PRIVACY IS DEAD EVERYWHERE

12/31/2013

Inside TAO: Documents Reveal Top NSA Hacking Unit

http://www.spiegel.de/international/world/the-nsa-uses-powerful

-toolbox-in-effort-to-spy-on-global-networks-a-940969.html

12-30-2013 6-02-21 AM By SPIEGEL Staff

 In January 2010, numerous homeowners in San Antonio, Texas, stood baffled in front of their closed garage doors. They wanted to drive to work or head off to do their grocery shopping, but their garage door openers had gone dead, leaving them stranded. No matter how many times they pressed the buttons, the doors didn’t budge. The problem primarily affected residents in the western part of the city, around Military Drive and the interstate highway known as Loop 410.

In the United States, a country of cars and commuters, the mysterious garage door problem quickly became an issue for local politicians. Ultimately, the municipal government solved the riddle. Fault for the error lay with the United States’ foreign intelligence service, the National Security Agency, which has offices in San Antonio. Officials at the agency were forced to admit that one of the NSA’s radio antennas was broadcasting at the same frequency as the garage door openers. Embarrassed officials at the intelligence agency promised to resolve the issue as quickly as possible, and soon the doors began opening again

 12-30-2013 6-03-32 AMIt was thanks to the garage door opener episode that Texans learned just how far the NSA’s work had encroached upon their daily lives. For quite some time now, the intelligence agency has maintained a branch with around 2,000 employees at Lackland Air Force Base, also in San Antonio. In 2005, the agency took over a former Sony computer chip plant in the western part of the city. A brisk pace of construction commenced inside this enormous compound. The acquisition of the former chip factory at Sony Place was part of a massive expansion the agency began after the events of Sept. 11, 2001.

On-Call Digital Plumbers

One of the two main buildings at the former plant has since housed a sophisticated NSA unit, one that has benefited the most from this expansion and has grown the fastest in recent years — the Office of Tailored Access Operations, or TAO. This is the NSA’s top operative unit — something like a squad of plumbers that can be called in when normal access to a target is blocked.

According to internal NSA documents viewed by SPIEGEL, these on-call digital plumbers are involved in many sensitive operations conducted by American intelligence agencies. TAO’s area of operations ranges from counterterrorism to cyber attacks to traditional espionage. The documents reveal just how diversified the tools at TAO’s disposal have become — and also how it exploits the technical weaknesses of the IT industry, from Microsoft to Cisco and Huawei, to carry out its discreet and efficient attacks.

The unit is “akin to the wunderkind of the US intelligence community,” says Matthew Aid, a historian who specializes in the history of the NSA. “Getting the ungettable” is the NSA’s own description of its duties. “It is not about the quantity produced but the quality of intelligence that is important,” one former TAO chief wrote, describing her work in a document. The paper seen by SPIEGEL quotes the former unit head stating that TAO has contributed “some of the most significant intelligence our country has ever seen.” The unit, it goes on, has “access to our very hardest targets.”

A Unit Born of the Internet

Defining the future of her unit at the time, she wrote that TAO “needs to continue to grow and must lay the foundation for integrated Computer Network Operations,” and that it must “support Computer Network Attacks as an integrated part of military operations.” To succeed in this, she wrote, TAO would have to acquire “pervasive, persistent access on the global network.” An internal description of TAO’s responsibilities makes clear that aggressive attacks are an explicit part of the unit’s tasks. In other words, the NSA’s hackers have been given a government mandate for their work. During the middle part of the last decade, the special unit succeeded in gaining access to 258 targets in 89 countries — nearly everywhere in the world. In 2010, it conducted 279 operations worldwide.

Indeed, TAO specialists have directly accessed the protected networks of democratically elected leaders of countries. They infiltrated networks of European telecommunications companies and gained access to and read mails sent over Blackberry’s BES email servers, which until then were believed to be securely encrypted. Achieving this last goal required a “sustained TAO operation,” one document states.

This TAO unit is born of the Internet — created in 1997, a time when not even 2 percent of the world’s population had Internet access and no one had yet thought of Facebook, YouTube or Twitter. From the time the first TAO employees moved into offices at NSA headquarters in Fort Meade, Maryland, the unit was housed in a separate wing, set apart from the rest of the agency. Their task was clear from the beginning — to work around the clock to find ways to hack into global communications traffic.

Recruiting the Geeks

To do this, the NSA needed a new kind of employee. The TAO workers authorized to access the special, secure floor on which the unit is located are for the most part considerably younger than the average NSA staff member. Their job is breaking into, manipulating and exploiting computer networks, making them hackers and civil servants in one. Many resemble geeks — and act the part, too.

Indeed, it is from these very circles that the NSA recruits new hires for its Tailored Access Operations unit. In recent years, NSA Director Keith Alexander has made several appearances at major hacker conferences in the United States. Sometimes, Alexander wears his military uniform, but at others, he even dons jeans and a t-shirt in his effort to court trust and a new generation of employees.

The recruitment strategy seems to have borne fruit. Certainly, few if any other divisions within the agency are growing as quickly as TAO. There are now TAO units in Wahiawa, Hawaii; Fort Gordon, Georgia; at the NSA’s outpost at Buckley Air Force Base, near Denver, Colorado; at its headquarters in Fort Meade; and, of course, in San Antonio.

One trail also leads to Germany. According to a document dating from 2010 that lists the “Lead TAO Liaisons” domestically and abroad as well as names, email addresses and the number for their “Secure Phone,” a liaison office is located near Frankfurt — the European Security Operations Center (ESOC) at the so-called “Dagger Complex” at a US military compound in the Griesheim suburb of Darmstadt.

But it is the growth of the unit’s Texas branch that has been uniquely impressive, the top secret documents reviewed by SPIEGEL show. These documents reveal that in 2008, the Texas Cryptologic Center employed fewer than 60 TAO specialists. By 2015, the number is projected to grow to 270 employees. In addition, there are another 85 specialists in the “Requirements & Targeting” division (up from 13 specialists in 2008). The number of software developers is expected to increase from the 2008 level of three to 38 in 2015. The San Antonio office handles attacks against targets in the Middle East, Cuba, Venezuela and Colombia, not to mention Mexico, just 200 kilometers (124 miles) away, where the government has fallen into the NSA’s crosshairs.

Mexico’s Secretariat of Public Security, which was folded into the new National Security Commission at the beginning of 2013, was responsible at the time for the country’s police, counterterrorism, prison system and border police. Most of the agency’s nearly 20,000 employees worked at its headquarters on Avenida Constituyentes, an important traffic artery in Mexico City. A large share of the Mexican security authorities under the auspices of the Secretariat are supervised from the offices there, making Avenida Constituyentes a one-stop shop for anyone seeking to learn more about the country’s security apparatus.

Operation WHITETAMALE

That considered, assigning the TAO unit responsible for tailored operations to target the Secretariat makes a lot of sense. After all, one document states, the US Department of Homeland Security and the United States’ intelligence agencies have a need to know everything about the drug trade, human trafficking and security along the US-Mexico border. The Secretariat presents a potential “goldmine” for the NSA’s spies, a document states. The TAO workers selected systems administrators and telecommunications engineers at the Mexican agency as their targets, thus marking the start of what the unit dubbed Operation WHITETAMALE.

Workers at NSA’s target selection office, which also had Angela Merkel in its sights in 2002 before she became chancellor, sent TAO a list of officials within the Mexican Secretariat they thought might make interesting targets. As a first step, TAO penetrated the target officials’ email accounts, a relatively simple job. Next, they infiltrated the entire network and began capturing data.

Soon the NSA spies had knowledge of the agency’s servers, including IP addresses, computers used for email traffic and individual addresses of diverse employees. They also obtained diagrams of the security agencies’ structures, including video surveillance. It appears the operation continued for years until SPIEGEL first reported on it in October.

The technical term for this type of activity is “Computer Network Exploitation” (CNE). The goal here is to “subvert endpoint devices,” according to an internal NSA presentation that SPIEGEL has viewed. The presentation goes on to list nearly all the types of devices that run our digital lives — “servers, workstations, firewalls, routers, handsets, phone switches, SCADA systems, etc.” SCADAs are industrial control systems used in factories, as well as in power plants. Anyone who can bring these systems under their control has the potential to knock out parts of a country’s critical infrastructure.

The most well-known and notorious use of this type of attack was the development of Stuxnet, the computer worm whose existence was discovered in June 2010. The virus was developed jointly by American and Israeli intelligence agencies to sabotage Iran’s nuclear program, and successfully so. The country’s nuclear program was set back by years after Stuxnet manipulated the SCADA control technology used at Iran’s uranium enrichment facilities in Natanz, rendering up to 1,000 centrifuges unusable.

The special NSA unit has its own development department in which new technologies are developed and tested. This division is where the real tinkerers can be found, and their inventiveness when it comes to finding ways to infiltrate other networks, computers and smartphones evokes a modern take on Q, the legendary gadget inventor in James Bond movies.

Having Fun at Microsoft’s Expense

One example of the sheer creativity with which the TAO spies approach their work can be seen in a hacking method they use that exploits the error-proneness of Microsoft’s Windows. Every user of the operating system is familiar with the annoying window that occasionally pops up on screen when an internal problem is detected, an automatic message that prompts the user to report the bug to the manufacturer and to restart the program. These crash reports offer TAO specialists a welcome opportunity to spy on computers.

SPIEGEL ONLINE

The original Microsoft error message exploited by the NSA

When TAO selects a computer somewhere in the world as a target and enters its unique identifiers (an IP address, for example) into the corresponding database, intelligence agents are then automatically notified any time the operating system of that computer crashes and its user receives the prompt to report the problem to Microsoft. An internal presentation suggests it is NSA’s powerful XKeyscore spying tool that is used to fish these crash reports out of the massive sea of Internet traffic.

