA’s Digital Innovation Directorate have been with you and with Director Pompeo. These are areas that might profit from early White House review. 

 

SCROLL DOWN TO “PUTIN ….” AFTER YOU TAKE THIS LINK

ARTICLE CONTINUES HERE AT AMERICAN TRUTH SEEKERS 

ats-logo-284x300

Advertisements

IRP66

I think it was Friedrich Nietzsche who said that “man is the cruelest animal ” and every year or so a story comes along that reminds you of just how true that statement is and man’s inhumanity to man and the evil that dwells inside some of us… When catalyzed by greed and narcississm …the need for revenge can be all-consuming, and the results …devastating.

As I was reading the other day I stumbled upon a story that piqued my interest enough to start digging into it to get the background and fact check the original story. The people who are the victims in this story have come to be called the “IRP6.” http://freetheirp6.wix.com/freetheirp6#!

6 men….strong and devout Christians all of themk, have had their lives rudely interrupted and taken from them by a corrupt criminal justice system with it’s hand on one side of the scales of justice …driven by greed and uncaring about the ruined lives it leaves in its wake.

“When crimes begin to pile up they become invisible. When sufferings become unendurable, the cries are no longer heard. The cries, too, fall like rain in summer.” – Bertolt Brecht

When you see an injustice such as this taking place in every person’s duty to shine a bright light on it and say enough is enough because any of us could be next. I will let you read about this for yourself that I strongly encourage you to take some affirmative step to support these six men who are currently scheduled to spend the next 10 to 11 years in prison for a crime they didn’t commit. Man’s inhumanity is truly the keynote of stupidity in power. At the heart of this corruption is a federal court judge and the law firm she used to work for and a sociopathic woman consumed with evil. It’s an interesting story and one that everybody needs to hear… So please help me with this and spread it to at least two other people… Remember you could be next.

THERE WILL BE FOLLOW UPS TO THIS …COUNT ON IT!

IRP6

HERE IS THE STORY

Beginning of IRP Solutions

IRP Solutions was established in February 2003 and began to heavily market its flagship Case Investigative Life Cycle (CILC®) software solution in August 2003 to major federal, state and local law enforcement agencies, including but not limited to the Department of Homeland Security (DHS), Department of Justice (DOJ) and the New York City Police Department (NYPD).

The Impact of 911

IRP Solutions Corporation was formed a couple of years after the tragedies of 9-11 (IRP is an acronym for “Investigative Resource Planning”). This was a country in shock. We experienced the worst attack in history against our country on our native soil. Many of the events of that day and months that would follow showed gaps in the investigative processes of our law enforcement agencies, but yet there were no solutions readily available to address the need. Meanwhile, years prior to 9-11 the founders of IRP Solutions had begun development of a small stand-alone software application to be used as an individual work product for law enforcement.

That initial work was done under the company name Leading Team. Although the initial software developed by Leading Team was an enterprise-class solution, it was not web-enabled or capable of addressing the major gaps that were identified post-911 (i.e., Lack of ability to share intelligence/investigative information between law enforcement at all levels of government, etc.). The company founders knew that with a little hard work, they could develop a software application that could significantly impact our nation’s law enforcement operations. However, they didn’t feel that the current company name accurately reflected the new strategy. Thus, IRP Solutions Corporation was formed.

The Call from DHS: A Dream Opportunity….

In October 2003, IRP received a call from the Program Manager at the Department of Homeland Security (DHS) for an initiative that was called the Consolidated Enforcement Environment Initiative. DHS wanted IRP to conduct a web demo of the software solution that IRP had developed. IRP’s web demo was very successful and the company was asked to travel to Washington, DC to conduct a demo before a larger audience.

In November 2003, IRP travelled to Washington, DC to demonstrate their software solution before the DHS Consolidated Enforcement Environment Initiative team which comprised of DHS, FBI, Secret Service, Federal Air Marshals, Immigrations and Customs Enforcement, TSA, U.S. Coast Guard, and Deloitte. This audience questioned IRP on the technical and functional aspects of the software. This was, yet another, successful demonstration of the software that IRP had developed.  Following the meeting, DHS provided IRP with “Eyes Only” documentation and asked IRP to begin working (non-contractually) on capabilities to meet certain federal law enforcement scenarios.

