Archive for July, 2019

TBR News July 21, 2019

Jul 21 2019 Published by under Uncategorized

The Voice of the White House Washington, D.C. July 21, 2019:

“Working in the White House as a junior staffer is an interesting experience.

When I was younger, I worked as a summer-time job in a clinic for people who had moderate to severe mental problems and the current work closely, at times, echos the earlier one.

I am not an intimate of the President but I have encountered him from time to time and I daily see manifestations of his growing psychological problems.

He insults people, uses foul language, is frantic to see his name mentioned on main-line television and pays absolutely no attention to any advice from his staff that runs counter to his strange ideas.

He lies like a rug to everyone, eats like a hog, makes lewd remarks to female staffers and flies into rages if anyone dares to contradict him.

His latest business is to re-institute a universal draft in America.

He wants to do this to remove tens of thousands of unemployed young Americans from the streets so they won’t come together and fight him.

Commentary for July 21:” Climate change over the next 5-10 years could result in a global catastrophe costing millions of lives in wars and natural disasters..

A secret report, suppressed by US defense chiefs warns that major European cities will be sunk beneath rising seas as Britain, Canada and the northern tier states of the United Sates are  plunged into a ‘Siberian’ climate by 2020-2015. Nuclear conflict, mega-droughts, famine and widespread rioting will erupt across the world.

The document predicts that abrupt climate change could bring the planet to the edge of anarchy as countries develop a nuclear threat to defend and secure dwindling food, water and energy supplies. The threat to global stability vastly eclipses that of terrorism, say the few experts privy to its contents.

‘Disruption and conflict will be endemic features of life,’ concludes the Pentagon analysis. ‘Once again, warfare would define human life.’

The findings will prove humiliating to the Trump administration, which has repeatedly denied that climate change even exists. Experts said that they will also make unsettling reading for a President who has insisted national defense is a priority.”


The Table of Contents

  • Nadler: Mueller has evidence of Trump high crimes and misdemeanours
  • Of course Donald Trump is a racist – and his Wall Street enablers know it
  • Racism Is an Impeachable Offense
  • Blockades and International Law
  • Hong Kong protesters back on streets after explosives discovery
  • Encyclopedia of American Loons
  • The CIA Confessions: The Crowley Conversations
  • Pentagon preparing for mass civil breakdown 

Continue Reading »

No responses yet

TBR News July 20, 2019

Jul 20 2019 Published by under Uncategorized

The Voice of the White House Washington, D.C. July 20, 2019:

“Working in the White House as a junior staffer is an interesting experience.

When I was younger, I worked as a summer-time job in a clinic for people who had moderate to severe mental problems and the current work closely, at times, echos the earlier one.

I am not an intimate of the President but I have encountered him from time to time and I daily see manifestations of his growing psychological problems.

He insults people, uses foul language, is frantic to see his name mentioned on main-line television and pays absolutely no attention to any advice from his staff that runs counter to his strange ideas.

He lies like a rug to everyone, eats like a hog, makes lewd remarks to female staffers and flies into rages if anyone dares to contradict him.

His latest business is to re-institute a universal draft in America.

He wants to do this to remove tens of thousands of unemployed young Americans from the streets so they won’t come together and fight him.

Commentary for July 20:”Bolton is a complete lunatic. He is frantic to make war on anyone he dislikes and has no interest in any consequences. He was sacked from the government once for his nutty behavior but now he is back, hissing in the wings like a furious snake and Fat Donald, who has the intellectual capacity of a chicken, listens to him. And he listens to the even weirder Jesus Freaks. And the public pays the bill from their viciousness and stupidity. The clock is ticking, however.”

The Table of Contents

  • How Trump’s arch-hawk lured Britain into a dangerous trap to punish Iran
    • Point
  • Germany: Merkel commemorates Hitler assassination plot 75 years after ‘Operation Valkyrie’
    • Counterpoint
  • The Truth Emerges
  • Encyclopedia of American Loons
  • The CIA Confessions: The Crowley Conversations

Continue Reading »

No responses yet

TBR News July 19, 2019

Jul 19 2019 Published by under Uncategorized

The Voice of the White House Washington, D.C. July 19, 2019:

“Working in the White House as a junior staffer is an interesting experience.

