Anonymiss Express's Posts - 12160 Social Network2024-03-29T11:28:10ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpresshttps://storage.ning.com/topology/rest/1.0/file/get/1798365385?profile=RESIZE_48X48&width=48&height=48&crop=1%3A1https://12160.info/profiles/blog/feed?user=1kiz6a40ravu9&xn_auth=noSeeking MORE victims of Police Brutality by Chula Vista cop Fred Kraffttag:12160.info,2014-01-19:2649739:BlogPost:12642442014-01-19T08:44:28.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<h2 class="entry-meta">July 20, 2013</h2>
<p><a href="http://storage.ning.com/topology/rest/1.0/file/get/1976584160?profile=original" target="_self"><img class="align-center" src="http://storage.ning.com/topology/rest/1.0/file/get/1976584160?profile=original" width="511"></img></a> If you are a victim of Fred Krafft, please contact <a href="https://twitter.com/CrimeDefense" title="https://twitter.com/CrimeDefense">@CrimeDefense</a></p>
<h2>More Information: Navy surgeon’s lawsuit claiming police brutality continues</h2>
<blockquote><p>CHULA VISTA, Calif. – For the first time, one of San Diego’s top Navy doctors…</p>
</blockquote>
<h2 class="entry-meta">July 20, 2013</h2>
<p><a target="_self" href="http://storage.ning.com/topology/rest/1.0/file/get/1976584160?profile=original"><img class="align-center" src="http://storage.ning.com/topology/rest/1.0/file/get/1976584160?profile=original" width="511"/></a>If you are a victim of Fred Krafft, please contact <a title="https://twitter.com/CrimeDefense" href="https://twitter.com/CrimeDefense">@CrimeDefense</a></p>
<h2>More Information: Navy surgeon’s lawsuit claiming police brutality continues</h2>
<blockquote><p>CHULA VISTA, Calif. – For the first time, one of San Diego’s top Navy doctors is speaking out about what he calls a nightmare incident with Chula Vista police.</p>
<p><a href="http://www.10news.com/news/family-sues-chula-vista-police-claims-police-brutality" title="" class="ext-link ext-icon-4">10News broke the story in 2011</a> of a lawsuit filed by Dr. Eric Harris after a violent encounter at a Jimmy Buffett concert at the Cricket Wireless Amphitheatre in October 2008.</p>
<p>“I was incredulous as it was going on,” said Harris.</p>
<p>In a parking lot jammed with traffic, Harris, who heads the spinal surgery unit at Naval Medical Center San Diego, got out of his SUV to help create a space to merge.</p>
<p>He said a Chula Vista police officer yelled at him to get back in his SUV. Harris admitted that he muttered a curse word under his breath, and then headed back to the passenger side of his SUV.</p>
<p>Harris said CVPD Officer Frank Krafft came from behind and slammed his face into the vehicle three times</p>
<p>“The worst thing was my children were screaming in the back seat,” said Harris.</p>
<p>Harris was arrested on charges including resisting arrest. Prosecutors declined to pursue the case, but Harris filed a lawsuit against the city of Chula Vista.</p>
<p>Weeks after the incident, Harris was diagnosed with severe post-traumatic stress disorder.</p>
<p>More than four years after the incident, the case marches on.</p>
<p>The city of Chula Vista retained outside counsel, and the legal bills continue to grow.</p>
<p>[...]</p>
</blockquote>
<p>Source: <a title="http://www.10news.com/news/navy-surgeon-chula-vista-police-brutality-lawsuit-043013" href="http://www.10news.com/news/navy-surgeon-chula-vista-police-brutality-lawsuit-043013" class="ext-link ext-icon-4">Navy surgeon’s lawsuit claiming police brutality continues – Dr. Eric Harris says CVPD officer injured him</a></p>#Iraq #War vet faces 10 years in prison after photographing police | #policestate #ows #ustag:12160.info,2012-06-25:2649739:BlogPost:8952242012-06-25T20:08:19.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>25 june 2012, via <a class="twitter-atreply pretty-link" href="https://twitter.com/#%21/pink_piratez" rel="nofollow" target="_blank">@pink_piratez</a></p>
<blockquote><p><img alt="Photo by Antonio Buehler" height="277" src="https://rt.com/files/usa/news/texas-faces-years-recording-692/buehler-photo-antonio.n.jpg" width="370"></img></p>
<p>A 34-year-old Iraqi War veteran is facing ten years behind bars after photographing police officers in Austin, Texas that he says were mistreating a woman during a routine arrest on New Year’s Eve.</p>
<p>Antonio Buehler was pumping gas on December 31, 2011 when he witnessed officers with the Austin Police…</p>
</blockquote>
<p>25 june 2012, via <a class="twitter-atreply pretty-link" href="https://twitter.com/#%21/pink_piratez" rel="nofollow" target="_blank">@pink_piratez</a></p>
<blockquote><p><img alt="Photo by Antonio Buehler" src="https://rt.com/files/usa/news/texas-faces-years-recording-692/buehler-photo-antonio.n.jpg" height="277" width="370"/></p>
<p>A 34-year-old Iraqi War veteran is facing ten years behind bars after photographing police officers in Austin, Texas that he says were mistreating a woman during a routine arrest on New Year’s Eve.</p>
<p>Antonio Buehler was pumping gas on December 31, 2011 when he witnessed officers with the Austin Police Department attempt to detain a woman under suspicion of driving under the influence of alcohol at a fueling station. By the end of the evening, though, Buehler also found himself being apprehended by authorities.</p>
<p><em>“I saw a woman getting assaulted by the police. It looked like police abuse, and I decided to speak up and take pictures. I think that is every person’s right,”</em> Buehler told Austin’s KVUE News earlier this year.</p>
<p>The authorities, however, see things differently. According to the officers, Buehler was interfering with their investigation. Buehler says he was simply exercising his First Amendment rights from afar, but the police department begs to differ.</p>
<p>[…]</p>
</blockquote>
<p><a href="https://rt.com/usa/news/texas-faces-years-recording-692/" target="_blank">RT - Iraq War vet faces 10 years in prison after photographing police</a></p>Whistleblowers: How to contribute material to Cryptome anonymously?tag:12160.info,2012-05-14:2649739:BlogPost:8539902012-05-14T12:07:16.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p><a href="http://cryptome.org/cryptome-anon.htm" title="http://cryptome.org/cryptome-anon.htm">Reply by Cryptome</a>:</p>
<blockquote><p>To send material to Cryptome anonymously:</p>
<ol>
<li>Consider that the odds are very high that Cryptome or any other disclosure initiative (anonymizer, leak site, paste, doc-drop, torrent) is a deception operation, witting or unwitting, and avoid their use.</li>
<li>Protect yourself and never trust any method proposed by a receiver of your material. Never…</li>
</ol>
</blockquote>
<p><a title="http://cryptome.org/cryptome-anon.htm" href="http://cryptome.org/cryptome-anon.htm">Reply by Cryptome</a>:</p>
<blockquote><p>To send material to Cryptome anonymously:</p>
<ol>
<li>Consider that the odds are very high that Cryptome or any other disclosure initiative (anonymizer, leak site, paste, doc-drop, torrent) is a deception operation, witting or unwitting, and avoid their use.</li>
<li>Protect yourself and never trust any method proposed by a receiver of your material. Never believe assurances of privacy and security for it is customary to deceive about them, witting or unwitting, and inevitable failures are never fully admitted.</li>
<li>Presume there are no secure means to anonymously transmit online due to the basic design of the Internet to minutely track transmitted data despite illusory promises of anonymizing, cloaking and hiding services.</li>
<li>Presume undisclosed sysadmin surveillance throughout the online transmittal path.</li>
<li>Presume there are no fully secure means to encrypt digital material due to the unbridgeable gap between programming limitations of digital data and the engineering indequacies of analog devices to handle it.</li>
<li>Presume every program, device and system has a traceable embedded unique ID or electromagnetic performance signature.</li>
<li>If a host is used, run a series of test submissions of provocative but benign material to see what happens. Place “dye markers” in the material to trace its movement. Expect tampering, ruse, subterfuge, false assurance.</li>
<li>“Not traceable to you,” repeated below, is the hardest part only you can do.</li>
</ol>
<p>However, if you wish to take a risk with Cryptome (or any other), a few suggestions:</p>
<p>If material is digital:</p>
<ol>
<li>Encrypt to our PGP public key on Cryptome.org with a one-time-use PK. Encrypt again with a different one-time-use PK. The encrypting device should not be yours nor traceable to you.</li>
<li>Wear surgical gloves and surgical mask for step 2 and 3. (Best is a bio-hazard suit.)</li>
<li>Burn data to disk from a one-time use device. The burning device should not be yours nor traceable to you.</li>
<li>Package in a container untouched by your bare body. Package in a second container. Packages should not be traceable to you.</li>
<li>Mail or ship to our postal address on Cryptome.org from a location distant from your usual location, from a separate country if possible by way of a forwarding service not traceable to you.</li>
</ol>
<p>If hardcopy 1:</p>
<ol>
<li>Wear surgical gloves and surgical mask for step 2 and 3. (Best is a bio-hazard suit.)</li>
<li>Make a copy at a location away from your usual location.</li>
<li>Package in a container untouched by your bare body. Package in a second container. Packages should not be traceable to you.</li>
<li>Mail or ship to our postal address on Cryptome.org from a location distant from your usual location, from a separate country if possible by way of a forwarding service not traceable to you.</li>
</ol>
<p>If hardcopy 2:</p>
<ol>
<li>Wear surgical gloves and surgical mask for step 2 – 4. (Best is a bio-hazard suit.)</li>
<li>Scan hardcopy to make images or PDFs. The scanning device should not be yours nor traceable to you.</li>
<li>Encrypt to our PGP public key on Cryptome.org with a one-time-use PK. Encrypt again with a different one-time-use PK. The encrypting device should not be yours nor traceable to you.</li>
<li>Burn data to disk from a one-time use device. The burning device should not be yours nor traceable to you.</li>
<li>Package in a container untouched by your bare body. Package in a second container. Packages should not be traceable to you.</li>
<li>Mail or ship to our postal address on Cryptome.org from a location distant from your usual location, from a separate country if possible by way of a forwarding service not traceable to you.</li>
</ol>
<p>Best, be creative, imagine a means to triumph over the advice given here. Don’t brag about it.</p>
</blockquote>Whistleblower: The NSA is Lying – US Government Has Copies of Most of Your Emailstag:12160.info,2012-04-22:2649739:BlogPost:8380542012-04-22T00:30:00.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>April 20, 2012, via <a href="https://twitter.com/#%21/TyphonMind">@TyphonMind</a></p>
<p><a href="http://www.democracynow.org/appearances/william_binney">William Binney</a> served in the NSA for over 30 years, including a time as director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the NSA’s data-mining program has become so vast that it could “create an Orwellian state.”…</p>
<p></p>
<p>April 20, 2012, via <a href="https://twitter.com/#%21/TyphonMind">@TyphonMind</a></p>
<p><a href="http://www.democracynow.org/appearances/william_binney">William Binney</a> served in the NSA for over 30 years, including a time as director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the NSA’s data-mining program has become so vast that it could “create an Orwellian state.”</p>
<p><a href="http://www.democracynow.org/appearances/jacob_appelbaum">Jacob Appelbaum</a>, a computer security researcher who has volunteered with WikiLeaks. He is a developer and advocate for the Tor Project, a network enabling its users to communicate anonymously on the internet.</p>
<p><a href="http://www.democracynow.org/appearances/laura_poitras">Laura Poitras</a>, an award-winning documentary filmmaker and producer. She is working on the third part of a trilogy of films about America post-9/11. The first film was <em>My Country, My Country</em>,” and the second was <em>The Oath</em>.</p>
<p>See video: <a href="http://www.democracynow.org/2012/4/20/whistleblower_the_nsa_is_lying_us">http://www.democracynow.org/2012/4/20/whistleblower_the_nsa_is_lying_us</a></p>
<p>National Security Agency whistleblower William Binney reveals he believes domestic surveillance has become more expansive under President Obama than President George W. Bush. He estimates the NSA has assembled 20 trillion “transactions” — phone calls, emails and other forms of data — from Americans. This likely includes copies of almost all of the emails sent and received from most people living in the United States. Binney talks about Section 215 of the USA PATRIOT Act and challenges NSA Director Keith Alexander’s assertion that the NSA is not intercepting information about U.S. citizens. <em>This interview is part of a <a href="http://www.democracynow.org/shows/2012/4/20">4-part special</a>. Click here to see segment <a href="http://www.democracynow.org/2012/4/20/exclusive_national_security_agency_whistleblower_william">1</a>, <a href="http://www.democracynow.org/2012/4/20/detained_in_the_us_filmmaker_laura">2</a>, and <a href="http://www.democracynow.org/2012/4/20/we_do_not_live_in_a">3</a>.</em></p>
<h2>Transcript</h2>
<p><strong>JUAN GONZALEZ:</strong> Well, I wanted to ask William Binney about this issue. When it comes to snail mail, the old postal system, it’s very tough for the government to intercept mail, except in times of war, particular situations. When it comes to phone conversations, land phone conversations, you need a warrant to be able to intercept phone conversations. But what about email, and what about the communication now that is really the dominant form that not only Americans, but many people around the world communicate? What are the restrictions on the government in terms of email?</p>
<p><strong>WILLIAM BINNEY:</strong> Well, after some of the laws they passed, like the PATRIOT Act and their secret interpretation of Section 215, which is—my view, of course, is same as Tom Drake’s, is that that gives them license to take all the commercially held data about us, which is exceedingly dangerous, because if you take that and put it into forms of graphing, which is building relationships or social networks for everybody, and then you watch it over time, you can build up knowledge about everyone in the country. And having that knowledge then allows them the ability to concoct all kinds of charges, if they want to target you. Like in my case, they fabricated several charges and attempted to indict us on them. Fortunately, we were able to produce evidence that would make them look very silly in court, so they didn’t do it. In fact, it was—I was basically assembling evidence of malicious prosecution, which was a countercharge to them. So…</p>
<p><strong>AMY GOODMAN:</strong> Do you believe all emails, the government has copies of, in the United States?</p>
<p><strong>WILLIAM BINNEY:</strong> I would think—I believe they have most of them, yes.</p>
<p><strong>AMY GOODMAN:</strong> And you’re speaking from a position where you would know, considering your position in the National Security Agency.</p>
<p><strong>WILLIAM BINNEY:</strong> Right. All they would have to do is put various Narus devices at various points along the network, at choke points or convergent points, where the network converges, and they could basically take down and have copies of most everything on the network.</p>
<p><strong>AMY GOODMAN:</strong> Jacob, your email?</p>
<p><strong>JACOB APPELBAUM:</strong> Well, I selectively chose to use certain public services, like Sonic.net and Gmail, and I specifically did that so as to serve as a warning to other people. I didn’t use it for anything interesting, never once emailed Julian, for example, from those accounts. But the U.S. government again asserted in those cases, according to the <em>Wall Street Journal</em>, which is one way to find out about what’s going on with you—they asserted that they have the right to all that metadata. And it is possible—on Monday, I had a little interaction with the FBI, where they sort of hinted that maybe there might be a national security letter for one of my email accounts, which is also hosted by Google, specifically because I want to serve as a canary in a coal mine for other people.</p>
<p><strong>AMY GOODMAN:</strong> A national security letter—it’s believed the government has given out hundreds of thousands of those.</p>
<p><strong>JACOB APPELBAUM:</strong> Yeah.</p>
<p><strong>AMY GOODMAN:</strong> I have also written about NSLs. But if you get one, you are not allowed to talk about it, on pain of something like up to five years in prison, even to mention that you were handed a national security letter that said turn something over.</p>
<p><strong>JACOB APPELBAUM:</strong> Yeah. That was the case of Nick Merrill, for example, who’s a brave American, who essentially fought and won the NSL that was handed down to him.</p>
<p><strong>AMY GOODMAN:</strong> And the librarians of Connecticut—</p>
<p><strong>JACOB APPELBAUM:</strong> Yes.</p>
<p><strong>AMY GOODMAN:</strong> —who were taking on the USA PATRIOT Act and didn’t want to give information over about patrons in the library that the FBI wanted to get information on.</p>
<p><strong>JACOB APPELBAUM:</strong> Right, absolutely. So, an NSL, what’s specifically scary about it is that all that is required is for an FBI agent to assert that they need one, and that’s it. And you don’t have a chance to have judicial review, because you aren’t the one served. Your service provider will be served. And they can’t tell you, so you don’t get your day in court.</p>
<p><strong>AMY GOODMAN:</strong> Laura, can you set up this clip that we have?</p>
<p><strong>LAURA POITRAS:</strong> Yes, actually, this is what Jake was alluding to. On Monday, there was a panel at the Open Society Institute. And Jake—and there was a deputy general counsel of the FBI who was present, and Jake had the opportunity to question her about national security letters.</p>
<blockquote><p><strong>JACOB APPELBAUM:</strong> Are you including national security letters in your comment about believing that there is judicial oversight with the FBI’s actions?</p>
</blockquote>
<blockquote><p><strong>FBI DEPUTY GENERAL COUNSEL:</strong> National security letters and administrative subpoenas have the ability to have judicial oversight, yes.</p>
</blockquote>
<blockquote><p><strong>JACOB APPELBAUM:</strong> How many of those actually do have judicial oversight, in percentage?</p>
</blockquote>
<blockquote><p><strong>FBI DEPUTY GENERAL COUNSEL:</strong> What do you mean by that? How many have—</p>
</blockquote>
<blockquote><p><strong>JACOB APPELBAUM:</strong> I mean, every time you get a national security letter, you have to go to a judge? Or—</p>
</blockquote>
<blockquote><p><strong>FBI DEPUTY GENERAL COUNSEL:</strong> No, as you well know, national security letters, just like administrative subpoenas, you don’t have to go to a judge. The statute does allow for the person on whom those are served to seek judicial review. And people have done so.</p>
</blockquote>
<blockquote><p><strong>JACOB APPELBAUM:</strong> And in the case of the third parties, such as, say, the 2703(d) orders that were served on my — according to the <em>Wall Street Journal</em> — my Gmail account, my Twitter account, and my internet service provider account, the third parties were prohibited from telling me about it, so how am I supposed to go to a judge, if the third party is gagged from telling me that I’m targeted by you?</p>
</blockquote>
<blockquote><p><strong>FBI DEPUTY GENERAL COUNSEL:</strong> There are times when we have to have those things in place. So, at some point, obviously, you became aware. So at some point, the person does become aware. But yes, the statute does allow us to do that. The statute allows us.</p>
</blockquote>
<p><strong>AMY GOODMAN:</strong> Now, Jacob, explain who she was again.</p>
<p><strong>JACOB APPELBAUM:</strong> So, my understanding is that she’s the deputy general counsel of the FBI.</p>
<p><strong>AMY GOODMAN:</strong> And the significance of what she has just said?</p>
<p><strong>JACOB APPELBAUM:</strong> Essentially, what she says is, “We are just and righteous because you get judicial review. But there are some cases where you don’t, and we are still just and righteous. And you should trust us, because COINTELPRO will never happen again.” That’s what I heard from that. And, in fact, later, someone asked about COINTELPRO and said, “How can we” —</p>
<p><strong>AMY GOODMAN:</strong> The counterintelligence program that targeted so many dissidents in the 1970s.</p>
<p><strong>JACOB APPELBAUM:</strong> Yeah. Tried to get Martin Luther King Jr. to kill himself, for example. The FBI wrote him a letter and encouraged him to commit suicide. So for her to suggest that it is just and right and that we should always trust them sort of overlooks the historical problems with doing exactly that for any people in a position of power, with no judicial oversight.</p>
<p><strong>JUAN GONZALEZ:</strong> William Binney, what about the companies that are approached by the government to participate or facilitate the surveillance? Your sense of the degree of opposition that they’re mounting, if at all? And also, has there been any kind of qualitative change since the Obama administration came in versus what the Bush administration was practicing?</p>
<p><strong>WILLIAM BINNEY:</strong> Well, first of all, I don’t think any of them opposed it in any way. I mean, they were approached to saying, “You’ll be patriotic if you support us.” So I think they saluted and said, “Yes, sir,” and supported them, because they were told it was legal, too. And then, of course, they had to be given retroactive immunity for the crimes they were committing. So—</p>
<p><strong>JUAN GONZALEZ:</strong> Approved by President Obama.</p>
<p><strong>WILLIAM BINNEY:</strong> And President Bush, yeah. It started with Bush, yeah.</p>
<p><strong>JUAN GONZALEZ:</strong> And the differences in the administrations?</p>
<p><strong>WILLIAM BINNEY:</strong> Actually, I think the surveillance has increased. In fact, I would suggest that they’ve assembled on the order of 20 trillion transactions about U.S. citizens with other U.S. citizens.</p>
<p><strong>AMY GOODMAN:</strong> How many?</p>
<p><strong>WILLIAM BINNEY:</strong> Twenty trillion.</p>
<p><strong>AMY GOODMAN:</strong> And you’re saying that this surveillance has increased? Not only the—</p>
<p><strong>WILLIAM BINNEY:</strong> Yes.</p>
<p><strong>AMY GOODMAN:</strong> —targeting of whistleblowers, like your colleagues, like people like Tom Drake, who are actually indicted under the Obama administration—</p>
<p><strong>WILLIAM BINNEY:</strong> Right.</p>
<p><strong>AMY GOODMAN:</strong> —more times—the number of people who have been indicted are more than all presidents combined in the past.</p>
<p><strong>WILLIAM BINNEY:</strong> Right. And I think it’s to silence what’s going on. But the point is, the data that’s being assembled is about everybody. And from that data, then they can target anyone they want.</p>
<p><strong>AMY GOODMAN:</strong> Bill Binney, talk about Bluffdale, Utah. What is being built there?</p>
<p><strong>WILLIAM BINNEY:</strong> Well, a very large storage device, basically, for remote interrogation and remote processing. That’s the way I view that. Because there’s not enough people there to actually work the data there, so it’s being worked somewhere else.</p>
<p><strong>AMY GOODMAN:</strong> Where do you get the number 20 trillion?</p>
<p><strong>WILLIAM BINNEY:</strong> Just by the numbers of telecoms, it appears to me, from the questions that CNET posed to them in 2006, and they published the names and how—what the responses were. I looked at that and said that anybody that equivocated was participating, and then estimated from that the numbers of transactions. That, by the way, estimate only was involving phone calls and emails. It didn’t involve any queries on the net or any assembles—other—any financial transactions or credit card stuff, if they’re assembling that. I do not know that, OK.</p>
<p><strong>JUAN GONZALEZ:</strong> And the original—the original allegations that you made, in terms of the crimes being committed under the Bush administration in terms of the rights of American citizens, could you detail those?</p>
<p><strong>WILLIAM BINNEY:</strong> Well, I made that—I reported the crime when I was raided in 2007. And it was that Bush and Cheney and Hayden and Tenet conspired to subvert the Constitution and violate various laws of the—that exist in the statute at the time, and here’s how they did it. And I was reporting this to the FBI on my back porch during the raid. And I went through Stellar Wind and told them what it did and what the information it was using and how they were spying on—or assembling data to be able to spy on any American.</p>