IRP Solutions’ Case Investigative Life Cycle (CILC®)

Although CILC software was considered the most promising, strong political winds from large entrenched competitors significantly slowed the sales cycle, which subsequently caused a cash flow crunch and aging debt related to the development of the software.

The RAID….The IRP Dream Becomes A Nightmare…February 9, 2005

The morning of February 9th, 2005 started like most days at IRP Solutions. Company staff began to show up for work. The day was a typical business day until unexpected guest showed up at the reception desk. IRP Solutions was being raided by federal agents for alleged wrongdoing. There were 21 federal agents at the front door of a business, that at the time, only had approximately 20 employees. A warrant was presented stating that IRP Solutions and its executives were accused of mail and wire fraud.

Let’s rewind a couple of years and set the stage for how all of this came about…..

In 2003, IRP Solutions (IRP) was established to develop software for law enforcement agencies. Through its marketing efforts, IRP became engaged with major agencies like the Department of Homeland Security (DHS). As IRP became more engaged with agencies like DHS and NYPD, there were more requests for modifications to the software. DHS even told IRP to “…put a federal face on the software…”. Agencies were sending very positive signals and continued to ask for modifications to the software to meet their respective needs. Because of the modification and customization requests from agencies, IRP management began to explore ways to meet the increased demand for software development. IRP began to explore the option of augmenting the staff with contract labor.

IRP contacted staffing companies and explained the dilemma of trying to meet the requests of the law enforcement agencies. Several companies did their due diligence and considered IRP an acceptable risk for executing a contract. There were several companies that chose not to team with IRP. Contracts were executed to bring on technologists to incorporate technical enhancements requested by the federal government and local law enforcement. The agencies were fully engaged with IRP to make enhancements to the software, which resulted in the need for IRP to continue extending its engagement with staffing companies. Consequently, the debt continued to grow.

In the meantime, in late 2004, DHS requested pricing quotes that exceeded $100 million. Additionally, DHS explicitly stated that they were working on the budget and needed the pricing quotes as part of their budget exercises. This was later substantiated by FBI interview documents in which a DHS official stated that they (DHS) were setting up a pilot project for IRP.

Now fast forward to February 2005…IRP business offices are raided by over 20 federal agents for alleged fraud and running a scam, accused of not developing software, but bilking staffing companies of millions of dollars. IRP was also accused of making up stories about customers like the Department of Homeland Security, the FBI, NYPD, Colorado Bureau of Investigations, and several others.

There was no fraud or scheme…IRP Solutions was a legitimate business that incurred business debt.

A grand jury handed down a 25-count indictment in June 2009, charging the six with fraud in never paying $4 million or more the company owed to about 40 companies that provided temporary labor to IRP.

Dupree said, “The Christian businessmen built a small company that concentrated on developing a software application called CILC, which stands for Case Investigative Life Cycle. This software was developed to aid law enforcement in investigating a case through to prosecution. The necessity of this type of software was overly clear as the government indicated the main reason 9/11 can occur was because of the inability of government agencies to share information.”

“In other words, the FBI alleged that IRP Solutions did not actually have software at all, “said Dupree

DON’T LEAVE NOW …THIS STORY CONTINUES HERE WITH (CLICK) THEN SCROLL DOWN A FEW PARAGRAPHS

HERE IS THE LINK TO THEIR WEBSITE WHERE YOU CAN DONATE MONEY AND/OR READ PRESS RELEASES, AND VIEW ACTUAL EVIDENCE …PEOPLE THIS THING STINKS ON ICE … PUT YOURSELF IN THEIR SHOES … 10 YEARS IN PRISON… WTF?CLICK

HERE FOR THE FREE THE IRP6 WEBSITE (CLICK)

THIS LINK WILL TAKE YOU TO A REALLY GOOD GRAPHIC SHOWING THE RELATIONSHIPS OF ALL OF THE BAD ACTORS

IRP663

spy2

Bush and Cheney may have invented it, but national Democratic Party leaders are full-fledged players in the 21st-century national surveillance state. And the interest-group pressures that now help to sustain its defenders in Washington work just as powerfully on Democrats as on Republicans. That’s according to Thomas Ferguson, Paul Jorgensen, and Jie Chen. They have just posted a short version of their new report on AlterNet and a working paper for the Roosevelt Institute titled Party Competition and Industrial Structures in the 2012 Elections: Who’s Really Driving the Taxi to the Dark Side?

spying-06

 We’re now joined by one of the authors, Thomas Ferguson. He’s a professor of political science at the University of Massachusetts Boston, a senior fellow at the Roosevelt Institute, and a contributing editor at AlterNet.