When I was younger, I worked as a summer-time job in a clinic for people who had moderate to severe mental problems and the current work closely, at times, echos the earlier one.

I am not an intimate of the President but I have encountered him from time to time and I daily see manifestations of his growing psychological problems.

He insults people, uses foul language, is frantic to see his name mentioned on main-line television and pays absolutely no attention to any advice from his staff that runs counter to his strange ideas.

He lies like a rug to everyone, eats like a hog, makes lewd remarks to female staffers and flies into rages if anyone dares to contradict him.

His latest business is to re-institute a universal draft in America.

He wants to do this to remove tens of thousands of unemployed young Americans from the streets so they won’t come together and fight him.

Commentary for July 19:”Trump will not shut up concerning the liberal women in Congress. A number of Republicans in Congress are growing increasingly restive about Trump’s loose mouth and he has been discreetly advised to dummy up. Of course he won’t and the result will be a defection on the part of Republicans that will be coming up for reelection next year. Trump is far too stupid to realize what he is doing and he does not realize that it might be effective to fool others, one ought not fool oneself.”


The Table of Contents

  • Is a New US Mideast War Inevitable?
  • America stumbling towards civil war one terrible tweet at a time
  • Allies play hard to get on U.S. proposal to protect oil shipping lanes
  • Here’s Trump hating on America. Is it time for him to leave?
  • German churches lose 430,000 Catholic and Protestant members in 2018
  • Encyclopedia of American Loons
  • The CIA Confessions: The Crowley Conversations
  • Analysis: Threat from disease weapons

Continue Reading »

No responses yet

TBR News July 18, 2019

Jul 18 2019 Published by under Uncategorized

The Voice of the White House Washington, D.C. July 18, 2019:

“Working in the White House as a junior staffer is an interesting experience.

When I was younger, I worked as a summer-time job in a clinic for people who had moderate to severe mental problems and the current work closely, at times, echos the earlier one.

I am not an intimate of the President but I have encountered him from time to time and I daily see manifestations of his growing psychological problems.

He insults people, uses foul language, is frantic to see his name mentioned on main-line television and pays absolutely no attention to any advice from his staff that runs counter to his strange ideas.

He lies like a rug to everyone, eats like a hog, makes lewd remarks to female staffers and flies into rages if anyone dares to contradict him.

His latest business is to re-institute a universal draft in America.

He wants to do this to remove tens of thousands of unemployed young Americans from the streets so they won’t come together and fight him.

Commentary for July 18:”Here, in toto, is a copy of a document someone gave to me at lunch. It represents an on-going plan on the part of radical Christian Republicans to control the next presidential elections. Worth reading!-

Postponement and Rescheduling of Elections to Federal Office

Because of the fear of possible terrorist attacks which could be directed at election facilities or voters in the States just prior to or during the elections in a presidential election year, attention has been directed at the possibility/authority to postpone, cancel or reschedule an election for federal office.


There is no provision in the United States Constitution which currently authorizes in express language any federal official or institution to “postpone” an election for federal office. The Constitution expressly devolves upon the States the primary authority to administer within their respective jurisdictions elections for federal office, with a residual and superceding authority within the United States Congress over most aspects of congressional elections (other than the place of choosing Senators), and with express authority in Congress over at least the timing of the selections of presidential electors in the States. As to the time set for holding elections under this express constitutional authority, Congress has legislated, originally in 1845, a uniform date for presidential electors to be chosen in the States, and in 1872, a uniform date for congressional elections across the country, which are to be on the Tuesday immediately following the first Monday in November in the particular, applicable even-numbered election years.

In addition to the absence of specific constitutional direction, there is also no federal law which currently provides express authority to “postpone” an election, although the potential operation of federal statutes regarding vacancies and the consequences of a State’s failure to select on the prescribed election day may allow the States to hold subsequent elections in “exigent” circumstances. A handful of States have provided in State law express authority to postpone or reschedule elections within their jurisdictions based on certain emergency contingencies, and others have provided general emergency provisions which might be applicable to election situations.