<p><strong>AMY GOODMAN:</strong> I want to go to a clip of Congress Member Hank Johnson—he’s the Georgia Democrat—questioning National Security Administration director, General Keith Alexander, last month, asking him whether the NSA spies on U.S. citizens.</p>
<blockquote><p><strong>REP. HANK JOHNSON:</strong> Does the NSA routinely intercept American citizens’ emails?</p>
</blockquote>
<blockquote><p><strong>GEN. KEITH ALEXANDER:</strong> No.</p>
</blockquote>
<blockquote><p><strong>REP. HANK JOHNSON:</strong> Does the NSA intercept Americans’ cell phone conversations?</p>
</blockquote>
<blockquote><p><strong>GEN. KEITH ALEXANDER:</strong> No.</p>
</blockquote>
<blockquote><p><strong>REP. HANK JOHNSON:</strong> Google searches?</p>
</blockquote>
<blockquote><p><strong>GEN. KEITH ALEXANDER:</strong> No.</p>
</blockquote>
<blockquote><p><strong>REP. HANK JOHNSON:</strong> Text messages?</p>
</blockquote>
<blockquote><p><strong>GEN. KEITH ALEXANDER:</strong> No.</p>
</blockquote>
<blockquote><p><strong>REP. HANK JOHNSON:</strong> Amazon.com orders?</p>
</blockquote>
<blockquote><p><strong>GEN. KEITH ALEXANDER:</strong> No.</p>
</blockquote>
<blockquote><p><strong>REP. HANK JOHNSON:</strong> Bank records?</p>
</blockquote>
<blockquote><p><strong>GEN. KEITH ALEXANDER:</strong> No.</p>
</blockquote>
<blockquote><p><strong>REP. HANK JOHNSON:</strong> What judicial consent is required for NSA to intercept communications and information involving American citizens?</p>
</blockquote>
<blockquote><p><strong>GEN. KEITH ALEXANDER:</strong> Within the United States, that would be the FBI lead. If it was a foreign actor in the United States, the FBI would still have the lead and could work that with NSA or other intelligence agencies, as authorized. But to conduct that kind of collection in the United States, it would have to go through a court order, and the court would have to authorize it. We are not authorized to do it, nor do we do it.</p>
</blockquote>
<p><strong>AMY GOODMAN:</strong> That was General Keith Alexander, the NSA director, being questioned by Democratic Congress Member Hank Johnson. Bill Binney, he’s the head of your agency, of the NSA. Explain what he’s saying—what he’s not saying, as well.</p>
<p><strong>WILLIAM BINNEY:</strong> Well, I think it’s—part of it is a term, how you use the term “intercept,” as to whether or not what they’re saying is, “We aren’t actually looking at it, but we have it,” you know, or whether or not they’re actually collecting it and storing it somewhere.</p>
<p><strong>JUAN GONZALEZ:</strong> So the mistake of the congressman was not to ask, “Are you collecting information?”</p>
<p><strong>WILLIAM BINNEY:</strong> Well, he also said things like, “We don’t collect” — or, “We don’t collect against U.S. citizens unless we have a warrant.” And then, at the same time, he said that we don’t—at the same interview, he said, “We don’t have the capability to collect inside this country.” Well, those are kind of contradictory.</p>
<p><strong>AMY GOODMAN:</strong> Is he lying? Is General Keith Alexander lying?</p>
<p><strong>WILLIAM BINNEY:</strong> I wouldn’t—you know, the point is how you split the words. I wouldn’t say “lying.” It’s a kind of avoiding the issue.</p>
<p><strong>AMY GOODMAN:</strong> Jacob Appelbaum, how does this relate to you? And how powerful is General Keith Alexander?</p>
<p><strong>JACOB APPELBAUM:</strong> I was saying to Bill that I think he’s probably the most powerful person in the world, in the sense that—</p>
<p><strong>AMY GOODMAN:</strong> More powerful than President Obama?</p>
<p><strong>JACOB APPELBAUM:</strong> Well, sure. I mean, if he controls the information that arrives on Obama’s desk, and Obama makes decisions based on the things on his desk, what decisions can he make, if—except the decisions presented to him by the people he trusts? And when the people he trusts are the military, the military makes the decisions, then the civilian government is not actually in power.</p>
<p><strong>AMY GOODMAN:</strong> Bill Binney, you’re nodding your head.</p>
<p><strong>WILLIAM BINNEY:</strong> Yes. I mean, well, for example, their responsibility is to interpret what they have and report up echelon. So, I mean, that’s the responsibility of all the intelligence agencies. So, they basically filter the information to what they believe is important, which is what they should do, because, you know, they’re occupying—it takes time for leaders to review material to make decisions. So they have to boil it down as best they can. So it’s a function of their processing, but it is important that they do it correctly to make sure the information that gets there is correct and complete as it can.</p>
<p><strong>AMY GOODMAN:</strong> Is General Alexander more powerful than President Obama?</p>
<p><strong>WILLIAM BINNEY:</strong> In the sense of making—of presenting information for decision making, sure.</p>
<p><strong>JUAN GONZALEZ:</strong> And Laura, the impact on journalists, who have to go through what you go—you’ve gone through the last few years, just to be able to report what’s going on with our government? The chilling effect that this has on—maybe not on you, but on many other journalists?</p>
<p><strong>LAURA POITRAS:</strong> Sure. I mean, I feel like I can’t talk about the work that I do in my home, in my place of work, on my telephone, and sometimes in my country. So the chilling effect is huge. It’s enormous.</p>
<p><strong>AMY GOODMAN:</strong> You keep your computers and telephones away from conversations you’re having in a room?</p>
<p><strong>LAURA POITRAS:</strong> Yeah. When we had a meeting with you, remember, we told you—we kicked all your cell phones and all your computers out of the room.</p>
<p><strong>AMY GOODMAN:</strong> You un—the wired phone, you unwired.</p>
<p><strong>LAURA POITRAS:</strong> Yeah.</p>
<p><strong>AMY GOODMAN:</strong> My cell phone, you didn’t allow me to have it in the room. And you made sure there were no computers in the room.</p>
<p><strong>LAURA POITRAS:</strong> Right.</p>
<p><strong>AMY GOODMAN:</strong> Why?</p>
<p><strong>LAURA POITRAS:</strong> Because we wanted—well, we wanted to talk about—because we were bringing—we were bringing William to New York. And—</p>
<p><strong>AMY GOODMAN:</strong> We have to leave it there, but we’re going to go online right now at democracynow.org. We’re going to continue this conversation with Bill Binney of the NSA, formerly with NSA; Laura Poitras and Jacob Appelbaum.</p>
<h2>Links</h2>
<ul>
<li><a href="http://whitney.org/Events/LauraPoitrasObservationAndTrust">Surveillance Teach-in with Laura Poitras, Jacob Appelbaum and William Binney at the Whitney Museum, April 20</a></li>
<li><a href="http://www.nsa.gov/">NSA website</a></li>
<li><a href="http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1">“The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say),” by James Bamford. (Wired Magazine, March 15, 2012)</a></li>
</ul>
<object id="obj_1334944828234" height="500" width="500"><param name="movie" value="http://12160mhz.chatango.com/group"></param><param name="AllowScriptAccess" value="never"></param><param name="AllowNetworking" value="all"></param><param name="AllowFullScreen" value="false"></param><param name="flashvars" value="cid=1334944828234&a=000000&b=100&c=FF0033&d=FFFFFF&e=000000&g=00FF66&k=666666&l=333333&m=000000&n=FFFFFF&p=16&s=1&t=0"></param><embed wmode="opaque" id="emb_1334944828234" src="http://12160mhz.chatango.com/group" allowscriptaccess="never" allownetworking="all" type="application/x-shockwave-flash" allowfullscreen="false" flashvars="cid=1334944828234&a=000000&b=100&c=FF0033&d=FFFFFF&e=000000&g=00FF66&k=666666&l=333333&m=000000&n=FFFFFF&p=16&s=1&t=0" height="500" width="500"></embed> <param name="wmode" value="opaque"></param></object>
<br/>“We Don’t Live in a Free Country”: Jacob Appelbaum on Being Target of Widespread Gov’t Surveillancetag:12160.info,2012-04-22:2649739:BlogPost:8378842012-04-22T00:26:21.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>April 20, 2012, via <a href="https://twitter.com/#%21/TyphonMind">@TyphonMind</a></p>
<p><a href="http://www.democracynow.org/appearances/jacob_appelbaum">Jacob Appelbaum</a>, a computer security researcher who has volunteered with WikiLeaks. He is a developer and advocate for the Tor Project, a network enabling its users to communicate anonymously on the internet.</p>
<p>See video:…</p>
<p>April 20, 2012, via <a href="https://twitter.com/#%21/TyphonMind">@TyphonMind</a></p>
<p><a href="http://www.democracynow.org/appearances/jacob_appelbaum">Jacob Appelbaum</a>, a computer security researcher who has volunteered with WikiLeaks. He is a developer and advocate for the Tor Project, a network enabling its users to communicate anonymously on the internet.</p>
<p>See video: <a href="http://www.democracynow.org/2012/4/20/we_do_not_live_in_a">http://www.democracynow.org/2012/4/20/we_do_not_live_in_a</a></p>
<p>We speak with Jacob Appelbaum, a computer researcher who has faced a stream of interrogations and electronic surveillance since he volunteered with the whistleblowing website, WikiLeaks. He describes being detained more than a dozen times at the airport and interrogated by federal agents who asked about his political views and confiscated his cell phone and laptop. When asked why he cannot talk about what happened after he was questioned, Appelbaum says, “Because we don’t live in a free country. And if I did, I guess I could tell you about it.” A federal judge ordered Twitter to hand over information about Appelbaum’s account. Meanwhile, he continues to work on the Tor Project, an anonymity network that ensures every person has the right to browse the internet without restriction and the right to speak freely. <em>This interview is part of a <a href="http://www.democracynow.org/shows/2012/4/20">4-part special</a>. Click here to see segment <a href="http://www.democracynow.org/2012/4/20/exclusive_national_security_agency_whistleblower_william">1</a>, <a href="http://www.democracynow.org/2012/4/20/detained_in_the_us_filmmaker_laura">2</a>, and <a href="http://www.democracynow.org/2012/4/20/whistleblower_the_nsa_is_lying_us">4</a>.</em></p>
<h2>Transcript</h2>
<p><strong>JUAN GONZALEZ:</strong>Jacob, your experiences entering the United States at various times?</p>
<p><strong>JACOB APPELBAUM:</strong>Well, after the summer of 2010, my life became a little hectic with regard to flying. I do a lot of traveling, working with the Tor Project. And after the summer of 2010, where I gave a speech at Hackers on Planet Earth in place of Julian Assange, I was targeted by the U.S. government and essentially, until the last four times that I’ve flown, I was detained basically every time. Sometimes men would meet me at the jetway, similarly, with guns.</p>
<p><strong>AMY GOODMAN:</strong>Let us play that moment when you went to the HOPE conference.</p>
<p><strong>JACOB APPELBAUM:</strong>Oh, dear.</p>
<p><strong>AMY GOODMAN:</strong>Hackers on Planet Earth. Julian Assange was supposed to be there. He wasn’t. You stood up. This is the beginning of what you said.</p>
<blockquote><p><strong>JACOB APPELBAUM:</strong> Hello to all my friends and fans in domestic and international surveillance. I’m here today because I believe that we can make a better world.</p>
</blockquote>
<p><strong>AMY GOODMAN:</strong>And what did you go on to say?</p>
<p><strong>JACOB APPELBAUM:</strong>Basically, I went on to talk about how I feel that people like Bill need to come forward to talk about what the U.S. government is doing, so that we can make informed choices as a democracy. And I went on to talk about how WikiLeaks is a part of making that happen. And as long as we have excessive classification and secrecy, that we need a WikiLeaks, and we need to stand in solidarity together, so that people will have the information that they need to understand what’s actually happening in their names.</p>
<p><strong>JUAN GONZALEZ:</strong>You mentioned the Tor Project that you work with. What is it?</p>
<p><strong>JACOB APPELBAUM:</strong>The Tor Project is an anonymity network, which ensures that each person has the right to read, without restriction, and the right to speak freely, with no exception.</p>
<p><strong>AMY GOODMAN:</strong>T-O-R?</p>
<p><strong>JACOB APPELBAUM:</strong> <a href="http://www.torproject.org/">TorProject.org</a>. And the basic idea is that every person in the world has the right to read and the right to speak freely. And using their software, using principles of mutual aid and solidarity—something familiar to <em>Democracy Now!</em>viewers, I imagine—it’s possible for everybody to use this anonymity network, spread out across the planet. It’s a thing that’s useful for resisting so-called lawful interception. So, for example, when Mubarak in Egypt wants to wiretap someone, they only see an activist talking to the Tor network; they don’t see that person connecting to Twitter. And that is something that can be used by everybody everywhere to resist so-called lawful interception.</p>
<p><strong>JUAN GONZALEZ:</strong>And you use a program that was actually developed by the U.S. government?</p>
<p><strong>JACOB APPELBAUM:</strong>Well, yeah. So, originally, the Tor Project is born from ideas that come from the anonymity community, of which the U.S. military has actually contributed quite heavily to. But since the times of the original onion routing patents, it has become a free software project, where, as far as I know, the U.S. Navy has contributed zero lines of code to it, but certainly lots of good ideas, because they understand, as many other people do, that if everyone has anonymous communication, that means everyone does, and if only special people do, it means that you can tell that those are special people that have special privileges, and you can basically see who they are.</p>
<p>So, for example, the Riseup Collective, which you mentioned earlier on the show, they run a number of tor nodes. And I run some, and many other people do. And as long as you get one good one, you have some of the properties that you need. And this helps people to resist not just so-called lawful interception, but also to resist censorship. So if you can’t see inside of the communications, you can’t selectively discriminate based on the content.</p>
<p><strong>AMY GOODMAN:</strong>Just to say that in our news headlines today, we said the FBI has just seized a computer server at the New York facility shared by the internet organization Riseup Networks and May First/People Link. But I want to go back to your experience at the airport. If you could just briefly say—I mean, it’s been dozens and dozens of times that you have—</p>
<p><strong>JACOB APPELBAUM:</strong>I don’t fly as much as Laura, and Laura has been at it for a lot longer than I have. But in the period of time since they’ve started detaining me, around a dozen-plus times. I’ve been detained a number of times. The first time I was actually detained by the Immigration and Customs Enforcement, I was put into a special room, where they frisked me, put me up against the wall. One guy cupped me in a particularly uncomfortable way. Another one held my wrists. They took my cell phones. I’m not really actually able to talk about what happened to those next.</p>
<p><strong>AMY GOODMAN:</strong>Why?</p>
<p><strong>JACOB APPELBAUM:</strong>Because we don’t live in a free country. And if I did, I guess I could tell you about it, right? And they took my laptop, but they gave it back. They were a little surprised it didn’t have a hard drive. I guess that threw them for a loop. And, you know, then they interrogated me, denied me access to a lawyer. And when they did the interrogation, they has a member of the U.S. Army, on American soil. And they refused to let me go. They tried—you know, they tried their usual scare tactics. So they sort of implied that if I didn’t make a deal with them, that I’d be sexually assaulted in prison, you know, which is the thing that they do these days as a method of punitive punishment, and they of course suggested that would happen.</p>
<p><strong>AMY GOODMAN:</strong>How did they imply this?</p>
<p><strong>JACOB APPELBAUM:</strong>Well, you know, they say, “You know, computer hackers like to think they’re all tough. But really, when it comes down to it, you don’t look like you’re going to do so good in prison.” You know, that kind of stuff.</p>
<p><strong>JUAN GONZALEZ:</strong>And what was the main thrust of the questions they were asking you?</p>
<p><strong>JACOB APPELBAUM:</strong>Well, they wanted to know about my political views. They wanted to know about my work in any capacity as a journalist, actually, the notion that I could be in some way associated with Julian. They wanted, basically, to know any—</p>
<p><strong>AMY GOODMAN:</strong>Julian Assange.</p>
<p><strong>JACOB APPELBAUM:</strong>Julian Assange, the one and only. And they wanted—they wanted, essentially, to ask me questions about the Iraq war, the Afghan war, what I thought politically. They didn’t ask me anything about terrorism. They didn’t ask me anything about smuggling or drugs or any of the customs things that you would expect customs to be doing. They didn’t ask me if I had anything to declare about taxes, for example, or about importing things. They did it purely for political reasons and to intimidate me, denied me a lawyer. They gave me water, but refused me a bathroom, to give you an idea about what they were doing.</p>
<p><strong>AMY GOODMAN:</strong>What happened to your Twitter account?</p>
<p><strong>JACOB APPELBAUM:</strong>Well, the U.S. government, as I learned while I was in Iceland, actually, sent what’s called an administrative subpoena, or a 2703(d) order. And this is, essentially, less than a search warrant, and it asserts that you can get just the metadata and that the third party really doesn’t have a standing to challenge it, although in our case we were very lucky, in that we got to have—Twitter actually did challenge it, which was really wonderful. And we have been fighting this in court.</p>
<p>And without going into too much detail about the current court proceedings, we lost a stay recently, which says that Twitter has to give the data to the government. Twitter did, as I understand it, produce that data, I was told. And that metadata actually paints—you know, metadata and aggregate is content, and it paints a picture. So that’s all the IP addresses I logged in from. It’s all of the, you know, communications that are about my communications, which is Bill’s specialty, and he can, I’m sure, talk about how dangerous that metadata is.</p>
<h2>Links</h2>
<ul>
<li><a href="http://whitney.org/Events/LauraPoitrasObservationAndTrust">Surveillance Teach-in with Laura Poitras, Jacob Appelbaum and William Binney at the Whitney Museum, April 20</a></li>
<li><a href="https://www.torproject.org/">Tor Project: Anonymity Online</a></li>
<li><a href="http://www.rollingstone.com/culture/news/the-most-dangerous-man-in-cyberspace-20100818">“The Most Dangerous Man in Cyberspace,” Jacob Appelbaum profile (Rolling Stone, August 18, 2010)</a></li>
</ul>
<p> </p>
<div class="TweetButton_button" style="float: right; margin-left: 10px;"></div>National Security Agency Whistleblower William Binney on Growing State Surveillancetag:12160.info,2012-04-22:2649739:BlogPost:8378812012-04-22T00:15:12.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>April 20, 2012, via <a href="https://twitter.com/#%21/TyphonMind">@TyphonMind</a></p>
<p><a href="http://www.democracynow.org/appearances/william_binney">William Binney</a>served in the NSA for over 30 years, including a time as director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the NSA’s data-mining program has become so vast that it could "create an Orwellian state."</p>
<p>See video:…</p>
<p>April 20, 2012, via <a href="https://twitter.com/#%21/TyphonMind">@TyphonMind</a></p>
<p><a href="http://www.democracynow.org/appearances/william_binney">William Binney</a>served in the NSA for over 30 years, including a time as director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the NSA’s data-mining program has become so vast that it could "create an Orwellian state."</p>
<p>See video: <a href="http://www.democracynow.org/2012/4/20/exclusive_national_security_agency_whistleblower_william">http://www.democracynow.org/2012/4/20/exclusive_national_security_agency_whistleblower_william</a></p>
<p>In his first television interview since he resigned from the National Security Agency over its domestic surveillance program, William Binney discusses the NSA’s massive power to spy on Americans and why the FBI raided his home after he became a whistleblower. Binney was a key source for investigative journalist James Bamford’s recent exposé in Wired Magazine about how the NSA is quietly building the largest spy center in the country in Bluffdale, Utah. The Utah spy center will contain near-bottomless databases to store all forms of communication collected by the agency, including private emails, cell phone calls, Google searches and other personal data.</p>
<p>Binney served in the NSA for over 30 years, including a time as technical director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the NSA’s data-mining program has become so vast that it could "create an Orwellian state." Today marks the first time Binney has spoken on national television about NSA surveillance. <em>This interview is part of a <a href="http://www.democracynow.org/shows/2012/4/20">4-part special</a>. Click here to see segment <a href="http://www.democracynow.org/2012/4/20/detained_in_the_us_filmmaker_laura">2</a>, <a href="http://www.democracynow.org/2012/4/20/we_do_not_live_in_a">3</a>, and <a href="http://www.democracynow.org/2012/4/20/whistleblower_the_nsa_is_lying_us">4</a></em></p>
<h2>Transcript</h2>
<br/> <strong>JUAN GONZALEZ:</strong> Today we bring you a <em>Democracy Now!</em> special on the growing domestic surveillance state and the Department of Homeland Security’s efforts to spy on dissident journalists and activists. In a national broadcast exclusive, we’re joined by National Security Agency whistleblower William Binney. He was a key source for James Bamford’s recent [<a href="http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1">exposé</a>] in <em>Wired Magazine</em>about the NSA—how the NSA is quietly building the largest spy center in the country in Bluffdale, Utah. The Utah spy center will contain nearly bottomless databases to store all forms of communication collected by the agency, including private emails, cell phone calls and Google searches and other personal data.<p>Binney served in the NSA for over 30 years, including a time as director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the agency’s data-mining program has become so vast that it could, quote, "create an Orwellian state." Today marks the first time Binney has spoken on national television about surveillance by the National Security Agency.</p>
<p><strong>AMY GOODMAN:</strong> We’re also joined by two individuals who have been frequent targets of government surveillance: Laura Poitras, the Academy Award-nominated filmmaker, and Jacob Appelbaum, a computer security researcher who has volunteered with WikiLeaks. Poitras is the director of the documentary films <em>My Country, My Country</em> and <em>The Oath</em>. Both Poitras and Appelbaum have been repeatedly detained and interrogated by federal agents when entering the United States. Their laptops, cameras and cell phones have been seized, and presumably their data has been copied.</p>
<p>The Justice Department has also targeted Applebaum’s online communications. In November, a federal judge ordered Twitter to hand over information about his account. In October, the <em>Wall Street Journal</em>revealed the Justice Department had obtained a secret court order to force Google and the internet provider Sonic.net to turn over information about Appelbaum’s email accounts.</p>
<p>William Binney, Laura Poitras and Jacob Appelbaum will be speaking tonight at the Whitney Museum here in New York for a teach-in on surveillance. The three of them join us here in our studio together in a broadcast for the first time. We’re going to begin with William Binney.</p>
<p>You worked for the National Security Agency for more than three decades.</p>
<p><strong>WILLIAM BINNEY:</strong>Almost four.</p>
<p><strong>AMY GOODMAN:</strong>Almost four decades.</p>
<p><strong>WILLIAM BINNEY:</strong>Yeah.</p>
<p><strong>AMY GOODMAN:</strong>You, for a time, directed the NSA’s World Geopolitical and Military Analysis Reporting Group. Tell us what you did and then why you left and what happened to you afterwards.</p>
<p><strong>WILLIAM BINNEY:</strong>Well, I was the technical director of that group, that basically looked at the world, so we looked at all the technical problems of—in the world, and see how we could solve collection, analysis and reporting on military and geopolitical issues all around the world, every country in the world. So, it was a rather large technical problem to tackle, but it—and one of the largest problems we thought we had was looking at the World Wide Web and all the ballooning and mushrooming communications in the world. And our ability to deal with that was diminishing over time, so I kind of referred to it as our inability to keep up with the rate of change. So, we were falling behind the rate of change.</p>