 Thank you so much for joining us.

 TOM FERGUSON, PROF. POLITICAL SCIENCE, UMASS BOSTON: Hi there.

NOOR: So, Professor Ferguson, what you’re arguing here kind of flies in the face of conventional wisdom and the mainstream narrative of the 2012 election. Can you just break down exactly what you’re saying?

 FERGUSON: Okay. Well, we’re saying a lot of things, but I’ll focus on the stuff that connects directly to the national surveillance state. We started out trying simply to do a straightforward money-in-politics analysis of the election. Now, I say that fully conscious of the irony, ’cause there’s nothing straightforward about that.

 We don’t use anybody else’s data. We download it all from the Federal Election Commission and the IRS, which does the so-called 527 contributions, which are big–it’s a lot of money. And then we sort of pore over it and we do a lot of computer techniques that nobody else does. I mean, I’ve talked about that before on this show–don’t particularly feel the need to do it again.

And so we were sitting back and, you know, analyzing it. And our first stages of the study are pretty much the same. You sort of sit there and you try to figure out, okay, let’s take the entire business community, then let’s subdivide it into big business and the rest and look at those two samples, one everything and the other big business. So we do that.

spying-02

 And in the business as a whole, the big sample, what we discover is straightforward, which is that Obama’s support there was not very strong. Just counting percentages of firms that contribute, about 24 percent did. The Republican percentage for Romney was, like, 46 percent–much higher.

And when we look at the big business sample, we find, you know, again a disproportion between the Republicans and the Democrats, though this time everything shifted up. That is to say, 76 percent of the big business firms on our sample were contributing to Romney and about 56 for Obama. Now, you know, what that looked like to us was the usual story, which is, yep, the Republicans are the party of big business, though we thought it was really pretty interesting. And this is one place where we start to depart from the usual narrative. Obama had a lot of support in big business, much more than any discussion of the campaign that I know of would suggest.

 But where the story got really interesting for us is when we did our usual move, which was start looking at pieces of the business community, usually sectors first. And there we quickly discover that in certain industries Obama’s support is running way higher than his average. And those industries turn out to be six in particular: telecommunications, electronics, defense, software on the web, computers, and manufacturing for the web.

 In June 2013, when the Snowden revelations hit, you know, from Glen Greenwald and company at The Guardian, and to some extent The Washington Post, we were looking at these results and said, you know, this is really very interesting. These sectors that are showing extremely high percentages of contribution to Obama are precisely the sectors in which a large number of those firms that are mentioned are real active. And at that point, you know, we know we have a really interesting conclusion, which is that a lot of the Obama bastions of support, maybe the biggest of all, is precisely those firms, the ones responsible for the surveillance–I should say, sectors in which those firms predominate. On the other hand, I can also tell you, without trying to go firm-by-firm, a lot of the folks discussed in The Guardian and other publications, Google, Facebook, Apple, for example, they all contain substantial contributions or contributors, ’cause you can have both the firm and executives contribute under our rules these days. They show up for the Democrats in substantial amounts.

spy 1

NOOR: And as you point out, many Obama supporters were hoping that President Obama would rein in, you know, what could have been seen as rampant surveillance and, you know, wiretapping under the Bush-Cheney years. So what needs to be done to bring these companies, to bring these industries under heel and under some type of control?

 FERGUSON: We know from Tim Shorrock’s really excellent book on this subject that steadily forward from the Reagan era, the government privatized more and more of intelligence operations. And, you know, the Clinton people were very big in that. But then the sort of big change is after 911. The whole sort of newly privatized operation then swells enormously in size. And so we’re to the point where now, say, like, two-thirds of all the intelligence expenditures, Shorrock estimates, are going to the private sector.

 And, you know, I have to say, looking back on this now, this looks to me like an awful lot of other privatization efforts I’ve seen, where it turns out you get clientele politics. And certainly you get some very powerful interest group pressures. If you look at–I mean, there is a couple of studies–there’s at least one study of the amendment that almost passed in the House of Representatives not long after the initial revelations to rein in the NSA, and there they showed you that there was–the correlation between districts with a lot of defense and what they were calling surveillance industry money, which is probably narrower than what I am, it was very high. And it’s–that’s pretty interesting and it’s pretty scary.