As to potential disruptions on election day, particularly in regard to the presidential election, some of the confused scenarios and proposed solutions appear to stem from a common misconception of the presidential election as being in the nature of a national referendum. The presidential election, however, is in reality a series of State (and District of Columbia) elections for presidential electors from that State (or jurisdiction) that the Congress has mandated, since 1845, to be held on the same day throughout the country. Consonant with the States’ authority over the administration and procedural aspects of elections to federal office within their jurisdictions, is the initial responsibility for resolving issues of challenges and recounts in those elections. This authority and these procedures may be relevant in the case of disruptions, insurrection or violence at the polling places on election day which could conceivably cast into question the efficacy and legitimacy of a particular election result in that jurisdiction.

It should be emphasized that while the States have the initial authority, or the “first cut” at resolving disputes and recounts in their respective jurisdictions regarding elections to federal office, the Constitution expressly provides that the final authority over the elections and returns of its own Members lies exclusively in each House of Congress. As to the elections for presidential electors, the Constitution expressly gives to the Congress the task of counting the electoral votes for President. Implicit within this explicit authority to count the electoral votes has been the practical necessity to determine which electoral votes to count. While Congress has established procedures and rules for counting the electoral votes and resolving disputed lists of electors, Congress has, by statute, specifically given the States a “safe harbor” time within which to formally resolve presidential electoral disputes, prior to the meeting of the Electoral College in December, which then would be considered “conclusive” upon the Congress in counting those electoral votes for President.

Timing of Federal Elections

The United States Constitution does not require a uniform election date in the States for elections to the House or Senate, or for the selection of presidential electors. Rather, this has been done by Congress by the enactment of federal law. The Constitution, while declaring in the “Times, Places and Manner” clause (Article I, Section 4, clause 1) that the States have the general authority over the administration of even federal elections within their respective jurisdictions, expressly provides that the Congress may supercede any State provision regarding, among other things, the timing of congressional elections, and further provides that Congress may establish the time for the election of presidential electors in the States. (Article II, Section 1, clause 4). Under these authorities, Congress has established uniform dates for the general elections to federal office within the States, which now are mandated to be held on the first Tuesday next following the first Monday in November in the appropriate even-numbered years.

It was not until 1845 that a uniform date for electing presidential electors in the States was mandated by Congress. Before then, the timing for selecting presidential electors could and did vary from State to State. Congress in 1844 and 1845 was, however, concerned about the allegations of fraud and corruption in the previous election (1840) for electors for President and Vice President in several States. It was asserted that some of the particular misconduct in that election appeared to have been encouraged, in part, because the States had differing dates for the presidential election, which allowed the alleged movement of populations and voters to key States having later elections (described as “pipelaying”). Congress sought to eliminate such opportunities for fraud and corruption by establishing a uniform day throughout the country for selecting the electors for President and Vice President, while assuring that those States that required an absolute majority to elect could continue to hold a run-off for presidential electors if needed in an election on a subsequent date. The uniform date for congressional elections in the States was not established by the Congress until 1872. In first enacting this legislation, the Congress appeared to be concerned primarily with two factors, that is, the potential undue and unfair influence on elections in some States that earlier results and elections in other States may routinely have; and the burden on voters who in some States would have to go to the polls twice for two different general elections to choose federal officers in presidential election years.