The automated crash reports are a “neat way” to gain “passive access” to a machine, the presentation continues. Passive access means that, initially, only data the computer sends out into the Internet is captured and saved, but the computer itself is not yet manipulated. Still, even this passive access to error messages provides valuable insights into problems with a targeted person’s computer and, thus, information on security holes that might be exploitable for planting malware or spyware on the unwitting victim’s computer.

Although the method appears to have little importance in practical terms, the NSA’s agents still seem to enjoy it because it allows them to have a bit of a laugh at the expense of the Seattle-based software giant. In one internal graphic, they replaced the text of Microsoft’s original error message with one of their own reading, “This information may be intercepted by a foreign sigint system to gather detailed information and better exploit your machine.” (“Sigint” stands for “signals intelligence.”)

SPIEGEL ONLINE

An NSA internal slide: “This information may be intercepted by a foreign SIGINT system to gather detailed information and better exploit your machine.”

One of the hackers’ key tasks is the offensive infiltration of target computers with so-called implants or with large numbers of Trojans. They’ve bestowed their spying tools with illustrious monikers like “ANGRY NEIGHBOR,” “HOWLERMONKEY” or “WATERWITCH.” These names may sound cute, but the tools they describe are both aggressive and effective.

According to details in Washington’s current budget plan for the US intelligence services, around 85,000 computers worldwide are projected to be infiltrated by the NSA specialists by the end of this year. By far the majority of these “implants” are conducted by TAO teams via the Internet.

Increasing Sophistication

Until just a few years ago, NSA agents relied on the same methods employed by cyber criminals to conduct these implants on computers. They sent targeted attack emails disguised as spam containing links directing users to virus-infected websites. With sufficient knowledge of an Internet browser’s security holes — Microsoft’s Internet Explorer, for example, is especially popular with the NSA hackers — all that is needed to plant NSA malware on a person’s computer is for that individual to open a website that has been specially crafted to compromise the user’s computer. Spamming has one key drawback though: It doesn’t work very often.

Nevertheless, TAO has dramatically improved the tools at its disposal. It maintains a sophisticated toolbox known internally by the name “QUANTUMTHEORY.” “Certain QUANTUM missions have a success rate of as high as 80%, where spam is less than 1%,” one internal NSA presentation states.

A comprehensive internal presentation titled “QUANTUM CAPABILITIES,” which SPIEGEL has viewed, lists virtually every popular Internet service provider as a target, including Facebook, Yahoo, Twitter and YouTube. “NSA QUANTUM has the greatest success against Yahoo, Facebook and static IP addresses,” it states. The presentation also notes that the NSA has been unable to employ this method to target users of Google services. Apparently, that can only be done by Britain’s GCHQ intelligence service, which has acquired QUANTUM tools from the NSA.

A favored tool of intelligence service hackers is “QUANTUMINSERT.” GCHQ workers used this method to attack the computers of employeesat partly government-held Belgian telecommunications company Belgacom, in order to use their computers to penetrate even further into the company’s networks. The NSA, meanwhile, used the same technology to target high-ranking members of the Organization of the Petroleum Exporting Countries (OPEC) at the organization’s Vienna headquarters. In both cases, the trans-Atlantic spying consortium gained unhindered access to valuable economic data using these tools.

The insert method and other variants of QUANTUM are closely linked to a shadow network operated by the NSA alongside the Internet, with its own, well-hidden infrastructure comprised of “covert” routers and servers. It appears the NSA also incorporates routers and servers from non-NSA networks into its covert network by infecting these networks with “implants” that then allow the government hackers to control the computers remotely. (Click here to read a related article on the NSA’s “implants”.)

In this way, the intelligence service seeks to identify and track its targets based on their digital footprints. These identifiers could include certain email addresses or website cookies set on a person’s computer. Of course, a cookie doesn’t automatically identify a person, but it can if it includes additional information like an email address. In that case, a cookie becomes something like the web equivalent of a fingerprint.

A Race Between Servers

Once TAO teams have gathered sufficient data on their targets’ habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service’s covert servers, known by the codename FOXACID.

This NSA server coerces the user into connecting to NSA covert systems rather than the intended sites. In the case of Belgacom engineers, instead of reaching the LinkedIn page they were actually trying to visit, they were also directed to FOXACID servers housed on NSA networks. Undetected by the user, the manipulated page transferred malware already custom tailored to match security holes on the target person’s computer.

The technique can literally be a race between servers, one that is described in internal intelligence agency jargon with phrases like: “Wait for client to initiate new connection,” “Shoot!” and “Hope to beat server-to-client response.” Like any competition, at times the covert network’s surveillance tools are “too slow to win the race.” Often enough, though, they are effective. Implants with QUANTUMINSERT, especially when used in conjunction with LinkedIn, now have a success rate of over 50 percent, according to one internal document.

Tapping Undersea Cables

At the same time, it is in no way true to say that the NSA has its sights set exclusively on select individuals. Of even greater interest are entire networks and network providers, such as the fiber optic cables that direct a large share of global Internet traffic along the world’s ocean floors.

One document labeled “top secret” and “not for foreigners” describes the NSA’s success in spying on the “SEA-ME-WE-4” cable system. This massive underwater cable bundle connects Europe with North Africa and the Gulf states and then continues on through Pakistan and India, all the way to Malaysia and Thailand. The cable system originates in southern France, near Marseille. Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle.

The document proudly announces that, on Feb. 13, 2013, TAO “successfully collected network management information for the SEA-Me-We Undersea Cable Systems (SMW-4).” With the help of a “website masquerade operation,” the agency was able to “gain access to the consortium’s management website and collected Layer 2 network information that shows the circuit mapping for significant portions of the network.”

It appears the government hackers succeeded here once again using the QUANTUMINSERT method.

The document states that the TAO team hacked an internal website of the operator consortium and copied documents stored there pertaining to technical infrastructure. But that was only the first step. “More operations are planned in the future to collect more information about this and other cable systems,” it continues.

But numerous internal announcements of successful attacks like the one against the undersea cable operator aren’t the exclusive factors that make TAO stand out at the NSA. In contrast to most NSA operations, TAO’s ventures often require physical access to their targets. After all, you might have to directly access a mobile network transmission station before you can begin tapping the digital information it provides.

Spying Traditions Live On

To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren’t connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after as little as a half hour’s work.

Responding to a query from SPIEGEL, NSA officials issued a statement saying, “Tailored Access Operations is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies.” The statement added that TAO’s “work is centered on computer network exploitation in support of foreign intelligence collection.” The officials said they would not discuss specific allegations regarding TAO’s mission.

Sometimes it appears that the world’s most modern spies are just as reliant on conventional methods of reconnaissance as their predecessors.

Take, for example, when they intercept shipping deliveries. If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called “load stations,” agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer.

These minor disruptions in the parcel shipping business rank among the “most productive operations” conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks “around the world.”

Even in the Internet Age, some traditional spying methods continue to live on.

REPORTED BY JACOB APPELBAUM, LAURA POITRAS, MARCEL ROSENBACH, CHRISTIAN STÖCKER, JÖRG SCHINDLER AND HOLGER STARK

ARTICLE TWO

 The NSA Actually Intercepted Packages to Put Backdoors in Electronics

http://gizmodo.com/the-nsa-actually-intercepted-packages-to-put-backdoors-1491169592

 BY LILY HAY NEWMAN

When it comes to modern firewalls for corporate computer networks, the world’s second largest network equipment manufacturer doesn’t skimp on praising its own work. According to Juniper Networks’ online PR copy, the company’s products are “ideal” for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company’s special computers is “unmatched” and their firewalls are the “best-in-class.” Despite these assurances, though, there is one attacker none of these products can fend off — the United States’ National Security Agency.

ANZEIGE

Specialists at the intelligence organization succeeded years ago in penetrating the company’s digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry — including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.

A 50-Page Catalog

These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives — from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA’s specialists seem already to have gotten past them.

This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets’ data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000.

In the case of Juniper, the name of this particular digital lock pick is “FEEDTROUGH.” This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive “across reboots and software upgrades.” In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH “has been deployed on many target platforms.”

Master Carpenters

The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA’s department for Tailored Access Operations (TAO). In cases where TAO’s usual hacking and data-skimming methods don’t suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such “implants,” as they are referred to in NSA parlance, have played a considerable role in the intelligence agency’s ability to establish a global covert network that operates alongside the Internet.

Some of the equipment available is quite inexpensive. A rigged monitor cable that allows “TAO personnel to see what is displayed on the targeted monitor,” for example, is available for just $30. But an “active GSM base station” — a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones — costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.

‘Persistence’

The ANT division doesn’t just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer’s motherboard that is the first thing to load when a computer is turned on.

This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this “Persistence” and believe this approach has provided them with the possibility of permanent access.

Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.

Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are “remotely installable” — in other words, over the Internet. Others require a direct attack on an end-user device — an “interdiction,” as it is known in NSA jargon — in order to install malware or bugging equipment.

There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. “Cisco does not work with any government to modify our equipment, nor to implement any so-called security ‘back doors’ in our products,” the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company “respects and complies with the laws of all countries in which it operates.”

Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it’s not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be “pursued for a future release.”

 10 13 11 flagbar


Monsanto and Trans Pacific Partnership with Ellen Brown

12/30/2013

http://globalwarming-arclein.blogspot.ca/2013/12/monsanto-and-trans-pacific-partnership.html

 BY ELLEN BROWN

12-30-2013 3-22-28 PM

This is the continuing saga of Monsanto et al to optimize their business model which is coming under increasing challenge and outright rejection by consumers.  What bothers me is just how few have been able to stand up to them. So far it has been on the edges.