 But, you know, my take is the actual sort of, if you like, industrial interests here are now very deep, very big. And what looked like a problem of ideology, meaning what top policymakers or bureaucrats thought was legally or morally acceptable, is that’s just the tip of the iceberg. You now have a huge interest group problem here.

 And, you know, that, I think, poses the question of controlled completely anew. I mean, it seems pretty obvious to me, looking now again at all of this with somewhat, you know, keener eyes, that it’s obvious that when Obama came in, yes, as you said, we all expected that he would rein in the sort of super extended national surveillance state from the Bush-Cheney era; instead what he did is fix a few of the most grievous errors, but then, you know, we know he was in fact secretly expanding what was going on underneath in surveillance. The government was even offering to pay some of the costs of firms when they had to change their equipment, you know, which of course makes nonsense of their denials they knew nothing about it. And we actually have here, I’d say–it’s pretty scary, right? I mean, you’ve got a government that wants to collect nearly everything about you, working through firms that also like that idea. And, in fact, what they’d like to do is to, you know, sell the information there. This is kind of a closed loop.

 This is–you know, I wouldn’t have said this was the major problem. You know, I was of course, like a lot of other people, naive.

 NOOR: So, Thomas Ferguson, we certainly have a lot more to talk about, but we’re going to end this part of the conversation here. Thank you so much for joining us.

 FERGUSON: Thanks.

 NOOR: Thank you for joining us on The Real News Network.

The Common Sense Show

1

by Dave Hodges

America has gone from being annoyed with their government to the point of resisting their government. In my previous article, I have detailed how state governors, veterans, truckers and just average everyday citizens are resisting the tyrannical and egregious abrogation’s of the United States Constitution. The police state crackdown mechanisms are in place which are designed to break the back of any resistance to federal authority, legitimate or not.

The net effect of the establishment of “Police State America” is that it is designed to subjugate the populace and stamp out any remaining vestiges of Constitutional liberties and create a society where the state is all-powerful. With America’s new found spirit of civil liberty being expressed through acts of civil disobedience, martial law is being put into place. When one couples this undeniable fact with the fact that President Obama is under extreme pressure and is struggling to maintain control of the country, these measures are going to be rolled out in a style reminiscent of the Shock and Awe style witnessed in Gulf War I.

2

Obama Is a Wounded Animal

Obama was clearly given a mandate by the central bankers to get the US into a war in the Middle East, first with Syria and Iran. This conflict was designed to temporarily preserve the Petrodollar which Iran is threatening by selling oil for gold to China, Russia and India. The powers that be were hoping that Russia and China would resist and any final resistance to a complete central banking takeover of the planet would be eliminated. Obama’s initiatives, designed to provoke a war with Syria, as a first step, were turned back. Obama has been publicly humiliated by Russian leader, Vladimir Putin. The world and specifically, the alternative media, thwarted Obama and the central bankers on this front.

Obama’s Motivation for Martial Law Implementation

Richard Nixon was unable to survive one direct hit upon his administration, namely, the Watergate scandal. Conversely, Obama is facing five scandals which dwarfs Watergate in terms of criminality, abuse of power, malfeasance of office and outright treason. The damage inflicted upon the American people by the criminal syndicate occupying the White House, in American History, is unparalleled.

Last May the central bankers, through their corporate controlled press, released five Watergate type scandals in a brief 10 day period designed to force a reluctant President’s hand in the Middle East. America is outraged by (1) Benghazi-Gate; (2) IRS-Gate; (3) AP Spy-Gate; (4) Whistle-blower-Gate; and even (5) Fast and Furious made a second pass. The alternative media is being so effective that it is forcing the MSM to jump off Obama’s ship and claim they do not support him any longer (e.g. MSNBC Chris Mathews). These five events are real threats to this President remaining in office. Unable to get a war started in the Middle East, how can the President survive these five crises? He has no choice but to move from the soft forms of martial law to an all-out implementation of martial law if he wants to remain in power.