<p>So we—I had a very small group of people in a lab, and we decided to attack that problem. And we did it by looking at how we could graph the network of communications and all the communications in the world, and then—and then focus in on that graph and use the graph to limit what we wanted to attack. And we basically succeeded at that, but in the process, of course, we scooped up Americans from different places, so we had to protect their identities, according to our laws and privacy rights of U.S. citizens. So, under USSID 18, we built in protections to anonymize their identities, so you couldn’t really tell who you were looking at.</p>
<p><strong>JUAN GONZALEZ:</strong>And that’s because the NSA could do surveillance from abroad, but not of U.S. citizens.</p>
<p><strong>WILLIAM BINNEY:</strong>Well, and, you see, the World Wide Web routes things all over, so you never really know where U.S. citizens’ communications are going to be routed. So, you—if you were collecting somewhere else on another continent, you could still get U.S. citizens. That’s—see, that was a universal problem. So we devised how to do that and protect U.S. citizens. So—and this was all before 9/11. And we devised how to do that, made that effective and operating. So we were actually prepared to deploy about eight months before 9/11 and actually have a system that would run and manage the—what I call 20 terabytes a minute of activity.</p>
<p>So—but after 9/11, all the wraps came off for NSA, and they decided to—between the White House and NSA and CIA, they decided to eliminate the protections on U.S. citizens and collect on domestically. So they started collecting from a commercial—the one commercial company that I know of that participated provided over 300—probably, on the average, about 320 million records of communication of a U.S. citizen to a U.S. citizen inside this country.</p>
<p><strong>AMY GOODMAN:</strong>What company?</p>
<p><strong>WILLIAM BINNEY:</strong>AT&T. It was long-distance communications. So they were providing billing data. At that point, I knew I could not stay, because it was a direct violation of the constitutional rights of everybody in the country. Plus it violated the pen register law and Stored Communications Act, the Electronic Privacy Act, the intelligence acts of 1947 and 1978. I mean, it was just this whole series of—plus all the laws covering federal communications governing telecoms. I mean, all those laws were being violated, including the Constitution. And that was a decision made that wasn’t going to be reversed, so I could not stay there. I had to leave.</p>
<p><strong>JUAN GONZALEZ:</strong>And I wanted to get back to, for a moment, when you say that you were developing a way to cope with the fact that the agency was falling behind, just because the sheer volume of the material that they were sweeping up was so great, that it was impossible, at times, to find the important intelligence material.</p>
<p><strong>WILLIAM BINNEY:</strong>Yes.</p>
<p><strong>JUAN GONZALEZ:</strong>So you, in essence, were creating a program that filtered out the valuable stuff.</p>
<p><strong>WILLIAM BINNEY:</strong>Right. That’s right.</p>
<p><strong>JUAN GONZALEZ:</strong>What—did it have a name, the program?</p>
<p><strong>WILLIAM BINNEY:</strong>Well, it was called Thin Thread. I mean, Thin Thread was our—a test program that we set up to do that. By the way, I viewed it as we never had enough data, OK? We never got enough. It was never enough for us to work at, because I looked at velocity, variety and volume as all positive things. Volume meant you got more about your target. Velocity meant you got it faster. Variety meant you got more aspects. These were all positive things. All we had to do was to devise a way to use and utilize all of those inputs and be able to make sense of them, which is what we did.</p>
<p><strong>JUAN GONZALEZ:</strong>And when they didn’t use your system, they—the NSA developed another or attempted to develop another system to do the same?</p>
<p><strong>WILLIAM BINNEY:</strong>Well, that one failed. They didn’t produce anything with that one.</p>
<p><strong>AMY GOODMAN:</strong>And that one was called?</p>
<p><strong>WILLIAM BINNEY:</strong>Trailblazer, yeah.</p>
<p><strong>AMY GOODMAN:</strong>Trailblazer, and—</p>
<p><strong>WILLIAM BINNEY:</strong>I called it—I called it five-year plan number one. Five-year plan number two was Turbulence. Five-year plan number three is—</p>
<p><strong>AMY GOODMAN:</strong>And Trailblazer cost how much money?</p>
<p><strong>WILLIAM BINNEY:</strong>That was, I think, in my—my sense, was a little over $4 billion.</p>
<p><strong>AMY GOODMAN:</strong>Four billion dollars.</p>
<p><strong>WILLIAM BINNEY:</strong>Right.</p>
<p><strong>AMY GOODMAN:</strong>But it was scuttled. It was done away with in 2006?</p>
<p><strong>WILLIAM BINNEY:</strong>Yes, '05, I think it was. But yes, that's right. And we developed our program with $3 million, roughly.</p>
<p><strong>JUAN GONZALEZ:</strong>And Trailblazer was largely developed by SAIC, the—</p>
<p><strong>WILLIAM BINNEY:</strong>Well, they were contributing contractors, yeah. But they—I think they had the lead—they were the lead contractors in some of contracts, yeah.</p>
<p><strong>AMY GOODMAN:</strong>And why did they go with this one, though, ultimately, they did not use it? This is under Michael Hayden at the time?</p>
<p><strong>WILLIAM BINNEY:</strong>Yes. Well—</p>
<p><strong>AMY GOODMAN:</strong>Under the Bush administration?</p>
<p><strong>WILLIAM BINNEY:</strong>Well, I thought—my sense was it was a good employment program. And it was a large budget program. It would spend money, a lot of money, so it would build the budget and—</p>
<p><strong>AMY GOODMAN:</strong>Go to a major weapons manufacturer.</p>
<p><strong>WILLIAM BINNEY:</strong>Right.</p>
<p><strong>AMY GOODMAN:</strong>And heads of the agency, National Security Agency, would go back and forth working at NSA, working at SAIC.</p>
<p><strong>WILLIAM BINNEY:</strong>It was—we called it an incestuous relationship, yeah.</p>
<p><strong>AMY GOODMAN:</strong>What happened to you after you quit? You quit within a month of the 9/11 attacks.</p>
<p><strong>WILLIAM BINNEY:</strong>Thirty-first of October of 2001, yeah.</p>
<p><strong>AMY GOODMAN:</strong>And then what happened?</p>
<p><strong>WILLIAM BINNEY:</strong>Well, we tried to form out the company to at least help the government to deal with some of the massive data problems they had, like in—even in the FBI, and also Customs and Border Protection and NRO and various other agencies. And every time we went somewhere to try to develop something, why, we got canceled, our contract got canceled, for—basically because, we have heard, anyway, that they were told that certain agencies didn’t want them hiring us, so they didn’t want us working for them, so...</p>
<p><strong>JUAN GONZALEZ:</strong>And before you left, in that short period when it became obvious to you the direction that the NSA was going to, did you—when you raised objections or raised concerns, what was the response?</p>
<p><strong>WILLIAM BINNEY:</strong>Well, I went directly to the Intelligence Committee, because it was their job to—because, first of all, when that happened, I mean, the people they had to use to set it up—since they used part of the program we developed to set it up, they had to use our people to set it up, initially, because no one else knew the code, and no one else knew how to get it operating. So, when they did that, they came—those people came to me and said, "You know, they’re doing this," you know, and they told me what they were doing. And so I immediately went to the Intelligence Committee, because they were—the intelligence committees were formed to have oversight over the intelligence community to make sure they didn’t monitor U.S. citizens. This was a fallout of the Church Committee back in the '70s. And the member of the staff that I went to went to Porter Goss, who was chairman of that committee at the time, and he referred her to General Hayden for any further. When it was the job of that committee to do the oversight on all this domestic spying, they weren't doing it, OK? Basically, the—at the time, according to Dick Cheney’s interview on the 10th anniversary of 9/11, he said the—at that time, only the majority or minority leaders, the HPSCI and the SSCI, were involved in having knowledge about this program, Stellar Wind, which you had talked with Tom Drake about.</p>
<p><strong>AMY GOODMAN:</strong>The former NSA—</p>
<p><strong>WILLIAM BINNEY:</strong>Right, right.</p>
<p><strong>AMY GOODMAN:</strong>—employee who was also a whistleblower.</p>
<p><strong>WILLIAM BINNEY:</strong>And that was the program, of course, that Director Mueller reported was the issue that—with the hospital visit with Ashcroft. So—</p>
<p><strong>AMY GOODMAN:</strong>And explain that, very briefly, for—to remind people.</p>
<p><strong>WILLIAM BINNEY:</strong>Well, the whole program, I guess, had to be reauthorized every 45 days, and they had to have the director of NSA, director of CIA and the attorney general sign an affidavit that they still needed the program and that it was legal. And when Comey and Goldsmith in the DOJ decided that this really was a violation of the Constitution and was illegal, then that issue came up. And that’s what—that’s what got everybody kind of disturbed and ready to—ready, actually, to resign in 2004, early 2004, I believe that was. And as a part of it was coming up for reauthorization, and so Gonzales left the White House, along with one other person I can’t remember, and went to the hospital where Ashcroft was, because he was—had pancreatitis, I believe, and was in the hospital, and Comey was the acting attorney general. And so, at that point, they went to Ashcroft to see if he would overrule Comey, who had denied reauthorization and declared it basically illegal. And so, they tried to get Ashcroft to overrule that and went to the hospital to do that. And Director Mueller, I think, also quickly got to the hospital to help ensure that Ashcroft was not taken advantage of, I guess. So...</p>
<p><strong>AMY GOODMAN:</strong>When was your home raided?</p>
<p><strong>WILLIAM BINNEY:</strong>Twenty-sixth of July of 2007.</p>
<p><strong>AMY GOODMAN:</strong>What happened? Where did you</p>
<p><strong>WILLIAM BINNEY:</strong>I should—I should say that it was the morning of the second day after Gonzales’s testimony, the then-Attorney General Gonzales’s testimony, to the Senate Judiciary Committee on the TSP, the—what was called the TSP, which I refer to as a fabricated plan. It was created to cover a number of plans, one of which was Stellar Wind, and the others—which they didn’t want to discuss. And the others were wiretapping. And so, they picked on the wiretapping ones, because the public would generally say, "Yes, anybody that was potentially a terrorist, a foreign terrorist, communicating with anybody in the United States, we want you to monitor their communications." So that was the acceptable part of it. But it was grouped with Stellar Wind and some other programs, so that they could give cover to it, talk about some programs, say they’re talking about the Terrorist Surveillance Program, but it was basically a group of programs, some of which they did not want to talk about. And he did not testify to that at the—and I believe some of the—Whitehouse and Feingold, I think, were the two who were on the Senate Intelligence Committee that did challenge him at the time, saying he wasn’t being truthful, and that was—he wasn’t being completely honest. So...</p>
<p><strong>AMY GOODMAN:</strong>You live where?</p>
<p><strong>WILLIAM BINNEY:</strong>I live in Maryland, actually four miles from NSA.</p>
<p><strong>AMY GOODMAN:</strong>And what happened?</p>
<p><strong>WILLIAM BINNEY:</strong>They came busting in.</p>
<p><strong>AMY GOODMAN:</strong>Who’s "they"?</p>
<p><strong>WILLIAM BINNEY:</strong>The FBI. About 12 of them, I think, 10 to 12. They came in with the guns drawn, on my house.</p>
<p><strong>AMY GOODMAN:</strong>Where were you?</p>
<p><strong>WILLIAM BINNEY:</strong>I was in the shower. I was taking a shower, so my son answered the door. And they of course pushed him out of the way at gunpoint and came running upstairs and found me in the shower, and came in and pointed the gun at me while I was, you know—</p>
<p><strong>AMY GOODMAN:</strong>Pointed a gun at your head?</p>
<p><strong>WILLIAM BINNEY:</strong>Oh, yeah. Yes. Wanted to make sure I saw it and that I was duly intimidated, I guess.</p>
<p><strong>JUAN GONZALEZ:</strong>And what did they—what did they do at that point? Did they begin questioning you? Or they just took you to headquarters? Or—</p>
<p><strong>WILLIAM BINNEY:</strong>No, no. Yeah, they basically separated us from—I was separated from my family. Took me on the back porch, and they started asking me questions about it. They were basically wanting me to tell them something that would implicate someone in a crime. And so, I told them that I didn’t really know—they wanted to know about certain people, that was—they were the ones that were being raided at the same time, people who—we all signed—those who were raided that day, all of us signed the DOD-IG complaint. We were the ones who filed that complaint.</p>
<p><strong>AMY GOODMAN:</strong>The Pentagon—</p>
<p><strong>WILLIAM BINNEY:</strong>The Pentagon DOD-IG, against—</p>
<p><strong>AMY GOODMAN:</strong>—inspector general complaint.</p>
<p><strong>WILLIAM BINNEY:</strong>Against NSA, yes, talking about fraud—basically corruption, fraud, waste and abuse. And then—</p>
<p><strong>AMY GOODMAN:</strong>Tom Drake was raided at the same time?</p>
<p><strong>WILLIAM BINNEY:</strong>No, he was raided in November of that year. We were just the ones who signed it, were raided.</p>
<p><strong>JUAN GONZALEZ:</strong>So, and who were the other people that were raided that same day?</p>
<p><strong>WILLIAM BINNEY:</strong>Diane Roark, Kirk Wiebe and Ed Loomis.</p>
<p><strong>AMY GOODMAN:</strong>Diane Roark worked for the Senate committee?</p>
<p><strong>WILLIAM BINNEY:</strong>Diane was the senior staffer. She had the NSA account on the HPSCI side, on the House side. So she was monitoring. She was doing oversight. She was doing real oversight; the others weren’t. Basically, the others were simply taking what the NSA said verbatim and taking them at their word. So, basically, that was not oversight. But Diane would probe and be prying into what they were saying to find out really clearly what was going on. And—</p>
<p><strong>JUAN GONZALEZ:</strong> And ostensibly, they were searching for who was leaking information to the—who had leaked information to the <em>New York Times</em>.</p>
<p><strong>WILLIAM BINNEY:</strong>That was the pretext, yes. But I accused them of being sent there by someone outside the FBI. And that—their body language told me that I hit it right on the head. So—and I also—after a while, they were questioning me, and I couldn’t tell them anything, because I didn’t know anything that would implicate any of the four of us, so—</p>
<p><strong>AMY GOODMAN:</strong>They were looking for leaks.</p>
<p><strong>WILLIAM BINNEY:</strong> Well, that was the pretext, the leak on the—to give the <em>New York Times</em>thing. The real thing—what they were really doing was retribution and intimidation so we didn’t go to the Judiciary Committee in the Senate and tell them, "Well, here’s what Gonzales didn’t tell you, OK." That was what it was really all about. And also, it was retribution for that DOD-IG complaint, because it was a rather embarrassing report that they gave, so...</p>
<p><strong>JUAN GONZALEZ:</strong>And what is it that Gonzales didn’t tell them, in your perspective, in terms of what is happening to our national security surveillance situation?</p>
<p><strong>WILLIAM BINNEY:</strong>Well, it was about—it was about Stellar Wind and all of the domestic spying.</p>
<p><strong>AMY GOODMAN:</strong> We’re going to break and come back to this conversation. William Binney was the technical director of the National Security Agency, which, by the way, is a number of times larger than the CIA, the National Security Agency’s World Geopolitical and Military Analysis Reporting Group. When we come back, we’ll also speak with a well-known hacker, Jacob Appelbaum, who has volunteered for WikiLeaks—he’s a computer security researcher—and Laura Poitras, whose films, <em>My Country, My Country</em> and <em>The Oath</em>, are well known. She’s been nominated for an Oscar. This is <em>Democracy Now!</em>Back in a minute.</p>
<h2>Links</h2>
<ul>
<li><a href="http://whitney.org/Events/LauraPoitrasObservationAndTrust">Surveillance Teach-in with Laura Poitras, Jacob Appelbaum and William Binney at the Whitney Museum, April 20</a></li>
<li><a href="http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1">“The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say),” by James Bamford. (Wired Magazine, March 15, 2012)</a></li>
<li><a href="http://www.democracynow.org/2012/3/21/exposed_inside_the_nsas_largest_and">“Exposed: Inside the NSA’s Largest and Most Expansive Secret Domestic Spy Center in Bluffdale, Utah” (Democracy Now, March 21, 2</a></li>
<li><a title="http://www.newyorker.com/reporting/2011/05/23/110523fa_fact_mayer" href="http://www.newyorker.com/reporting/2011/05/23/110523fa_fact_mayer">“The Secret Sharer: Is Thomas Drake an enemy of the state?” by Jane Mayer. (New Yorker, May 23, 2011)</a></li>
</ul>Detained in the US: Filmmaker Laura Poitras Held, Questioned Some 40 Times at US Airportstag:12160.info,2012-04-22:2649739:BlogPost:8379712012-04-22T00:00:00.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>April 20, 2012, via <a href="https://twitter.com/#%21/TyphonMind">@TyphonMind</a></p>
<p><a href="http://www.democracynow.org/appearances/laura_poitras">Laura Poitras</a>, an award-winning documentary filmmaker and producer. She is working on the third part of a trilogy of films about America post-9/11. The first film was <em>My Country, My Country</em>, and the second was <em>The Oath</em>.</p>
<p>See video:…</p>
<p>April 20, 2012, via <a href="https://twitter.com/#%21/TyphonMind">@TyphonMind</a></p>
<p><a href="http://www.democracynow.org/appearances/laura_poitras">Laura Poitras</a>, an award-winning documentary filmmaker and producer. She is working on the third part of a trilogy of films about America post-9/11. The first film was <em>My Country, My Country</em>, and the second was <em>The Oath</em>.</p>
<p>See video: <a href="http://www.democracynow.org/2012/4/20/detained_in_the_us_filmmaker_laura">http://www.democracynow.org/2012/4/20/detained_in_the_us_filmmaker_laura</a></p>
<p>The Academy Award-nominated filmmaker Laura Poitras discusses how she has been repeatedly detained and questioned by federal agents whenever she enters the United States. Poitras said the interrogations began after she began working on her documentary, “My Country, My Country,” about post-invasion Iraq. Her most recent film, “The Oath,” was about Yemen and Guantánamo and follows the lives of two past associates of Osama bin Laden. She estimates she has been detained approximately 40 times and has had her laptop, cell phone and personal belongings repeatedly searched. Tonight she is leading a surveillance teach-in at the Whitney Museum in New York City with our other guests, computer security researcher and government target Jacob Appelbaum and National Security Agency whistleblower William Binney. Poiras is currently at work on a film about post-9/11 America. <em>This interview is part of a <a href="http://www.democracynow.org/shows/2012/4/20">4-part special</a>. Click here to see segment <a href="http://www.democracynow.org/2012/4/20/exclusive_national_security_agency_whistleblower_william">1</a>, <a href="http://www.democracynow.org/2012/4/20/we_do_not_live_in_a">3</a>, and <a href="http://www.democracynow.org/2012/4/20/whistleblower_the_nsa_is_lying_us">4</a></em></p>
<h2>Transcript</h2>
<p><strong>AMY GOODMAN:</strong> Our guests are William Binney, who was technical director of the NSA’s World Geopolitical and Military Analysis Reporting Group. He worked with the NSA for almost 40 years, National Security Agency. We’re also joined by Laura Poitras, the Oscar-nominated filmmaker, and Jacob Appelbaum, a computer security researcher.</p>
<p>You two have something in common with each other. You—every time you come into the United States by plane, you are stopped, you are searched, you are interrogated. Laura Poitras, tell us about your experience. Your latest one?</p>
<p><strong>LAURA POITRAS:</strong> Right. Well, I mean, I’ve been stopped at the border since 2006, since I started working on a series of films looking at U.S. post-9/11. And so, I’ve been—I’ve actually lost count of how many times I’ve been detained at the border, but it’s, I think, around 40 times. And—</p>
<p><strong>AMY GOODMAN:</strong> Four-zero.</p>
<p><strong>LAURA POITRAS:</strong> Four-zero, right. And on this particular trip, lately they’ve been actually sending someone from the Department of Homeland Security to question me in the departing city, so I was questioned in London about what I was doing. I told them I was a journalist and that, you know, my work is protected, and I wasn’t going to discuss it. And then, on this particular occasion, I landed at Newark Airport, and they—what they do when I’m flying, they do passport control inspection at the gate. So they make everyone who’s deplaning show their passport. And so, that’s how they—</p>
<p><strong>JUAN GONZALEZ:</strong> So they don’t even wait for you to get to Immigration.</p>
<p><strong>LAURA POITRAS:</strong> No, I don’t get—I don’t get into Immigration. I get the escorted treatment from—</p>
<p><strong>AMY GOODMAN:</strong> So they make everyone show the passport, until they get to you.</p>
<p><strong>LAURA POITRAS:</strong> Right.</p>
<p><strong>AMY GOODMAN:</strong> And then they take you off the plane.</p>
<p><strong>LAURA POITRAS:</strong> And then they take me away. And then I’m escorted, first through Immigration. And so, this has been going on—you know, I’ve been through this several times and kind of know how it goes. But what happened on this particular trip, which was very disturbing, so—</p>
<p><strong>AMY GOODMAN:</strong> Just a few weeks ago.</p>
<p><strong>LAURA POITRAS:</strong> Yeah. So I was met by two agents at Newark. One of them is Agent Wassum. And I—when they met me, I took out my pen and paper to note their names and the time and—because I’ve always taken notes, so I have a record of the questions that I’m asked and how long I’m detained for, what’s the focus of the interrogation, what they are doing to me. And on this occasion, I took out my pen, and I was ordered to put away my pen. And I didn’t, and I continued to take notes. And I was ordered again to put away the pen, and I didn’t. And then he threatened to handcuff me for not putting away my pen. And at that point, I put away my pen and then walked to Immigration and took out my pen again to take notes, was ordered again to put away my pen, and then was taken into secondary screening. And I asked to speak to a supervisor, explained I was a journalist, explained that legal counsel has told me that I should be taking notes of my detention and interrogation. And then I was told that I couldn’t take notes, that I was free to take notes after I was finished being questioned. And then—</p>
<p><strong>JUAN GONZALEZ:</strong> Under the theory that what? The pen was a weapon?</p>
<p><strong>LAURA POITRAS:</strong> Oh, yeah, that’s right. They said that my pen was a dangerous weapon. So that’s what—that’s Agent Wassum who said that, that my pen was a threat to them. And, you know, I mean, in terms of the context, you have to understand that I’m surrounded by border agents who are all carrying guns, and I’m taking out, you know, a pen that they find threatening. And so, this was, you know, profoundly upsetting. And then I was taken into—I was taken directly into an interrogation room and questioned. I took out my pen again. I was ordered by another agent to put it away. And this went on for quite some time. And I was told during this interrogation—I mean, I’m always asserting my rights as a journalist to not reveal my work, my sources.</p>
<p><strong>AMY GOODMAN:</strong> You did a film on Yemen. You did a film on Iraq.</p>
<p><strong>LAURA POITRAS:</strong> Yeah, yeah, yeah. And so, this detention started after I finished the first film in 2006, and which was about the occupation of Iraq. And I was told that I was refusing to cooperate with an investigation. And then he said, “Well, it wasn’t an investigation; it was questioning,” but that I was refusing to cooperate. And then I asserted my rights, that actually asserting one’s rights is not refusing to cooperate. And so, this went on for quite some time. And, I mean, it’s something that’s been happening for a while, and I’ve talked about it publicly, but also have been hesitant to, because I don’t want to jeopardize the work that I do.</p>