Current Federal Authority to Postpone

As noted, the United States Constitution does not provide any express authority to any federal official or institution to postpone an election for federal office in a particular State, or in all of the States. Specifically, there is no current constitutional authority residing in the President of the United States, nor the executive branch of. Government, to postpone, cancel, or reschedule elections for federal office in the various States. There might certainly be some potential emergency powers inherent in the President of the United States, as well as those delegated by statute, but there is no precedent for such powers being applied with respect to elections held in the various States for presidential electors, authority over which, as to the procedures and methods, has been expressly delegated in the Constitution to the States. It is possible that some scenarios could be imagined, however, where attacks, disruptions and destruction are so severe and so dangerous in certain localities, particularly in crowded urban areas, that the President under a rule of necessity may look to protect the public safety by federalizing State national guard and restricting movement and activities in such areas which would obviously affect the ability to conduct an election at those sites. Unlike the President, Congress does have explicit constitutional authority over elections to federal office which is of an express, residual nature concerning congressional elections, and a broad implicit authority recognized by the Supreme Court to legislate to protect the integrity and proceedings of presidential elections, as well as express authority over the date of the selection of presidential electors. Congress could, therefore, pass legislation regarding dates, and emergency postponements and/or rescheduling times for elections to federal offices. The courts have recognized an expansive authority in the Congress to “provide a complete code” for federal elections within the States, including presidential elections, and, within the parameters of the specific dates for the length and terms of federal offices established within the Constitution, could exercise its legislative discretion with regard to emergency scheduling and rescheduling. As noted by the Supreme Court earlier in our history with regard to Congress’ authority over the conduct of elections for federal office in the States:

That a government whose essential character is republican, whose executive head and legislative body are both elective … , has no power by appropriate laws to secure this election from the influence of violence … is a proposition so startling as to arrest attention and demand the gravest consideration.

If this government is anything more than a mere aggregation of delegated agents of other States and governments, each of which is superior to the general government, it must have the power to protect the elections on which its existence depends from violence and corruption.

Furthermore, in theory, Congress could also enact a law delegating to the executive certain authority in this area regarding emergency rescheduling. However, as a policy matter, and under Article I, Section 4, clause 1, and Article II, Section 1, clause 2, Congress has traditionally allowed the States, within the framework of the federal constitutional and statutory mandates, to exercise the substantive control over the procedures and administrative details of elections within their own respective jurisdictions, and the States have then generally further devolved immediate administrative and supervisory control over many election procedures to local and county authorities within their jurisdictions. This policy has generally recognized the principle that because of the varying political cultures, practices and traditions across the nation, and from State-to-State, that operational authority over most of the election mechanics is more efficiently left to the States and localities.

It should be noted, and as discussed in more detail in following sections, that there are existing provisions under current federal law regarding a failure of a State to make a selection on the prescribed election day with regard to both congressional elections (2 U.S.C. § 8) and presidential elections (3 U.S.C. § 2), which have traditionally left the details of such decisions up to the States.

State Authority Over Election Procedures and Administration

State Authority Under United States Constitution.

There is under our federal system of shared sovereignty a division of jurisdiction and authority which occurs in the case of elections to federal office under the provisions of the United States Constitution. In the first instance, the terms of federal offices and the qualifications of candidates eligible for federal offices are established and fixed by the agreement of the States within the instrument which created those offices, that is, the United States Constitution, and are thus unalterable by the Congress alone or by any State unilaterally. The Constitution expressly provides, however, that the individual States have the authority to administer elections for federal congressional office, while providing that Congress may generally supercede any such regulations. The Supreme Court has described this “Times, Places and Manner” clause of Article I, Section 4, as a “default provision; it invests the States with responsibility for the mechanics of congressional elections … but only so far as Congress declines to pre-empt state legislative choices.” The State legislatures have express authority over the “manner” in which presidential electors in their State are to be chosen. Within certain constitutionally prescribed parameters, the States are also responsible to establish the qualifications for voting in their States in federal elections. Finally, as to its own Members, the Constitution provides that each House of Congress expressly retains the authority to be the final judge of the results of their elections and constitutionally prescribed qualifications, and the Congress, in joint session, is assigned in the Constitution the duty to count the electoral votes for President and to declare the winner.

Under the States’ “Times, Places and Manner” authority in the Constitution, the States may promulgate a broad range of regulatory and administrative provisions over the mechanics and procedures even for federal elections within their States regarding such things as forms of the ballots, “ballot access” by candidates (including new party or independent candidates), voting procedures, and the nominating and electoral process generally, to prevent election fraud, voter confusion, ballot overcrowding, the proliferation of frivolous candidates, and to facilitate proper election administration..