The Three Stages of Martial Law Roll-Out

Under martial law, Obama can effectively eliminate all opposition to his administration. Under martial law, Obama can eliminate all media opposition to his presidency. Additionally, under martial law, Obama can remain in power, perhaps indefinitely. The pattern for the implementation of martial law follows three very distinct stages.

obama-narcissism

Stage one of martial law consists of the gradual roll-out of government controls over citizen liberties. Travel is restricted through inland border checkpoints. The internal DHS VIPR programs which randomly search citizens at public events and on the highways  are now in place. Citizens are conditioned by the TSA that they do not control or own their bodies as the flying public is molested by the TSA everyday in our nation’s airports in an extreme violation of our citizens Fourth Amendment rights. Stage one also begins to create an enemies list and we have already seen this in the MIAC report in which Christians, Ron Paul supporters, Second Amendment supporters, Libertarians and Constitutionalists have been branded as domestic terrorists. The enemies list has been created and will be acted upon at a future date. In Stage one, the government elevates itself above any pretense of constitutional liberties. America has been firmly under Stage one martial law governance since the events of 9/11.

In Stage two, martial law implementation becomes obvious to all citizens except for the ones who invoke cognitive dissonance as a psychological coping mechanism. Stage two is marked by restrictions on travel, the loss of free speech and the right to assemble to air grievances against the government.

Press release date: April 4, 2012

Owner: Department of Homeland Security

Project Description:

Shelters Direct provided the Department of Homeland Security with this 4×13 Steel UL 752 Level 3 Bullet Resistant Booth.

This guard building features a standing seam hip roof, a thru-wall HVAC unit, (2) UL 752 BR Level 3 sliding doors, UL 752 Bullet Resistant Level 3 glass and a Low]E coating.

3

National ID

In Stage two, the free internet as we know it, will disappear. Subsequently, the truthful, alternative media will disappear as well. Stage two is also characterized by the total loss of due process of law with regard to detainment, imprisonment or worse. This stage is also marked by limiting participation of members of the society who have been previously identified as enemies of the state (i.e. MIAC Report). This would include the ability to hold certain kinds of employment, a special designation on a form of national ID, the imposition of restrictions on who can marry, where one can live, etc.

5

When the national ID card is implemented, it is time to run for the hills because history shows that nobody will be safe.

4

The Loss of Private Property

Stage two also witnesses the total loss of private property and free will in terms of choice of domicile (i.e. Agenda 21), choice of employment and exercising any form of political choice. In short, Stage two is characterized by creating a political caste system in which the legal rights of certain groups are set in place (i.e. NDAA, Executive Order 13603, etc). The MERS mortgage fraud inspired thievery of legitimate home titles and the MF Global theft of privately secured investment accounts are cases in point. Stage two is often preceded by a false flag attack (e.g. burning of the Reichstag) designed to create a perceived enemy which serves as the excuse for the encroachment of  “necessary” tyranny in a society in which “we must trade our liberty for security” approach to governance.

7

Stage three martial law has given history some of its darkest days. Warrantless detentions become common place in which suspected political dissidents are removed from society, usually in the middle of the night. In modern terminology, these would be referred to as the “Red list” tagged citizens who are detained and normally executed. These include outspoken preachers, outspoken talk show hosts, people who have any kind of history of civil disobedience.

The remainder of this article will exclusively focus on the establishment of Stage two martial law.

Police State Measures

From unconstitutional border checkpoints which are  dozens of miles inland, America has been under a soft form of martial law for some time. The TSA conducts illegal and unconstitutional sexual assault, everyday, upon the flying public. The TSA has expanded their illegal detention and search operations through Operation VIPR on highways, malls and even a high school prom in Santa Fe, New Mexico. The NSA spies on your every electronic communication and has created a threat matrix database on every American. Why? What have Americans done that is so bad that our federal agencies have to invade rodeos, NASCAR events and the I-40 highway in Tennessee to pull over Americans without probable cause and molest their bodies in the name of national security? These unwarranted actions are the preliminary event to the roll out of Stage two martial law.

8

Creating the “Reichstag Fire” Justification

I do not look for one false flag event designed to move the country into martial law, it is likely that several false flag events will take place, in different regions of the country. The pattern is almost always the same in which the authorities conduct a drill related to terrorism. The drill is used to mask a false flag attack arising from the drill. This happened on 9/11, the 7/7 bombings and most recently, at the Boston Marathon. These drills combined with resulting false flag events will give the administration the ability to incrementally implement martial law in a fashion similar to what happened in with the implementation of  illegal martial law in Boston following the Boston Marathon bombing on April 15th. The roll out of Boston’s martial law was clearly a beta test for what is coming all across the country. And who could ever forget the images of the federal subjugation of an American city in which we saw troops in the street, curfews imposed and free travel eliminated.