What it going to kill this is surely the biology itself.  The cost structure is already creaking and the absolute need to properly rejuvenate soils just to sustain fertility is a natural deadline.  Super weeds are also signaling failure.

At the same time, conversion to organic protocols is becoming more clearly understood and easier to implement.  Once begun there is no going back.

I am disturbed by the attempt by these multinationals to write their advantage into any trade agreement.  That it infers surrendering sovereignty to Trans national corporation seems wishful thinking but we must remain vigilant.

WHY MONSANTO AND TRANS-PACIFIC PARTNERSHIP EQUAL GLOBAL FOOD DOMINANCE

Control oil and you control nations,” said U.S. Secretary of State Henry Kissinger in the 1970s. ”Control food and you control the people.”

Global food control has nearly been achieved, by reducing seed diversity with GMO (genetically modified) seeds that are distributed by only a few transnational corporations. But this agenda has been implemented at grave cost to our health; and if the Trans-Pacific Partnership (TPP) passes, control over not just our food but our health, our environment and our financial system will be in the hands of transnational corporations.

Profits Before Populations

According to an Acres USA interview of plant pathologist Don Huber, Professor Emeritus at Purdue Universitytwo modified traits account for practically all of the genetically modified crops grown in the world today. One involves insect resistance.

The other, more disturbing modification involves insensitivity to glyphosate-based herbicides (plant-killing chemicals). Often known as Roundup after the best-selling Monsanto product of that name, glyphosate poisons everything in its path except plants genetically modified to resist it.

Glyphosate-based herbicides are now the most commonly used herbicides in the world. Glyphosate is an essential partner to the GMOs that are the principal business of the burgeoning biotech industry. Glyphosate is a “broad-spectrum” herbicide that destroys indiscriminately, not by killing unwanted plants directly but by tying up access to critical nutrients.

Because of the insidious way in which it works, it has been sold as a relatively benign replacement for the devastating earlier dioxin-based herbicides. But a barrage of experimental data has now shown glyphosate and the GMO foods incorporating it to pose serious dangers to health.

Compounding the risk is the toxicity of “inert” ingredients used to make glyphosate more potent. Researchers have found, for example, that the surfactant POEA can kill human cells, particularly embryonic, placental and umbilical cord cells. But these risks have been conveniently ignored.

The widespread use of GMO foods and glyphosate herbicides helps explain the anomaly that the U.S. spends more than twice as much per capita on healthcare as the average developed country, yet it is rated far down the scale of the world’s healthiest populations. The World Health Organization has ranked the U.S. last out of 17 developed nations for overall health.

Sixty to seventy percent of the foods in U.S. supermarkets are now genetically modified. By contrast, in at least 26 other countries—including Switzerland, Australia, Austria, China, India, France, Germany, Hungary, Luxembourg, Greece, Bulgaria, Poland, Italy, Mexico and Russia—GMOs are totally or partially banned; and significant restrictions on GMOs exist in about sixty other countries.

A ban on GMO and glyphosate use might go far toward improving the health of Americans. But the Trans-Pacific Partnership, a global trade agreement for which the Obama Administration has sought Fast Track status, would block that sort of cause-focused approach to the healthcare crisis.

Roundup’s Insidious Effects

Roundup-resistant crops escape being killed by glyphosate, but they do not avoid absorbing it into their tissues. Herbicide-tolerant crops have substantially higher levels of herbicide residues than other crops. In fact, many countries have had to increase their legally allowable levels—by up to 50 times—in order to accommodate the introduction of GM crops.

In the European Unionresidues in foods are set to rise 100 to 150 times if a new proposal by Monsanto is approved. Meanwhile, herbicide-tolerant “super-weeds” have adapted to the chemical, requiring even more toxic doses and new toxic chemicals to kill the plant.

Human enzymes are affected by glyphosate just as plant enzymes are: the chemical blocks the uptake of manganese and other essential minerals. Without those minerals, we cannot properly metabolize our food. That helps explain the rampant epidemic of obesity in the United States. People eat and eat in an attempt to acquire the nutrients that are simply not available in their food.

According to researchers Samsell and Seneff in Biosemiotic Entropy: Disorder, Disease, and Mortality:

Glyphosate’s inhibition of cytochrome P450 (CYP) enzymes is an overlooked component of its toxicity to mammals. CYP enzymes play crucial roles in biology… Negative impact on the body is insidious and manifests slowly over time as inflammation damages cellular systems throughout the body. “Consequences are most of the diseases and conditions associated with a Western diet, which include gastrointestinal disorders, obesity, diabetes, heart disease, depression, autism, infertility, cancer and Alzheimer’s disease.”

More than 40 diseases have been linked to glyphosate use, and more keep appearing. In September 2013, the National University of Rio Cuarto, Argentina, published research finding that glyphosate enhances the growth of fungi that produce aflatoxin B1, one of the most carcinogenic of substances.

A doctor from Chaco, Argentina, told Associated Press, “We’ve gone from a pretty healthy population to one with a high rate of cancer, birth defects and illnesses seldom seen before.” Fungi growths have increased significantly in U.S. corn crops.

Glyphosate has also done serious damage to the environment. According to an October 2012 report by the Institute of Science in Society:

“Agribusiness claims that glyphosate and glyphosate-tolerant crops will improve crop yields, increase farmers’ profits and benefit the environment by reducing pesticide use. Exactly the opposite is the case… [T]he evidence indicates that glyphosate herbicides and glyphosate-tolerant crops have had wide-ranging detrimental effects, including glyphosate resistant super weeds, virulent plant (and new livestock) pathogens, reduced crop health and yield, harm to off-target species from insects to amphibians and livestock, as well as reduced soil fertility.”

Politics Trumps Science

In light of these adverse findings, why have Washington and the European Commission continued to endorse glyphosate as safe? Critics point to lax regulations, heavy influence from corporate lobbyists, and a political agenda that has more to do with power and control than protecting the health of the people.

In the ground-breaking 2007 book Seeds of Destruction: The Hidden Agenda of Genetic Manipulation, William Engdahl states that global food control and depopulation became U.S. strategic policy under Rockefeller protégé Henry Kissinger. Along with oil geopolitics, they were to be the new “solution” to the threats to U.S. global power and continued U.S. access to cheap raw materials from the developing world.

In line with that agenda, the government has shown extreme partisanship in favor of the biotech agribusiness industry, opting for a system in which the industry “voluntarily” polices itself. Bio-engineered foods are treated as “natural food additives,” not needing any special testing.

Jeffrey M. Smith, executive director of the Institute for Responsible Technology, confirms that U.S. Food and Drug Administration policy allows biotech companies to determine if their own foods are safe. Submission of data is completely voluntary. He concludes:

“In the critical arena of food safety research, the biotech industry is without accountability, standards, or peer-review. They’ve got bad science down to a science.”

Whether or not depopulation is an intentional part of the agenda, widespread use of GMO and glyphosate is having that result. The endocrine-disrupting properties of glyphosate have been linked to infertility, miscarriage, birth defects and arrested sexual development.

In Russian experiments, animals fed GM soy were sterile by the third generation. Vast amounts of farmland soil are also being systematically ruined by the killing of beneficial microorganisms that allow plant roots to uptake soil nutrients.

In Gary Null’s eye-opening documentary Seeds of Death: Unveiling the Lies of GMOs, Dr. Bruce Lipton warns, “We are leading the world into the sixth mass extinction of life on this planet… Human behavior is undermining the web of life.”

The TPP and International Corporate Control

As the devastating conclusions of these and other researchers awaken people globally to the dangers of Roundup and GMO foods, transnational corporations are working feverishly with the Obama administration to fast-track the Trans-Pacific Partnership, a trade agreement that would strip governments of the power to regulate transnational corporate activities.

Negotiations have been kept secret from Congress but not from corporate advisers, 600 of whom have been consulted and know the details. According to Barbara Chicherio in Nation of Change:

“The Trans Pacific Partnership (TPP) has the potential to become the biggest regional Free Trade Agreement in history… The chief agricultural negotiator for the U.S. is the former Monsanto lobbyist, Islam Siddique. If ratified the TPP would impose punishing regulations that give multinational corporations unprecedented right to demand taxpayer compensation for policies that corporations deem a barrier to their profits. “They are carefully crafting the TPP to insure that citizens of the involved countries have no control over food safety, what they will be eating, where it is grown, the conditions under which food is grown and the use of herbicides and pesticides.”

Food safety is only one of many rights and protections liable to fall to this super-weapon of international corporate control. In an April 2013 interview on The Real News Network, Kevin Zeese called the TPP “NAFTA on steroids” and “a global corporate coup.” He warned:

“No matter what issue you care about—whether its wages, jobs, protecting the environment… this issue is going to adversely affect it…. If a country takes a step to try to regulate the financial industry or set up a public bank to represent the public interest, it can be sued.”

Return to Nature: Not Too Late

There is a safer, saner, more earth-friendly way to feed nations. While Monsanto and U.S. regulators are forcing GM crops on American families, Russian families are showing what can be done with permaculture methods on simple garden plots.

In 2011, 40% of Russia’s food was grown on dachas (cottage gardens or allotments). Dacha gardens produced over 80% of the country’s fruit and berries, over 66% of the vegetables, almost 80% of the potatoes and nearly 50% of the nation’s milk, much of it consumed raw. According to Vladimir Megre, author of the best-selling Ringing Cedars Series:

“Essentially, what Russian gardeners do is demonstrate that gardeners can feed the world – and you do not need any GMOs, industrial farms, or any other technological gimmicks to guarantee everybody’s got enough food to eat. Bear in mind that Russia only has 110 days of growing season per year – so in the U.S., for example, gardeners’ output could be substantially greater. Today, however, the area taken up by lawns in the U.S. is two times greater than that of Russia’s gardens – and it produces nothing but a multi-billion-dollar lawn care industry.”