The States’ procedural and administrative authority over elections within their jurisdictions, including elections to federal office, includes the initial authority over election contests, protests and recounts. As noted by the Supreme Court in Roudebush v. Hartke, even though the Constitution expressly gives each House of Congress the final authority over the elections and returns of it own members (Article I, Section 5), a State may adopt contest and recount provisions as one of the “safeguards which experience shows are necessary in order to enforce the fundamental right involved.” The Court noted there:

Indiana has found, along with many other States, that one procedure necessary to guard against irregularity and error in the tabulation of votes is the availability of a recount. … A recount is an integral part of the Indiana electoral process and is in the ambit of the broad powers delegated to the States by Art. I, § 4.

It is true that a State’s verification of the accuracy of election results pursuant to its Art. I, § 4, powers is not totally separable from the Senate’s power to judge elections and returns. But a recount can be said to “usurp” the Senate’s function only if it frustrates the Senate’s ability to make an independent final judgment. A recount does not prevent the Senate from independently evaluating the election any more than the initial count does. The Senate is free to accept or reject the apparent winner in either count, and, if it chooses, to conduct its own recount.

As to the presidential election, the State legislatures are granted express authority over the manner in which presidential electors are to be chosen. Article II, Section 1, clause 2. Although there remains continued controversy over the Supreme Court’s ruling in Bush v. Gore, where a federal court intervened to stop a State ordered recount of the vote for presidential electors in Florida in 2000, the Court’s per curium opinion left intact and affirmed, at least in theory, a State legislature’s authority under the United States Constitution to enact protest or contest statutes and provisions regarding elections for presidential electors, although the implementation of that procedure as directed by the Florida courts was found by a majority of the Supreme Court to be violative of the equal protections and due process requirements of the United States Constitution. The primacy under the United States Constitution of the States’ legislatures in establishing the mechanisms for appointment of presidential electors and in fashioning recount and protest statutes was also emphasized by the Supreme Court in the decision preceding Bush v. Gore, that is, Bush v. Palm Beach County Canvassing Board, which had remanded back to the State courts the issue of the recount proceedings in the Florida presidential election of 2000.

Authority Under State Law to Postpone or Reschedule.

There are several State provisions which currently purport to give to certain specified State officials the authority to “postpone” or to reschedule an election within the State, prior to the holding of an election, for a number of emergency and exigent circumstances. Furthermore, other States may have general emergency powers which might be used, and might be broad enough, to allow the Governor or other State executive official to take action which may effect a postponement of an election. Because of the increased awareness of the threat from terrorists and terrorist organizations, State legislatures may in the future consider the adoption of additional provisions which set out the considerations and circumstances for the declaration of a postponement and/or rescheduling of an election within their jurisdiction, including elections to federal offices.

Conformance With Federal Law.

Does a State law or order instituting a rescheduling of an election to federal office within that State impermissibly affect the date of such election in contravention of the federal laws that have established election day for federal offices to be the first Tuesday after the first Monday in November?

Congressional Elections. The federally established date for elections for federal office, while it is clearly mandatory and not merely advisory, may not necessarily be an “absolute,” such that no election subsequent to that date could be or should be recognized. In fact, as noted, the federal statutory scheme in the case of congressional elections specifically provides for the contingency of a “vacancy” in the State delegation, whether that vacancy is caused by death, resignation or incapacity, or by a “failure to elect at the time prescribed by law,” by authorizing another time for the election to be prescribed by State law:

2 U.S.C. § 8. Vacancies The time for holding elections in any State, District, or Territory for a Representative or Delegate to fill a vacancy, whether such vacancy is caused by a failure to elect at the time prescribed by law, or by the death, resignation, or incapacity of a person elected, may be prescribed by the laws of the several States and Territories respectively.

