07/8/16

4GW – Lawfare

You won’t find the word “Lawfare” in most dictionaries yet. It’s a derivative word from Law and Warfare, and it’s a common 4th generation warfare (4GW) tactic. Lawfare began to be noticed in 2001 before 9/11, but was used as far back as the Nuremburg Trials. Currently, lawfare is mainly used to tie-up a targets time with legal trifles so the objectives of the 4GW agents can be achieved. International Lawfare crosses borders in ways like trade agreements, and human rights issues such as the “Bush Six”. Countries manipulate, or outright violate international trade agreements to economically weaken a country. Sometimes this abuse of law works in their favor and they win cases, other times it simply buys them time to do other things. Muslims use Lawfare as a tool to exploit the legal systems in Israel, France, the U.K., Germany, and even the U.S. I can give 3 examples here, and there are more. 1.) The overwhelming cry by Muslim communities to override a country’s legal system with Sharia Law. They try to use ethnicity and religion to persuade a government to allow the use of Sharia Law instead of the Law of the Land. 2.) The refugee debacle that is also happening throughout Europe now. They have persuaded international law organizations to attempt to force, through international legal pressure, neighboring countries to accept scores of refugees at all costs to security of their countries. In the E.U. the refugees can then cross any E.U. border. Most of these refugees are not families; they are men in the 20 to 35 year old range. They are not refugees, they are suspicious at best, and sleeper cell players at worst. The U.N. has even gotten involved by using the International Court of Justice to enforce the U.N. Charter on every country that ratified the charter. Britain just exited the E.U. (Brexit) because of, in part, the lack of security with regards to borders. Brussels is the legal hub for the E.U. and they are deaf to any outcry from E.U. power-player countries. 3.) China and Russia use currency manipulation to affect the monetary exchange rate and devalue commodities exported by a country but overvalue commodities imported by the same country. The target then must spend resources appealing to the international legal system to try to force them back in line with the trade agreements, or tolerate a trade deficit and a weak economic state.

I also cite an example in the U.S. We’re having legal issues with the illegal alien and refugee traffic as well. The DOJ has, at the behest of the past presidents manipulated the legal system of the U.S. to allow scores of illegal aliens to move across the southern border with impunity. Thank God President Trump is putting the hammer down on these abuses (this sentence added on 6/28/2018). Illegal Latinos can get benefits, a driver’s license (in CA), and now some states are even about to give them the right to vote. Under the “Protocol Relating to the Status of Refugees” The U.S. government is forcing the American people to accept, under duress, tens of thousands of Middle Eastern and African refugees without vetting them properly to assess the potential national security risk. Of all refugees coming into the U.S. in 2016 (85,000) The Middle Eastern and African refugees account for 69.4% (59,000)! This is a classic example of Lawfare.

I cannot speak for other countries, but in the United States this Lawfare is forced on us by an elite cluster of individuals focused on the liberal progressive agenda. They are people like the Clinton’s, Obama’s, Biden’s, Pelosi’s, Reid’s, and so on. These people have loaded the highest cabinet positions with liberal, progressively focused people. They have especially manipulated our judicial system in part by strategically placing liberally progressive judges on the benches of our courts. They also abuse the spirit of the Patriot Act and U.N. Charter. This is Lawfare.

Lawfare delegitimizes a sovereign country’s right to defend its people; it is an abuse of the one thing that prevents all of us from reverting back to the Dark Ages and barbarism. Lawfare is an affront to basic human rights and is a perversion of the purpose of the law. Imagine what it would be like if our government could use any kind of horrifying weapon they wanted on the people, or if they could legally exterminate mentally ill people, or the elderly? Imagine what it would be like if only sanctioned religions or race were allowed, such as Islam, or if the rights of the one overrode the rights of the many, or how about if our government forced us to work 100 hours a week for nearly nothing?

I don’t have to imagine what it would be like; the history books called it medieval slavery, it sparked the Crusades, and it was the Islamic currency and culture for most Muslim nations from 622 AD to 1950 AD and is allowed under Islamic Sharia Law. That’s not evolution, its regression! The only people that fair well with this kind of lawlessness are the elite Islamic radicals, and progressive liberals that orchestrate it.

Boats

04/24/15

Police Tyranny

Body-CamerasIn the City of St. Louis, MO I have started noticing people stopping and observing the police when a “law enforcement event” is taking place in public such as police questioning an individual or group of individuals, or even giving a traffic citation. This is happening because the police are not trust-worthy anymore. They have too many incidents of brutality and harassment that are on camera against them. They can’t seem to shake this animosity towards them. Making the situation still worse is the fact that the police now monitor, at will, the general population using various public, private and government security video cameras in St. Louis. The police know where all the cameras are because they are the monitoring authority. They are careful not to get out of line when on camera, but who knows what they do when not on camera? Even if they are not doing anything wrong, the impression they leave is that they are.