In the U.S., only about 0.6 percent of the total agricultural area is devoted to organic farming. This area needs to be vastly expanded if we are to avoid “the sixth mass extinction.” But first, we need to urge our representatives to stop Fast Track, vote no on the TPP, and pursue a global phase-out of glyphosate-based herbicides and GMO foods. Our health, our finances and our environment are at stake.

Ellen Brown is an attorney, president of the Public Banking Institute and the author of twelve books, including the best-selling Web of Debt. In The Public Bank Solution, her latest book, she explores successful public banking models historically and globally. Her blog articles are at EllenBrown.com.

10 13 11 flagbar


Regional Scheme for the Pacific Rim The Trans-Pacific Partnership (TPP)

12/28/2013

http://www.thenewamerican.com/world-news/item/16347-regional-scheme-for-the-pacific-rim

This article is part of our special report “How the Free Trade Agenda Is Knocking Down America.” This report warns that the free trade agenda is a dangerous and deceptive bait and switch. The intent is not to create genuine free trade but to transfer economic and political power to regional arrangements on the road to global governance. Because of what is at stake, we encourage you to read the entire special report and to become involved. (click here for the PDF

fakegold-liberty

 By  William F. Jasper

With little fanfare or public notice, the Obama administration has pushed full speed ahead over the past year with negotiations on the Trans-Pacific Partnership (TPP), a so-called free trade agreement loaded with potential for enormous political and economic harm for Americans. The TPP, which currently involves 12 nations — Australia, Brunei, Canada, Chile, Malaysia, Mexico, New Zealand, Peru, Singapore, the United States, and Vietnam (Japan is negotiating for membership and is likely to join soon) — is really intended as an interim arrangement, on the road to an expanded Free Trade Area of the Asia Pacific (FTAAP) that would include all 21 nations of the grouping known as the Asia-Pacific Economic Cooperation (APEC). That includes China and Russia.
The architects and promoters of the TPP and FTAAP frequently point with admiration to the “integration” process of the European Union (EU) as the model they would like to see implemented for the Asia-Pacific rim nations. As with the Transatlantic Trade and Investment Partnership (TTIP), the Trans-Pacific Partnership has been designed to follow the EU example of relentless widening and deepening, constantly eroding national sovereignty, while building “transnational governance” that is not restrained by the checks and balances of national constitutions.

Secrecy vs. Transparency

If there is one word that is used more often than “reform” by governments, politicians, and international organizations — and abused even more frequently and egregiously — it is “transparency.” As with the United Nations and the World Trade Organization (WTO), the White House and the U.S. Trade Representative’s (USTR) office regularly proclaim their commitment to transparency while doing everything possible to hide their actions from their constituents. The USTR’s “Fact Sheet: Transparency and the Trans-Pacific Partnership” is intended to give the impression that the Obama administration is forthrightly providing the American people with all the up-to-date information they need to accurately evaluate the agreements that are being made in their name, and that would, if accepted by Congress, devastatingly impact their lives, their liberty, and their future.

The USTR “Fact Sheet” cites as evidence of its transparency efforts the number of consultations it has held with its selected trade advisory committees and privileged “Civil Society stakeholders.” It states, for instance:

Over the course of the TPP negotiations, USTR has conducted more than 147 meetings with the trade advisory committees. Since June 11, 2010, USTR has posted 110 TPP documents to a website for cleared trade advisors to review and provide comments.

This transparency boast actually exposes a dangerous feature of the TPP process: The TPP documents are not available to the average American citizen, only to “cleared trade advisors.” And who are the “cleared trade advisors”? According to the USTR, these are “representatives from industry, agriculture, services, labor, state and local governments, and public interest groups.” But, apparently, that does not include elected representatives of the American people, since members of Congress have been forced to plead, and threaten in order to get a peep at the secret TPP texts.

For instance, Senator Ron Wyden (D-Ore.), the chairman of the Senate Finance Committee’s subcommittee on International Trade, Customs, and Global Competitiveness, requested copies of the TPP draft documents but was stonewalled by the USTR. When Senator Wyden threatened to propose a measure in the Senate that would force transparency on the proc­ess, the USTR agreed to grant the senator a peek at the documents, though his staff was not permitted to see them. This type of secretive process has no legitimate place in our system of government, and it obviously puts Congress at a distinct disadvantage in the TPP process, since the real work of examining the detailed legal texts normally falls to congressional staff members who are often experts in particular areas of domestic and foreign policy.

Wyden spokeswoman Jennifer Hoelzer told the online Huffington Post that it was also “insulting” that members of Congress and their staff are denied access to documents that industry officials on the “cleared” trade advisory committees are given free access to. “I would point out how insulting it is for them to argue that members of Congress are to personally go over to USTR to view the trade documents,” Hoelzer said. But they are not allowed to make copies. However, Hoelzer pointed out, “An advisor at Halliburton or the MPAA [Motion Picture Association of America] is given a password that allows him or her to go on the USTR website and view the TPP agreement anytime he or she wants.”

The USTR has responded to mounting criticism over its “transparency deficit” with a PR campaign that has featured a succession of meetings and consultations with “stakeholders” that are substantively meaningless but give the appearance of democratic legitimacy. The USTR transparency fact sheet states:

USTR invited over 250 Civil Society stakeholders to a briefing held on June 19, 2012 and provided non-governmental organizations the opportunity to discuss specific issues with USTR negotiators.

Moreover, it says:

USTR will continue to engage with stakeholders to find ways to increase transparency in the TPP negotiations, while moving ahead toward an innovative, groundbreaking 21st-century trade agreement that will support more jobs for working Americans here at home.

The Controlled Opposition

The Obama administration’s standard response to any question or objection is to replay the all-purpose, shop-worn mantra that it — and the Bush and Clinton administrations before it — monotonously, mindlessly intones: “More trade equals more jobs and more prosperity…. More trade equals more jobs and more prosperity.” End of discussion, end of debate.

And when pressed into a corner, the TPP advocates will “engage” and “brief” a pre-selected coterie of activist stakeholders who constitute the usual controlled opposition. According to the USTR, these stakeholders are “leaders from the AFL-CIO, Citizens Trade Campaign, Coalition for a Prosperous America, the Emergency Committee for American Trade, Friends of the Earth, Grocery Manufacturers Association, Maine Citizens Trade Policy Commission, Public Citizen, and the Sierra Club — among others.”

This is the same lineup of “Civil Society Organizations” (CSOs) that is providing faux grassroots participation for the TTIP planned economic and political merger of the United States with the EU (see our article “EU/U.S. — Transatlantic Convergence“). No surprise there; we have seen the same CSO/NGO players engaged in the same deceptive games during the battles over the North American Free Trade Agreement (NAFTA), the Central American Free Trade Agreement (CAFTA), the Free Trade Area of the Americas (FTAA), the Security and Prosperity Partnership (SPP), the World Trade Organization (WTO), and the many other trade-agreement fights. The purpose of these sham opposition groups is to foster the false perception of widespread public involvement in the TPP process and strong public consensus for the TPP objectives. Even when these “opposition” groups publicly object to truly objectionable features of these trade agreements, it is usually for the wrong reasons, and invariably they argue that the proposed new trade authority be given more powers and go beyond trade issues to deal with the environment, labor, financial services, etc. By establishing themselves as the noisiest adversaries, and the only ones the establishment politicians and media deem credible, they successfully co-opt the opposition label and prevent any genuine opponents from rising to the fore. Then they can be counted on to fold, sell out, or walk out at the critical moment and leave the field wide open for passage of the agreement. Not surprisingly, virtually all of these ostensibly grassroots organizations are actually astro-turf groups funded by grants from government agencies, the big tax-exempt foundations, major corporations, and big labor unions.

The TPP proponents are only too happy to accommodate this fake vox populi; as with the TTIP, they are including virtually everything — including the kitchen sink — in the Trans-Pacific Partnership. The White House, the USTR, the State Department, and the private organizations promoting the TPP openly admit that this agreement is not simply a trade agreement, not simply about lowering tariffs. It encompasses — among other things — customs, telecommunications, investment services, technical barriers to trade, sanitary and phytosanitary measures, intellectual property, regulatory coherence, development, non-conforming measures and cross-border trade in services, rules of origin, competition, agriculture, textiles, and environment. Each of these “deepening” areas is pregnant with incredible potential for havoc.

What Are They Hiding?

As just one example of the enormous dangers that are lurking in the hundreds (or thousands) of pages of still-secret texts, consider the leaked TPP draft text on intellectual property that would threaten Internet freedom — as well as American sovereignty — with new TPP surveillance requirements. As The New American reported last year, the leaked document would mandate that TPP member nations enact regulations that require Internet service providers (ISPs) to privately enforce copyright protection laws. “Current U.S. law,” noted The New American’s Joe Wolverton, “specifically the Digital Millennium Copyright Act (DMCA), would be supplanted by TPP Article 16.3. This provision in the TPP draft document paves the way for a new copyright enforcement scheme that extends far beyond the limits currently imposed by DMCA.”

The Electronic Frontier Foundation pointed out the TPP threat to Internet freedom:

Private ISP enforcement of copyright poses a serious threat to free speech on the Internet, because it makes offering open platforms for user-generated content economically untenable. For example, on an ad-supported site, the costs of reviewing each post will generally exceed the pennies of revenue one might get from ads. Even obvious fair uses could become too risky to host, leading to an Internet with only cautious and conservative content.

The net effect would be to squeeze out the smaller, independent ISPs, further cartelizing our communications and news media, and eventually wiping out the burgeoning alternative Internet-based news media.