<p><strong>AMY GOODMAN:</strong> They took your computer? They took—</p>
<p><strong>LAURA POITRAS:</strong> Not on this trip, no. In the past, yeah.</p>
<p><strong>AMY GOODMAN:</strong> They’ve taken your computer?</p>
<p><strong>LAURA POITRAS:</strong> On one occasion, they took my computer.</p>
<p><strong>AMY GOODMAN:</strong> They’ve taken your phone?</p>
<p><strong>LAURA POITRAS:</strong> Yeah. Yeah, on one occasion. I was actually—it was right after, a few days after they—it was actually maybe a week after Jacob’s computer was detained.</p>
<p><strong>AMY GOODMAN:</strong> <em>Democracy Now!</em> contacted the Department of Homeland Security for an explanation of why you were detained and interrogated at the airport on April 5th. We received a reply from Anthony Bucci, the public affairs specialist—that’s B-U-C-C-I—in New York City for U.S. Customs and Borders Protection. He emailed, quote: “Due to privacy laws, U.S. Customs and Border Protection is prohibited from discussing specific cases.” He went on to write, quote: “Our dual mission is to facilitate travel in the United States while we secure our borders, our people and our visitors from those that would do us harm like terrorists and terrorist weapons, criminals, and contraband.” He did not answer our additional questions.</p>
<p><strong>LAURA POITRAS:</strong> Well, I guess they should add “journalist” to that list.</p>
<h2>Links</h2>
<ul>
<li><a href="http://whitney.org/Events/LauraPoitrasObservationAndTrust">Surveillance Teach-in with Laura Poitras, Jacob Appelbaum and William Binney at the Whitney Museum, April 20</a></li>
<li><a href="http://www.praxisfilms.org/">Praxis Films</a></li>
<li><a href="http://www.salon.com/2012/04/08/u_s_filmmaker_repeatedly_detained_at_border/">“U.S. filmmaker repeatedly detained at border,” by Glenn Greenwald. (Salon, April 8, 2012)</a></li>
</ul>
<object id="obj_1334944828234" height="500" width="500"><param name="movie" value="http://12160mhz.chatango.com/group"></param><param name="AllowScriptAccess" value="never"></param><param name="AllowNetworking" value="all"></param><param name="AllowFullScreen" value="false"></param><param name="flashvars" value="cid=1334944828234&a=000000&b=100&c=FF0033&d=FFFFFF&e=000000&g=00FF66&k=666666&l=333333&m=000000&n=FFFFFF&p=16&s=1&t=0"></param><embed wmode="opaque" id="emb_1334944828234" src="http://12160mhz.chatango.com/group" allowscriptaccess="never" allownetworking="all" type="application/x-shockwave-flash" allowfullscreen="false" flashvars="cid=1334944828234&a=000000&b=100&c=FF0033&d=FFFFFF&e=000000&g=00FF66&k=666666&l=333333&m=000000&n=FFFFFF&p=16&s=1&t=0" height="500" width="500"></embed> <param name="wmode" value="opaque"></param></object>
<br/>NDAA Nullification Becomes Law in Virginia. Effective July 1st.tag:12160.info,2012-04-19:2649739:BlogPost:8354042012-04-19T14:38:02.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p><a href="http://diylol.com/meme-generator/ndaa-bill/memes/theres-no-way-youll-lose-civil-liberties-with-the-ndaa-bill-trust-us" target="_blank"><img class="align-center" src="http://anonymissexpress.cyberguerrilla.org/wp-content/uploads/2012/04/ndaa-bill-meme-generator-there-s-no-way-you-ll-lose-civil-liberties-with-the-ndaa-bill-trust-us-caf9a1.png?width=510" width="510"></img></a></p>
<p><em>by <a href="http://blog.tenthamendmentcenter.com/author/michael-boldin/" rel="author" title="Posts by Michael Boldin">Michael Boldin</a>,</em> April 18th, 2012</p>
<blockquote>Today, the Virginia legislature once again approved House Bill 1160 (HB1160), what many refer to as the NDAA Nullification Act. The support was…</blockquote>
<p><a target="_blank" href="http://diylol.com/meme-generator/ndaa-bill/memes/theres-no-way-youll-lose-civil-liberties-with-the-ndaa-bill-trust-us"><img class="align-center" src="http://anonymissexpress.cyberguerrilla.org/wp-content/uploads/2012/04/ndaa-bill-meme-generator-there-s-no-way-you-ll-lose-civil-liberties-with-the-ndaa-bill-trust-us-caf9a1.png?width=510" width="510"/></a></p>
<p><em>by <a title="Posts by Michael Boldin" href="http://blog.tenthamendmentcenter.com/author/michael-boldin/" rel="author">Michael Boldin</a>,</em> April 18th, 2012</p>
<blockquote>Today, the Virginia legislature once again approved House Bill 1160 (HB1160), what many refer to as the NDAA Nullification Act. The support was overwhelming, again. In the House today the vote was 89-7 and the Senate concurred a few hours later, 36-1.<p>The bill “Prevents any agency, political subdivision, employee, or member of the military of Virginia from assisting an agency of the armed forces of the United States in the conduct of the investigation, prosecution, or detention of a United States citizen in violation of the United States Constitution, Constitution of Virginia, or any Virginia law or regulation.”</p>
<p>[...]</p>
<p>UPDATE – according to sponsor Bob Marshall, because the legislature passed the bill as recommended by the Governor, a signature is not required. HB1160 becomes law on July 1st.</p>
<p>*******</p>
<p>To track Liberty Preservation legislation across the U.S., click <a href="http://tenthamendmentcenter.com/nullification/ndaa/" target="_blank">HERE</a>.</p>
<p>For model legislation to present to your local government, click <a href="http://aldovidali.com/wp-content/uploads/Model-Resolution.pdf" target="_blank">HERE</a>.</p>
<p>For model NDAA nullification legislation at the state level, click <a href="http://tenthamendmentcenter.com/legislation/liberty-preservation-act/" target="_blank">HERE</a>.</p>
</blockquote>
<p><br/>Tenth Amendment Center: <a title="http://blog.tenthamendmentcenter.com/2012/04/ndaa-nullification-passes-in-virginia-governors-signature-expected-shortly/" href="http://blog.tenthamendmentcenter.com/2012/04/ndaa-nullification-passes-in-virginia-governors-signature-expected-shortly/">NDAA Nullification Becomes Law in Virginia. Effective July 1st.</a></p>Facebook Timeline Tyrannytag:12160.info,2012-04-17:2649739:BlogPost:8331902012-04-17T10:30:00.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<div align="center"><iframe frameborder="0" height="480" src="https://www.youtube.com/embed/y2m6oSD6ptw?wmode=opaque" width="640"></iframe>
</div>
<p><br></br> </p>
<p>If you haven't been timelined yet, you eventually will be! Why can't Facebook let its users choose their page layout? Why is Timeline enforced on hundreds of millions of users? What is Timeline -- a perfect way to present one's biography or a way to get to know the dirty laundry of someone who hasn't cleaned his/her page yet? Does…</p>
<div align="center"><iframe width="640" height="480" src="http://www.youtube.com/embed/y2m6oSD6ptw?wmode=opaque" frameborder="0"></iframe>
</div>
<p><br/> </p>
<p>If you haven't been timelined yet, you eventually will be! Why can't Facebook let its users choose their page layout? Why is Timeline enforced on hundreds of millions of users? What is Timeline -- a perfect way to present one's biography or a way to get to know the dirty laundry of someone who hasn't cleaned his/her page yet? Does Facebook violate people's privacy, and should anyone who chooses to register on the website put up with any Facebook's initiative? CT-ing with Roman Karachinsky, Anita Ramasastry and Terry Carney.</p>
<p> </p>
<h2>More Information</h2>
<h3><em>Anita mentioned these two services that are dangerous for user privacy</em></h3>
<p><a title="http://12160.info/profiles/blog/show?id=2649739%3ABlogPost%3A831754&xgs=1&xg_source=msg_share_post" href="http://12160.info/profiles/blog/show?id=2649739%3ABlogPost%3A831754&xgs=1&xg_source=msg_share_post">This Creepy App Isn’t Just Stalking Women Without Their Knowledge, It’s A Wake-Up Call About Facebook Privacy [Update]</a></p>
<p><a title="http://www.socialintel.com/" href="http://www.socialintel.com/">Social Intelligence</a>: social media screening and investigative services including employment background checks, insurance claims investigations, corporate due diligence, government services, and more.</p>
<h3><em>Tutorials on changing privacy settings</em></h3>
<p>Video: <a title="https://www.youtube.com/watch?v=RYiE0_e4FL4" href="https://www.youtube.com/watch?v=RYiE0_e4FL4">Facebook Timeline Part 3 of 3: Privacy Settings</a></p>
<p>Video: <a title="https://www.youtube.com/watch?v=K1fpnDjeL74" href="https://www.youtube.com/watch?v=K1fpnDjeL74">Disable Facebook Timeline get old profile back 100% secure</a><<<</p>
<h3><em>EPIC alert</em></h3>
<p><a title="https://epic.org/alert/epic_alert_1906.html" href="https://epic.org/alert/epic_alert_1906.html">See item 4</a></p>
<blockquote>Facebook recently announced changes to its "Statement of Rights and Responsibilities." The most-discussed change involves Facebook app access to user data; although Facebook's practices have not changed, the company now states that a user's information is disclosed to apps used by that person's Facebook friends. Facebook also allows user-downloaded software or plugins to automatically download updates, upgrades, and additional features, and prohibits users from tagging others who do not wish to be tagged.<p>Allowing apps to access the personal information of a Facebook user's friends raises questions about Facebook's compliance with a 2011 settlement with the Federal Trade Commission, in which the agency found that Facebook "deceived consumers by telling them they could keep their information on Facebook private, and then repeatedly allowing it to be shared and made public." In particular, the FTC found that Facebook had misled users about the extent to which their personal information would be made available to their friends' Facebook apps.</p>
<p>The settlement, which follows from complaints filed by EPIC and other consumer and privacy organizations in 2009 and 2010, bars Facebook from changing privacy settings without users' affirmative consent, or misrepresenting the privacy or security of users' personal information.<br/>In comments filed with the FTC, EPIC said that the existing settlement is "insufficient to address the concerns originally identified by EPIC and the consumer coalition, as well as those findings established by the Commission."</p>
<p>The new Facebook app access provisions also raise doubts about the effectiveness of Facebook's privacy settings. Facebook's "How People Bring Your Info To Apps They Use" privacy setting allows users to or to turn off Platform Apps altogether if they don't use any Apps themselves. Facebook's terms do not include any reference to those settings, thus leaving users without necessary information about the interaction between the privacy settings and the Statement of Rights and Responsibilities.</p>
<p>The changes were open for public comment until March 23. Facebook received 526 comments, which it plans to review in the coming weeks.</p>
<p>Facebook: <a title="https://www.facebook.com/note.php?note_id=10151420037600301" href="https://www.facebook.com/note.php?note_id=10151420037600301">Statement of Rights and Responsibilities</a></p>
<p>Facebook: <a title="http://epic.org/redirect/032812-facebook-track-changes.html" href="http://epic.org/redirect/032812-facebook-track-changes.html">Statement of Rights and Responsibilities (Tracked Changes)</a></p>
<p>FTC: <a title="http://ftc.gov/opa/2011/11/privacysettlement.shtm" href="http://ftc.gov/opa/2011/11/privacysettlement.shtm">Facebook Settlement</a></p>
<p>EPIC: <a title="http://epic.org/privacy/inrefacebook/EPIC-FacebookComplaint.pdf" href="http://epic.org/privacy/inrefacebook/EPIC-FacebookComplaint.pdf">In re Facebook</a>pdf (Dec. 17, 2009)</p>
<p>EPIC: <a title="http://epic.org/privacy/facebook/EPIC_FTC_FB_Complaint.pdf" href="http://epic.org/privacy/facebook/EPIC_FTC_FB_Complaint.pdf">In re Facebook 2</a>pdf (May 5, 2010)</p>
<p>EPIC: <a title="http://epic.org/redirect/032812-epic-facebook-comments.html" href="http://epic.org/redirect/032812-epic-facebook-comments.html">Comments to FTC on Facebook Settlement</a>(Dec. 27, 2011)</p>
<p>EPIC: <a title="http://epic.org/privacy/facebook/" href="http://epic.org/privacy/facebook/">Facebook Privacy</a></p>
<p>EPIC: <a title="https://epic.org/privacy/ftc/facebook/" href="https://epic.org/privacy/ftc/facebook/">Facebook Settlement</a></p>
</blockquote>
<p>.<object id="obj_1331677062328" width="500" height="500" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="AllowScriptAccess" value="never"></param><param name="AllowNetworking" value="all"></param><param name="AllowFullScreen" value="false"></param><param name="flashvars" value="cid=1331677062328&a=000000&b=100&c=FF0033&d=FFFFFF&e=000000&g=00FF66&k=666666&l=333333&m=000000&n=FFFFFF&p=16&s=1&t=0"></param><param name="src" value="http://12160mhz.chatango.com/group"></param><param name="allowscriptaccess" value="never"></param><param name="allownetworking" value="all"></param><param name="allowfullscreen" value="false"></param><embed wmode="opaque" id="obj_1331677062328" width="500" height="500" type="application/x-shockwave-flash" src="http://12160mhz.chatango.com/group" flashvars="cid=1331677062328&a=000000&b=100&c=FF0033&d=FFFFFF&e=000000&g=00FF66&k=666666&l=333333&m=000000&n=FFFFFF&p=16&s=1&t=0" allowscriptaccess="never" allownetworking="all" allowfullscreen="false"></embed> <param name="wmode" value="opaque"></param></object>
<br/> Check out the member blogs, videos, and discussions @ <a href="http://12160.info">http://12160.info</a><br/>.<br/>.</p>How to Encrypt All Internet Use on Your Android Phonetag:12160.info,2012-04-02:2649739:BlogPost:8199542012-04-02T19:00:00.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>When you connect to a public Wi-Fi network, your Android phone is susceptible to the same sorts of attacks as a laptop—as demonstrated by <a href="http://lifehacker.com/5802682/android-vulnerability-reminds-us-once-again-to-take-precautions-with-unsecured-wi+fi" target="_blank">the Android data vulnerability exposed</a> a few days ago. The solution to securing your communication is simple: You have to encrypt it. Here’s how to set up an SSH tunnel as a cheap, easy method to encrypt all your…</p>
<p>When you connect to a public Wi-Fi network, your Android phone is susceptible to the same sorts of attacks as a laptop—as demonstrated by <a href="http://lifehacker.com/5802682/android-vulnerability-reminds-us-once-again-to-take-precautions-with-unsecured-wi+fi" target="_blank">the Android data vulnerability exposed</a> a few days ago. The solution to securing your communication is simple: You have to encrypt it. Here’s how to set up an SSH tunnel as a cheap, easy method to encrypt all your Android phone’s data.</p>
<h2>What you’ll need:</h2>
<ul>
<li><strong><a href="http://lifehacker.com/5789397/the-always-up+to+date-guide-to-rooting-any-android-phone" target="_blank">A rooted Android phone</a></strong>: Your phone needs to be rooted in order to be able to make connections through an SSH tunnel. If you haven’t rooted your phone yet, and you’re willing to take the leap, hit up our <a href="http://lifehacker.com/5789397/the-always-up+to+date-guide-to-rooting-any-android-phone" target="_blank">always up-to-date guide to Android rooting</a> to get started.</li>
<li><strong>An SSH server</strong>: Ideally this would be rented from a web host online, but it could be any internet-connected computer with an SSH server running, including your home computer.</li>
<li><strong><a href="https://market.android.com/details?id=org.sshtunnel&feature=search_result" target="_blank">SSH Tunnel</a></strong> (free from the Android Market)</li>
</ul>
<h2>Why use encryption at all? What’s an SSH Tunnel?</h2>
<p>Normally, you don’t need to worry about encryption on your phone because you’re already using your carrier’s mobile data connection, which in and of itself is pretty secure already, if only because you’re the only person using it. The problem arises when you connect to public Wi-Fi. On public Wi-Fi, anybody can listen in on everyone else’s web traffic with the right tools, and in doing so, potentially gain access to things like your social networks, your email, or worse.</p>
<p>SSH Tunneling allows your phone to create a secure, encrypted connection to a server located far away from the public Wi-Fi, and run all your data through that connection (like a tunnel). The Wi-Fi connection you’re using may not be secure, but when you’re using an SSH tunnel, your data will be. See our previous guide to <a href="http://lifehacker.com/237227/geek-to-live--encrypt-your-web-browsing-session-with-an-ssh-socks-proxy" target="_blank">encrypt your web browsing session using this method on a computer</a> for the desktop version of this guide.</p>
<p><a href="http://lifehacker.com/5803880/how-to-encrypt-all-internet-use-on-your-android-phone" title="http://lifehacker.com/5803880/how-to-encrypt-all-internet-use-on-your-android-phone" target="_blank">Follow the steps as described on lifehacker</a></p>
<p><em>Note Anonymiss Express: also read the comments before you begin, a number of problems you may encounter have already been mentioned and solved.</em></p>
<p>"<br/> <object id="obj_1333397060781" height="500" width="500"><param name="movie" value="http://12160mhz.chatango.com/group"></param><param name="AllowScriptAccess" value="never"></param><param name="AllowNetworking" value="all"></param><param name="AllowFullScreen" value="false"></param><param name="flashvars" value="cid=1333397060781&a=000000&b=100&c=FF0033&d=FFFFFF&e=000000&g=00FF66&k=666666&l=333333&m=000000&n=FFFFFF&p=16&s=1&t=0"></param><embed wmode="opaque" id="emb_1333397060781" src="http://12160mhz.chatango.com/group" allowscriptaccess="never" allownetworking="all" type="application/x-shockwave-flash" allowfullscreen="false" flashvars="cid=1333397060781&a=000000&b=100&c=FF0033&d=FFFFFF&e=000000&g=00FF66&k=666666&l=333333&m=000000&n=FFFFFF&p=16&s=1&t=0" height="500" width="500"></embed> <param name="wmode" value="opaque"></param></object>
</p>Anonymous Operation Equiptag:12160.info,2012-04-01:2649739:BlogPost:8188172012-04-01T18:45:56.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<div class="meta"><div class="date">April 1, 2012, but not a prank</div>
</div>
<p><a href="http://anonymissexpress.cyberguerrilla.org/?attachment_id=18806" rel="attachment wp-att-18806"><img alt="" class="alignright align-right" height="192" src="http://freakoutnation.com/wp-content/uploads/2012/04/Anonymous-350x192.png?f22064" title="Anonymous" width="350"></img></a></p>
<h2>Idea</h2>
<p>Anon member <a href="https://twitter.com/#%21/VizFoSho">@VizFoSho</a> had this extraordinary idea. Share it — spread it — let’s do this thing:</p>
<p>Collection of old unwanted laptops and desktops for wipe/repair/consolidation to reinstall with Open Source education software…</p>
<div class="meta"><div class="date">April 1, 2012, but not a prank</div>
</div>
<p><a href="http://anonymissexpress.cyberguerrilla.org/?attachment_id=18806" rel="attachment wp-att-18806"><img class="alignright align-right" title="Anonymous" src="http://freakoutnation.com/wp-content/uploads/2012/04/Anonymous-350x192.png?f22064" alt="" height="192" width="350"/></a></p>
<h2>Idea</h2>
<p>Anon member <a href="https://twitter.com/#%21/VizFoSho">@VizFoSho</a> had this extraordinary idea. Share it — spread it — let’s do this thing:</p>
<p>Collection of old unwanted laptops and desktops for wipe/repair/consolidation to reinstall with Open Source education software for distribution in poor communities to families without computers. If we can expand the mind of children, and get them used to using computers, we can give them a hand up in education and schooling.</p>
<p>What’s needed: Laptops, computers in need of repair, and simply any tech necessary to give a helping hand to others in need, in addition to providing health/nutrition/finance software for parents.</p>
<p> </p>
<h2>Plan</h2>
<p>All software is free and open source.</p>
<p>Let’s get to work. <a href="http://pastebin.com/gJRU5cDP">Browse through the plan and if you can add to it, </a>speak up.</p>
<p> </p>
<h2>Hashtags</h2>
<ol>
<li><a title="https://twitter.com/#!/search/%23CabinCr3w" href="https://twitter.com/#%21/search/%23CabinCr3w">#CabinCr3w</a></li>
<li><a title="https://twitter.com/#!/search/%23Anonymous" href="https://twitter.com/#%21/search/%23Anonymous">#Anonymous</a></li>
<li><a title="https://twitter.com/#!/search/%23OWS" href="https://twitter.com/#%21/search/%23OWS">#OWS</a></li>
<li><a title="https://twitter.com/#!/search/%23OpEquip" href="https://twitter.com/#%21/search/%23OpEquip">#OpEquip</a></li>
</ol>
<p><em>Many thanks to <a href="https://twitter.com/#%21/VizFoSho">VizFoSho</a> (<a title="http://freakoutnation.com/2012/04/01/opequip-a-monumentally-important-idea-by-anonymous-includes-you-to-change-the-world/" href="http://freakoutnation.com/2012/04/01/opequip-a-monumentally-important-idea-by-anonymous-includes-you-to-change-the-world/">FreakOutNation</a>).</em></p>ALSO remove your YouTube historytag:12160.info,2012-02-29:2649739:BlogPost:7921002012-02-29T16:00:13.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>February 23, 2012 | By <a href="https://www.eff.org/about/staff/eva-galperin" target="_blank">Eva Galperin</a></p>
<p>On March 1st, Google will implement its new, unified <a href="http://googleblog.blogspot.com/2012/01/updating-our-privacy-policies-and-terms.html" target="_blank">privacy policy</a>, which will affect data Google has collected on you prior to March 1st as well as data it collects on you in the future. Earlier this week, we showed you how to…</p>
<p>February 23, 2012 | By <a href="https://www.eff.org/about/staff/eva-galperin" target="_blank">Eva Galperin</a></p>
<p>On March 1st, Google will implement its new, unified <a href="http://googleblog.blogspot.com/2012/01/updating-our-privacy-policies-and-terms.html" target="_blank">privacy policy</a>, which will affect data Google has collected on you prior to March 1st as well as data it collects on you in the future. Earlier this week, we showed you how to <a href="https://www.eff.org/deeplinks/2012/02/how-remove-your-google-search-history-googles-new-privacy-policy-takes-effect" target="_blank">delete your Google Web History</a> in order to prevent Google from combining your Web History data with the data it has about you on its other products to provide you with personalized ads or suggestions across all of its products. You may also wish to delete your YouTube Viewing and Search History, which can reveal particularly sensitive information about you, including your location, interests, age, sexual orientation, religion, and health concerns.</p>
<p>Note that disabling Viewing and Search History in your YouTube account will not prevent Google from gathering and storing this information and using it for internal purposes. It also does not change the fact that any information gathered and stored by Google could be <a href="https://www.google.com/transparencyreport/governmentrequests/" target="_blank">sought</a> by law enforcement.</p>
<p>With Viewing and Search History enabled, Google will keep these records indefinitely; with it disabled, they will be partially anonymized after 18 months, and certain kinds of uses, including sending you customized search results, will be prevented. An individual concerned about privacy may also want to set up a secondary Google account for browsing and sharing YouTube videos. She could then download all of her existing YouTube videos to her computer, delete them from her primary Google profile, and then use a separate browser to upload them to a new secondary Google account. If you want to do more to reduce the records Google keeps, the advice in EFF’s <a href="https://www.eff.org/wp/six-tips-protect-your-search-privacy" target="_blank">Six Tips to Protect Your Search Privacy</a> white paper remains relevant.</p>
<p>The following steps will delete your viewing and search history on YouTube. If you have multiple YouTube accounts, you will have to complete these steps for each account.</p>
<p><a href="https://www.eff.org/deeplinks/2012/02/how-remove-your-youtube-viewing-and-search-history-googles-new-privacy-policy" title="https://www.eff.org/deeplinks/2012/02/how-remove-your-youtube-viewing-and-search-history-googles-new-privacy-policy" target="_blank">All steps clearly explained on Electronic Frontier Foundation</a></p>Ongoing Threat: Monsanto and Blackwatertag:12160.info,2012-02-29:2649739:BlogPost:7920842012-02-29T14:47:26.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>14 Oct 2010, Silvia Ribeiro <a href="http://english.pravda.ru/business/companies/14-10-2010/115363-machines_of_war_blackwater_monsanto_billgates-0/" title="http://english.pravda.ru/business/companies/14-10-2010/115363-machines_of_war_blackwater_monsanto_billgates-0/">on Pravda</a></p>
<p>A report by Jeremy Scahill in <em>The Nation</em>(Blackwater’s Black Ops, 9/15/2010) revealed that the largest mercenary army in the world, Blackwater (now called Xe Services) clandestine intelligence…</p>
<p>14 Oct 2010, Silvia Ribeiro <a title="http://english.pravda.ru/business/companies/14-10-2010/115363-machines_of_war_blackwater_monsanto_billgates-0/" href="http://english.pravda.ru/business/companies/14-10-2010/115363-machines_of_war_blackwater_monsanto_billgates-0/">on Pravda</a></p>