According to the Police Officer’s Union the police seem to think that their personal privacy is being cast into jeopardy if they are required to wear “body cameras” while on the job. It’s alright for them to monitor our public life and license plates at will, but when we, the public, want the same courtesy they cry foul!

I think that, as trusted public servants and law enforcement officers, they should be required to wear body cameras at all times where close public interaction is possible. This Police Officer’s Union excuse of “personal privacy” is BS and they know it. They just want to be able to play their same old tricks and games and get away with it. A leopard can’t change its spots. A few corrupt and intimidating police officers have caused this schism between the public and the police to open up. Their union covers for them and causes the schism to get wider.

It’s time for complete transparency by our law enforcement authorities. If transparency does not happen then the flame of anti-police violence will be stoked until it’s an inferno requiring extraordinary methods to put it out.

 

03/13/15

Pandora’s Emails

data-whore

Why is it OK for elected Democrats, or liberals or those appointed by them to consistently violate the law to suit their agenda? At the same time they pass laws that are not even read, or reviewed in public because they don’t want the public to actually know what’s in them. They also bully those under them to follow and adhere to the laws they subversively pass while they publicly violate that same law with impunity.

Hillary Clinton is a perfect example of this tyranny. Bill Clinton, as POTUS, passed a law in 1995 that states with words to the effect that all government business is to be communicated using government communications only, and not personal emails, etc. The penalty for breaking the law is 3 years in prison, and being barred from serving in government office. While Hillary was Secretary of State she personally sent out memorandums regarding email communications and safeguarding sensitive information by telling her subordinates to use only government servers to communicate sensitive and classified information. This memorandum was sent out because the NSA had determined that China was “hacking” public citizen’s email accounts. In effect, she made sure she could read all their communications but at the same time she compromised national security data and she denied the public and her superior’s access to her official data! She has committed treason (knowingly or unknowingly) by her actions. According to the law concerning safeguarding sensitive information Hillary Clinton broke the law by having her own private email exchange server, and was using it for ALL of the sensitive and classified information that she had officially communicated during her tenure as Secretary of State. So when we needed all the Benghazi details she only gave the investigators what she wanted to give them, and held back what might incriminate her. There are large gaps in the dates of the emails she has surrendered to the requesting government authorities. Dates that include the Benghazi debacle.

What she and other liberals are doing is refusing to follow the law so they can “backdoor” the public, and skirt their accountability. It needs to stop, and by force if necessary. All the laws put into place by Executive Order under Bush and Obama must be rescinded. The Patriot Act must expire.

Our country is a Representative Republic. We have a Legislative, Judiciary, and Executive branch separation for a reason. Checks and balances on government prevent loss of power by the people and “absolute control” by a few. Our “liberal needy” citizens get all kinds of free money, phones, houses, cars, and even tax refunds when they don’t even work so they will follow the “Pied Piper” of socialism to infinity.

For a few trinkets the Native Americans gave away everything until they realized, too late, the real cost of those few trinkets. Then the Native Americans had to be eliminated because of their untimely opposition to the “New Way”.

I wake up every morning and love to “smell the coffee” of enlightenment. Please join me.

 

01/13/15

Orwellian St. Louis (Surveillance City)

Privacy

The St. Louis Metropolitan Police don’t want to put body cameras on their officers because it may violate their rights,… but it’s ok to put them all over our free Metro-St. Louis area and carry out surveillance on the citizens of St. Louis. That’s because they  don’t care about the free-citizens’ rights.

Major Michael Caruso with the St. Louis Metropolitan Police, when referring to imminent, city-wide camera surveillance says, “It’s going to be a huge asset to us when we try to prevent or even solve crimes. This will have video surveillance evidence to find the crooks. What it will do is tie all the surveillance systems that are in existence now through the city, a bunch of private business and even some private citizens who have surveillance systems at their residences or their neighborhoods and stuff. We will be able to monitor these through the police department.”

This video surveillance main hub the Major described is called the “Real Time Intelligence Center”. All the cameras around St. Louis (city owned, business owned, and some private citizen owned cameras) can be monitored in one location. The Mayor, and all the metropolitan police departments are onboard the surveillance oppression train as well.