Another TPP draft document leaked last year would require the United States to agree to exempt foreign corporations from our laws and regulations. Foreign businesses could challenge any of our federal, state, or local laws and regulations as being unfair practices in restraint of trade. Who would adjudicate these types of cases? They would be decided by an international arbitration tribunal overseen by the secretary-general of the United Nations.

This is an all-out assault on national sovereignty, unconstitutionally transferring legislative powers from the U.S. Congress; state legislatures; and local, city, and county governments to unaccountable international bureaucrats, and judicial powers from our federal and state courts to black-robed TPP globalists. It would also confer huge advantages on foreign businesses and large multinationals, while concomitantly putting American businesses — especially small and medium-sized enterprises — at a competitive disadvantage. American businesses would remain shackled with the onerous regulatory burden of EPA, FDA, ADA, OSHA, etc., while their foreign competitors could operate here unimpeded by those same strictures.

How many more similar dangers (or worse) are hidden in the TPP texts? Based on what has already been leaked so far, should Congress not already be demanding total transparency, with full and immediate access to all of the TPP negotiation texts?

At the 12th round of TPP negotiations, held in Dallas, Texas, in May of 2012, stakeholder participants requested that the negotiation texts be made public so that stakeholders could formulate more informed evaluations, questions, and responses. How Barbara Weisel, assistant U.S. trade representative for Southeast Asia and the Pacific and the lead negotiator for the United States at TPP, replied to this reasonable request is chillingly instructive. According to the USTR’s own website, “Weisel said that while the U.S. position is that constantly evolving TPP chapter texts cannot be released to the public, the Office of the U.S. Trade Representative has been and remains committed to discussing in-depth with a wide range of stakeholders the formation of U.S. positions, the substance of negotiations as they take place, and how issues should be handled by negotiators as talks continue.”

The “TPP chapter texts cannot be released to the public”! That’s the Obama administration’s “transparency”!

From TPP to FTAAP

We mentioned at the beginning of this article that the TPP is actually intended as a door opener to an even larger and more ambitious Free Trade Area of the Asia Pacific (FTAAP). That is not merely the conjecture of this writer; U.S. officials and the original architects of the TPP have stated this explicitly.

A very important source of statements in this regard is the pro-TPP book published in January of this year by the Peter G. Peterson Institute for International Economics (PIIE), entitled Understanding the Trans-Pacific Partnership, coauthored by Jeffrey J. Schott, Barbara Kotschwar, and Julia Muir. The PIIE is one of the premier global think tanks and has played an especially important role in promoting the WTO, IMF, United Nations, and free trade agreements (FTAs), including NAFTA, CAFTA, TPP, and FTAAP. Schott, the primary author of the study, has been in the forefront of the establishment wonks designing and promoting FTAs. The PIIE study states (in Chapter 1):

Over time, the TPP is expected to evolve into a major integration arrangement covering most of the members of the Asia-Pacific Economic Cooperation (APEC) forum.

Again in Chapter 1, we find:

The TPP is regarded as an interim arrangement or stepping stone toward a broader, regionwide Free Trade Area of the Asia Pacific (FTAAP), possibly within a decade, as envisaged by APEC leaders in Bogor [Indonesia] in November 1994 and reaffirmed more recently by them in their meeting in Honolulu in November 2011. TPP negotiators are not only thinking about new countries joining the ongoing talks but also planning and constructing the trade pact with a view toward future linkages with other APEC members, including and especially China.

Chapter 6 of the PIIE book is revealingly entitled “Moving from TPP to FTAAP.” It declares:

The current TPP architects envision building an eventual FTAAP on the comprehensive foundations of the TPP accord, with other APEC countries joining the pact in coming years.

Perhaps the most important admissions in Understanding the Trans-Pacific Partnership are to be found in the book’s preface by PIIE’s director, C. Fred Bergsten. As much as anyone, Dr. Bergsten shepherded APEC and TPP into existence. “Twenty years ago,” Bergsten writes in the preface, “I chaired the Eminent Persons Group (EPG) established by the leaders of the Asia Pacific Economic Cooperation (APEC) forum to develop a long-term vision for economic integration of the region.”

Bergsten then goes on to note that “the seeds of a Free Trade Area of the Asia Pacific (FTAAP) began to take serious root about a decade ago, with proposals from APEC’s Business Advisory Council, and now have multiple green shoots — the biggest and sturdiest of which is the ongoing negotiation of the Trans-Pacific Partnership (TPP).”

Those familiar with Dr. Bergsten’s background and connections recognize that these admissions are all the more important because he, Schott, and the other PIIE authors are channeling the party line of the Council on Foreign Relations (CFR) and the Trilateral Commission (TC), two of the most influential globalist organizations pushing for a New World Order that envisions a global monetary authority and a world government under the United Nations. Bergsten is a longtime member and leading intellectual of both the CFR and TC. The PIIE is named for and chaired by Peter G. Peterson, a longtime chairman of the CFR. The PIIE board of directors and advisory board, as well as its roster of scholars and fellows, is a register of prominent CFR and TC members, including David Rockefeller, former chairman of the CFR and founder of the TC. Many of the PIIE’s leaders have held Cabinet positions in various administrations. Leading the Obama TPP/FTAAP effort are CFR/TC members Michael Froman (U.S. trade representative) and Robert Hormats (undersecretary of state).

During the George W. Bush administration, U.S. Trade Representative Susan Schwab (CFR) praised APEC at the organ­ization’s 2007 meeting in Cairns, Australia, and endorsed the FTAAP.

“FTAAP is a visionary proposal that APEC is well-suited to take on,” said Amb. Schwab. “By more effectively knitting together the dynamic economies of the region, an FTAAP would some day yield enormous social and commercial benefits for the people of the Asia-Pacific region, including the United States.”

The dangers of the TPP are becoming daily more obvious. The secrecy of the TPP negotiation process and the threats to national sovereignty that have already been exposed due to leaks of text drafts show it to be incompatible with our American constitutional system. The fact that its authors and promoters admit the TPP is just a “steppingstone” to an even more expansive and more dangerous FTAAP, should be sufficient to guarantee its defeat. However, defeating the TPP and FTAAP will require a coordinated, sustained effort by American patriots over the next few months to take this information to their fellow citizens. It will take — in the words of Samuel Adams — “an irate, tireless minority keen to set brush fires in people’s minds.” And then the heat and light from those brushfires must be directed at members of Congress so that they will honor their constitutional duty to stop the TPP.

11-28-2013 4-50-41 PMThe above article is part of our special report “How the Free Trade Agenda Is Knocking Down America.” This report warns that the free trade agenda is a dangerous and deceptive bait and switch. The intent is not to create genuine free trade but to transfer economic and political power to regional arrangements on the road to global governance. Because of what is at stake, we encourage you to read the entire special report and to become involved. (click here for the PDF

10 13 11 flagbar


The Unspoken Truth on 9/11: “September 11, The New Pearl Harbor”

12/27/2013

http://www.globalresearch.ca/the-unspoken-truth-on-911-september-11-the-new-pearl-harbor/5354760

Introduction by Jefferson’s Voice

We have many heroes in our midst and some of the most tireless and courageous are those who have been very active in the 9/11 Truth movement for over ten years.  It is impossible to overstate the importance of recognizing the magnitude of damage done to the American republic from the 9/11 false flag attack.  It was the fulcrum event launching the global war on terror resulting in the deaths of thousands of US soldiers, disabling many more, killing millions of innocent civilians in the middle east and devastating the lives of tens of millions.  The effects at home have been nothing short of catastrophic as (1) a steady metastasis of an encroaching police state eviscerates our Constitution and civil liberties; (2) a black hole of military expenditures accelerates America’s trajectory into fiscal insolvency; and (3) as an event that provided a smokescreen for large scale criminal activity to include financial and corporate crime.

The 9/11 false flag could be said to be the second major coup, after JFK’s assassination, to be foisted on a mostly unsuspecting American public ultimately intended to deprive us of our God given rights to freedom, dignity, and self determination, gifted to us by the greatest minds of the Enlightenment and the countless men and women who made the ultimate sacrifice for generations of Americans.  9/11 spawned a form of malignant cancer on our civilization that must be exposed now at this critical juncture in our collective history.

Thankfully, the 9/11 Truth movement is still working hard to educate the public and has written extensively and produced documentaries to that end.  The most recent 9/11 Truth film “September 11: The New Pearl Harbor” is a brilliant example, utilizing expert researchers who “knock it out of the ballpark” and thus shame disinformation propagandists as establishment buffoons.  While the subject matter is sobering, to say the least, never before have I relished an opportunity to cheer on the “good guys”.  Please watch the documentary in full and then share this with everyone you know and in as many internet forums and networks as you possibly can so we can come together as one voice to defend our basic human rights. 

May God bless those fighting the good fight for Truth, Justice, and Freedom.

Jefferson’s Voice

12-26-2013 11-11-16 PM

Go to this link and SAVE IT  then click on PLAY NOW

http://www.globalresearch.ca/the-unspoken-truth-on-911-september-11-the-new-pearl-harbor/5354760

Here are links from a different source in case there’s trouble with the above one.

 1/3 http://www.youtube.com/watch?v=tzxrsIGR9Lg
2/3 http://www.youtube.com/watch?v=dRVCBQ0DVuk
3/3 http://www.youtube.com/watch?v=ylvD–PJd5s

By David Ray Griffin

There have been several good films and videos about 9/11. But the new film by award-winning film-maker Massimo Mazzucco is in a class by itself.

For those of us who have been working on 9/11 for a long time, this is the film we have been waiting for.

Whereas there are excellent films treating the falsity of particular parts of the official account, such as the Twin Towers or WTC 7, Mazzucco has given us a comprehensive documentary treatment of 9/11, dealing with virtually all of the issues.