Recently, DHS sponsored a self-study entitled, “Homeland Security and Intelligence: Next Steps in Evolving the Mission“, in which DHS proclaims that they are no longer concerned with foreign inspired terrorism. They are only going to focus on domestic terrorism, ostensibly, against the American people. Does the DHS purchase of 2.2 billion rounds of ammo, the acquisition of 2700 armored personnel carriers and the beta test of martial law in Boston last April begins to make a great deal of sense. Total control over the country, through a false flag event scenario seems entirely likely given the pre-positioning of assets by DHS.

The real purpose behind the creation of this American version of the East German Stasi secret police was to monitor and control the American population. Unfortunately, DHS has shared its high tech toys with most local police departments and Sheriff’s Departments and has, as a result, co-opted their local function. In other words, the federalization of local police forces, in violation of the 10th Amendment, is well underway. The early returns on this process are in and the results are extremely ugly, and through the federalization of local police departments, DHS is acquiring the manpower to enforce its soon-to-be martial law edicts.

The Importance of PDD 51 Cannot Be Overstated

Further support comes from Presidential Decision Directive 51 which handed President Obama dictator status in times of declared, and not necessarily real, national emergency. PDD 51 is a Bush era executive order that gives the President dictatorial power in times of national emergency, eliminates any roadblock to declaring martial law in the United States. It gives Obama the power to suspend elections. Under this arrangement, Obama could have 50 Watergate type of scandals hanging over his head and he does not have to worry about leaving office.

0

Stage Two and the Abrogation of Civil Liberties

When the first false flag event occurs, America will witness the implementation of Obama’s Executive Order 13603. In Section 601 of Executive Order 13603 signals the most Orwellian aspect of this executive order in which “upon request by the Director of Selective Service, and in coordination with the Secretary of Defense, assist the Director of Selective Service in development of policies regulating the induction and deferment of persons for duty in the armed services” (paragraph 2). What is particularly troubling is that the Secretary of Labor will possess oversight over the Selective Service process, instead of the Secretary of Defense. This revelation left me scratching my head as I wondered why would the Department of Labor be in charge of the coming military draft? Then it dawned upon me that we were not just talking about military conscription. I refer to the 2008 Presidential campaign in which Obama stated that “we need to construct a national civilian security force that is just as powerful, just as strong, just as well funded” (as the military).

Obama is clearly planning to conscript civilians, train them and send them where they are needed and will pay them whatever wage the Secretary of Commerce determines (Section 601; paragraphs 3, 4-Section 801; paragraph C). In one fell swoop, Obama has sidestepped the 13th Amendment as we are talking about the introduction of forced labor (i.e. indentured servitude).

Under Executive Order 13603, the Secretary of Transportation has been given control over civil transportation which “includes movement of persons and property by all modes of transportation in interstate, intrastate, or foreign commerce within the United States, its territories and possessions, and the District of Columbia, and related public storage and warehousing, ports, services,equipment and facilities, such as transportation carrier shop and repair facilities.” “Civil transportation” also shall include direction, control, and coordination of civil transportation capacity regardless of ownership” (Section 801 part A). Can there be any doubt that the expanded surveillance program of the TSA, in their unconstitutional practices of hands down our pants VIPER program, is designed to control all travel in the United States? The former Soviet Union used to have checkpoints every 20 miles in order to restrict travel and to prevent the congregation of “revolutionary forces” for purposes of opposing government control as well as to limit the ability of political dissidents to flee from their governmental pursuers. I feel compelled to ask, what is the government going to do that is so nefarious and so intrusive that they are seeking to set up a control grid which will accomplish these same goals? The present day Border Patrol checkpoints are part of a conditioning process designed to get Americans used to the fact that they have no constitutional liberties (e.g. Fourth Amendment).

Under EO 13603, the Secretary of Energy will have control over all “Energy” (which) means all forms of energy including petroleum, gas (both natural and manufactured), electricity, solid fuels (including all forms of coal, coke, coal chemicals, coal liquification, and coal gasification), solar, wind, other types of renewable energy, atomic energy, and the production, conservation, use, control, and distribution (including pipelines) of all of these forms of energy…” This means the government will have total control over all utility prices, the installation of smart meters along with the implementation of the smart grid and the amount of energy which can be consumed by average Americans will be severely curtailed under this new system of energy feudalism which will be imposed on the new American serfs. Obama, in the 2008 Presidential Campaign, stated that “under my plan of a cap and trade system, electricity rates would necessarily skyrocket.” Previously ignorant Americans will soon come to know the true meaning and the prophetic meaning of these words (Section 801, part b).