Did you notice his exclusion of “Body Cameras” worn by police officers? There is no mention of that at all. There is something precariously wrong with an official police department that wants to monitor the free people, but refuses to be monitored themselves. This sounds hauntingly familiar. This sounds like “East Block Germany” during the Cold War. The citizens were monitored and rewarded for informing on their neighbors but the authorities were immune because they were the oppressors. Is this what we have devolved into? Are we willing to sell our last atom of freedom and privacy in order to clutch the promise of security only to be once again lied to like the Orwellian “1984” novel? Wake up St. Louis! I’m going to give you a clue here folks. The Patriot Act requires that all video, and communication surveillance data be shared with the following: NSA, FBI, CIA, and the IRS as well as others. This data can be retained indefinitely.

“Lawmakers can no longer rely on constitutional law and technological limits—they need to proactively seek ways to harmonize constitutional rights and values with the new surveillance capabilities. . . Most people expect to remain anonymous in many ‘public’ contexts, such as entering an Alcoholics Anonymous meeting, a psychiatrist’s office, an infertility clinic, or the headquarters of a religious or cultural group. Similarly, even when they are in a public place, most people expect to keep private the information that might be detectable from such sources as the exposed words on a vial of prescription drugs, the moving lips of a couple engaged in hushed conversation, or diary entries written by a person sitting on a park bench. Ubiquitous, technologically-enhanced video cameras could enable the government to routinely capture footage of all of these activities.(The Constitution Project)

“Even if one is doing nothing wrong, a person may not want the government to know his or her every activity in public. And, of course, it is impossible to predict what the government may find suspicious. To quote U.S. Supreme Court Justice Sonia Sotomayor, “awareness that the Government may be watching chills associational and expressive freedoms. And the Government’s unrestrained power to assemble data that reveal private aspects of identity is susceptible to abuse.

In fact, we are well aware of governmental abuse of technology, both by entire police departments and by individual bad actors. For example, New York City Police Department officers have driven unmarked cars equipped with license plate readers through the parking lots of mosques to record the identities of every attendee. Police in Virginia used license plate readers to identify every driver coming into Washington, DC for President Obama’s 2009 inauguration, as well as a rally featuring Sarah Palin. As for individual bad actors, in 2004, a New York City Police Department infrared helicopter crew recorded a couple making love on a roof instead of monitoring its intended target. We need a system of rules to ensure that new technology doesn’t enable even more widespread abuse.” (ACLU Report on the Unchecked Rise of Surveillance Camera Use in St. Louis)

We must ask ourselves this: Are we willing to sell off all our God-given freedoms for an empty promise of security?

Benjamin Franklin summed it up perfectly when he wrote; “Those willing to give up their freedom for security deserve neither.”

Boats

 

 

05/16/14

The Tor Project: Online Anonymity

Tor_Project

Introducing the “Tor” Project. 1

Tor was originally designed, implemented, and deployed at the U.S. Naval Research Laboratory around 2005 for protecting U.S. Navy communications. It was envisioned long before that during “Desert Storm”. Today, it is used daily by normal people, the military, journalists, law enforcement officers, activists, and many others. Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers like in third world countries. Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with controversial illnesses. The more people who use Tor actually is part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.

Journalists use Tor to communicate more safely with whistleblowers and dissidents.

Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they’re in a foreign country, without notifying everybody nearby that they’re working with that organization.

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently.

Law enforcement uses Tor for visiting or conducting surveillance on web sites without leaving government IP addresses in their web logs, and for security during sting operations.

Tor helps to reduce the risks by distributing your transactions over several places on the Internet, so no single point can link you to your destination. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it’s going. Tor updates transactions and network circuits every ten minutes so your footprints are erased constantly.

The only flip-side to using Tor is the network delay due to the re-routing of your traffic. It does slow the web browser down considerably. I have mine setup so I can turn it on or off instantly depending on what I’m doing. It has been said that given the sheer numbers of people using Tor, that even the NSA has trouble collecting information when users incorporate Tor. Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit. The NSA uses this type of collection method among others to retrieve data but it is difficult to track large traffic. Tor also has hidden services that can be used to publish web articles without the fear of censorship, or authorship tracking.

Ongoing trends in law, policy, and technology threaten anonymity as never before, undermining our ability to speak and read freely online. These trends also undermine national security and critical infrastructure by making communication among individuals, organizations, corporations, and governments more vulnerable to analysis. Each new user and relay provides additional diversity, enhancing Tor’s ability to put control over your security and privacy back into your hands. Become a Tor user and help the Tor Project to protect us all.

1  Information about Tor can be found on their website. The Tor Project is an “open source”, non-profit entity. This is a summary taken from their website. For more information about the Tor Project please visit: https://www.torproject.org/