There have, of course, been films that treated the fictional official story as true. And there are films that use fictional stories to portray people’s struggles after starting to suspect the official story to be false.

But there is no fiction in Mazzucco’s film – except in the sense that it clearly and relentlessly exposes every part of the official account as fictional.

Because of his intent at completeness, Mazzucco has given us a 5-hour film. It is so fascinating and fast-paced that many will want to watch it in one sitting. But this is not necessary, as the film, which fills 3 DVDs, consists of 7 parts, each of which is divided into many short chapters.

These 7 parts treat Air Defence, The Hijackers, The Airplanes, The Pentagon, Flight 93, The Twin Towers, and Building 7. In each part, after presenting facts that contradict the official story, Mazzucco deals with the claims of the debunkers (meaning those who try to debunk the evidence provided by the 9/11 research community).

The Introduction, reflecting the film’s title, deals with 12 uncanny parallels between Pearl Harbor and September 11.

The film can educate people who know nothing about 9/11 (beyond the official story), those with a moderate amount of knowledge about the various problems with the official story, and even by experts. (I myself learned many things.)

Mazzucco points out that his film covers 12 years of public debate about 9/11. People who have been promoting 9/11 truth for many of these years will see that their labors have been well-rewarded: There is now a high-quality, carefully-documented film that dramatically shows the official story about 9/11 to be a fabrication through and through.

This is truly the film we have been waiting for.

Part I, II, and III

Availability: The film is freely available to the world at:

1. The film-maker’s own website, complete with detailed index:http://www.luogocomune.net/site/modules/sections/index.php?op=viewarticle&artid=167

OLDDOGS COMMENTS

This series of films should be watched by every person in America, and I mean if you do not do everything in your power to watch it and then demand everyone you know watch it, then you are not worthy of calling yourself an American. We can no longer tolerate the people sitting on their hands while America burns to the ground.

10 13 11 flagbar


THE CONVENTION OF STATES SCAM AND THE WAR OVER THE CONSTITUTION

12/23/2013

 http://www.newswithviews.com/Publius/huldah123.htm

By Publius Huldah

How the States Sold the Reserved Powers to the Feds

Our Constitution is a glorious document. This one page chart depicts the Structure of the federal government we created when we ratified our Constitution; and lists the “limited & enumerated powers” we delegated to the federal government over the Country at Large.

In a nutshell, our Constitution authorizes the federal government to handle the following objects for the Country at Large:

 Military defense, international commerce & relations;
 Control immigration & naturalization of new citizens;
 Domestically, to create a uniform commercial system: weights & measures, patents & copyrights, money based on gold & silver, bankruptcy laws, mail delivery & some road building; and
 With some of the amendments, secure certain civil rights.

Basically, that’s it. As stated in the 10th Amendmentall others powers are reserved by the States or The People.

But for 100 years, almost everyone in our Country has ignored our Constitution. Thus, instead of restricting spending to the enumerated objects of its powers, the people we send to Congress spend money on what anybody wants- and so gave us a debt of $17 trillion. Instead of restricting lawmaking to the enumerated objects of its powers, the people we send to Congress make laws on whatever they like. The President we elected tramples all over the Constitution; and due to the connivance, cowardice, and ignorance of Congress, the supreme Court, State governments, and the American People, is seizing totalitarian power.
WE are in terrible trouble.

And it is the phony right wing which is seducing the American People into taking the final jump off the cliff.

Michael Farris, head of the Convention of States[1]project, begins his video with this spiel:

“We all know that our government is way off track. The debt is astronomical and is going to cripple not only our own freedom and our own economy, but our children and our grandchildren are going to be effectively slaves, paying for all the things that we’re spending money on today.”

That part of his video is true.

But the purpose of their spiels is to make you believe they are on your side. You must look behind the spiels and think carefully about what they are proposing as “solutions”. Much is at stake:

THIS IS THE WAR over our Constitution and Country. And here are the two sides:

Learn & Enforce our Existing Constitution!

One side proposes that we learn & enforce our existing Constitution of limited & enumerated powers. We show that our Framers advised us to enforce our Constitution by (1) electing better representatives to annul the acts of the usurpers,[2] or by (2) nullification of unconstitutional acts.

To illustrate: What would our Country’s financial condition be if WE THE PEOPLE had enforced the enumerated powers on Congress?

It is the enumerated powers which list the objects on which Congress may appropriate funds:

 immigration office (Art. I, §8, cl.4)
 mint (Art. I, §8, cl. 5)
 Attorney General (Art. I, §8, cl. 6)
 post offices & post roads (Art. I, §8, cl. 7)
 patent& copyright office (Art. I, §8, cl. 8)
• federal courts (Art. I, §8, cl. 9)
 military (Art. I, §8, cls. 11-16)
 the civil list (Art. I, §6, cl.1)
 [and other objects listed in various other articles, sections, &clauses]

Do you get the idea? The Constitution itemizes what Congress is permitted to spend money on. See also the two geographical areas over which Congress was delegated “general legislative powers”: Art. I, §8, next to last clause, & Art. IV, §3, cl. 2).

The reason we have a debt of $17 trillion is because everyone ignored the Constitution; so Congress spent money on objects outside the scope of its enumerated powers.

Amend Away our Existing Constitution?

But the Randy Barnett[3]/ Rob Natelson/ Michael Farris/ Mark Levincamp want a “convention” so they can gut our existing Constitution by amending out the limited & enumerated powers with new amendments which grant general powers to the federal government; or they seek to re-write the Constitution altogether.

Here are illustrations of how the limited & enumerated powers can be amended out of our Constitution:

It has already been shown how the so-called balanced budget amendment would transform our Constitution from one of enumerated spending powers to one of general spending powers, where spending would be limited only by the amount of revenue the federal government generates or a certain percentage of the GDP.[4] But under our existing Constitution, the federal government’s expenditures are limited by the constitutional grants of authority – the enumerated powers. The problem is everyone ignores the enumerated powers – they never learned what they are!

Here is another illustration: Michael Farris, the grand master of The Spiel, has managed to convince many parents that the only way to protect their parental rights is an amendment to the Constitution which delegates to the federal and State governments constitutional power over their children!

And Mark Levin’s suggested amendments would gut our Constitution. Most increase the powers of the federal government by making constitutional what is now unconstitutional because it is not an enumerated power. The amendments pertaining to “overrides” undermine the Constitution as the objective standard of what is lawful and what is not – and substitute majority vote therefore. These “overrides” would erase the Constitution and replace it with majority (mob) rule.

Or is “re-writing the Constitution” their actual goal?

Farris says in the video:

“…sometimes what you need is not a change of personnel, you need a change of structure. The Founders understood the importance of structure…”

Does that give you cold chills?

How does Farris seek to change the structure?

Please – all of you – look at this one page chart which depicts The Structure of the federal government our Framers gave us: What needs changing? Isn’t enforcement what we need?

Jordan Sillars, Communications Director for Farris’ Convention of States Project, let the cat out of the bag:

On September 15, 2013, a discussion on my Face Book page was started about Mark Levin’s clamoring for a “convention of states.”

On or before September 19, Jordon Sillars posted a comment wherein he said:

… 3. I think the majority of Americans are too lazy to elect honest politicians. But I think some men and women could be found who are morally and intellectually capable of re-writing the Constitution…” [boldface mine].

On September 19 at 1:20 p.m., I responded:

“So, this really is about “re-writing the Constitution”, isn’t it?

And could you name these individuals who are “morally and intellectually capable of re-writing the Constitution”?”

Sillars thereafter deleted his comments, but not before I obtained a screen shot of his quoted comment which you can see here.

Why did he delete his comments?

Now let’s look more at what Farris says in his video:

The False Statements & Silly Arguments of the Proponents of a “convention of States”

1. After his introduction about the $17 trillion debt, Farris goes on to say:

The States have the power under Article V to call a convention of the States for the purpose of proposing amendments to the Constitution…”

His statement is false.

The Truth is the States have no authority to call the convention. That power is delegated to Congress. Article V says:

The Congress, whenever two thirds of both Houses shall deem it necessary, shall propose Amendments to this Constitution, or, on the Application of the Legislatures of two thirds of the several Statesshall call a Convention for proposing Amendments…” [emphasis mine]

Congress calls it. Not the States.

Furthermore, Dr. Edwin Vieira has pointed out:

‘The language “shall call a Convention for proposing Amendments” sets out a constitution duty in Congress. It embraces a constitutional power as well. That brings into play Article I, Section 8, Clause 18, which delegates to Congress the power “[t]o make all Laws which shall be necessary and proper for carrying into Execution the foregoing Powers [that is, in Article I, Section 8, Clauses 1 through 17], and all other Powers vested by this Constitution in the Government of the United States, or in any Department or Officer thereof”. The power to “call a Convention for proposing Amendments” is one of those “all other Powers”. Therefore, pursuant to that power, Congress may enact whatever “Law[ ] which shall be necessary and proper for carrying into Execution the * * * Power [to call a Convention]’.

So! Since Article V vests in Congress the power to call the convention; and since Article I, §8, last clause, vests in Congress the power to make all laws necessary & proper to execute its delegated powers;[5] Congress would be within its constitutional authority to organize the Convention anyway it wants, and to appoint whomsoever it wishes as delegates.[6]

Now look at this: The chart on Article V shows that James Madison, Father of our Constitution, remarked on the vagueness of the term, “call a Convention for the purpose”:

“How was a Convention to be formed? – by what rule decide? – what the force of its acts?” (Sep. 10); and “difficulties might arise as to the form, the quorum, & c., which in constitutional regulations ought to be as much as possible avoided”(Sep. 15, 1787).

Phyllis Schlafly also raised Twenty Questions about a Constitutional Convention.

Congress, pursuant to Article V and Article I, §8, last clause, has the constitutional power to answer all these questions by means of a law.