<p>A report by Jeremy Scahill in <em>The Nation</em>(Blackwater’s Black Ops, 9/15/2010) revealed that the largest mercenary army in the world, Blackwater (now called Xe Services) clandestine intelligence services was sold to the multinational Monsanto. Blackwater was renamed in 2009 after becoming famous in the world with numerous reports of abuses in Iraq, including massacres of civilians. It remains the largest private contractor of the U.S. Department of State “security services,” that practices state terrorism by giving the government the opportunity to deny it.</p>
<div align="center"><iframe width="640" height="480" src="http://www.youtube.com/embed/nqM4tKPDlR8?wmode=opaque" frameborder="0"></iframe>
</div>
<p><br/>Many military and former CIA officers work for Blackwater or related companies created to divert attention from their bad reputation and make more profit selling their nefarious services-ranging from information and intelligence to infiltration, political lobbying and paramilitary training – for other governments, banks and multinational corporations. According to Scahill, business with multinationals, like Monsanto, Chevron, and financial giants such as Barclays and Deutsche Bank, are channeled through two companies owned by Erik Prince, owner of Blackwater: Total Intelligence Solutions and Terrorism Research Center. These officers and directors share Blackwater.</p>
<p>One of them, Cofer Black, known for his brutality as one of the directors of the CIA, was the one who made contact with Monsanto in 2008 as director of Total Intelligence, entering into the contract with the company to spy on and infiltrate organizations of animal rights activists, anti-GM and other dirty activities of the biotech giant.</p>
<p>Contacted by Scahill, the Monsanto executive Kevin Wilson declined to comment, but later confirmed to The Nation that they had hired Total Intelligence in 2008 and 2009, according to Monsanto only to keep track of “public disclosure” of its opponents. He also said that Total Intelligence was a “totally separate entity from Blackwater.”</p>
<p>However, Scahill has copies of emails from Cofer Black after the meeting with Wilson for Monsanto, where he explains to other former CIA agents, using their Blackwater e-mails, that the discussion with Wilson was that Total Intelligence had become “Monsanto’s intelligence arm,” spying on activists and other actions, including “our people to legally integrate these groups.” Total Intelligence Monsanto paid $ 127,000 in 2008 and $ 105,000 in 2009.</p>
<p>[...]</p>
<p><a href="http://beforeitsnews.com/story/215/350/Monsanto_Now_Owns_Blackwater_Xe.html">Monsanto Now "Owns" Blackwater (Xe)? | Before It's News</a>.</p>
<p><strong>More information:</strong></p>
<ul>
<li><a title="October 2, 2010" href="http://www.darkgovernment.com/news/blackwater-xe-wins-huge-contract/" rel="bookmark">Blackwater (Xe) Wins Huge Contract</a></li>
<li><a title="June 10, 2010" href="http://www.darkgovernment.com/news/de-population-conspiracy-involving-monsanto/" rel="bookmark">De-Population Conspiracy Involving Monsanto</a></li>
<li><a title="June 5, 2010" href="http://www.darkgovernment.com/news/haiti-refuses-monsanto-donation/" rel="bookmark">Haiti Refuses Monsanto Seed Donation</a></li>
<li><a title="January 13, 2010" href="http://www.darkgovernment.com/news/blackwater-xe-mercenaries-arrive-in-somalia/" rel="bookmark">Blackwater / Xe Mercenaries Arrive in Somalia</a></li>
<li><a title="August 9, 2009" href="http://www.darkgovernment.com/news/blackwater-xe/" rel="bookmark">Blackwater (Xe)</a></li>
<li><a title="August 20, 2010" href="http://www.darkgovernment.com/news/blackwater-pays-for-export-violations/" rel="bookmark">Blackwater Pays for Export Violations</a></li>
<li><a title="August 9, 2009" href="http://www.darkgovernment.com/news/more-dirt-on-blackwater/" rel="bookmark">More Dirt on BlackWater</a></li>
</ul>Goodbye, First Amendment: ‘Trespass Bill’ will make protest illegaltag:12160.info,2012-02-29:2649739:BlogPost:7920772012-02-29T14:29:53.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>Just when you thought the government couldn’t ruin the First Amendment any further: The House of Representatives approved a bill on Monday that outlaws protests in instances where some government officials are nearby, whether or not you even know it.</p>
<p>The US House of Representatives voted 388-to-3 in favor of <a href="http://thomas.loc.gov/cgi-bin/query/D?c112:6:./temp/%7Ec1121WG30B::" target="_blank">H.R. 347</a> late Monday, a bill which is being dubbed the Federal Restricted…</p>
<p>Just when you thought the government couldn’t ruin the First Amendment any further: The House of Representatives approved a bill on Monday that outlaws protests in instances where some government officials are nearby, whether or not you even know it.</p>
<p>The US House of Representatives voted 388-to-3 in favor of <a href="http://thomas.loc.gov/cgi-bin/query/D?c112:6:./temp/%7Ec1121WG30B::" target="_blank">H.R. 347</a> late Monday, a bill which is being dubbed the Federal Restricted Buildings and Grounds Improvement Act of 2011. In the bill, Congress officially makes it illegal to trespass on the grounds of the White House, which, on the surface, seems not just harmless and necessary, but somewhat shocking that such a rule isn’t already on the books. The wording in the bill, however, extends to allow the government to go after much more than tourists that transverse the wrought iron White House fence.</p>
<p>Under the act, the government is also given the power to bring charges against Americans engaged in political protest anywhere in the country.</p>
<p>Under current law, White House trespassers are prosecuted under a local ordinance, a Washington, DC legislation that can bring misdemeanor charges for anyone trying to get close to the president without authorization. Under H.R. 347, a federal law will formally be applied to such instances, but will also allow the government to bring charges to protesters, demonstrators and activists at political events and other outings across America.</p>
<p>[…]</p>
<p><a href="https://rt.com/usa/news/348-act-tresspass-buildings-437/" title="https://rt.com/usa/news/348-act-tresspass-buildings-437/" target="_blank">More on RT</a></p>Science under attack - Árpád Pusztai and Ignacio Chapelatag:12160.info,2012-02-29:2649739:BlogPost:7921842012-02-29T14:00:00.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<div align="center"><iframe frameborder="0" height="480" src="https://www.youtube.com/embed/DJWVsdG1Gg8?wmode=opaque" width="640"></iframe>
</div>
<p><br></br>There is no difference between natural foods and genetically modified foods? That's not what research says. This documentary discusses those who have spoken out against the scientific government scam of genetically modified foods and have been fired, harassed and other things as well as the results of their research.</p>
<p>Árpád Pusztai and…</p>
<div align="center"><iframe width="640" height="480" src="http://www.youtube.com/embed/DJWVsdG1Gg8?wmode=opaque" frameborder="0"></iframe>
</div>
<p><br/>There is no difference between natural foods and genetically modified foods? That's not what research says. This documentary discusses those who have spoken out against the scientific government scam of genetically modified foods and have been fired, harassed and other things as well as the results of their research.</p>
<p>Árpád Pusztai and Ignacio Chapela have two things in common. They are distinguished scientists and their careers are in ruins. Both scientists choose to look at the phenomenon of genetic engineering.</p>
<p>Both made important discoveries. Both of them are suffering the fate of those who criticise the powerful vested interests that now dominate big business and scientific research.</p>
<p>Statements made by scientists themselves prove that 95% of the research in the area of genetic engineering is paid by the industry. Only 5% of the research is independent. The big danger for freedom of science and our democracy is evident. Can the public — we all — still trust our scientists?</p>I can do it — Whatever the IT istag:12160.info,2012-02-04:2649739:BlogPost:7669072012-02-04T23:29:23.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>From <a href="https://occupyessays.wordpress.com/2012/02/04/i-can-do-it-whatever-the-it-is-by-anonymiss/">https://occupyessays.wordpress.com/2012/02/04/i-can-do-it-whatever-the-it-is-by-anonymiss/</a></p>
<p><strong>by Anonymiss (rural civil-ian)<br></br></strong></p>
<p><a href="http://occupyessays.files.wordpress.com/2012/02/anonymisslegionsquare.png" target="_blank"><img class="align-right" src="https://occupyessays.files.wordpress.com/2012/02/anonymisslegionsquare.png?w=529"></img></a></p>
<p>Whatever is causing it, Grandmother Earth is changing [1]. There is no denying that. In the sixties, we…</p>
<p>From <a href="https://occupyessays.wordpress.com/2012/02/04/i-can-do-it-whatever-the-it-is-by-anonymiss/">https://occupyessays.wordpress.com/2012/02/04/i-can-do-it-whatever-the-it-is-by-anonymiss/</a></p>
<p><strong>by Anonymiss (rural civil-ian)<br/></strong></p>
<p><a target="_blank" href="http://occupyessays.files.wordpress.com/2012/02/anonymisslegionsquare.png"><img class="align-right" src="https://occupyessays.files.wordpress.com/2012/02/anonymisslegionsquare.png?w=529"/></a></p>
<p>Whatever is causing it, Grandmother Earth is changing [1]. There is no denying that. In the sixties, we had white winters every year, guaranteed, and ice skating on a daily basis. None of that in the seventies. In the eighties some, and in the last two decades none again. And lately, world wide, we seem to have experienced increases in temperature [2], extreme weather [3], earthquakes [4a] [4b] [4c], polar cap and glacier melting [5], etc.</p>
<p>And oh boy, there are lots of prophesies centered around Grandmother Earth’s changes. I believe most prophesies to be self-fulfilling wishes, especially when originating from priests and gurus seeking followers to dominate by fear management [6]. There are some prophesies however, coming from our oldest tribal lineages and having been passed on for generations, that might be interesting to investigate further, as they are based on studies of Grandmother Earth’s patterns over the ages. And instead of arrogating and appropriating by fear, these traditions teach that the keys to surviving Earth’s changes are to:</p>
<ol>
<li>Relocate ourselves to a place where we have a clean supply of water and can grow our own food.</li>
<li>Stay away from urban centers which will become more and more desperate and unsafe.</li>
<li>Cache non-GM seed, food, water, medical supplies, fuel, tools and weapons.</li>
<li>Align with the keepers of the Earth who can teach us how to be in the right place at the right time.</li>
<li>Guard our individual freedoms and become part of the solution and not the problem.</li>
<li>Stay absolutely awake, aware, alert and out of paranoia.</li>
</ol>
<p>Even if there weren’t any Earth changes happening, shit happens and incidents such as Katrina and Fukushima may happen to me, you and our (extended) family members, and it never hurts to come prepared. These keys sound good and exploring how do-able they are, is a much more enjoyable and fun life than as a cog in the war-work-machine.</p>
<h2>1. Relocate ourselves to a place where we have a clean supply of water and can grow our own food.</h2>
<p>Hmpf, easier said then done these days.</p>
<p><a target="_blank" href="https://anonymissexpress.files.wordpress.com/2011/02/motivator-pollution1.jpg?w=300&h=240"><img class="align-right" src="https://anonymissexpress.files.wordpress.com/2011/02/motivator-pollution1.jpg?w=300&h=240&width=300" width="300"/></a>Worldwide we are reaping the rewards from the industrial slogan “Dilution is the solution to pollution” [7a] [7b] [7c]. Oceans, seas and lakes have absorbed many toxins. The carrying capacity of most land locked open water for oil and grease from leaking cars, raw sewage, mining and other industrial runoff, and toxic and nuclear dumping has been exceeded. And don’t underestimate the effects we can have on our environment. In Iceland, traces of atmospheric lead pollution from tin-mining done by the Romans in Britain was found to be still around [8]. Nuclear waste dumped in the Arctic ocean migrates to the Atlantic and vice versa by ocean currents and atmospheric deposition [9a][9b], and the Fukushima incident added to the already disastrous levels. This makes no difference to the fish though, as fish were already contaminated with high levels of heavy metals such as mercury and chromium.</p>
<p>Depending on location, you may or may not collect rainwater. Literally, “may”. In many states of the US for example, laws have been passed making it a criminal act [10]. Cheer up, the government/corporate tandem has not yet arrogated and appropriated the air we breathe.</p>
<p>A return to old tribal lands then? Dams have destroyed micro-environments, flooding fertile lands and drying up rivers [11]. And the rest of the land has been arrogated and appropriated in the hunt for resources for the insatiable war-work-machine [12]. Treaties were not honored by “governments”. Okay, so what if returning to old tribal lands is not an option? We can relocate ourselves nearly everywhere where we can have access to the groundwater. Dang! Polluted by chemical spills, fertilizer run-off and acid rain.</p>
<p>I adapted key 1. to read “relocate ourselves to a place where we have a reasonably clean supply of water that we can filter down to drinkable, and where we can grow our own food.” We need filters, preferably ceramic filters. If not those, and with little to no money, learn about water purification techniques.</p>
<p><iframe width="640" height="480" src="http://www.youtube.com/embed/ELBKBY-XY6w?wmode=opaque" frameborder="0"></iframe>
</p>
<p>Note: For “grow our own food”, mind soil fertility qualities and pollution levels. And by all means, choose a location where Monsanto doesn’t have contracts, or else you’ll end up with crops (and seeds for next year) that are spoiled without your consent, plus a lawsuit from monsanto for illegally harvesting “their” crops [13].</p>
<h2>2. Stay away from urban centers which will become more and more desperate and unsafe</h2>
<p>Okay, so having relocated, actually live there and not go back to the city? No problem! Every time I go back to the city a wall of sound attacks my eardrums! And the smog. It contaminates the air, pollutes my hair and clothes, not to mention my lungs. And people seem to be racing about as if role playing Koyaanisqatsi, the “life out of balance”.</p>
<p>Water and food are basic, but the weather is getting more and more extreme too, from unexpectedly warm to freezing cold, so we need a shelter of sorts. In countries like France setting up Yurts and Tipis is no longer an option due to recently adopted laws [14]. If not for that, extreme weather also includes storms, and an acquaintance of ours has had her Yurt blown away during a recent storm. Start anew.</p>
<p>What types of shelters are locally suitable and is the knowledge still around for [15a][15b] [15c]? Try underground pit houses. They don’t blow away that easily, are not eyesores, better disguised from prying eyes than a tent, and in terms of energy bookkeeping are a very good idea. Plus they can be built from nearly all natural materials. And if you have the time, energy and resources, a pimped pit house can be quite livable.</p>
<h2>3. Cache seed, food, water, medical supplies, fuel, tools and weapons</h2>
<p><a target="_blank" href="https://anonymissexpress.files.wordpress.com/2011/02/motivator-volcano.jpg?w=300&h=240"><img class="align-right" src="https://anonymissexpress.files.wordpress.com/2011/02/motivator-volcano.jpg?w=300&h=240&width=300" width="300"/></a>The following lists were gathered some years ago from recounts and lessons learned by survivors of WW II, severe civil war conditions in the Balkans, the aftermath of Katrina in New Orleans, a keys discussion, and adapted by personal experiences.</p>
<h3>Seed</h3>
<p>Make that non-hybrid non-GM garden seed. Lettuce and alfalfa produce edible items in a very short time. If possible and time, energy and resources allow, create a small seed bank [16].</p>
<p>For spices, keep seeds rather than the powdered kind. In some cases however, the powdered kind will hold longer. Get a mortar and pestle or a grinder.</p>
<h3>Food</h3>
<p>Know what to cache, when and where. Grow and maintain a fresh food and medical herb supply for as long as possible.</p>
<p>Don’t throw away insulated ice boxes thinking they will not serve without your fridge producing the cold elements. They are great in winter, to keep your food from freezing.</p>
<p>Metal or plastic tubs keep vermin out and items relatively fresh. Fill some containers with a mix of your supplies, hidden where only you can find them. You can use cool storage areas in the ground.</p>
<ul>
<li>Honey, syrups, brown sugar, marmalade sugar.</li>
<li>Rice, beans, wheat.</li>
<li>Flour and yeast.</li>
<li>Canned fruits, veggies, soups, and stews.</li>
<li>Powdered and condensed milk. For condensed milk mind the expiry date. Get as far-out as possible, and shake the cans every three months.</li>
<li>Vegetable oil – without it, food burns or must be boiled. Make sure that oils you use won’t go rancid. Cold-pressed lasts longest. One of those Au Bain Marie pots may be a good idea too.</li>
<li>What can break monotony and keep spirits more easily alive during long term crunches? Get salt, garlic, spices, vinegar, soy sauce, bouillons, teas, coffee and baking supplies. When garlic is put in oil it can stay for long periods.</li>
<li>Dry herbs.</li>
<li>Nuts.</li>
<li>Dry corn. Can be soaked or popped for eating.</li>
</ul>
<h3>Water</h3>
<p>Get water containers and fill them. Get them in any size. If they are small make sure they are hard and clear plastic only. Food grade your containers for what is drinkable. In case outages and hard times take longer than expected, use those water filters and water purifiers you were so smart to buy.</p>
<p>This can also be one of them shelter pimping things. Build a water tank outside the shelter. It can be a water tank for collected rainwater, and in dryer areas for water from dew catchers, or both. Do consider dangers of the source to determine what to use it for. For luxury, you can add a boiler working on solar energy [17a] [17b].</p>
<p>Water management includes waste water management. Cloth towels and handkerchiefs can be cleaned with rainwater and soap. Less disposal issues than paper (which will soon run out anyway). Gray water (from tub, clothes and dish washing) can be reclaimed for watering plants, if you filter it properly. What gets in your edible plants, gets into people.</p>
<p>If you are in an urban environment and/or in a “considered normal in first world” house, a water supply problem includes the toilets no longer flushing, and you do not wish to spend too much of your container water for flushing. A portable toilet may be a short term option. If you are pimping a basic shelter, I recommend building a compost outhouse [18].</p>
<h3>Medical supplies</h3>
<ul>
<li>Vitamins.</li>
<li>First aid kit. If not already covered in the kit, add alcohol, tea tree, and peroxide to your kit for disinfectants.</li>
<li>Keep a first aid manual so you know how to deal with emergencies.</li>
<li>Learn about first aid herbs.</li>
</ul>
<p>A healthy mind in a healthy body. That also works the other way. Under stress conditions it is very important that you and yours can play games together, individually read books, and generally look forward to building a better future. So keep educating the kids. Keep diaries to place things you and your (extended) family members experience in a historic light. Besides putting things in a temporal context, it keeps healthy reflection going.</p>
<ul>
<li>Board games, cards, dice, balls and string for games.</li>
<li>Writing paper, pads and pencils.</li>
<li>Solar calculators (likely won’t work under electromagnetic pulses or during a solar storm).</li>
<li>Journals, diaries and scrapbooks, crayons and pens and pencils.</li>
<li>Books on math, sciences, history, art, gardening, as well as novels, and reading glasses.</li>
<li>Instruments of any type. Drums, strings, horns, kazoos, bells, chimes, and bagpipes – The latter are good for defense as well as stirring the heart of Northern peoples.</li>
<li>Songbooks, taking time to put a poem to music, humming.</li>
</ul>
<h3>Fuel</h3>
<ul>
<li>Buy CLEAR lamp oil, and if already scarce in your area, stockpile whatever you can find.</li>
<li>Coleman fuel. As much as you can find. It is impossible to have too little. This stockpile can also serve for bartering and trading for goods you haven’t stockpiled enough.</li>
<li>Lots of lighter fluid.</li>
<li>Fuel for cars is in the long run a no-go. That doesn’t mean no transportation. If you have the funds, build an electric car that you can load from solar panels. Bicycles are good too. Get creative.</li>
</ul>
<h3>Tools</h3>
<ul>
<li>For short term crunches, cook stoves on propane, Coleman fuel and kerosene will all do the trick. If you are using a propane-based cooking stove, get a handle holder as well. Small canister use is dangerous without it. Consider alternatives like cooking with the sun [19].</li>
<li>Hand can openers.</li>
<li>Hand egg beaters and whisks.</li>
<li>Non-electric grain grinder.</li>
<li>Cast iron cookware.</li>
<li>Lamps and wicks.</li>
<li>Aladdin or Coleman mantles.</li>
<li>Hand-crank flashlights, light sticks, torches and candles.</li>
<li>Matches. Lots of them. If you can put your hands on one of those “strike anywhere” matches, that would be awesome.</li>
<li>Refillable lighters.</li>
<li>Batteries. Mind the expiry dates. Get them as far out as possible.</li>
<li>Hand pumps and siphons.</li>
<li>Scissors, fabrics and sewing supplies.</li>
<li>Toilet paper.</li>
<li>That old washing board your great-grandmother left you. It may come in handy.</li>
<li>And that bucket and wringer that was useful for wringing a mop with can be re-useful for doing laundry as well.</li>
<li>Feminine hygiene – one of those “keepers” is quite re-useful.</li>
<li>Razors and shaving creams, talc, after shave.</li>
<li>Soap, shampoo and laundry detergent.</li>
<li>Toothbrush, floss.</li>
<li>Nail clippers.</li>
<li>Mosquito repellents and mosquito netting.</li>
<li>Bleach, not scented (4 to 6% sodium hypochlorite).</li>
</ul>
<h3>Bartering survival items</h3>
<p>These are nice to have, horrible not to have when you need them, and excellent for bartering.</p>
<ul>
<li>Regular and heavy duty aluminium foil</li>
<li>Garbage bags</li>
<li>Clothes pins and hangers</li>
<li>Duct tape</li>
<li>Tarps, stakes, twine, nails, ropes, spikes</li>
<li>Glue, nails, nuts, bolts, screws</li>
<li>Paraffin wax</li>
<li>Wine/liquors</li>
<li>Batteries of all kinds and sizes.</li>
</ul>
<h3>Weapons</h3>
<p>History teaches us that raiders and warlords will come. All of the stories related to crunches mention (four-legged) humans as most dangerous predators. And sadly, in the stories we found, that often includes people sent by “authorities” to aid survivors. It was a key lesson in the Katrina stories. People who are prepared and show signs of surviving without aid by authorities can, apparently, be considered a threat. “<em>You must be grateful for our (con) descendence down the mountain to aid you poor sods … and what we find here does not fit what we expected!</em> <em>You must have taken it from others!</em> ” or something like that.</p>
<ul>
<li>Get guns, ammunition, pepper spray, knives, clubs, bows and arrows, bats, and slingshots.</li>
<li>Big dogs, and enough dog food. Train the dogs from birth to be protective of you and your family, and not be friends with everyone. Not hard, for it comes natural to dogs.</li>
<li>By the way, small dogs will sound an alarm as well as a big dog.</li>
<li>Terriers will kill the mice that try to get into your caches. Cats, too.</li>
<li>Have hand-cranked and/or solar-powered radios and make connections with trusted “others”.</li>
</ul>
<h3>For long crunches and living off the grid</h3>
<p>We can’t prepare for everything, if only because such detailed plans would get in the way of adaptive response-ability to changes in the environment. However, to build further on lessons already learned by mankind on what works and what doesn’t in particular contexts, get some survival guides. Make sure they are based on actual experiences. Don’t buy air.</p>
<ul>
<li>Garden tools and supplies.</li>
<li>Fishing supplies and tools.</li>
<li>Canning supplies: jars, lids.</li>
<li>Camping: Keep a camping manual to refer to if you need to dig camp toilets, start a fire without matches, identify edibles in the wild and other potentially useful tips.</li>
<li>Books on pickling, beer-making, paint making, whatever tickles your fancy.</li>
</ul>
<h2>4. Align with the keepers of the Earth who can teach us how to be in the right place at the right time</h2>
<blockquote><p style="text-align: center;">“Reflected-sound-of-underground-spirits?” (Economics explained)<br/> I prefer reflected sound of underground little people … ~ <em>Terry Pratchett in The Colour of Magic</em></p>
</blockquote>
<p>Some months ago, a slug came to visit. I gave it some vegetable leafs. I could hear it eat. Enormous appetite. I was absolutely taken by it. Entranced. Then, in the middle of a leaf, it erected itself, and its sensors waved at me. At me! I said, “Wow, you lookin’ at me Vogon?” I felt honored. It stood there, I sat there, and time stopped. We had an “imaginary conversation” probably for not more than a minute or two. Then it continued eating.</p>
<p>The snail came back for 5 more evenings in a row and I studied its behaviour. Tried out several vegetables, to explore what it liked most. I even offered my finger with some vegetable juice on it. That tickles. And I looked up things about snails in books and on the internet in the daytime. Agricultural industry considers these little people a pest. And due to its slowness, the snail has traditionally been seen as a symbol of laziness.</p>
<p><a target="_blank" href="https://anonymissexpress.files.wordpress.com/2011/02/motivator-imperial-slugs1.jpg?w=300&h=240"><img class="align-right" src="https://anonymissexpress.files.wordpress.com/2011/02/motivator-imperial-slugs1.jpg?w=300&h=240&width=300" width="300"/></a><br/> If there aren’t any snails in the area, it is likely not a good environment. Slugs and snails are some of the first gastropods in the food chain to suffer from the effects of pollution. And timing of actually moving to a new location is important. If we still need to spend time on working in the war-work-machine, instead of in our lil garden or fishing by the river or chopping wood or building on or pimping our shelter, don’t move in yet.</p>
<p>When you have gotten this far, found a location, built a basic shelter, and created caches, then be lazy about any pimping, do the work in weekends and vacations rather than too hasty or out of fear you won’t make it “in time”. You will know when the time is right. Necessity is the mother of invention anyway.</p>
<h2>5. Guard our individual freedoms and become part of the solution and not the problem</h2>
<p>And that’s it. Living off the grid in post-fossil-fuel communities and/or pimped pit houses we *are* part of the solution. We are resilient and create beautiful park-like gardens, educational value, small wildlife habitats, less noise, air purification by more green, climate moderation effects, and we conserve building materials and energy.</p>
<p>And that gives us, those that are part of a solution, new problems to solve.</p>
<p>Barring a miraculous enlightenment on the part of the majority of people and a breaking of the corporate/government power grip on our individual lives, nobody will be safe from the machine, no matter where we move. Independent self-reliant people are considered a threat by the war-work-machine, and that too is a sound reason for wearing a controlled folly mask for as long as is needed, before moving in. If and when the bull goes the way of the bull, we are no longer seen as threat by the machine, but as juicy snacks by warlords looking to survive themselves at the expense of those that are prepared.</p>
<p>And we still have the internet for cross training and gaining what works and what doesn’t. And WikiLeaks. And The Deep Green Movement, Anonymous, Arab Spring, Indignados, Occupy, …</p>
<h2>6. Stay absolutely awake, aware, alert and out of paranoia</h2>
<p>Most people in the war-work-machine are in code white thinking “government” or someone else will take care of their bodies as long as they obey “government” or that “someone else”. Code orange alerts are not supposed to be routine and usually reserved for the direst emergencies, like a building collapse or a plane crash [20].</p>
<p>Thanks to WikiLeaks, The Deep Green Movement, Anonymous, Arab Spring, Indignados, and Occupy, an increasing number of people have become suspicious and cautious, realising something is amiss. On occasion, because it isn’t pinpointed or identified yet, this results in paranoia.</p>
<p>Some are taking further steps to hold code orange in the “real” world.</p>
<p>Besides having fun conversations with little beings on imperialistic capitalism, I ascertain other data as well. I keep discerning reality in order to determine what is there and what is not. I keep track of new laws made by “governments”, the progress of every “thing” being put on the altar of profit and power, and of alerts regarding Earth’s changes. I have prepared myself to be physical and use force to regulate violence, if necessary.</p>
<p>Self reliance is a boon and a skill, a need and a necessity, a challenge and a benefit. Healthy self-reliance and self-protection is simply another key to a gratifying and productive life. A life free of some of the constraints that could pin us down in the war-work-machine, a life free to explore and discover all that is available to us (if and when we choose to go for it).</p>
<p>We have to live with the consequences of our choices and actions, as has been and always is the case. At least I can feel good that I have met life’s challenges head on. I will have fought a good fight when the need arose, dug in when I needed to, and kept on going when times got a little rough. I will have loved life in word and deed.</p>
<blockquote><p style="text-align: center;">“One regret dear world, that I am determined not to have when I am lying on my deathbed is that I did not kiss you enough.” ~ <em>Hafiz of Persia</em></p>
</blockquote>
<h2>References</h2>
<h3>Earth is changing</h3>
<p>[1] <a href="http://www.skepticalscience.com/graphics.php?g=47">Skeptical Science: Still Going Down the Up Escalator</a></p>
<p>[2] <a title="http://earthobservatory.nasa.gov/Features/WorldOfChange/decadaltemp.php" href="http://earthobservatory.nasa.gov/Features/WorldOfChange/decadaltemp.php" target="_blank">NASA Earth Observatory: World of Change Global Temperatures Slideshow</a></p>
<p>[3] <a title="http://www.huffingtonpost.com/news/extreme-weather/" href="http://www.huffingtonpost.com/news/extreme-weather/">Huff Post: Extreme Weather News</a></p>
<p>[4a] <a href="http://www.johnstonsarchive.net/other/quake1.html">Number of Earthquakes by Year (last updated 12 August 2011)</a></p>
<p>[4b] <a title="http://earthquake.usgs.gov/earthquakes/eqarchives/year/graphs.php" href="http://earthquake.usgs.gov/earthquakes/eqarchives/year/graphs.php">Earthquake Facts and Statistics Graphs</a></p>
<p>[4c] <a href="http://www.ratical.com/radiation/inetSeries/testsNquakes.html">Nuclear Bomb Tests and their relationship to Earthquakes planetwide</a></p>
<p>[5] <a href="http://news.nationalgeographic.com/news/2012/120202-crack-antarctica-iceberg-science-glacier/">Giant Crack in Antarctica About to Spawn New York-Size Iceberg, February 2, 2012</a></p>
<p>[6] <a href="http://www.abhota.info/end5.htm">A Brief History of the Apocalypse: 2000-2012</a></p>
<h3>Relocate ourselves to a place where we have a clean supply of water and can grow our own food</h3>
<p>[7a] <a href="http://www.montanariveraction.org/pollution.dilution.html">Montana River Action: Pollution Dilution Not A Solution</a></p>
<p>[7b] <a href="http://greendeen.blogspot.com/2009/01/dilution-is-solution-to-pollution.html">Dilution is the Solution to Pollution?</a></p>
<p>[7c] <a href="http://www.themorningbulletin.com.au/story/2012/02/03/the-solution-to-the-pollution-is-dilution-thats-th/">Solution to pollution is not dilution, Adam Wratten | 3rd February 2012</a></p>
<p>[8] <a href="http://www.miller-mccune.com/blogs/news-blog/veni-vidi-polluti-the-long-arm-of-pollution-3833/">Veni, Vidi, Polluti: The Long Arm of Pollution, Bruce Dorminey, April 3, 2009</a></p>
<p>[9a] <a href="http://www.bjerknes.uib.no/pages.asp?kat=8&id=1756&lang=2">Ocean transport of radioactive waste – a benchmark for models, project Arctic Radioactive Contamination, financed by the Research Council of Norway, 2009</a></p>
<p>[9b] <a href="http://www.envirotech-online.com/news/health-and-safety/10/breaking_news/eea_establish_further_links_with_the_arctic/18235/">EEA establish further links with the Arctic, Lauren Steadman</a></p>
<p>[10] <a href="http://www.naturalnews.com/029286_rainwater_collection_water.html">Collecting rainwater now illegal in many states as Big Government claims ownership over our water, Mike Adams, July 26, 2010</a></p>
<p>[11] <a href="http://www.treehugger.com/clean-technology/is-hydropower-really-a-clean-power-source.html">Is Hydropower Really a Clean Power Source? Mat McDermott, May 25, 2010</a></p>
<p>[12] <a href="http://missoulanews.bigskypress.com/IndyBlog/archives/2012/01/31/an-illustrated-guide-to-oil-drilling-on-the-blackfeet-reservation">An illustrated guide to oil drilling on the Blackfeet Reservation</a></p>
<p>[13] <a href="http://anonymissexpress.tumblr.com/tagged/monsanto">Anonymiss Express: posts tagged monsanto</a></p>
<h3>Stay away from urban centers which will become more and more desperate and unsafe</h3>
<p>[14] <a href="http://www.treehugger.com/sustainable-product-design/yurts-cause-controversy-in-france.html">Yurts Cause Controversy in France, Bonnie Alter, January 5, 2011</a></p>
<p>[15a] <a href="http://www.malcolmwells.com/">Malcolmwells.com</a></p>
<p>[15b] <a href="http://www.undergroundhousing.com/">Underground housing</a></p>
<p>[15c] <a href="http://www.permies.com/permaculture-forums/959_0/green-building/underground-housing">Permaculture forums: underground housing</a></p>
<h3>Cache non-GM seed, food, water, medical supplies, fuel, tools and weapons</h3>
<p>[16] <a href="http://www.squidoo.com/emergencyseedbank">Emergency Seed Bank: Why An Emergency Seed Bank/Survival Seed Bank/NON-GMO-Heirloom Seeds, by Justin Doody</a></p>
<p>[17a] <a title="Points To Consider When Choosing Water Heaters" href="http://www.articlesezinedaily.com/points-to-consider-when-choosing-water-heaters/" rel="bookmark">Points To Consider When Choosing Water Heaters, Nathan Thompson, Feb 3, 2012</a></p>
<p>[17b] <a href="http://www.solarenergy-solarpower.com/solar-water-heaters-how-do-they-compare.html">Solar Water Heaters: How do They Compare, Emma Santa</a></p>
<p>[18] <a href="http://www.composttoilet.org.uk/">Compost toilets</a></p>
<p>[19] <a href="http://www.cookwiththesun.com/">Cooking with the sun, Doug Edwards-KF6TSS</a></p>
<h3>Stay absolutely awake, aware, alert and out of paranoia</h3>
<p>[20] <a href="http://www.appliedmartialartstraining.com/content/situational-awareness-and-preventing-violence-0">Applied Martial Arts: Situational Awareness and Preventing Violence</a></p>
<p></p>How To Bypass Internet Censorshiptag:12160.info,2012-01-03:2649739:BlogPost:7129512012-01-03T19:21:11.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<blockquote><p>Because we believe that Internet censorship is not only against the basic purpose of the Internet, which is to let people communicate what they want to with the people they want to communicate with, but also fundamentally against the universal right to freedom of opinion and expression [which] includes freedom to hold opinions without interference and to seek, receive, and impart information and ideas through any media and regardless of frontiers (UDHR, Article 19), we offer you…</p>
</blockquote>
<blockquote><p>Because we believe that Internet censorship is not only against the basic purpose of the Internet, which is to let people communicate what they want to with the people they want to communicate with, but also fundamentally against the universal right to freedom of opinion and expression [which] includes freedom to hold opinions without interference and to seek, receive, and impart information and ideas through any media and regardless of frontiers (UDHR, Article 19), we offer you here "How to bypass Internet Censorship".</p>
<p>This book will not only help you find your way in the diversity of tools and techniques that allow you to defeat Internet censorship, but will also tell you more about how censorship works behind the curtains. You will also learn about the risks that may be linked to the use of such tools, and help you evaluate and mitigate them thanks to encryption or anonymization techniques.</p>
</blockquote>
<p><a href="https://www.howtobypassinternetcensorship.org/" title="https://www.howtobypassinternetcensorship.org/" target="_blank">Read more and see the clips</a> …</p>
<p><a href="https://www.howtobypassinternetcensorship.org/files/bypass-internet-censorship-quickstart.pdf" target="_blank">Get your feet wet with the lightweight Quickstart PDF (8 pages, 268 KB) - Download</a></p>
<p>How To Bypass Internet Censorship is licensed under a <a href="http://creativecommons.org/licenses/by/3.0/" rel="license" target="_blank">Creative Commons Attribution 3.0 Unported License</a>.<br/> Based on a <a href="http://en.flossmanuals.net/booki/ch004_introduction/" target="_blank">booksprint</a> work at <a href="http://booki.flossmanuals.net/" rel="dc:source" target="_blank">booki.flossmanuals.net<br/></a></p>"Hotel Minibar" Keys Open Diebold Voting Machines | Freedom to Tinker | Bush stole the elections, blackbox voting fraud ...tag:12160.info,2011-12-23:2649739:BlogPost:7171172011-12-23T05:01:26.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>Like other computer scientists who have studied Diebold voting machines, we were surprised at the apparent carelessness of Diebold's security design. It can be hard to convey this to nonexperts, because the examples are technical. To security practitioners, the use of a fixed, unchangeable encryption key and the blind acceptance of every software update offered on removable storage are rookie mistakes; but nonexperts have trouble appreciating this. Here is an example that anybody, expert or…</p>
<p>Like other computer scientists who have studied Diebold voting machines, we were surprised at the apparent carelessness of Diebold's security design. It can be hard to convey this to nonexperts, because the examples are technical. To security practitioners, the use of a fixed, unchangeable encryption key and the blind acceptance of every software update offered on removable storage are rookie mistakes; but nonexperts have trouble appreciating this. Here is an example that anybody, expert or not, can appreciate:</p>
<p><strong>The access panel door on a Diebold AccuVote-TS voting machine – the door that protects the memory card that stores the votes, and is the main barrier to the injection of a virus – can be opened with a standard key that is widely available on the Internet.</strong></p>
<p>On Wednesday we did a live demo for our Princeton Computer Science colleagues of the vote-stealing software described in our <a href="http://itpolicy.princeton.edu/voting">paper and video</a>. Afterward, <a href="http://lookingabout.blogspot.com/">Chris Tengi</a>, a technical staff member, asked to look at the key that came with the voting machine. He noticed an alphanumeric code printed on the key, and remarked that he had a key at home with the same code on it. The next day he brought in his key and sure enough it opened the voting machine.</p>
<p>This seemed like a freakish coincidence – until we learned how common these keys are. <a href="https://freedom-to-tinker.com/blog/felten/hotel-minibar-keys-open-diebold-voting-machines" title="https://freedom-to-tinker.com/blog/felten/hotel-minibar-keys-open-diebold-voting-machines">More ...</a></p>
<p> </p>
<p> <iframe width="640" height="480" src="http://www.youtube.com/embed/esAGWYjbWoM?wmode=opaque" frameborder="0"></iframe>
</p>Handy anonimity toolstag:12160.info,2011-12-22:2649739:BlogPost:3518412011-12-22T18:23:43.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>You might as well start by looking in the data of your machine. Did you fill in your real name and address anywhere? Remove it. And don’t keep any of your passwords on your machine. A piece of paper will do.</p>
<p>KeePassX is very useful if you make more identities, keeping the database on a USB stick that you take out of your machine when you walk away from it, and keep that stick in a location only known to you.<br></br> <span id="more-1333"> </span></p>
<h3>Anonymous – the uber-secret…</h3>
<p>You might as well start by looking in the data of your machine. Did you fill in your real name and address anywhere? Remove it. And don’t keep any of your passwords on your machine. A piece of paper will do.</p>
<p>KeePassX is very useful if you make more identities, keeping the database on a USB stick that you take out of your machine when you walk away from it, and keep that stick in a location only known to you.<br/> <span id="more-1333"> </span></p>
<h3>Anonymous – the uber-secret handbook</h3>
<p>The greatest threats to your safety are A) social engineering and your behaviour and B) revealing your IP address.</p>
<p><a title="http://pastebin.com/a8sCYHep/" rel="nofollow" href="http://pastebin.com/a8sCYHep" target="_blank">http://pastebin.com/a8sCYHep</a></p>
<h3>Anonymous – An Introductory Guide to Safety during Social Instability</h3>
<p>Political activists, dissidents, and even nonpartisan bystanders caught in social instability are often fearful for their protection and protection of their families. Citizens may face harsh and even violent opposition by authorities and security forces in such situations. This guide is designed to introduce the reader to the mentality needed to stay safe during unrest and protests – both online and offline. It furthermore aims to assist in continued communications during periods of internet and phone line restrictions.</p>
<p><a href="http://pastebin.com/LVrXDNCm">http://pastebin.com/LVrXDNCm</a></p>
<h3>OrangeMesh</h3>
<p>OrangeMesh is a simple, open source network management dashboard for ROBIN based networks. It helps communities, individuals, and business create and manage wireless mesh networks without any reliance on third parties.</p>
<p><a href="http://orangemesh.sourceforge.net/">http://orangemesh.sourceforge.net/</a></p>
<h3>Freenet</h3>
<p>Freenet is free software which lets you anonymously share files, browse and publish “freesites” (web sites accessible only through Freenet) and chat on forums, without fear of censorship. Freenet is decentralised to make it less vulnerable to attack, and if used in “darknet” mode, where users only connect to their friends, is very difficult to detect. <em>For Linux and Unix.</em></p>
<p><a href="http://freenetproject.org/">http://freenetproject.org/</a></p>
<h3>Osiris – serverless portal system</h3>
<p>Osiris portals are <strong>serverless</strong>, so they spread through the P2P network members. This allows the portals to be independent of central servers, <strong>free</strong> and <strong>indestructibles</strong> since they are supported by every portal member.<br/> Moreover, all the sent contents are <strong>anonymous</strong>, enabling a strong <strong>privacy</strong> protection and ensuring that no one can overwhelm this experiment of free thought and knowledge distribution.<br/> Osiris can also build monarchic portals for a traditional moderation.</p>
<p><a title="http://osiris.kodeware.net/" rel="nofollow" href="http://osiris.kodeware.net/" target="_blank">http://osiris.kodeware.net</a></p>
<h3>The Social VPN Project</h3>
<p>This is a <strong>free and open-source</strong> P2P Social Virtual Private Network (VPN) that seamlessly networks your computer with the computers of your friends so that:</p>
<ul>
<li>Your computer can communicate directly to computers of your friends, and all communication is encrypted and authenticated<em>.</em> In other words, <em>you are in full control of who you connect to and all your communications are private</em>.</li>
<li>This private network is configured with no hassle. The social VPN does all the configuration <em>automatically</em> for you. All you and your friends need to do is run this software and log in to your XMPP backend (such as Google chat, or Jabber.org).</li>
<li>You and your friends can communicate, share and collaborate in countless ways, with existing applications, like iTunes, Windows shared folders, and remote desktop. You can share files and folders, stream music and video, play multi-user games, access remote desktops, and run a Web server private to your friends.</li>
<li>If you own multiple computers at different places, you can also use the Social VPN to seamlessly access your files, desktop, etc remotely – creating your own personal VPN.</li>
</ul>
<p><a title="http://socialvpn.wordpress.com/" rel="nofollow" href="http://socialvpn.wordpress.com/" target="_blank">http://socialvpn.wordpress.com</a></p>
<p> </p>
<p>How-To's will follow. Want me to investigate a specific tool (first), or have FOSS suggestions for more tools, please let me know.</p>Why Is the Media Lying About New #NDAA Power for Indefinite Military Detention of Americans?tag:12160.info,2011-12-20:2649739:BlogPost:7284622011-12-20T21:53:54.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p><span class="submitted">Saturday 17 December 2011</span></p>
<p>by: Ralph Lopez, <a href="http://warisacrime.org/content/why-media-lying-about-new-ndaa-power-indefinite-military-detention-americans" target="_blank">War Is a Crime</a></p>
<p>[…]</p>
<p>The <a href="http://www.ajc.com/news/nation-world/house-passes-662house-passes-662-billion-1259587.html" target="_blank">AP reported this Wednesday</a>when the House passed the final House-Senate Conference Committee version of the…</p>
<p><span class="submitted">Saturday 17 December 2011</span></p>
<p>by: Ralph Lopez, <a href="http://warisacrime.org/content/why-media-lying-about-new-ndaa-power-indefinite-military-detention-americans" target="_blank">War Is a Crime</a></p>
<p>[…]</p>
<p>The <a href="http://www.ajc.com/news/nation-world/house-passes-662house-passes-662-billion-1259587.html" target="_blank">AP reported this Wednesday</a>when the House passed the final House-Senate Conference Committee version of the NDAA:</p>
<blockquote><p>Specifically, the bill would require that the military take custody of a suspect deemed to be a member of al-Qaida or its affiliates and who is involved in plotting or committing attacks on the United States. <strong>There is an exemption for U.S. citizens.</strong></p>
</blockquote>
<p>As has been pointed out repeatedly by civil libertarians, the cunning language is technically correct, because “require” is different than “allow,” but although the bill does not “require” the executive branch to place American citizens in military detention without charge or trial for life, it does indeed “allow” it.</p>
<p>Although Sections 1031 and 1032 were renumbered 1021 and 1022 in the Conference Committee (makes it harder to Google) the substance is still intact. The US military can bust down your door at any time, given the proper go ahead by the executive branch, take you away, never charge you with a crime, never give you a trial, and lock you up, torture you, or even kill you. There is a bit of new razzle-dazzle in the new <a href="http://democrats.rules.house.gov/112/text/112_hr1540conf_txt.pdf" target="_blank">Section 1021 language now stating</a>:</p>
<blockquote><p>“Nothing in this section shall be construed to affect existing law or authorities relating to the detention of United States citizens, lawful resident aliens of the United States, or any other persons who are captured or arrested in the United States.”</p>
</blockquote>
<p>The problem is that <strong>“existing law,”</strong> as the traitor occupying the senate seat for the Great State of South Carolina, <a href="http://www.c-spanvideo.org/appearance/600840428" target="_blank">Lindsey Graham, reiterated,</a> <strong>is the Fourth Circuit Appeals Court ruling in Padilla v. Rumsfeld, which</strong> <a href="http://www.dailykos.com/story/2011/12/15/1045560/-Why-a-Constitutional-Law-Professor-Cannot-Sign-NDAA,-Allowing-Military-Detention-of-Americans?via=blog_683161" target="_blank">temporarily upheld Bush’s authority</a> <strong>to hold American citizen Jose Padilla without charge or trial, as an “enemy combatant,” even though he was arrested on US soil with the full rights of an American-born citizen.</strong> Judge Michael Luttig in that decision fully expected the question to go before the Supreme Court, before Bush pulled a fast one and said suddenly that Padilla could have a civilian trial after being <a href="http://www.nytimes.com/2006/12/04/us/04detain.html?_r=2&hp&ex=1165208400&en=02ab7b458c838c22&ei=5094&partner=homepage&oref=slogin&oref=slogin" target="_blank">held in isolation and tortured</a>for 3 1/2 years. That made Luttig go ballistic. Now he was the last guy to have overturned the Bill of Rights.</p>
<p>In a Washington Post report “Judge Luttig Slams Bush Administration in Padilla Case” the Post <a href="http://www.legalreader.com/blog/2005/12/21/appeals-court-slams-administration-on-padilla-detention.html" target="_blank">(reposted in the Legal Reader)</a>said:</p>
<blockquote><p>The appeals court opinion reflected a tone of anger that is rare for a federal court addressing the United States government, particularly in a matter of presidential authority.</p>
</blockquote>
<p>A <a href="http://cyberlaw.stanford.edu/blogs/gelman/archives003684.shtml" target="_blank">Stanford Law School website notes</a>:</p>
<blockquote><p>Luttig said the government’s actions created the appearance “that the government may be attempting to avoid” Supreme Court review in a matter of “especial national importance.”</p>
</blockquote>
<p>So bottom line, yes, this still means you.</p>
<p>[…]</p>
<p>Thomas Jefferson said:</p>
<blockquote><p>“I consider trial by jury as the only anchor ever yet imagined by man, by which a government can be held to the principles of its constitution.”</p>
</blockquote>
<p>By violating their Oath to protect and defend the United States Constitution, these senators have made themselves “domestic enemies” of the Constitution. <strong>This is Day One of the Overthrow, which we shall fight, and Day One of the Media Silence.</strong> As Anonymous says, war has been declared on the American people. It is appropriate to always end with the list of those who betrayed us December 15, Bill of Rights Day, a day of infamy. These are the names, and their names are Treason. And this includes Obama who signed it.</p>
<p><a href="http://www.truth-out.org/why-media-lying-about-new-ndaa-power-indefinite-military-detention-americans/1324397022#.TvDnHI34i5g.twitte" title="http://www.truth-out.org/why-media-lying-about-new-ndaa-power-indefinite-military-detention-americans/1324397022#.TvDnHI34i5g.twitte" target="_blank">Read more on truthout</a></p>President Obama's Top 10 Constitutional Violationstag:12160.info,2011-12-06:2649739:BlogPost:7212012011-12-06T21:58:56.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>[...]</p>
<div><div><p>The Obama administration and its allies in Congress have perpetrated more than their share of such mob-like actions. While it's hard to narrow them down, here's my stab at the government's top 10 constitutional violations since President Obama took office.</p>
</div>
</div>
<p><strong>1. The individual mandate</strong></p>
<p>No list of President Obama's constitutional violations would be complete without including the requirement that every American purchase health…</p>
<p>[...]</p>
<div><div><p>The Obama administration and its allies in Congress have perpetrated more than their share of such mob-like actions. While it's hard to narrow them down, here's my stab at the government's top 10 constitutional violations since President Obama took office.</p>
</div>
</div>
<p><strong>1. The individual mandate</strong></p>
<p>No list of President Obama's constitutional violations would be complete without including the requirement that every American purchase health insurance, on penalty of civil fine. The individual mandate is unprecedented and exceeds Congress's power to regulate interstate commerce. If it is allowed to stand, Congress will be able to impose any kind of economic mandate as part of any kind of national regulatory scheme. Fortunately, the Supreme Court has a chance to strike this down during its current term.</p>
<p><strong>2. Medicaid coercion</strong></p>
<p>The Court will also be taking up Obamacare's massive intrusion on federal-state relations in the form of a coercive Medicaid expansion. The law compels states to drastically increase their Medicaid expenditures and reorganize their health care bureaucracies, on penalty of losing <em>all</em>(not just additional) Medicaid funds. No state contemplated such a program when it signed onto Medicaid — Arizona was the last to join, in 1982 — and now no state can afford to withdraw. Indeed, even if some withdrawal mechanism existed, withdrawn states' taxpayers would still be funding complying states' Medicaid programs. As the Supreme Court held in <em>South Dakota v. Dole</em>, there comes a point when "the financial inducement offered by Congress might be so coercive as to pass the point at which pressure turns into compulsion."</p>
<p><strong>3. The Independent Payment Advisory Board (a.k.a. "The Death Panel")</strong></p>
<p>IPAB is the group of 15 presidential appointees who, beginning in 2014, are tasked with reducing Medicare spending. Any decisions IPAB makes automatically become law that can only be overridden by a three-fifths majority vote in the Senate. Unlike other federal agencies, IPAB is subject to no external review — no public notification in advance of proposed rules or opportunity for comment, no administrative guidelines and no judicial review. Medicare comprises about 13 percent of the federal budget, so that's an awesome amount of power for Congress to delegate to unelected executive-branch bureaucrats. Indeed, it's so basic a violation of traditional separation of powers that there's no historical analog. The Goldwater Institute has filed a strong lawsuit challenging this (yet another) unprecedented aspect of Obamacare, which will continue wending its way through the lower courts regardless of how the Supreme Court rules on the individual mandate and Medicaid-coercion issues.</p>
<p><strong>4. The Chrysler bailout</strong></p>
<p>Building on the Bush administration's illegal use of TARP funds to bail out the auto industry, the Obama administration bullied Chrysler's secured creditors — who were entitled to "absolute priority" — into accepting 30 cents on the dollar, while junior creditors such as labor unions received much more. This subversion of creditor rights violates not just bankruptcy law but also the Constitution's Takings and Due Process Clauses. This blatant crony capitalism — government-directed industrial policy to help political insiders — discourages investors and generally undermines confidence in American rule of law.</p>
<p><strong>5. Dodd-Frank</strong></p>
<p>Intended to remedy weaknesses in the U.S. financial system — ensuring transparency and accountability — the Dodd-Frank financial "reform" empowered unlimited, unreviewable and often secret bureaucratic discretion. The administrative bodies the legislation created face no constraints on the exercise of arbitrary authority. For example, the Treasury Department now has broad and essentially unchecked power to seize banks and other financial entities that it determines are unsound but "too big to fail." The new Consumer Financial Protection Bureau and Financial Stability Oversight Council, meanwhile, craft, execute and interpret their own law. Due process and separation of powers issues abound.</p>
<p><strong>6. The deep-water drilling ban</strong></p>
<p>Following the Deepwater Horizon oil spill, the Interior Department issued a blanket six-month moratorium on new oil and gas drilling in the Gulf of Mexico. A federal judge struck down that moratorium as arbitrary and capricious, but the government issued a new order to replace the one that was struck down. That order was subsequently withdrawn, but the judge was so shocked by the administration's conduct that he found the government in civil contempt of court.</p>
<p><strong>7. Political-speech disclosure for federal contractors</strong></p>
<p>In April of this year, President Obama released a draft executive order (still pending) that would require businesses with federal contracts to disclose independent expenditures on federal elections (political speech independent of candidates and parties). This order is intended to undermine the Supreme Court's <em>Citizen United </em>decision — allowing independent expenditures by corporations, unions and other associations — by discouraging federal contractors and their executives from engaging in political speech. <em>Citizens United </em>held that such expenditures do not enable the kind of <em>quid pro quo </em>corruption that campaign finance laws are allowed to regulate, so this draft executive order shows contempt for the First Amendment by chilling protected speech.</p>
<p><strong>8. Taxing political contributions</strong></p>
<p>Earlier this year, the IRS tried to muzzle political speech by asserting that donations to certain nonprofit advocacy groups (so-called 501(c)(4) organizations) would be subject to the gift tax. Historically, the IRS has not applied the gift tax in this way — donations to advocacy groups are not likely to be used to circumvent the estate tax — and when the IRS previously tried to tax political donations, it was rebuffed by the courts on the grounds that such transfers are not gifts (i.e., the donor is getting something in return). The IRS has since backed down, but the suspicion remains that it was trying to chill the political speech of those opposed to President Obama's policies, in violation of the First Amendment.</p>
<p><strong>9. Graphic tobacco warnings</strong></p>
<p>Late last year, the FDA issued regulations requiring cigarette manufacturers to display graphic warnings on all packs of cigarettes that must cover at least 50% of the packaging and graphically portray tobacco-related illnesses. These warnings violate the First Amendment because the government is compelling the cigarette manufacturers to discourage their customers from buying their lawful products. Last month, a federal judge blocked the new regulation, which was due to go into effect in January, but the administration is appealing.</p>
<p><strong>10. Health care waivers</strong></p>
<p>The Department of Health and Human Services has granted nearly 2,000 waivers to employers seeking relief from Obamacare's onerous regulations. Nearly 20 percent of these waivers went to gourmet restaurants and other businesses in Nancy Pelosi's San Francisco district. Nevada, home to Senate Majority Leader Harry Reid, got a blanket waiver, while Republican-controlled states like Indiana and Louisiana were denied. Even beyond the unseemly political favoritism, such arbitrary dispensations violate a host of constitutional and administrative law provisions ranging from equal protection to the "intelligible principle" required for congressional delegation of authority to cabinet agencies. Unlike 17th-century English monarchs, American presidents were not granted dispensing powers: As we've seen, the power to suspend a legal requirement can and will be used to arbitrarily favor the politically connected. Moreover, most of these waivers were never authorized by Congress in the first place.</p>
<p><em><a href="http://www.cato.org/people/ilya-shapiro">Ilya Shapiro</a> is a senior fellow in constitutional studies at the Cato Institute and editor-in-chief of the <a href="http://www.cato.org/pubs/scr/">Cato Supreme Court Review</a>.</em></p>
<p><a href="http://www.hawaiireporter.com/president-obamas-top-10-constitutional-violations/123" target="_blank">http://www.hawaiireporter.com/president-obamas-top-10-constitutional-violations/123</a></p>An Open Letter from and to White Allies Calling for Support of “Decolonize Oakland” Proposal #ICRRtag:12160.info,2011-12-06:2649739:BlogPost:7202612011-12-06T01:00:00.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>Please Share!</p>
<p><a href="http://1.bp.blogspot.com/-jgz3-NuN6hg/Tt1bF_754JI/AAAAAAAAAIE/G2G1tLXxAmg/s1600/decolonize.jpg" target="_blank"><img class="align-right" src="http://1.bp.blogspot.com/-jgz3-NuN6hg/Tt1bF_754JI/AAAAAAAAAIE/G2G1tLXxAmg/s1600/decolonize.jpg"></img></a></p>
<p>An Open Letter from and to White Allies Calling for Support of “Decolonize Oakland” Proposal:</p>
<blockquote class="posterous_long_quote"><b>Tomorrow, local Indigenous peoples are proposing at Occupy Oakland’s General Assembly for a name change from Occupy Oakland to “Decolonize Oakland”. You can read the proposal…</b></blockquote>
<p>Please Share!</p>
<p><a target="_blank" href="http://1.bp.blogspot.com/-jgz3-NuN6hg/Tt1bF_754JI/AAAAAAAAAIE/G2G1tLXxAmg/s1600/decolonize.jpg"><img class="align-right" src="http://1.bp.blogspot.com/-jgz3-NuN6hg/Tt1bF_754JI/AAAAAAAAAIE/G2G1tLXxAmg/s1600/decolonize.jpg"/></a></p>
<p>An Open Letter from and to White Allies Calling for Support of “Decolonize Oakland” Proposal:</p>
<blockquote class="posterous_long_quote"><b>Tomorrow, local Indigenous peoples are proposing at Occupy Oakland’s General Assembly for a name change from Occupy Oakland to “Decolonize Oakland”. You can read the proposal here:</b></blockquote>
<blockquote class="posterous_long_quote"><a href="http://www.occupyoakland.org/2011/12/decolonize-oakland/">http://www.occupyoakland.org/2011/12/decolonize-oakland/</a></blockquote>
<blockquote class="posterous_long_quote"><b>Since this proposal went out, there has been a great deal of discussion and strong feelings (especially in online forums) that has elucidated a very deep need for white allies to be present at the General Assembly tomorrow to support this proposal. In general, we need to step-up and offer an anti-racist presence and analysis. This is not to say everyone thinks the same way as a person of color or as an ally. This is not to say anyone is perfect, better, or has the right to judge others. This is not a letter encouraging everyone to start thinking the same way…</b><br/><br/> <b>This is a letter to and from white allies asking that we hold ourselves accountable to our commitment to be an ally. How? By showing up and being your anti-racist self when the communities we seek to be allies to ask us to support them. And that is what is happening tomorrow.</b></blockquote>
<blockquote class="posterous_long_quote">It is important for white allies to be present in solidarity with the Q/POC Caucuses in making this proposal because of (but not limited to) the following anti-racism principles:<br/><ul>
<li>People of color are not responsible for the education of white people.</li>
<li>Seeking the empowerment of people of color does not signify disenfranchising white people, but instead leads to equitable relationships that further empower all.</li>
<li>Defensive responses to issues voiced by people of color are invocations of privilege.</li>
<li>“Anti-racism” does not exist without action.</li>
<li>Racism is more than “individual acts of meanness.” (Peggy McIntosh)</li>
<li>The anti-racist focus should be on effect rather than intention.</li>
<li>(View the complete list or add to it at <a href="http://resistracism.wordpress.com/racism-101/">http://resistracism.wordpress.com/racism-101/</a></li>
</ul>
<br/>----------------------------------------------------------------------------------<br/> While Sunday is an important moment, these issues will in no way disappear after the GA- just as their presence long precedes it. Pease be an accountable ally by addressing these concerns when you hear white/privileged people repeating a historical pattern of dismissing the proposals and voices of people of color and queer people of color as ‘unstrategic,’ 'divisive,' 'unfocused,' etc. The discussion is not complete without a full analysis of the impact of privilege and racism in our movement.<br/> ----------------------------------------------------------------------------------<br/> Discussion on Monday December 5th: How To Improve Ourselves as Anti-Racist White Allies<br/><br/> Regardless of the outcome of Sunday's vote on changing Occupied Oakland to Decolonize Oakland, this issue has presented us with the opportunity to explore some of the perspectives that motivated the proposers.<br/><br/> It is an ideal moment to continue the constantly evolving dialog of how white folks can most effectively support the work of People of Color. How can we, as white allies, best address issues of privilege internally/externally and create respectful cross-cultural connections..<br/> Please join us at 6:30pm on Monday, December 5 at the Hold-Out, 2313 San Pablo Ave (at 23rd Street), Oakland. This will be an informal facilitated discussion to promote an open exchange of ideas.<br/><br/> “We…should not be led to believe that the role of the ally is to “help” victims of racism. The role of the ally is to speak up against systems of oppression, and to challenge other whites to do the same. Teaching about racism needs to shift from an exploration of the experiences of victims and victimizers to that of empowered people of color and their white allies, creating the possibility of working together as partners in the establishment of a more just society.” <a href="http://debunkingwhite.livejournal.com/339225.html">http://debunkingwhite.livejournal.com/339225.html</a><br/> ----------------------------------------------------------------------------------<br/> Hope to see you Sunday 12-5 at the GA at Oscar Grant plaza! There will be a gathering of supporters at 1:45 to check in prior to the start of the GA.</blockquote>
<div class="posterous_quote_citation">via <a href="https://www.facebook.com/notes/morning-star/an-open-letter-from-and-to-white-allies-calling-for-support-of-decolonize-oaklan/10150502343935820?_fb_noscript=1">facebook.com</a></div>Mebendazole Elicits a Potent Antitumor Effect on Human Cancer Cell Lines Both in Vitro and in Vivotag:12160.info,2011-12-04:2649739:BlogPost:7193752011-12-04T16:29:30.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<div class="posterous_autopost"><div class="posterous_bookmarklet_entry"><blockquote class="posterous_long_quote">We have found that mebendazole (MZ), a derivative of benzimidazole, induces a dose- and time-dependent apoptotic response in human lung cancer cell lines. In this study, MZ arrested cells at the G<sub>2</sub>-M phase before the onset of apoptosis, as detected by using fluorescence-activated cell sorter analysis. MZ treatment also resulted in mitochondrial cytochrome <em>c…</em></blockquote>
</div>
</div>
<div class="posterous_autopost"><div class="posterous_bookmarklet_entry"><blockquote class="posterous_long_quote">We have found that mebendazole (MZ), a derivative of benzimidazole, induces a dose- and time-dependent apoptotic response in human lung cancer cell lines. In this study, MZ arrested cells at the G<sub>2</sub>-M phase before the onset of apoptosis, as detected by using fluorescence-activated cell sorter analysis. MZ treatment also resulted in mitochondrial cytochrome <em>c</em> release, followed by apoptotic cell death. Additionally, MZ appeared to be a potent inhibitor of tumor cell growth with little toxicity to normal WI38 and human umbilical vein endothelial cells. When administered p.o. to <em>nu/nu</em> mice, MZ strongly inhibited the growth of human tumor xenografts and significantly reduced the number and size of tumors in an experimental model of lung metastasis. In assessing angiogenesis, we found significantly reduced vessel densities in MZ-treated mice compared with those in control mice. These results suggest that MZ is effective in the treatment of cancer and other angiogenesis-dependent diseases.</blockquote>
<div class="posterous_quote_citation">via <a href="http://clincancerres.aacrjournals.org/content/8/9/2963.short#close=1">clincancerres.aacrjournals.org</a></div>
<h3>In most countries, mebendazole can be bought without prescription. And it's cheap.</h3>
</div>
</div>Interest and Inflation Free Money - Margrit Kennedytag:12160.info,2011-11-30:2649739:BlogPost:7170142011-11-30T23:45:20.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>EVERY DAY almost everyone on this planet uses money. Yet few people understand how money works and affects their lives directly and indirectly. Let us, therefore, take a closer look at what money is and what would happen without it.</p>
<p>First, the good news: Money is one of the most ingenious inventions of humankind, as it helps the exchange of goods and services and overcomes the limits of barter, that is, the direct exchange of goods and services. For example, if you live in a village…</p>
<p>EVERY DAY almost everyone on this planet uses money. Yet few people understand how money works and affects their lives directly and indirectly. Let us, therefore, take a closer look at what money is and what would happen without it.</p>
<p>First, the good news: Money is one of the most ingenious inventions of humankind, as it helps the exchange of goods and services and overcomes the limits of barter, that is, the direct exchange of goods and services. For example, if you live in a village which relies entirely on barter, and you produce works of art but there is nobody to exchange your artwork with except the undertaker, you will soon have to change your occupation or leave. Thus, money creates the possibility for specialization, which is the basis of civilization. Then why do we have a “money problem”?</p>
<p>Here comes the bad news: Money does not only help the exchange of goods and services but can also hinder the exchange of goods and services by being kept in the hands of those who have more than they need. Thus it creates a private toll gate where those who have less than they need pay a fee to those who have more money than they need. This is by no means a “fair deal.” In fact, our present monetary systems could be termed “unconstitutional” in most democratic nations, as I will show later …</p>
<ul class="notranslate">
<li class="toc_section toc_section_1"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/1/LIST-OF-FIGURES" target="_blank">LIST OF FIGURES:</a></li>
<li class="toc_section toc_section_1"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/2/INTRODUCTION" target="_blank">INTRODUCTION</a></li>
<li class="toc_section toc_section_1"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/3/CHAPTER-ONE-FOUR-BASIC-MISCONCEPTIONS-ABOUT-MONEY" target="_blank">CHAPTER ONE FOUR BASIC MISCONCEPTIONS ABOUT MONEY</a></li>
<li class="toc_section toc_section_1"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/4/First-Misconception-THERE-IS-ONLY-ONE-TYPE-OF" target="_blank">First Misconception: THERE IS ONLY ONE TYPE OF</a></li>
<li class="toc_section toc_section_1"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/5/Figure-1-Basic-Types-of-Growth-Patterns" target="_blank">Figure 1 Basic Types of Growth Patterns</a></li>
<li class="toc_section toc_section_1"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/6/Figure-2-Constant-Growth-Curves" target="_blank">Figure 2 Constant Growth Curves</a></li>
<li class="toc_section toc_section_1"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/7/WE-ARE-ALL-EQUALLY-AFFECTED-BY-INTEREST" target="_blank">WE ARE ALL EQUALLY AFFECTED BY INTEREST</a></li>
<li class="toc_section toc_section_1"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/8/FREE-MARKET-ECONOMIES" target="_blank">FREE MARKET ECONOMIES</a></li>
<li class="toc_section toc_section_1"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/9/Figure-5-Development-of-Various-Economic-Indicators" target="_blank">Figure 5 Development of Various Economic Indicators</a></li>
<li class="toc_section toc_section_2 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/10/REPLACEMENT-OF-INTEREST-BY-A-CIRCULATION-FEE" target="_blank">REPLACEMENT OF INTEREST BY A CIRCULATION FEE</a></li>
<li class="toc_section toc_section_2 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/11/THE-FIRST-MODEL-EXPERIMENTS" target="_blank">THE FIRST MODEL EXPERIMENTS</a></li>
<li class="toc_section toc_section_2 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/12/THE-NEED-FOR-LAND-REFORM" target="_blank">THE NEED FOR LAND REFORM</a></li>
<li class="toc_section toc_section_2 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/13/Figure-7-To-Pay-for-a-Building-Site-in-the-FRG-in-the-1980s" target="_blank">Figure 7 To Pay for a Building Site in the FRG in the 1980s</a></li>
<li class="toc_section toc_section_2 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/14/THE-NEED-FOR-TAX-REFORM" target="_blank">THE NEED FOR TAX REFORM</a></li>
<li class="toc_section toc_section_2 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/15/THE-ADVANTAGES-IN-GENERAL" target="_blank">THE ADVANTAGES IN GENERAL</a></li>
<li class="toc_section toc_section_2 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/16/FLAWS-IN-THE-MONETARY-SYSTEM" target="_blank">FLAWS IN THE MONETARY SYSTEM</a></li>
<li class="toc_section toc_section_2 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/17/Figure-8-Why-Does-the-Economy-Get-Caught-in-the-Cogs" target="_blank">Figure 8 Why Does the Economy Get Caught in the Cogs?</a></li>
<li class="toc_section toc_section_2 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/18/Figure-9-Growth-of-the-GNP-in-the-FRG-Between-1950-and-1989" target="_blank">Figure 9 Growth of the GNP in the FRG Between 1950 and 1989</a></li>
<li class="toc_section toc_section_2 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/19/Figure-10-Have-You-Ever-Seen-Money-Work" target="_blank">Figure 10 Have You Ever Seen Money Work?</a></li>
<li class="toc_section toc_section_3 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/20/THE-RICH" target="_blank">THE RICH</a></li>
<li class="toc_section toc_section_3 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/21/THE-POOR" target="_blank">THE POOR</a></li>
<li class="toc_section toc_section_3 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/22/Figure-12-Interest-Rate-vs-Unemployment-and-Bankruptcies" target="_blank">Figure 12 Interest Rate vs. Unemployment and Bankruptcies</a></li>
<li class="toc_section toc_section_3 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/23/Figure-13-Development-Aid" target="_blank">Figure 13 Development Aid</a></li>
<li class="toc_section toc_section_3 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/24/Figure-14-We-Are-Living-in-World-War-III-Already" target="_blank">Figure 14 We Are Living in World War III Already</a></li>