9        Stalin did it, Hitler did it and now Obama has the ability to do it. In Stage two martial law, if you want to eat, you must obey.

The Secretary of Agriculture will possess control over “fertilizer” (which) means any product or combination of products that contain one or more of the elements nitrogen, phosphorus, and potassium for use as a plant nutrient.” The Secretary of Agriculture will also control “food resource facilities “(which) means plants, machinery, vehicles (including on farm), and other facilities required for the production, processing, distribution, and storage (including cold storage) of food resources, and for the domestic distribution of farm equipment and fertilizer.” This is the total control of all food. This will allow Monsanto which demonstrably controls the Department of Agriculture, the FDA and EPA to move forward, unabated, for the total GMO takeover of our food supply. Even more disturbing is that a few men will have total control over all food production and the dissenting masses who oppose this fascist takeover can be effectively starved into submission or starved to death (Section 801, parts c-f).

There can be no doubt as the Secretary of Defense will be placed in charge of all water resources Section 801, part n). I can draw no other conclusion that placing the control of water under the DOD represents the weaponizing of water and the intended target of this full frontal assault are the American people for the purpose of imposing population control and complete compliance. I hearken back to the movie, The Hunger Games, this is exactly what lies in our future with regard to a martial law roll out which reaches Stage two.

What Will It Be Like to Live Under Martial Law?

In summary, Stage two martial law will follow a false flag event in which the internet will be taken down. All bank accounts, pension funds and 401K’s will be frozen and stolen. Extreme travel restrictions will be put in place. Random house to house searches will be conducted (Don’t forget about the 386,000 foreign troops which just completed their training on American soil). What will they be looking for? Of course, they will be looking for guns and the false flag events will give them the pretext to do so. And they will also be looking for known trouble makers. We will all be living in a society where we can be singled out for persecution, or worse. We will all have to watch every word we say. As it was in the Soviet Union, your young children will be used to spy upon and tattle on you at their school. And of course, you will be totally dependent upon the government for food, water and shelter. Traveling will be so onerous, that you will be content just to huddle in your home. When the false flag events commence, we will look at these days as the good ‘ole days.

http://thecommonsenseshow.com/2013/10/11/the-three-stages-of-us-martial-law/

nafta

This news is just horrendous …Obama has been negotiating and now supports this new trade agreement called the Transpacific Trade Partnership which is so bad for this country and so good for the corporations that own Obama that it boggles the mind. This treaty signs over american sovereignty to the corporations in such a profound way that they will even be allowed to privately police any violations of their rules. This is the part where we lose our freedoms and liberties and become corporate slaves.

– Internet restrictions up the wazoo

– Natural resources can be pillaged and we will no longer have any say over them

– Financial protection laws will be non existent

– Food safety laws …gone

The list goes on and on …the treay is 29 chapters and only 5 deal with free trade and the other 24 sign away our country to the corporations …get involved …Get vocal and get loud! This is the klind of garbage that tools like Wyden and Merkely and Charlie Rangel will vote for because they are told too … Here is the article

Rick MacArthur, publisher of Harper’s Magazine, and author of the book “The Selling of “Free Trade: NAFTA, Washington, and the Subversion of American Democracy,” discusses what’s been happening behind closed doors on Capitol Hill and why many environmentalists, AIDS activists, American labor unions, and social movements in Latin America oppose the deal. [includes rush transcript]

It was an unexpected announcement from Washington — and one many are still trying to figure out. Earlier this month, the White House and Democratic leaders announced they had reached a historic agreement on trade.

It’s the first bipartisan economic agreement since Democrats took control of Congress this year. Democrats say they’ve won guarantees to protect labor rights and environmental standards in all future trade deals, starting with Peru, Panama, Columbia and South Korea. Labor rights would include union organizing, collective bargaining and bans on child labor and workplace discrimination. On the environment, countries trading with the U.S. would be forced to comply with existing laws and international accords.