Folks! The Farris/Natelson/ Levin camp is not telling you the truth when they say the States decide these issues!

2. Farris then says in his video:

“…in Article V of the Constitution [the Founding Fathers] gave us the solution…”

“…they gave the power to the States to create a new set of rules when the federal government overstepped its boundaries. We can re-calibrate the rules to take power away from Washington D.C. and give it back to the people and to the States.”

His statements are both false and silly.

Here is the false part of what he said:

It was not the consensus at the Federal Convention of 1787 that the purpose of Article V was so States could make amendments to the Constitution in order to take power away from a federal government which had usurped power by violating the Constitution.

This chart shows what happened at the Federal Convention of 1787 re development of Article V.

Two delegates (Randolph & Mason, who didn’t sign the Constitution) supported the notion that amendments might be used if the national government should become oppressive. And they didn’t want Congress to have any power over amendment procedures. Their view was the minority view.

Other delegates (Gov. Morris, Hamilton & Madison) thought Congress ought to be able to propose amendments. One delegate (Mr. Gerry) worried about States obtaining a convention and binding the Union to innovations which subverted State Constitutions. Hamilton spoke of amendments to correct defects which would probably appear in the Constitution.

So the final version of Article V provides two methods of proposing amendments to the Constitution. Congress either:

 Proposes the amendments; or
 “Calls” a convention when the Legislatures of 2/3 of the States apply for it. [Now see Art. I, §8, last clause.]

Now for the silly parts of what Farris said (and there are two silly parts):

3. Farris tells us the solution to a federal government which “overstep[s] its boundaries” [violates the Constitution] is to amend the Constitution.

He proposes “to take power away from Washington D.C.”[power the federal government has usurped] by “re-calibrate[ing] the rules”.

In other words, the solution to a federal government which violates the Constitution is to amend the Constitution.

Do you see how silly this is?

4. Farris and his camp also imply that the States are victims of federal tyranny, and are the virtuous & wise ones who can fix our Country if they can just get a convention to propose amendments.

But the States are the ones who sold you out to the federal government in the first place! I’ll show you:

The 10th Amendment says:

“The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.”

What happened to these reserved powers?

The States sold them to the federal government.

Let’s use education as an illustration of how the States sold to the federal government your reserved power to educate your own children in the way you see fit.

The Creator God who, as recognized by our Declaration of Independence, endowed us with unalienable rights; assigned to parents the responsibility to provide for the education &moral instruction of their children: Proverbs 1:8-9, 6:20-21, 13:1, 22:6 & 23:19-22; Genesis 18:19; Deuteronomy 4:9-10 & 6:1-7; Ephesians 6:1-4; 2 Timothy 1:5 & 3:15-17.

Is “education” one of the enumerated powers delegated to the federal government for the Country at large? No. So the federal government has no constitutional authority to get involved. Accordingly, all acts of Congress pertaining to education for the Country at Large, the federal Department of Education, and all their rules & programs are unconstitutional as outside the scope of powers delegated to the federal government.

So why does the federal government dictate all things respecting education?

Because your States sold your God-given responsibility to educate your own children-and your reserved power to do so-to the federal government. This has been going on for a long time; but most recently your State sold you out for federal grants with the federal government’s “race to the top” and “common core” schemes.[7]

You have to be ignorant, unthinking,& gullible – a greenhorn -to believe that The States are the men in the white hats who can fix all this with a convention to propose amendments.

Conclusion

The federal government is not the problem – it is the result of our own ignorance, pride and folly.

WE THE PEOPLE, who are “the natural guardians of the Constitution” (Federalist No. 16, next to last para) didn’t trouble ourselves to learn the enumerated powers of Congress and the President. Do you know them?

I ask my Readers who have been supporting the “convention of States” scheme: Have you studied our Founding Principles set forth in The Declaration of Independence? Have you studied the text of the Constitution so that you know what it says?

If not, how are you qualified to know how to “fix” a Constitution you never learned?

Are you willing to stake your lives & liberties, and those of your progeny, on whether those in the Barnett/Natelson/Farris/ Levin camp (1) know what they are talking about, and (2) are telling the truth?

Why? Because you like them? Because they provide a scapegoat which permits you to blame-shift? And you think you can “get even”?

Wise voices in this Country are warning you about the scam. Foremost among them is Phyllis Schlafly, who has been warning of this danger for decades. Yet, such is the ignorant conceit of the greenhorns that they sneer at those who are warning them.

I trust you now see the connection between the moral corruption of a People and tyranny.

Endnotes:

1. Use your own head! Do not be manipulated by other peoples’ choice of words. Rob Natelson formerly referred to what he wants as a “constitutional convention”. Now, he calls it a “Convention of the States” – that is the term his cohorts & minions now use. Why did they change what they called it?
2. But our elections are no longer honest. The States took federal grant money to buy voting machines which can be rigged.
3. Randy Barnett’s “Bill of Federalism” is ten proposed amendments which would transform our Constitution from one of enumerated powers to one of general & unlimited powers. Mark Levin’s proposed amendments are similar to Barnett’s.
4. The GDP is computed by an agency in the Executive Branch. So under the BBA, spending would be limited by numbers under the control of the federal government: By how much they tax you; or by a number (GDP) the Executive Branch computes.You think that is a fine idea?
5. The Federalist Papers tell us what the “necessary & proper” clause (Art. I, §8, last clause) means: The clause delegates to Congress power to pass all laws necessary & proper to execute its declared powers (Federalist No. 29, 4th para); a power to do something must be a power to pass all laws necessary & proper for the execution of that power (Federalist No. 33, 4th para); “the constitutional operation of the intended government would be precisely the same if [this clause] were entirely obliterated as if [it] were repeated in every article” (Federalist No. 33, 2ndpara); and thus the clause is “perfectly harmless”, a tautology or redundancy. (Federalist No. 33, 4thpara). See also Federalist No. 44, 10th-17thparas. In other words, the clause permits the execution of powers already declared and granted. Do not be misled by Rob Natelson’s post on the “necessary & proper” clause! Why did Natelson ignore what The Federalist Papers say about this clause? Why did he fabricate the song & dance set forth in his post?
6. Think this through also: Even if Congress, as a matter of grace, permitted the States to appoint delegates, how would delegates from your State be chosen? Who controls your State? Would the powers in your State choose you? Or do you believe Michael Farris would choose the leaders?
7. This happened in your State because The People in your State elected to State government people who sold you out. See this website on federal grants: You think your State Legislators, who have been gobbling up all the federal grant money they can get, will fix our Country at a “convention” to propose amendments?

© 2013 Publius Huldah – All Rights Reserved

Publius Huldah is a retired attorney who now lives in Tennessee. Before getting a law degree, she got a degree in philosophy where she specialized in political philosophy and epistemology (theories of knowledge). She now writes extensively on the U.S. Constitution, using the Federalist Papers to prove its original meaning and intent. She also shows how federal judges and politicians have ignored Our Constitution and replaced it with their personal opinions and beliefs.

E-Mail: publiushuldah@gmail.com

10 13 11 flagbar


Farce of Globalism: World Bank Becomes Top Cop?

12/21/2013

 http://www.thedailybell.com/editorials/34855/Farce-of-Globalism-World-Bank-Becomes-Top-Cop/

Editorial,

The World Bank has a new mission. The Economic Times tells us that the World Bank has a new enemy to confront. It is not poverty but “corruption.”

Here’s more:

Corruption top foe in developing countries: World Bank … World Bank chief Jim Yong Kim said Thursday that corruption was the top problem faced by developing countries as he unveiled a new weapon to root out graft.

“In the developing world, corruption is public enemy number one,” Kim said at a conference at World Bank headquarters in Washington. “Every dollar that a corrupt official or a corrupt business person puts in their pocket is a dollar stolen from a pregnant woman who needs health care; or from a girl or a boy who deserves an education.”

Kim said the private sector should be “part of the solution.” “Oil, gas, and mining firms are increasingly disclosing their contracts with governments,” he said, providing “a chance” to monitor the activities of both corporate and public officials.

Kim announced that the World Bank will create a single pool of technical experts in rule of law, public sector, financial and state management, and public procurement as a major tool to fight corruption.

This is surely part of the evolution of internationalism, as we have been tracking it. How can you tell? Just look at the main elements of Western control set up after World War Two. Among them are the United NationsWorld BankIMF and NATO. Each of these organizations is continuously expanding. Also, we can tell by who created them that the Western banking establishment is behind them.

The Cold War, a somewhat manufactured crisis, in our opinion, was responsible for the expansion of NATO and the UN. “Caring” for impoverished countries and people was responsible for the expansion of the World Bank and NATO.

Of course, we know from various exposes that the IMF and World Bank do not deal directly with people they are supposed to be helping. Instead, their officials make deals with top bureaucrats. The bureaucrats are basically bribed to take huge handouts from the World Bank to “improve” public facilities, etc. When the expansions sour due to bribe taking and corruption, the bureaucrats in charge vanish, often to other countries or luxurious retirements on various tropical islands.

The next generation of bureaucrats is left to deal with the bitter dregs of wasted funding. Then the IMF swoops in to lend money at high cost to allow the country’s unsuspecting population to pay back IMF “loans.” Population after population has been rightfully shocked to find out that its countries are bankrupt and public facilities like waterworks are up for sale to the highest bidder.

Make that “low bidder,” as multinationals surreptitiously controlled by the globalist banking community pay very little for acquisitions. And then, of course, the prices of basic services are raised considerably to those who depend on them.

Thus vast corporate creatures – handmaidens of a global elite – are continually acquiring fundamental resources as they centralize power and authority to benefit a blossoming international governance. All this has been done behind the scenes, but now as what we call the Internet Reformation continues to expose the Way the World Really Works, those who are committed globalists have sped up the apparent takeover.

