On critical issues, the massive Trans-Pacific Partnership (TPP) being negotiated in secret by the Obama administration willundermine democracy in the United States and around the world and further empower transnational corporations. It will circumvent protections for health care, wages, labor rights, consumers’ rights and the environment, and decrease regulation of big finance and risky investment practices.
The only way this treaty, which will be very unpopular with the American people once they are aware of it, can be approved is if the Obama administration avoids the democratic process by using an authority known as “Fast Track,” which limits the constitutional checks and balances of Congress.
If the TPP is approved, the sovereignty of the United States and other member nations will be dissipated by trade tribunals that favor corporate power and force national laws to be subservient to corporate interests. …
For most of the history of the United States, treaties and trade agreements went through the normal congressional process described in the Constitution. Fast Track is a relatively new concept that coincides with an era of increasing presidential power, which includes the power to declare war and to murder US citizens without warning or judicial oversight. If Congress had reviewed agreements such as the WTO and NAFTA beforehand and civil society had been able to participate in a democratic process, would the United States have made the mistake of passing these laws that have so injured our economy and others?
Fast Track is very unpopular, so now President Obama and others who advocate for it do not use the term. Instead they call it by the euphemism “Trade Promotion Authority.” But changing the name does not change what it is – a method of ceding the constitutional power of Congress and undermining the checks and balances built into the constitutional framework. …
Dating back to the 1980s and known to government insiders as “Main Core,” the database reportedly collects and stores — without warrants or court orders — the names and detailed data of Americans considered to be threats to national security. According to several former U.S. government officials with extensive knowledge of intelligence operations, Main Core in its current incarnation apparently contains a vast amount of personal data on Americans, including NSA intercepts of bank and credit card transactions and the results of surveillance efforts by the FBI, the CIA and other agencies. One former intelligence official described Main Core as “an emergency internal security database system” designed for use by the military in the event of a national catastrophe, a suspension of the Constitution or the imposition of martial law. …
This stuff is absolutely chilling.
And there have been hints that such a list still exists today.
For example, the testimony of an anonymous government insider that was recently posted on shtfplan.com alluded to such a list…
“We know all this already,” I stated. He looked at me, giving me a look like I’ve never seen, and actually pushed his finger into my chest. “You don’t know jack,” he said, “this is bigger than you can imagine, bigger than anyone can imagine. This administration is collecting names of sources, whistle blowers and their families, names of media sources and everybody they talk to and have talked to, and they already have a huge list. If you’re not working for MSNBC or CNN, you’re probably on that list. If you are a website owner with a brisk readership and a conservative bent, you’re on that list. It’s a political dissident list, not an enemy threat list,” he stated….
They had to come up with a new database name to distinguish it from their database of CIA run fundamentalist islamic paramilitaries (Al Qaeda): https://www.theguardian.com/uk/2005/jul/08/july7.development
It goes without saying that the likes of cheney and rumsfeld (un-indicted 9/11 terrorists) are not on the list.
The U.S. House of Representatives voted again Thursday to allow the indefinite military detention of Americans, blocking an amendment that would have barred the possibility.
Congress wrote that authority into law in the National Defense Authorization Act two years ago, prompting outrage from civil libertarians on the left and right. President Barack Obama signed the measure, but insisted his administration would never use it.
Former French Foreign Minister Roland Dumas said that Britain had been preparing gunmen to invade Syria two years before the crisis there flared up in 2011.During a TV show, Dumas said ”I was in Britain two years ago, and I met British officials, some my friends…they admitted that they were up to something in Syria.”
”They even asked me to join them in my capacity as a foreign minister, but I declined,” he added.
He indicated that the plan of striking Syria had been prepared in advance long before the 2011 events, adding that the goal was to overthrow the Syrian government that considers Israel an enemy.
The TV show was dedicated to discussing the war in Syria.
French magazine: ‘Jihadists’ involvement in Syria much bigger than Afghanistan
The French magazine “Le Nouvel Observateur” quoted a senior French official as saying that the participation of French Jihadists in Syria is bigger that their involvement in Afghanistan war.
The French magazine said that the French intelligence verified the identities of 270 French nationals who are fighting in Syria, indicating that their return has become a major concern for the French interior ministry.
The magazine said that the number of European ‘Jihadists’ fighting in Syria ranges between 1,500 and 2,000, in addition to hundreds of Tunisians.
