Posts Tagged ‘illegitimate’

ap-syrian-1-er-170309_12x5_1600.jpg

18:40

“We don’t have a basis, our lawyers tell us, unless we have a UN Security Council Resolution,  which the Russians can veto or the Chinese, or unless we are under attack, by the folks there, or unless we are invited in.

Russia is invited in by the legitimate regime–well it’s illegitimate in our mind–but by the regime. And so they were invited in and we’re not invited in. We’re flying in airspace there where they can turn on the air defense and we have a very different scene. The only reason they’re letting us fly is because we’re going after ISIL. If we were going after Assad, those air defenses, we’d have to take out all the air defenses, and we don’t have a legal justification, frankly for doing that, unless we stretch it way beyond the law, on a humanitarian basis. Which some people argue we should, by the way. But so far American legal theory has not gone into the so-called “right to protect.”

 

687474703a2f2f7777772e676c6f62616c72657365617263682e63612f77702d636f6e74656e742f75706c6f6164732f323031342f31312f474d4f2d4e6565646c652d436f726e2d496e6a6563742d436c6f736575702d3430307

Suspected manipulation in the outcome of EU research project

According to Testbiotech, the study took place over the course of just three months, which isn’t nearly long enough to make a proper assessment about the safety of a synthetic organism. Additionally, the study failed to even try to discover a dose threshold at which MON810 might pose health problems, a basic data point that any legitimate study on the matter would have included.

Archives of Toxicology Editor-in-Chief co-authored BPA review with employee of BPA manufacturer

Another major issue is the journal in which the study was published, which has major conflicts of interest with the biotech industry.

more

Joint Task Force Exercise

 

A bit late, this has appeared at the OpedNews site today:

Obama Off the Ukrainian Deep End

HONG KONG-US-LAW-SNOWDEN-POLITICS-FILES

 

Guardian:

Attacking Tor: how the NSA targets users’ online anonymity

TOR will not help you.  NSA uses “exploits” in your computer’s software to plant viruses and to hack into your system.  TOR users are favorite targets for this war machine.  Guardian posted the most in depth analysis yet from Edward Snowden’s exposures.

The NSA refers to these capabilities as CNE, or computer network exploitation.

After identifying an individual Tor user on the internet, the NSA uses its network of secret internet servers to redirect those users to another set of secret internet servers, with the codename FoxAcid, to infect the user’s computer. FoxAcid is an NSA system designed to act as a matchmaker between potential targets and attacks developed by the NSA, giving the agency opportunity to launch prepared attacks against their systems.

Waging war on American civilians is defined as treason in our Constitution.  When cyber war attacks are launched on US citizen’s computers, this is high treason and should be treated as such.

 

big-brother-is-watching-you-poster

http://www.youtube.com/watch?feature=player_embedded&v=gD5LZSk2TIE

Let’s take it up a notch:

What is real “treason?”

“Treason against the United States, shall consist only in levying War against them, or in adhering to their Enemies, giving them Aid and Comfort. No Person shall be convicted of Treason unless on the Testimony of two Witnesses to the same overt Act, or on Confession in open Court.”
-US Constitution, Article 3, Sec. 3

Unlawful surveillance is engaging in CYBERWAR against the people of the United States.  This is by my assessment equivalent to treason.

More of today’s news documenting state crimes against the people of the Unied States…

 


 

21 Facts About NSA Snooping That Every American Should Know

#1 According to CNET, the NSA told Congress during a recent classified briefing that it does not need court authorization to listen to domestic phone calls…

Rep. Jerrold Nadler, a New York Democrat, disclosed on Thursday that during a secret briefing to members of Congress, he was told that the contents of a phone call could be accessed “simply based on an analyst deciding that.”

If the NSA wants “to listen to the phone,” an analyst’s decision is sufficient, without any other legal authorization required, Nadler said he learned. “I was rather startled,” said Nadler, an attorney and congressman who serves on the House Judiciary committee…

#4 The chief technology officer at the CIA, Gus Hunt, made the following statement back in March

“We fundamentally try to collect everything and hang onto it forever.”

 


 

 

 

 

1371422794000-XXX-hdb3235-1306161949_4_3_rx404_c534x401

Former National Security Agency whistle-blowers tell USA TODAY that Edward Snowden succeeded where they failed.
Internet_cafe_inside_Bagram_Air_Base
Yes Folks, the Big Lie is THAT Big… and Growing.
Air Force Prohibiting Airmen from Reading NSA Scandal Stories

In summary, anything to do with the recent news about the NSA and Verizon phone records are considered classified and searching news or records about these on our NIPRNET computers is unauthorized. Thanks!

Similar to events associated with WIKILEAKS disclosures in the past 2 years, classified documents associated with a news story on NSA and wiretapping are potentially classified and readily available on the internet. Users are not to use AF NIPRNET systems to access the Verizon phone records collection and other related news stories because the action could constitute a Classified Message Incident.

Classified documents regarding Verizon phone record collection and court order have been identified as being hosted on publically accessible Internet Web Sites, most notably “The Guardian” news site. Viewing and/or downloading these documents on Air Force NIPRNET computers could constitute a Classified Message Incident. Therefore, users are not to access these file (sic) for any reason (i.e. viewing, downloading, forwarding, etc.)

Come defend freedom by being a censored automaton who follows orders unquestioningly and only knows what we tell you.  For freedom of course.