“Join the tide. Every exposure, every disengagement from their parasitic system, every communication of truth, every civil disobedience helps build the crescendo of Truth sweeping the planet. We can take them down. Their structure is a fabrication, an overlay on human consciousness, and it cannot survive without our cooperation.” Z Gardner
As America continues to be overwhelmed by an obviously orchestrated mass intrusion of immigrants over its borders, the utter hypocrisy of increasingly stringent so-called “security measures” for the rest of the population paints a very clear picture.
There is no terrorism threat to the United States. It’s bogus now and has been completely fraudulent from the get go.
If there were such a threat, not only would this flood of illegals not be allowed never mind clearly encouraged, but anyone crossing the border would have to undergo the same rigorous Orwellian strip downs, x-rays, inspections and interrogations normal citizens are subjected to. On top of that, once they are herded over the border they are being given escorts to safe havens including military bases, given supplies and free transportation to destinations around the country, and are in line for free health care, legal representation and a plethora of other benefits that will no doubt prove back-breaking to the American economy and way of life.
All by design, while cardboard cut-out Obama, the human decoy, takes his multi-million dollar 2-week summer vacation at swishy Martha’s Vineyard. Get the picture? There’s no concern because they are transparently behind it. Besides, while the stage prop Obama is away the real rulers in the shadows can have a field day without having to worry about programming their mouthpiece. Hence all the “vacations” for this vapid useful idiot.
The Set Up – Destruction, Division, the NAU and False Flag Fuel
“. . . the Founding Fathers understood that people who stand up to “oppressive” government officials are to be zealously protected … because “shaming” corrupt, powerful people “into more honourable and just modes of conducting affairs” is the only way to preserve liberty, justice and prosperity, and to remain “free and happy”.” ~WashingtonsBlog
Freedom of the Press is Geared Towards Protecting Critics of Government Corruption …Not Government Apologists
Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.
The powers-that-be argue that freedom of the press only applies to large, well-heeled corporate media. For example, the Nation noted last year:
When the Department of Justice rolled out new policies intended to “strengthen protections for members of the news media” this summer, it wasn’t clear who belonged to the “news media.” Other DOJ documents suggest a narrow application to professional, traditional journalists. (The DOJ did not return a request to clarify the agency’s definition of “news media.”) The Federal Bureau of Investigation’s Domestic Investigations and Operations Guide excludes bloggers from the news media, along with “persons and entities that simply make information available,” like Wikileaks. These policies are guidelines, not directives, but as the Freedom of the Press Foundation points out, they are “part of a broader legislative effort in Washington to simultaneously offer protection for the press while narrowing the scope of who is afforded it.”
Senator Dianne Feinstein argued for an amendment that would have restricted the shield to salaried journalists. “Should this privilege apply to anyone, to a seventeen year-old who drops out of high school, buys a website for five dollars and starts a blog? Or should it apply to journalists, to reporters, who have bona fide credentials?”
Deals brokered between federal agents and foreign corporations have allowed the United States government to easily intercept and interpret a vast swath of communication data sent around the world, new documents reveal.
In a National Security Agency slideshow obtained by The Washington Post and attributed to NSA leaker Edward Snowden, the US government encouraged analysts to tap into an array of underwater, fiber-optic cables that serve as conduits for around 99 percent of the world’s Internet and phone traffic.
The report, published by the Post’s Craig Timberg and Ellen Nakashima, explains how NSA slides leaked by Snowden reveal yet another surveillance program undertaken as an alleged counterterrorism measure but at the cost of putting the privacy of millions, if not billions, of people at risk.
According to that report, the US government sent a team of attorneys from a number of alphabet soup agencies — including the Federal Bureau of Investigation and the Departments of Defense, Justice and Homeland Security — to oversee post-9/11 efforts that would ensure most intelligence sent throughout the world could be collected by American agents.
“Among their jobs, documents show, was ensuring that surveillance requests got fulfilled quickly and confidentially,” the journalists wrote.
That the NSA is covertly spying on all three branches of the American government is nothing short of scandalous. Tice’s revelations are especially appalling to anyone even remotely familiar with how exactly the type of information collected in such intercepts can be used for the purposes of political blackmail, and how profoundly that blackmail can shape the political landscape of the country. In fact, there is a long history of intelligence agencies and covert groups using precisely this type of information to blackmail politicians in the past.
Civil libertarians have long viewed Senator Dianne Feinstein (D.,CA) as a menace to privacy and civil liberties in her role on the Senate Intelligence Committee. She has worked to blocked investigation of torture while supporting warrantless surveillance of our own citizens. Recently, many Californians became aware of her role in seeking ever-expanding powers for the security state. Feinstein desperately tried to get citizens to embrace a new model of privacy that allows for their continual surveillance in the latest scandals under her tenure. That has not worked particularly well so now Feinstein is taking a new approach: she is proclaiming her concern over the dangers of privacy posed by . . . drones. That’s right. Like the street magicians distracting an audience, Feinstein is trying to get citizens to focus on the use of drones for surveillance and promising some form of “regulation” in the future. The obvious intent behind yesterday’s carefully constructed scene was to present Feinstein in the light of a fighter for, rather than an attacker of, privacy rights.
FBI Director Robert Mueller acknowledged the law enforcement agency uses drone aircraft in the United States for surveillance in some cases.
Feinstein jumped at the opportunity to declare “I think the greatest threat to the privacy of Americans is the drone and the use of the drone, and the very few regulations that are on it today and the booming industry of commercial drones.” The point is obvious. The collection of every call made by every American is not really a big deal in turns of privacy. It is also not a concern to grab hundreds of millions of emails and attachments. No, it is the limited number of drone cases that is “the greatest threat to the privacy of Americans.” Of course, using drones to vaporize Americans without a charge or judicial review does not appear to bother Feinstein greatly.
Signals collection has a long secretive and enigmatic history. The very definition of espionage implies spying, most closely associated with foreign sources. Since the Echelon network, the unified function of data retrieval became a given during the cold war. With the revelation of Prism, advances in sophisticated electronic devices and software algorithms provide a major leap. The article, Is PRISM the US version of Echelon?, sums up the evolution. “With this kind of setup and ambition to capture and evaluate private conversations (well, not so private now), makes Echelon that much more believable, and that PRISM is a reflection of the infamous project, but focused solely on the US.”
“The ECHELON system is fairly simple in design: position intercept stations all over the world to capture all satellite, microwave, cellular and fiber-optic communications traffic, and then process this information through the massive computer capabilities of the NSA, including advanced voice recognition and optical character recognition (OCR) programs, and look for code words or phrases (known as the ECHELON Dictionary) that will prompt the computers to flag the message for recording and transcribing for future analysis. Intelligence analysts at each of the respective listening stations maintain separate keyword lists for them to analyze any conversation or document flagged by the system, which is then forwarded to the respective intelligence agency headquarters that requested the intercept.”
This machinery of electronic snooping has no instinctive restraint on the subject or content, when the technocratic engineers are left to design the next level of the “All Seeing Eye”. The notion that the Prism program is shocking certainly does not conform to the even increasing capacity of surveillance society that has already discarded the presumption of privacy.