The NSA surveillance program that harvests everyone’s data can be very useful in building a terrorist profile. Thanks to data-mining, the authorities could be tipped off to an individual who makes telephone calls to a Muslim from Somalia. This person also regularly makes and receives phone calls from a convicted felon in the United States and is in Facebook communication with a Pakistani known to be interested in aviation. The subject also attended school with a close relative of a well-known Saudi arms dealer and has recently made purchases of fertilizer within the United States. Clearly, the metadata indicates this person warrants further investigation.
This person is me.
That’s just the tip of the iceberg when it comes to my suspicious metadata, I imagine. I’ll release more as the days progress, and I won’t even make you go to Hong Kong and look for a guy with a Rubik’s Cube. I have had run-ins with the authorities and have even received official notice of being a “scofflaw.” (True, though sadly, I seem to have lost the written evidence of being deemed an official scofflaw.)
This NSA surveillance story is amazing, and is thankfully shining a bright light on abuses and overreach within the government. Kind of funny that my earlier prediction turned out so completely wrong, thanks to Edward Snowden. Clearly, Snuggly has enough material for a year’s worth of cartoons.
Let Snuggly the Security Bear and I know what you think, and be sure to comment and share the cartoon.
The National Security Agency has acknowledged in a new classified briefing that it does not need court authorization to listen to domestic phone calls.
Rep. Jerrold Nadler, a New York Democrat, disclosed this week that during a secret briefing to members of Congress, he was told that the contents of a phone call could be accessed “simply based on an analyst deciding that.”
If the NSA wants “to listen to the phone,” an analyst’s decision is sufficient, without any other legal authorization required, Nadler said he learned. “I was rather startled,” said Nadler, an attorney and congressman who serves on the House Judiciary committee…
Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said. [We documented Tuesday that the government is illegally spying on all Americans … and then giving the info to giant corporations.]
These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden ….
Makers of hardware and software, banks, Internet security providers, satellite telecommunications companies and many other companies also participate in the government programs. In some cases, the information gathered may be used not just to defend the nation but to help infiltrate computers of its adversaries.
Along with the NSA, the Central Intelligence Agency, the Federal Bureau of Investigation and branches of the U.S. military have agreements with such companies to gather data that might seem innocuous but could be highly useful in the hands of U.S. intelligence or cyber warfare units, according to the people, who have either worked for the government or are in companies that have these accords….
The information provided by Snowden also exposed a secret NSA program known as Blarney. As the program was described in the Washington Post (WPO), the agency gathers metadata on computers and devices that are used to send e-mails or browse the Internet through principal data routes, known as a backbone.
That metadata includes which version of the operating system, browser and Java software are being used on millions of devices around the world, information that U.S. spy agencies could use to infiltrate those computers or phones and spy on their users.
“It’s highly offensive information,” said Glenn Chisholm, the former chief information officer for Telstra Corp (TLS)., one of Australia’s largest telecommunications companies, contrasting it to defensive information used to protect computers rather than infiltrate them….
WARNING: The National Security Agency is likely recording and storing this communication as part of its unlawful spying programs on all Americans … and people worldwide. The people who created the NSA spying program say that this communication – and any responses – can and will be used against the American people at any time in the future should folks in government decide to go after us for political reasons. And private information in digital communications may be given to big companies by the government.
I put this in the “genocide/democide” category due to the utility of this program in carrying out an orderly extermination of “undesireables,” which would include pretty much everyone with an independent thought in his/her head. Dissolution of national boundaries (the “north american union” for instance) requires an erasure of the historical knowledge that gives rise to national identity. No wonder the secret government supported the khmer rouge experiment in cambodia. They want to start with a clean slate. A lobotomy of human history and civilization is what they’re preparing for. Why not? Obviously they can afford it as long as we believe their funny money has value. They’re only taking possession of what we’ve voluntarily given them by borrowing our entire economy into existence.
Just in case they ever want to assassinate you without leaving a trace, this will give them the means to do so, via designer diseases custom fit to your genetic profile.
Foreign potentates and diplomats beware: the United States wants your DNA.
If that chief of mission seemed a bit too friendly at the last embassy party, it might be because the State Department recently instructed U.S. diplomats to collect biometric identification on their foreign interlocutors. The search for the most personal information of all is contained in WikiLeaks’ latest publication of tens of thousands of sensitive diplomatic cables.
A missive from the Secretary of State’s office in April 2009 asked diplomats in Africa to step up their assistance to U.S. intelligence. Not only should diplomats in Burundi, Rwanda and Congo collect basic biographical information on the people they talk to — a routine diplomatic function — but they should also gather “fingerprints, facial images, DNA, and iris scans.”