But critics say Democratic leaders have fallen far short of what they claim. The negotiations were conducted in near secrecy, and the details haven’t been fully disclosed. Criticism has come from many circles — environmentalists, AIDS activists, American labor unions, and social movements in countries including Colombia and Peru. Meanwhile, groups representing major U.S. corporations have supported the plan. The U.S. Chamber of Commerce is the world’s largest business federation. Chamber president Tom Donohue said: “We are encouraged by assurances that the labor provisions cannot be read to require compliance with [International Labor Organization] Conventions.”

Democrats are anything but united on the issue. Democratic caucus members are reportedly meeting today about the deal to avoid an internal split. That may be hard to overcome. As the agreement was announced, the New York Times reported at least half of Democratic Congressmembers were prepared to oppose it. In such a case, Democratic leaders would be forced to count on Republican support to pass final legislation.

As scrutiny grows, Rep. Charles Rangel, the Democratic chair of the House Ways and Means Committee, defended the deal in an interview Monday with CNN”s Lou Dobbs.

Continued Here Click

http://www.democracynow.org/2007/5/22/a_subversion_of_american_democracy_white

Forced Mass Drugging of US Troops an Underreported Scandal

Soldiers being forced to pop pills by exempt officer class

Alex Jones & Paul Joseph Watson
Infowars.com
August 19, 2013

The mass drugging of US troops is one of the most underreported scandals of the modern era, with soldiers not only being used as guinea pigs in a brave new world of pharmacological experimentation, but also having their rights stripped as a result.

Sgt. Joe Biggs recently joined the Alex Jones Show to describe in shocking details how he witnessed soldiers in Afghanistan displaying careless ignorance of the threat posed by IED’s because the troops were high on Percocet, a prescription painkiller based on oxycodone, a Schedule II narcotic analgesic which is derived from opium.

The Rest of this story is here (click) at Infowars.com

 10

20130320

This one is going to make you really mad….not kind of mad but really mad. I was watching a Bill Whittle rant earlier this morning where he makes an extremely accurate observation about the way our government and our elected leaders never seem to ask the right questions or look out for the people they should be looking out for when they come up with most of their half-baked anti America ideas… For instance how in the world can anyone with a working brain not see the devastating impact that adding 20 million new …mostly unskilled people to the labor pool will have? How could our own country screw it’s own people by putting their need to stay in office (and for the GOP legislators who are supporting this …God only knows what they are using for brains?)

illegal

That’s right it’s another classic example of our government putting the best interests of its own people second to the desires of a group of felons 15-22 million strong who will bring wage rates as low as they can possibly go …over burden our social services even more than they already are and bankrupt our cities and states by allowing an infestation of parasitic non English speaking drug dealers, drunk drivers, rapists and gun carrying gang bangers. Before you think that this is just another anti-illegal alien rant let me get to the issue that surfaced on my social justice for Americans first radar this morning was.

As we are all aware (to some degree or another) about 1/3 of the states who pander to illegal aliens …like Oregon, California Colorado etc. have all recently passed laws granting illegal aliens the right to ‘in state college tuition rates’ even though they aren’t even legally in those states. This by itself should still make any clear thinking American angry but did you know who doesn’t get the in state tuition break? Our returning members of our own military…

Nearly 250,000 veterans and service members are each paying an average of $10,000 per academic year out-of-pocket while using the GI Bill to attend a public college or university because of the changes in their educational benefits regarding residency for tuition purposes, according to the Student Veterans Advocacy Group (SVAG). (You can read the entire sad pathetic story here …click)

So basically the people who are in this country illegally and who are sucking it dry are being given preferential treatment over our own returning military people to the tune of over $10,000.00 PER YEAR! ARE YOU FREAKING KIDDING ME?

illegal-aliens-001

The Car Guyz

Auto Industry Experts Playing for the Other Team ...You!

FOX News

Stomping out Liberal Lunacy Whereever it's Found ...Which lately has been like playing Whack -A- Mole

The Rush Limbaugh Show

Stomping out Liberal Lunacy Whereever it's Found ...Which lately has been like playing Whack -A- Mole

Breitbart News

Stomping out Liberal Lunacy Whereever it's Found ...Which lately has been like playing Whack -A- Mole

Drudge Retort

Stomping out Liberal Lunacy Whereever it's Found ...Which lately has been like playing Whack -A- Mole

Fathers' Rights Blog

by Jeffery M. Leving

therightwingextremist

Stomping out Liberal Lunacy Whereever it's Found ...Which lately has been like playing Whack -A- Mole

The WordPress.com Blog

The latest news on WordPress.com and the WordPress community.

%d bloggers like this: