Obama's CDC has stackable coffins ready... FEMA clearly is fast becoming the Obama administration’s secret in-country military operations that is scaring citizens out of their wits. A video narrated by Dale Bohannan has popped up online with photos of what first appear to be porta-potties. But on closer inspection, the black plastic containers are what the narrator reveals to be as many as 125,000 outsized casket liners that are in no way there to service the needs of live American citizens!
Bohannan drove down a newly cut road through a soybean field in Madison, Georgia and spoke with the field’s owner, who told him the Center for Disease Control (CDC) owned these coffin liners and was leasing his land for their storage! “These are cremation containers for multiple bodies–patent # 5,425,163–burnable, (and) generate very little pollution. The first Amendment guarantees “the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”
NSA reportedly intercepting laptops purchased online to install spy malware. According to a new report from Der Spiegel based on internal NSA documents, the signals intelligence agency's elite hacking unit (TAO) is able to conduct sophisticated wiretaps in ways that make Hollywood fantasy look more like reality. The report indicates that the NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories in order to implant bugs before they reach their destinations.
According to Der Spiegel, the NSA's TAO group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load malware onto the electronics or install malicious hardware that can give US intelligence agencies remote access. This tool, among others, is available to NSA agents through what Der Spiegel describes as a mail-order spy catalog. Sometimes the NSA hops on an FBI jet for high-tech raids. Gun laws in the United States by state. Gun laws in the United States regulate the sale, possession, and use of firearms and ammunition. State laws vary, and are independent of existing federal firearms laws, although they are sometimes broader or more limited in scope than the federal laws. For instance, some US states have created assault weapon bans that are similar to the expired federal assault weapons ban. In many cases, state firearms laws can be considerably less restrictive than federal firearms laws.
This does not confer any de jure immunity against prosecution for violations of the federal laws. However, state and local police departments are not legally obligated to enforce federal gun law as per the U.S. Common subjects of state laws[edit] Firearm related matters that are often regulated by state or local laws include the following: Alabama[edit] Alaska[edit] Arizona[edit] Arkansas[edit] California[edit] Colorado[edit] Connecticut[edit] Delaware[edit] District of Columbia[edit] Florida[edit] Georgia[edit] Hawaii[edit] Your car's black box can reveal all. They are about the size of a pack of cigarettes, a high-tech piece of equipment that looks like a motor vehicle ashtray turned upside down. While many cars no longer have ashtrays under their dashboard, most cars built in the past decade contain an event data recorder, more commonly known as a black box.
The EDR, a computer chip that is part of a vehicle's air bag control module, activates in a damage-causing accident and records information such as speed, braking distance and whether occupants are wearing seat belts. There is some debate on who should have access to that information. The “black box” has been in the news recently. EDR data from the 2007 Ford Crown Victoria Lt. The former Worcester mayor isn't the first public official involved in an accident in which the black box provided details. “Where they are located depends on the make of the automobile,” said W.R. Mr. “He's a pioneer in this field,” said state police Lt. Mr. Lt. James O. Mr. Mr. The Next Data Privacy Battle May Be Waged Inside Your Car.
WikiLeaks Archive — Mixing Diplomacy With Spying. Revealed in classified State Department cables, the directives, going back to 2008, appear to blur the traditional boundaries between statesmen and spies. The cables give a laundry list of instructions for how State Department employees can fulfill the demands of a “National Humint Collection Directive.” (“Humint” is spy-world jargon for human intelligence collection.)
One cable asks officers overseas to gather information about “office and organizational titles; names, position titles and other information on business cards; numbers of telephones, cellphones, pagers and faxes,” as well as “internet and intranet ‘handles’, internet e-mail addresses, web site identification-URLs; credit card account numbers; frequent-flier account numbers; work schedules, and other relevant biographical information.” Philip J. Crowley, a State Department spokesman, on Sunday disputed that American diplomats had assumed a new role overseas. “Our diplomats are just that, diplomats,” he said.
Ronald E. Protect America Act of 2007. Background[edit] In December 2005, the New York Times published an article[3] that described a surveillance program of warrantless domestic wiretapping ordered by the Bush administration and carried out by the National Security Agency in cooperation with major telecommunications companies since 2002 (a subsequent Bloomberg article[4] suggested that this may have already begun by June 2000). Many critics have asserted that the Administration's warrant-free surveillance program is a violation of the Fourth Amendment to the United States Constitution against warrantless search, and, a criminal violation of FISA. The Bush administration maintained that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists,[5] and that the President's inherent authority under Article II of the Constitution to conduct foreign surveillance trumped the FISA statute.
However, the Supreme Court decision in Hamdan v. PRISM (surveillance program) Below are a number of slides released by Edward Snowden showing the operation and processes behind the PRISM program. It should be noted that the "FAA" referred to is Section 702 of the FISA Amendments Act ("FAA"), and not the Federal Aviation Administration, which is more widely known by the same FAA initialism. Slide showing that much of the world's communications flow through the U.S. Details of information collected via PRISM Slide listing companies and the date that PRISM collection began Slide showing PRISM's tasking process Slide showing the PRISM collection dataflow Slide showing PRISM case numbers Slide showing the REPRISMFISA Web app Slide showing some PRISM targets. Slide fragment mentioning "upstream collection", FAA702, EO 12333, and references yahoo.com explicitly in the text.
FAA702 Operations, and map FAA702 Operations, and map. The subheader reads "Collection only possible under FAA702 Authority". Senator John McCain (R-AZ) Senator Rand Paul (R-KY) Data Sovereignty in the Cloud: The Issues for Government. Location, location, location. What is true of real estate is equally true of critical aspects of cloud computing services.
While the location of a data storage center may be irrelevant to many operations and applications, the physical location of a piece of data or information is often critical in determining which sovereign nation controls that data. Indeed, if information is power, then the location of information may determine who exercises power in cyberspace. As federal, state and local governments move toward cloud computing solutions, they need to come to terms with these challenges (often the issue is spoken of as one of "data sovereignty" - as in "which sovereign controls the data? "). At a minimum, any sensitive or confidential government data should be stored only on servers within the United States, in order to reduce the jurisdictional and security concerns that attend offshore data storage. The backstory here is illustrative of geography and data sovereignty. Channeling Reality.
Clandestine HUMINT operational techniques. Many of the techniques here are important in counterintelligence. Defensive counterintelligence personnel need to know them to recognize espionage, sabotage, etc. in process. Offensive counterintelligence specialists may actually use them against foreign intelligence services (FIS). While DA and UW can be conducted by national military or paramilitary organizations, al-Qaeda and similar non-state militant groups appear to use considerably different clandestine cell system structure, for command, control, and operations, than do national forces. Cell systems are evolving to more decentralized models, sometimes because they are enabled by new forms of electronic communications. This page deals primarily with one's own assets. Staff and Skills in a Clandestine HUMINT Operations Station[edit] This description is based around the foreign intelligence service, of country B, operating in and against country A. Station under Diplomatic Cover[edit] Operational Targeting Officer: not always used.
Spy Agency Sought U.S. Call Records Before 9/11, Lawyers Say. June 30 (Bloomberg) -- The U.S. National Security Agency asked AT&T Inc. to help it set up a domestic call monitoring site seven months before the Sept. 11, 2001 attacks, lawyers claimed June 23 in court papers filed in New York federal court. The allegation is part of a court filing adding AT&T, the nation's largest telephone company, as a defendant in a breach of privacy case filed earlier this month on behalf of Verizon Communications Inc. and BellSouth Corp. customers. The suit alleges that the three carriers, the NSA and President George W. Bush violated the Telecommunications Act of 1934 and the U.S. Constitution, and seeks money damages.
``The Bush Administration asserted this became necessary after 9/11,'' plaintiff's lawyer Carl Mayer said in a telephone interview. The lawsuit is related to an alleged NSA program to record and store data on calls placed by subscribers. ``The U.S. U.S. Pioneer Groundbreaker Stop Suit On June 9, U.S. The case is McMurray v. White House Confidential. By Martin Filler Jan/Feb-2001 On January 20, after an unprecedented amount of post-election drama, George W. and Laura Bush will become the 41st family to call the White House home. Although it's the very symbol of the American presidency and one of the most enduring images in our national life, the White House is in fact a typically transient residence in a country where people change domiciles an average of once every six years. Indeed, since the structure's first tenant, John Adams, moved in on November 1, 1800, the median occupancy rate has been only five years, ranging from William Henry Harrison's one month to Franklin Delano Roosevelt's dozen years.
And each time the inhabitants have changed, so has the character of the place. Shortly after Inauguration Day, the new First Family will go to the top-secret government warehouse in Riverdale, Maryland, where the back stock of the White House collection is stored. Knowing how ephemeral interior decoration can be, Mrs. Treasure House. HUMINT. Good intelligence management begins with the proper determination of what needs to be known. Unless precise requirements are set, data will be collected unsystematically and the decision maker ultimately left without pertinent information on which to act. Collected data must be evaluated and transformed into a usable form and sometimes stored for future use.
Evaluation is essential, because many of the wide variety of sources are of doubtful reliability. A standardized system is used to rate the reliability of sources and the likely accuracy of the information they provide; information may be classified as true once it is confirmed by a number of sources. The manner in which HUMINT operations are conducted is dictated by both official protocol and the nature of the source of the information. Sources may be neutral, friendly, or hostile, and may or may not be witting of their involvement in the collection of information. Full article ▸ UN Pushes Population Control Agenda. The United Nations has openly proclaimed that the world’s increasing population is a cause for concern. Likewise, the UN has advocated for its Agenda 21 program that seeks to bring about “sustainable development.”
On February 10, The New American’s William Jasper wrote of Agenda 21: The UN’s Agenda 21 is definitely comprehensive and global — breathtakingly so. Agenda 21 proposes a global regime that will monitor, oversee, and strictly regulate our planet’s oceans, lakes, streams, rivers, aquifers, sea beds, coastlands, wetlands, forests, jungles, grasslands, farmland, deserts, tundra, and mountains. It even has a whole section on regulating and “protecting” the atmosphere.
It proposes plans for cities, towns, suburbs, villages, and rural areas. Agenda 21 is yet another means to achieve ultimate control. A United Nations resolution adopted by the UN General Assembly specifically designed to implement Agenda 21 reads: Likewise, the March 2009 U.N. Fortunately, the U.S. City Says Using Garage For Anything But Car is Illegal! It’s Illegal to store anything but your car in your garage in San Francisco San Francisco is a great example of what happens when liberalism runs amok. What the left “innocently” forgets when they woo voters to their cause is the obvious and logical outcome of their policies. Government involvement in every facet of life. In San Francisco, one of the examples of leftist policies that are just simple outgrowths of leftist philosophy, is the micromanagement of a community. In this case it has to do with your garage. [Added by Ord. 399-89, App. 11/6/89; amended by Ord. 161-92, App. 6/4/92; Ord. 350-95, App. 11/3/95; Ord. 256-07, App. 11/6/07] (a) No automobile or other motor vehicle shall occupy any portion of an apartment house or hotel except in a garage which meets the requirements of the Building Code and other provisions of the Municipal Code.
(b) Use. (c) Separation. What’s that? The nanny state knows no bounds, folks. Liberalism leads governments to do things like we see in New York. Home | IANSA - the global movement against gun violence. Weather Warfare: Beware the US Military’s Experiments with Climatic Warfare. This article was first published by The Ecologist in December 2007. I summarizes several in-depth and detailed articles written by the author on the HAARP program.
The debate on climate change does not acknowledge the role of climatic warfare, namely the deliberate manipulation of climate for military use. “HAARP is a weapon of mass destruction, capable of destabilising agricultural and ecological systems globally.” “‘Climatic warfare’ potentially threatens the future of humanity, but has casually been excluded from the reports for which the IPCC received the 2007 Nobel Peace Prize.” It has also been excluded from the November 2015 Paris Climate Summit. Rarely acknowledged in the debate on global climate change, the world’s weather can now be modified as part of a new generation of sophisticated electromagnetic weapons. Environmental modification techniques have been applied by the US military for more than half a century. Military analysts are mute on the subject.
The HAARP Programme. Keeping Up Appearances. FBI Investigating Numerous Attacks on Nation’s Power Grid. Why the hottest new police car is a bomb-proof military SUV. 2013 Ford Police Interceptor | All-New Police Interceptor Law Enforcement Sedans & SUVs. Chief orders new 'beacon lights' on Cincinnati police cruisers | Cincinnati. Pa. town latest to force drivers over and ask for cheek swabs for federal study. Police Skip Chasing Criminals With New Tracking Technology. Texas Police Ask Drivers for Blood Samples, Secretly Test Those Who Refuse. Costa Mesa police trade in venerable Crown Vics for high-tech cars. The NSA Uses Powerful Toolbox in Effort to Spy on Global Networks. Diana killed by bright light shone into car. EU may recommend black box recorders for cars. 'It's Intimidating. And It's Free': Iraq War Surplus Militarizing US Police. Microsoft, suspecting NSA spying, to ramp up efforts to encrypt its Internet traffic. | Justice Department Pays Linkedin $500,000 For Unlimited Access To Your Personal InformationWealthy Debates.
iSpy: Latest report says NSA has backdoor access to iPhones. Unmanned Aerial Vehicle (UAV) - Predator Drone - News. About the Museum · International Spy Museum. LG Smart TV spying whiplash: LG removes Smart Ad video and changes statement. Rumor: UN arms treaty will ban guns in US. McDonald v. Chicago. Secret U.S. court approved wider NSA spying even after finding excesses. New NSA Spying Info on Project Code Named ‘Stellar Wind’: Collected Data Akin to a ‘Real-Time Map of Your Brain’ Area 51 officially acknowledged by CIA. The Road to Area 51. The World Factbook. The Difference between Aliens, Demons and Fallen Angels. Simon Peter versus Simon the Sorcerer.