According to Ronald Kessler, the author of the 2009 book In the President’s Secret Service, Navy stewards gather bedsheets, drinking glasses, and other objects the president has touched—they are later sanitized or destroyed—in an effort to keep would‑be malefactors from obtaining his genetic material.
An obscure bill that sailed through Congress and was signed into law last month is stoking fears of a nationwide DNA warehouse potentially open to abuse by law enforcement agencies or health insurance companies.
But proponents say the law is a much-needed rationalization of the way the government stores and tests blood from newborns.
The Newborn Screening Saves Lives Act of 2007 (S.1858/H.R. 3825), signed into law on April 24, empowers a committee to provide guidelines to all states on how — and for how long — they should store blood. At present, all states store blood from all newborns, and some, like California, store it indefinitely. Eight of the committee’s nine members are medical researchers, who almost universally favor longer storage times, so critics fear that the national guidelines will lead to more storage of samples, which contain recoverable DNA.
“What we are doing is taking an individual genetic code and saying it’s the government’s,” said Twila Brase, of the Minnesota activist group Citizens’ Council on Health Care. “And once we do that, it’s available for whatever a legislature wants to do in 20 years. The fact of the matter is that we don’t know what they could or would do.”
States have been storing blood samples from newborns since blood screening for genetic defects and diseases began in the 1960s. The samples can help detect and treat a wide range of diseases, but in the age of the genome, the issue of storing samples has taken on unprecedented importance. Blood samples contain DNA that can be unambiguously linked to individuals, which may in the future present tempting data to governments, businesses and health providers.
Off-duty cops collect DNA samples at Alabama roadblocks
Off-duty cops in two counties in Alabama spent the weekend collecting saliva and blood samples from drivers at roadblocks.
According to Lt. Freddie Turrentine with the St. Clair County Sheriff’s Department, drivers were asked to voluntarily offer samples of their saliva and blood for a study being conducted by the Pacific Institute for Research and Evaluation.
The drivers were compensated for their samples.
Documents recently released by the U.S. Immigration and Customs Enforcement (ICE), in response to a Freedom of Information Act request filed by the Electronic Freedom Foundation (EFF), show that the Department of Homeland Security (DHS) is considering collecting DNA samples from children 14 and up, and is even considering collecting samples from kids younger than that.
The Human Genome Project may now open the door to the development and use of genetic weapons targeted at specific ethnic groups. This project is currently being conducted under the auspices of the U.S. Energy Department, which also oversees America’s nuclear weapon arsenal.
In October 1997, Dr. Wayne Nathanson, chief of the Science and Ethics Department of the Medical Society of the United Kingdom, warned the annual meeting of the Society that “gene therapy” might possibly be turned into “gene weapons” which could potentially be used to target particular genes possessed by certain groups of people. These weapons, Nathanson warned, could be delivered not only in the forms already seen in warfare such as gas and aerosol, but could also be added to water supplies, causing not only death but sterility and birth defects in targeted groups.
Current estimates of the cost of developing a “gene weapon” have been placed at around $50 million, still quite a stretch for an isolated band of neo-Nazis, but well within the capabilities of covert government programs. …
A shocking You Tube video shows alleged Syrian rebels testing chemical weapons on lab rabbits before making threats to use them against Syria’s pro-Assad Alawite population….
Who has Crossed the “Red Line”? Barack Obama and John Kerry are Supporting a Terrorist Organization on the State Department List
A WMD saga modeled on Iraq based on fabricated evidence is unfolding. The Western media in chorus relentlessly accuse the Syrian government of premeditated mass-murder, calling upon the “international community” to come to the rescue of the Syrian people.
As “Rebels” Near Defeat – US Plays WMD Card; US to Give Military Support to Syrian Rebels as ‘Red Line’ Crossed
Is it possible that the PRISM leak was set up by the NSA as a deception operation in support of the Obama Administration’s ongoing wars against whistleblowers and the 4th Amendment? Documents from Federal intelligence contractor HBGary, published in 2011 by anonymous hackers, include a Power Point presentation proposing methods for attacking Wikileaks, and this document names Glenn Greenwald, who broke the PRISM story, as a specific target …
Or, further down the rabbit hole, Webster Tarpley suggested the leak may be a kind of political attack waged by the neocons to push a reluctant obama into an overt syrian military attack. After all, Snowden’s disclosures are hardly new, they’re only more conveniently packaged for the half-awake. By that measure, it would appear to have been successful: http://www.prisonplanet.com/man-behind-syrian-chemical-weapons-claim-is-fiction-writer-who-covered-up-benghazi.html