Every day it seems the IMF is more activist, with its top people rallying around the idea that the IMF should become the world’s central bank.

The UN meanwhile drives hundreds of leaders of various corrupt countries into vast conferences that produce global resolutions on everything from trade to environmentalism and, of course, the pseudo science of global warming.

And now, it seems, a new task has been found for the World Bank. It will be to clean up corruption.

The IMF is not suited to be the world’s central bank because monopoly central banks don’t work, because the IMF’s SDR scrip is inefficient and because the IMF generally is a corrupt and useless body, filled with grasping bureaucrats who understand quite well the gap between the IMF’s stated goals and reality.

The UN has always been an entirely corrupt body – an authoritarian, even fascist government in waiting. It is inefficient, wasteful, ruinous and just as hypocritical as the IMF or other world bodies. As for the World Bank, its corruption is so extensive that one is almost tempted to say it is indeed the organization that should monitor corruption worldwide because of its extensive internal experience.

Forbes magazine ran a fairly thorough article on the corruption inherent in the World Bank back in mid-2012 entitled, “World Bank Spins Out Of Control: Corruption, Dysfunction Await New President.”

… It’s presidential inauguration time in Washington. Not for the person who will helm the federal government – that comes in six months – but instead for Dr. Jim Yong Kim, the man taking the reins of an organization even more lumbering, and far less accountable: the World Bank.

With 188 member countries and an army of 9,000 employees and consultants, Kim will lead one of the world’s most powerful institutions – charged with saving the worlds poor – but also one of its most dysfunctional. It is an endlessly expanding virtual nation-state with supranational powers, a 2011 aid portfolio of $57 billion and little oversight by the governments that fund it. ‘

And – according to dozens of interviews over the past few weeks, atop hundreds more over the past five years, plus a review of thousands of pages of internal documents – problems have gotten worse, not better, at the World Bank despite more than a decade of reform attempts.

Kim, the Dartmouth College president tapped by President Obama to lead the bank, stands little chance of fixing things, say insiders, unless he is prepared to completely revamp the current system. The inmates are running the asylum, says a former director.

Some specific points from the article:

– Part of the problem is structural: Internal reports, reviewed by FORBES, show, for example, that even after Zoellick implemented a budget freeze some officials operated an off-budget system that defies cost control, while others used revolving doors to game the system to make fortunes for themselves or enhance their positions within the bank.

– Why not track all the cash? Good luck: Bank sources cite up to $2 billion that may have gone unaccounted for recently amid computer glitches.

– Sadly, the last part is cultural: The bank, those inside and outside it say, is so obsessed with reputational risk that it reflexively covers up anything that could appear negative, rather than address it.

– Whistle-blower witch hunts undermine the one sure way to root out problems at a Washington headquarters dominated by fearful yes-men and yes-women, who – wary of a quick expulsion back to their own countries – rarely offer their true opinions.

– In 2005 George W. Bush tapped Paul Wolfowitz as president to clean the place up. To his credit, Wolfowitz made rooting out corruption his primary mission. But the former Pentagon official also came in like an occupying power. According to internal documents obtained by FORBES, the board and Wolfowitz engaged in a game of trench warfare so vicious that the minutes of some board meetings had to be sanitized to keep the world from knowing what was really going on.

– Numerous managers and vice presidents that I spoke with inside the bank say that corruption continues unabated. Five years ago a commission led by Paul Volcker drilled into the bank and called it a massive problem.

We can see from the above that the idea of the World Bank leading the fight against international sociopolitical corruption is generally farcical.

And I have not even touched on the “transparency meme” being cultivated by the same rogues and rascals running these vast repositories of waste.

Central banks are trying very hard to be transparent, for instance, but their function is essentially one of criminal incompetence. No matter the stated reasons, central banks are in the business of bankrupting the middle class on a regular basis and then assuming those bankrupt assets at minimal cost.

The reason that these enormous global facilities are receiving more and more power and authority is not because they work well or even work at all. It is because the internationalists who set them up want them to expand as a way of building world government.

Call it directed history. These agents of globalism will continually acquire power no matter the reality of their missions. They were never what they appeared to be. In the 21st century, it becomes increasingly apparent as the Internet Reformation era advances.

10 13 11 flagbar


Federal Reserve 100 Years of Failure

12/19/2013

http://www.activistpost.com/2013/12/federal-reserve-100-years-of-failure.html

12-19-2013 11-46-16 AM

By James Hall

Researching economic publications on the first century of the Federal Reserve System provides a wealth of financial information that attempts to explain the way the central bank works. Rarely will the academic studies and official reports address the raw nature of a money creation by a private banking monopoly. The common practice of disparaging sources outside government or corporatist business circles, attempts to avoid addressing, much less confronting the plutocracy that controls the debt created money system.

One such source list of the ownership of the Federal Reserve, compiled by Thomas D. Schauf appears on The Federal Reserve Scam! However, before getting to the particulars of the actual families behind the central banking cabal, it is important to go directly to the source of the primary chronicler who investigated and exposed the scheme. The late, Eustace Mullins – Secrets of The Federal Reserve, video reveals the entire sordid background.

Now review 25 Fast Facts About The Federal Reserve You Need To Know, from ETF Daily News that advises investors. The way these items play into the central banking model practiced by all 187 nations that belong to the IMF, demonstrates that banksters of the most select rank, are behind continued debt bubbles that are strangling the world.

On the Left Hook site by Dean Henderson, a five part series on the Federal Reserve provides added documentation. Mr. Henderson cites from Part 1 in this series, The Federal Reserve Cartel: The Eight Families, “They are the Goldman Sachs, Rockefellers, Lehmans and Kuhn Loebs of New York; the Rothschilds of Paris and London; the Warburgs of Hamburg; the Lazards of Paris; and the Israel Moses Seifs of Rome.”

Watch the video above by G Edward Griffin Creature From Jekyll Island A Second Look at the Federal Reserve. Mr. Griffin explains the broad picture in simple and clear terms.

With such definitive information available and widely known within financial circles, why is the public so content to remain in the dark? They live under the aftermaths of the Federal Reserve is a Cache of Stolen Assets, but resign themselves to the oblivion of lost expectations and the burden of diminished opportunities.

Think about who really owns the land, the buildings and the resources in our country. In order to really understand the scope and extent of the economy, the differential between actual Main Street enterprise, that feeds, clothes and shelters the population, is minuscule when compared to the financial assets, both liquid and real property, that is under the command and control of the central bank.

The political class and the business establishment simply refuse to buck the controllers of the currency. Attempts for a Jackals of Jekyll Island – Federal Reserve Audit, are pushed aside because any accountability for the Fed would ripple throughout the entire world fiat paper banking system. “The FED’s grip on the global moneychangers’ racket is based upon maintaining the U.S. Federal Reserve funny money, as the reserve currency for the planet. The value and worth of Treasury Bills and Bonds are on the path to have the value of.

12-19-2013 11-46-52 AM

Reichsbank marks. Recognize the enemy that is destroying the country and world economy.”The Cato Institute provides a working paper, Has the Fed Been a Failure?, that traces the history, avowed mission and actual results of the Federal Reserve System. This scholarly approach acknowledges that other financial frameworks are “relatively easy to identify viable alternatives to the adoption of the Federal Reserve Act in 1913.”

“However, recent work suggests that there has been no substantial overall improvement in the volatility of real output since the end of World War II compared to before World War I . . . the Fed cannot be credited with having reduced the frequency of banking panics or with having wielded its last-resort lending powers responsibly. In short, the Federal Reserve System, as presently constituted, is no more worthy of being regarded as the last word in monetary management than the National Currency System it replaced almost a century ago.”

Lastly, the essay, Who Owns The Federal Reserve?, by Ellen Brown, substantiates that the “Fed is privately owned, and its shareholders are private banks. In fact, 100% of its shareholders are private banks. None of its stock is owned by the government.”

Since the adoption of a private banking, money creation venture, the dollar has lost virtually its entire store of value. The currency has lost its universal acceptance, as multiple alternatives circulate to replace its reserve status.

The Federal Reserve’s First 100 Years: A Dismal Record by Dan Ferris, identifies the ultimate consequence of the stewardship under a central bank. “The century prior to the Fed, despite setbacks, was a century of improvement in the dollar’s value. The century after it, despite enormous gains in productivity, was a century of rampant Federal Reserve destruction of the dollar’s value.”

This failure to maintain and preserve the integrity of the dollar is no accident. The actual purpose of the architects of the Federal Reserve System has never changed. Consolidate the control of money into a concealed cartel of banking houses that ultimately decide economic and political policy.

Dispensing of credit to corporatist projects, owned or run by reliable operatives of the cabal is the objective. The only beneficiaries are the original stockholders.

“Under the terms of the Federal Reserve Act, public stock was only to be sold in the event the sale of stock to member banks did not raise the minimum of $4 million of initial capital for each Federal Reserve Bank when they were organized in 1913 (12 USCA 281). Each Bank was able to raise the necessary amount through member stock sales, and no public stock was ever sold to the non-bank public.”

For the rest of Americans, the Federal Reserve conspiracy is an ongoing theft syndicate. It only takes the will to admit the undeniable. Without the courage to abolish this usury monster, the next century will witness the total destruction of the country.

Original article archived here

James Hall is a reformed, former political operative. This pundit’s formal instruction in History, Philosophy and Political Science served as training for activism, on the staff of several politicians and in many campaigns. A believer in authentic Public Service, independent business interests were pursued in the private sector. Speculation in markets, and international business investments, allowed for extensive travel and a world view for commerce. Hall is the publisher ofBREAKING ALL THE RULES. Contact batr@batr.org

10 13 11 flagbar