<li class="toc_section toc_section_3 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/25/THE-CHURCHES-AND-SPIRITUAL-GROUPS" target="_blank">THE CHURCHES AND SPIRITUAL GROUPS</a></li>
<li class="toc_section toc_section_3 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/26/BUSINESS-AND-INDUSTRY" target="_blank">BUSINESS AND INDUSTRY</a></li>
<li class="toc_section toc_section_3 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/27/Figure-15-Labour-Costs-Are-Higher-Than-Just-Salaries" target="_blank">Figure 15 Labour Costs Are Higher Than Just Salaries</a></li>
<li class="toc_section toc_section_3 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/28/FARMERS" target="_blank">FARMERS</a></li>
<li class="toc_section toc_section_3 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/29/ECOLOGISTS-AND-ARTISTS" target="_blank">ECOLOGISTS AND ARTISTS</a></li>
<li class="toc_section toc_section_4 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/30/Figure-16-Hurrah-2-5-Growth-Again" target="_blank">Figure 16 Hurrah! 2.5% Growth Again!</a></li>
<li class="toc_section toc_section_4 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/31/WOMEN" target="_blank">WOMEN</a></li>
<li class="toc_section toc_section_4 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/32/CHAPTER-FOUR-SOME-LESSONS-FROM-HISTORY" target="_blank">CHAPTER FOUR SOME LESSONS FROM HISTORY</a></li>
<li class="toc_section toc_section_4 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/33/BRAKTEATEN-MONEY-IN-MEDIEVAL-EUROPE" target="_blank">BRAKTEATEN MONEY IN MEDIEVAL EUROPE</a></li>
<li class="toc_section toc_section_4 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/34/THE-WEIMAR-REPUBLIC-AND-THE-GOLD-STANDARD" target="_blank">THE WEIMAR REPUBLIC AND THE GOLD STANDARD</a></li>
<li class="toc_section toc_section_4 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/35/REPLACING-REVOLUTION-WITH-EVOLUTION" target="_blank">REPLACING REVOLUTION WITH EVOLUTION</a></li>
<li class="toc_section toc_section_4 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/36/A-POSSIBLE-SOLUTION-FOR-THE-NEAR-FUTURE" target="_blank">A POSSIBLE SOLUTION FOR THE NEAR FUTURE</a></li>
<li class="toc_section toc_section_4 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/37/THE-PARKING-FEE-CREATES-A-NEUTRAL-MONEY-SYSTEM" target="_blank">THE PARKING FEE CREATES A NEUTRAL MONEY SYSTEM</a></li>
<li class="toc_section toc_section_4 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/38/CHAPTER-SIX-WHAT-CAN-I-DO-TO-HELP-IN-THE-TRANSITION-PERIOD" target="_blank">CHAPTER SIX WHAT CAN I DO TO HELP IN THE TRANSITION PERIOD?</a></li>
<li class="toc_section toc_section_4 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/39/BE-INFORMED-INCREASE-THE-AWARENESS-OF-OTHERS" target="_blank">BE INFORMED, INCREASE THE AWARENESS OF OTHERS</a></li>
<li class="toc_section toc_section_5 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/40/SPONSOR-MODEL-EXPERIMENTS" target="_blank">SPONSOR MODEL EXPERIMENTS</a></li>
<li class="toc_section toc_section_5 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/41/START-A-LOCAL-EXCHANGE-TRADING-SYSTEM" target="_blank">START A LOCAL EXCHANGE TRADING SYSTEM</a></li>
<li class="toc_section toc_section_5 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/42/SUPPORT-ETHICAL-INVESTMENT" target="_blank">SUPPORT ETHICAL INVESTMENT</a></li>
<li class="toc_section toc_section_5 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/43/THE-LET-SYSTEM" target="_blank">THE LET SYSTEM</a></li>
<li class="toc_section toc_section_5 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/44/THE-WIR-NETWORK-AND-SIMILAR-ASSOCIATIONS" target="_blank">THE WIR NETWORK AND SIMILAR ASSOCIATIONS</a></li>
<li class="toc_section toc_section_5 not_first_page"><a class="toc_section_link" href="http://www.scribd.com/doc/34605440/45/THE-J-A-K-COOPERATIVE-BANKS-IN-SWEDEN" target="_blank">THE J.A.K. COOPERATIVE BANKS IN SWEDEN</a></li>
</ul>
<p>An Excellent Read In My Book :D Effectively, the FED can be put out of a job, sidestepped, by decentralisation and using other economies locally. A total crash is not necessary.</p>Chris Martenson’s presentation at the Gold & Silver Meeting in Madrid + (TL;DR)tag:12160.info,2011-11-30:2649739:BlogPost:7172352011-11-30T22:30:00.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p><iframe frameborder="0" height="360" src="https://www.youtube.com/embed/8WBiTnBwSWc?wmode=opaque" width="640"></iframe>
</p>
<p>(by <a href="http://www.youtube.com/watch?v=8WBiTnBwSWc&feature=share" target="_blank">GoldMoneyNews</a>)<br></br> This video was recorded on November 16 at the Gold & Silver Meeting 2011 in Madrid.</p>
<h1 class="title">It’s Official: The Economy Is Set To Starve</h1>
<p>Nov 23, serves as intro</p>
<p>Once a year, the International Energy Agency (IEA) releases…</p>
<p><iframe src="http://www.youtube.com/embed/8WBiTnBwSWc?wmode=opaque" frameborder="0" height="360" width="640"></iframe>
</p>
<p>(by <a href="http://www.youtube.com/watch?v=8WBiTnBwSWc&feature=share" target="_blank">GoldMoneyNews</a>)<br/> This video was recorded on November 16 at the Gold & Silver Meeting 2011 in Madrid.</p>
<h1 class="title">It’s Official: The Economy Is Set To Starve</h1>
<p>Nov 23, serves as intro</p>
<p>Once a year, the International Energy Agency (IEA) releases its World Energy Outlook (WEO), and it’s our tradition here at ChrisMartenson.com to review it. A lot of articles have already been written on the WEO 2010 report, and I don’t wish to tread an already well-worn path, but the subject is just too important to leave relegate to a single week of attention.</p>
<p>Because some people will only read the first two paragraphs, let me get a couple of conclusions out right up front. You need to pay close attention to Peak Oil, and you need to begin adjusting, because it has already happened. The first conclusion is mine; the second belongs to the IEA. </p>
<p>Okay, it’s not quite as simple as that; there are a few complexities involved that require us to dig a bit deeper and to be sure our terms and definitions are clear so that we are talking about the same things.</p>
<p>But if we can simply distinguish between two types of “oil” (you’ll see why that term is in quotes in a second), the story becomes much easier to follow.</p>
<ul>
<li>“Conventional oil” is the cheap and easy stuff. A well is drilled, pipe is inserted and oil comes up out of the ground that can be shipped directly to a refinery. Whether the oil is “sour” or “sweet” doesn’t matter; it’s still conventional oil.</li>
<li>“Unconventional oil” refers to things like tar sands, ultra-deep-water oil, coal-to-liquids, oil shale, and natural gas liquids. In other words, oil that is much more difficult and expensive to produce.</li>
</ul>
<p><a href="http://www.zerohedge.com/article/guest-post-its-official-economy-set-starve" title="http://www.zerohedge.com/article/guest-post-its-official-economy-set-starve" target="_blank">More …</a></p>
<h1 class="title">Chris Martenson Lecture On Why The Next 20 Years Will Be Marked By The Collapse Of The Exponential Function</h1>
<p>Nov 29</p>
<p>In the above video courtesy of <a href="http://www.goldmoney.com/video/martenson-presentation.html" target="_blank">GoldMoney</a>, Chris Martenson, economic analyst at <a href="http://www.chrismartenson.com/" target="_blank">chrismartenson.com</a> and author of ‘The Crash Course’, explains why he thinks that the coming 20 years are going to look completely unlike the last 20 years. In his presentation he focuses on the so-called three “Es”: Economy, Energy and Environment. He argues that at this point in time it is no longer possible to view either one of those topics separately from one another.</p>
<p>Since all our money is loaned onto existence, our economy has to grow exponentially. Martenson proves this point empirically by showing a 99.9% fit of the actual growth curve of the last 40 years to an exponential curve. If we wanted to continue on this path, our debt load would have to double again over the next 10 years. By continually increasing our debt relative to GDP we are making the assumption that our future will always be wealthier than our past. He believes that this assumption is flawed and that the debt loads are already unmanageable.</p>
<p><strong>Martenson explains how exponential growth works and why it is so scary that our economy is based on it.</strong> In an example he illustrates how unimaginably fast things speed up towards the end of an exponential curve. He shows that an exponential chart can be found in every one of the three “E’s” for instance in GDP growth, oil production, water use or species extinction. Due to the natural limitations on resources, Martenson comes to the conclusion that we are facing a serious energy crisis.</p>
<p><a href="http://www.zerohedge.com/news/chris-martenson-lecture-why-next-20-years-will-be-marked-collapse-exponential-function" title="http://www.zerohedge.com/news/chris-martenson-lecture-why-next-20-years-will-be-marked-collapse-exponential-function" target="_blank">More …</a></p>
<p> </p>Urge the Senate to Oppose Indefinite Military Detentiontag:12160.info,2011-11-27:2649739:BlogPost:7149182011-11-27T14:05:51.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p><a href="https://www.aclu.org/apps//admin/uploads/ndaa230.gif" target="_blank"><img class="align-right" src="https://www.aclu.org/apps//admin/uploads/ndaa230.gif"></img></a> The U.S. Senate is considering the unthinkable: changing detention laws to imprison people — including Americans living in the United States itself — indefinitely and without charge.</p>
<p>The Defense Authorization bill — a “must-pass” piece of legislation — is headed to the Senate floor with troubling provisions that would give the President — and all future presidents — the authority to…</p>
<p><a target="_blank" href="https://www.aclu.org/apps//admin/uploads/ndaa230.gif"><img class="align-right" src="https://www.aclu.org/apps//admin/uploads/ndaa230.gif"/></a>The U.S. Senate is considering the unthinkable: changing detention laws to imprison people — including Americans living in the United States itself — indefinitely and without charge.</p>
<p>The Defense Authorization bill — a “must-pass” piece of legislation — is headed to the Senate floor with troubling provisions that would give the President — and all future presidents — the authority to indefinitely imprison people, without charge or trial, both abroad and inside the United States.</p>
<p><a href="https://secure.aclu.org/site/Advocacy?cmd=display&page=UserAction&id=3865&s_subsrc=111116_ndaa_fb" title="https://secure.aclu.org/site/Advocacy?cmd=display&page=UserAction&id=3865&s_subsrc=111116_ndaa_fb" target="_blank"><strong>Urge your Senators to oppose sections 1031 and 1032 of the Defense Authorization bill</strong></a></p>Senators Demand the Military Lock Up American Citizens in a “Battlefield” They Define as Being Right Outside Your Windowtag:12160.info,2011-11-26:2649739:BlogPost:7140142011-11-26T15:16:23.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<div style="margin-top: 10px;"><p>[…]</p>
<p>The Senate is going to vote on whether Congress will give this president—and every future president — <a href="https://secure.aclu.org/site/Advocacy?cmd=display&page=UserAction&id=3865&s_subsrc=fixNDAA" target="_blank">the power</a> to order the military to pick up and imprison without charge or trial civilians anywhere in the world. Even Rep. Ron Paul (R-Texas) raised his concerns about the NDAA detention provisions during last night’s…</p>
</div>
<div style="margin-top: 10px;"><p>[…]</p>
<p>The Senate is going to vote on whether Congress will give this president—and every future president — <a href="https://secure.aclu.org/site/Advocacy?cmd=display&page=UserAction&id=3865&s_subsrc=fixNDAA" target="_blank">the power</a> to order the military to pick up and imprison without charge or trial civilians anywhere in the world. Even Rep. Ron Paul (R-Texas) raised his concerns about the NDAA detention provisions during last night’s Republican debate. The power is so broad that even U.S. citizens could be swept up by the military and the military could be used far from any battlefield, even within the United States itself.</p>
<p><a href="https://secure.aclu.org/site/Advocacy?cmd=display&page=UserAction&id=3865&s_subsrc=fixNDAA" target="_blank">The worldwide indefinite detention without charge or trial provision</a> is in S. 1867, the National Defense Authorization Act bill, which will be on the Senate floor on Monday. <a href="http://www.washingtonpost.com/politics/congress/senate-panel-pushes-ahead-with-defense-bill-over-white-house-objections-on-terror-suspect-plan/2011/11/15/gIQAEUoYPN_story.html" target="_blank">The bill was drafted in secret</a> by Sens. Carl Levin (D-Mich.) and John McCain (R-Ariz.) and passed in a closed-door committee meeting, without even a single hearing.</p>
<p>[…]</p>
<p><a href="http://www.aclu.org/blog/national-security/senators-demand-military-lock-american-citizens-battlefield-they-define-being" title="http://www.aclu.org/blog/national-security/senators-demand-military-lock-american-citizens-battlefield-they-define-being" target="_blank">WHUT? Read the whole article …</a></p>
</div>Heroic School 'Resource Officer' Takes Down Five-Year-Old Boytag:12160.info,2011-11-26:2649739:BlogPost:7141692011-11-26T12:00:56.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p><b>by William Grigg</b><br></br><img src="http://www.informationliberation.com/space.gif" vspace="2"></img> <br></br>Five-year-old Stockton, <a href="http://www.telegraph.co.uk/news/worldnews/northamerica/usa/8914514/Californian-5-year-old-handcuffed-and-charged-with-battery.html">California resident Michael Davis</a> has been diagnosed with Attention Deficit Hyperactivity Disorder, a clinical term often used to pathologize the predictable behavior of young boys. Like many other boys his age, Michael doesn't take well to prolonged "educational" detention, and…</p>
<p><b>by William Grigg</b><br/><img src="http://www.informationliberation.com/space.gif" vspace="2"/><br/>Five-year-old Stockton, <a href="http://www.telegraph.co.uk/news/worldnews/northamerica/usa/8914514/Californian-5-year-old-handcuffed-and-charged-with-battery.html">California resident Michael Davis</a> has been diagnosed with Attention Deficit Hyperactivity Disorder, a clinical term often used to pathologize the predictable behavior of young boys. Like many other boys his age, Michael doesn't take well to prolonged "educational" detention, and sometimes proved to be a disruptive influence in his class.<br/><br/> Seeking to "cure" Michael of his rambunctiousness, the commissariat in charge of Rio Calaveras Elementary School arranged a meeting with Lt. Frank Gordo, a "resource officer" assigned to the district. The "scared straight" script called for Lt. Gordo -- whose surname, so appropriate for a tax-feeder, is one of God's little jokes -- to waddle menacingly into the room, reducing young Michael to a puddle of docile obedience. Michael displayed a precociously healthy disposition by being un-intimidated by the state functionary in full battle array.<br/><br/> At one point, according to Gordo's account, he placed his hand on Michael. This was the very definition of a "bad touch," and Michael quite sensibly rebelled. Gordo reported that the youngster "pushed my hand away in a batting motion, pushed papers off the table, and kicked me in the right knee" -- a perfectly proportionate response to armed physical aggression by a much larger assailant (although I suspect Michael's aim was a little low).<br/><br/> Rather than backing off and calming down, which is how a functioning adult would have behaved, Gordo escalated the assault and compounded it with armed abduction by hog-tying the five-year-old -- zip-tying his hands and ankles and dragging him to the station, where he was charged with "battery on a police officer." The child would remain trussed for at least two hours. During that time he was forced to undergo a psychiatric evaluation -- since, as all dutiful subjects in the Soyuz understand, only someone clinically ill would display such hostility toward an agent of the State.<br/><br/> It wasn't until two weeks later that the police and school district deigned to share the details of the incident with Michael's mother, Thelma Gray. "I was led to believe that Michael saw and police officer and attacked a police officer on sight," <a href="http://www.kcra.com/r/29847063/detail.html">Gray told a news team from the local NBC affiliate KCRA</a>.<br/><br/> Michael, whose parents are divorced, may have emotional problems. This much should be said: Whatever "affliction" inspired this youngster's reflexive hostility toward a member of the State's punitive priesthood is something I wish the rest of us would catch.<br/><br/> It's worth noting that "resource officers" -- the uniformed bullies who prowl the hallways of government schools looking for trouble -- are taught to see themselves as an army of occupation whose mission is to overawe a hostile population.<br/><br/> In his keynote address to the 2007 National Association of School Resources Conference, held against the rugged and forbidding backdrop of Orlando's Disney World, self-styled tactical and counter-terrorism "expert" John Giduck opened a window into this mindset:<br/><br/> "You've got to be a one-man fighting force...You've got to have enough guns, and ammunition and body armor to stay alive...You should be walking around in schools every day in complete tactical equipment, with semi-automatic weapons.... <strong>You can no longer afford to think of yourselves as peace officers...You must think of yourself [sic] as soldiers in a war because we're going to ask you to act like soldiers</strong>."<br/><br/> Perhaps the intrepid Lt. Gordo will receive the equivalent of the Purple Heart for the wounds of honor he received in hands-on combat with Michael Davis.</p>
<p><a href="http://www.informationliberation.com/?id=37418">http://www.informationliberation.com/?id=37418</a></p>The shocking truth about the crackdown on Occupy TL;DRtag:12160.info,2011-11-26:2649739:BlogPost:7142392011-11-26T03:41:33.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>[...]</p>
<p>Why this massive mobilisation against these not-yet-fully-articulated, unarmed, inchoate people? After all, protesters against the war in Iraq, Tea Party rallies and others have all proceeded without this coordinated crackdown. Is it really the camping? As I write, two hundred young people, with sleeping bags, suitcases and even folding chairs, are still camping out all night and day outside of NBC on public sidewalks – under the benevolent eye of an NYPD cop – awaiting Saturday…</p>
<p>[...]</p>
<p>Why this massive mobilisation against these not-yet-fully-articulated, unarmed, inchoate people? After all, protesters against the war in Iraq, Tea Party rallies and others have all proceeded without this coordinated crackdown. Is it really the camping? As I write, two hundred young people, with sleeping bags, suitcases and even folding chairs, are still camping out all night and day outside of NBC on public sidewalks – under the benevolent eye of an NYPD cop – awaiting Saturday Night Live tickets, so surely the camping is not the issue. I was still deeply puzzled as to why OWS, this hapless, hopeful band, would call out a violent federal response.</p>
<p>That is, until I found out what it was that OWS actually wanted.</p>
<p>The mainstream media was declaring continually "OWS has no message". Frustrated, I simply asked them. I began soliciting online "What is it you want?" answers from Occupy. In the first 15 minutes, I received 100 answers. These were truly eye-opening.</p>
<p>The No 1 agenda item: get the money out of politics. Most often cited was legislation to blunt the effect of the Citizens United ruling, which lets boundless sums enter the campaign process. No 2: reform the banking system to prevent fraud and manipulation, with the most frequent item being to restore the Glass-Steagall Act – the Depression-era law, done away with by President Clinton, that separates investment banks from commercial banks. This law would correct the conditions for the recent crisis, as investment banks could not take risks for profit that create kale derivatives out of thin air, and wipe out the commercial and savings banks.</p>
<p>No 3 was the most clarifying: draft laws against the little-known loophole that currently allows members of Congress to pass legislation affecting Delaware-based corporations in which <em>they themselves are investors</em>.</p>
<p>When I saw this list – and especially the last agenda item – the scales fell from my eyes. Of course, these unarmed people would be having the shit kicked out of them.</p>
<p>For the terrible insight to take away from news that the <a href="http://inthesetimes.com/uprising/entry/12303/mayors_dhs_coordinated_occupy_attacks/">Department of Homeland Security coordinated a violent crackdown</a> is that the DHS does not freelance. The DHS cannot say, on its own initiative, "we are going after these scruffy hippies". Rather, DHS is answerable up a chain of command: first, to New York Representative Peter King, head of the House homeland security subcommittee, who naturally is influenced by his fellow congressmen and women's wishes and interests. And the DHS answers directly, above King, to the president (who was conveniently in Australia at the time).</p>
<p>In other words, for the DHS to be on a call with mayors, the logic of its chain of command and accountability implies that congressional overseers, with the blessing of the White House, told the DHS to authorise mayors to order their police forces – pumped up with millions of dollars of hardware and training from the DHS – to make war on peaceful citizens.</p>
<p>But wait: why on earth would Congress advise violent militarised reactions against its own peaceful constituents? The answer is straightforward: in recent years, members of Congress have started entering the system as members of the middle class (or upper middle class) – but they are leaving DC privy to vast personal wealth, as we see from the "scandal" of presidential contender Newt Gingrich's having been paid $1.8m for a few hours' "consulting" to special interests. The inflated fees to lawmakers who turn lobbyists are common knowledge, but the notion that <em>congressmen and women are legislating their own companies' profits</em>is less widely known – and if the books were to be opened, they would surely reveal corruption on a Wall Street spectrum. Indeed, <a href="http://www.cbsnews.com/8301-18560_162-57323221/congress-insiders-above-the-law/">we do already know that congresspeople are massively profiting from trading on non-public information</a> they have on companies about which they are legislating – a form of insider trading that sent Martha Stewart to jail.</p>
<p>[...]</p>
<p>Occupy has touched the third rail: <strong>personal congressional profits streams</strong>. Even though they are, as yet, unaware of what the implications of their movement are, those threatened by the stirrings of their dreams of reform are not.</p>
<p>Sadly, Americans this week have come one step closer to being true brothers and sisters of the protesters in Tahrir Square. Like them, our own national leaders, who likely see their own personal wealth under threat from transparency and reform, are now making war upon us.</p>
<p><a href="http://www.guardian.co.uk/commentisfree/cifamerica/2011/nov/25/shocking-truth-about-crackdown-occupy">http://www.guardian.co.uk/commentisfree/cifamerica/2011/nov/25/shocking-truth-about-crackdown-occupy</a></p>
<p>One step closer to the puppet masters, leaving a trail of revealed corruptions underway ...</p>#AnonOps #Anonymous Message - #OpPepper not available on YouTube - download from mediafiretag:12160.info,2011-11-22:2649739:BlogPost:7126262011-11-22T19:30:00.000ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p><a href="https://www.youtube.com/watch?feature=player_embedded&v=f2yyHEa3tw0">https://www.youtube.com/watch?feature=player_embedded&v=f2yyHEa3tw0</a></p>
<blockquote><p>This video has been removed as a violation of YouTube’s policy prohibiting <a href="https://www.youtube.com/t/community_guidelines#tips" target="_blank">hate speech</a>. Sorry about that.</p>
</blockquote>
<p> The videa has been removed multiple times now. And no, I see no hate speech? Just a warning to the police all…</p>
<p><a href="https://www.youtube.com/watch?feature=player_embedded&v=f2yyHEa3tw0">https://www.youtube.com/watch?feature=player_embedded&v=f2yyHEa3tw0</a></p>
<blockquote><p>This video has been removed as a violation of YouTube’s policy prohibiting <a href="https://www.youtube.com/t/community_guidelines#tips" target="_blank">hate speech</a>. Sorry about that.</p>
</blockquote>
<p> The videa has been removed multiple times now. And no, I see no hate speech? Just a warning to the police all over the world to stop being brutal. But see for your self:</p>
<div class="watch-unavailable-submessage">The vid can be downloaded from <a href="http://www.mediafire.com/?16dnc2p5iv3458a" target="_blank">http://www.mediafire.com/?16dnc2p5iv3458a</a></div>