The Supreme Court of the United States has found that the day established in 2 U.S.C. § 7 for electing Senators and Representatives in the States is a mandatory date, and that a State’s statutory scheme may not permissibly allow the “election” of such a federal official at an election held prior to the first Tuesday after the first Monday in November date. Thus, the Louisiana election provisions which designated as “elected” to Congress an open primary winner who received at least a majority of the votes cast in that primary election held prior to the general election, was found to be a violation of the federal law setting the general election date. States that allow “early voting” in federal elections, however, have not been found by federal courts to be holding a prior election in violation of the federal statute since it was found that the election would not be “consummated” before election day, or that such ballots would not be officially counted or tallied before election day.

Federal courts interpreting the federal statutes regarding the timing of elections to Congress have noted that the States’ scheme for elections must be in general conformance with the date prescribed by federal law, at 2 U.S.C. § 7, and may not routinely allow the election on an earlier date, but that certain “exigent” circumstances may permit the holding of an election for federal office at a subsequent time under 2 U.S.C. § 8.  The Federal court in the District of Columbia in Busbee v. Smith, in a case affirmed by the United States Supreme Court, found that an exigent circumstance, such as the State of Georgia’s reapportionment plan being refused preclearance by the Justice Department under the Voting Rights Act of 1965 because of “discriminatory effects,” allowed for an election to federal office in two congressional districts to be held on a subsequent date:

…[W]here exigent circumstances arising prior to or on the date established by [2 U.S.C.] section 7 preclude holding an election on that date, a state may postpone the election until the earliest practicable date. In this case, for example, Georgia will “fail[ ] to elect at the time prescribed by law” because its purposefully discriminatory conduct prevented it from securing Section 5 approval for constitutionally required changes in its voting procedures. As a result, we believe, that [2 U.S.C.] section 8 permits a reasonable postponement of the elections in the Fourth and Fifth Congressional Districts.

This reasoning, as noted later by another federal court, would allow for the postponement of an election, and the holding of the election for federal office in the State at a later date, for a number of possible “exigent” circumstances, including. “natural disasters” such as hurricanes, tied votes, or fraud. This federal court in Georgia found that the State’s statutory requirement that a candidate to be elected receive a majority, and not merely a plurality, of votes in the general election, was such an exigent circumstance that could require the holding of a subsequent run-off election for Senator to be held on November 24, after the earlier November general election mandated by 2 U.S.C. § 7 resulted in no candidate receiving a majority of the votes:

The court in Busbee acknowledged that 2 U.S.C. § 8 allows States, under certain circumstances, to hold elections at times other than those prescribed by section 7. Id. at 524-25. In addition to the circumstances it specifically enumerates — death, resignation, personal incapacity — section 8 allows states to reschedule elections “where exigent circumstances arising prior to or on the date established by section 7 preclude holding an election on that date.” Id. at 525. The court offered natural disasters, and the parties to the instant suit offer fraud and a tie vote as examples of ‘exigent’ circumstances warranting state rescheduling.

Elections for Presidential Electors.

The election for presidential electors presents somewhat different issues than those elections for congressional office, as the language of the federal statutes for presidential electors varies from the language governing congressional elections. The statute concerning the timing and scheduling for congressional elections provides expressly that when there is a vacancy caused by death, resignation or incapacity, or when “such vacancy is caused by a failure to elect at the time prescribed by law,” then a subsequent election may be scheduled. This language appears to be broad enough and, as noted above, has been interpreted by federal courts to actually permit a temporary postponement and rescheduling of a congressional election. The federal statute for presidential elections, however, expressly states that “[w]henever any State has held an election for the purpose of choosing electors,” but fails to “make a choice on the day prescribed by law,” then the electors may be selected on a subsequent day in the manner established by the legislature of the State:

3 U.S.C. § 2. Failure to make choice on prescribed day Whenever any State has held an election for the purpose of choosing electors, and has failed to make a choice on the day prescribed by law, the electors may be appointed on a subsequent day in such a manner as the legislature of such State may direct.

Does the wording of 3 U.S.C. § 2 mean that the authority of the States to reschedule an election for presidential electors is contingent upon the State actually having “held an election for the purpose of choosing electors”? If so, then under this theory no prior postponement and rescheduling would be permitted State-wide, even a postponement for natural disasters such as an impending hurricane, or the destruction shortly prior to the elections of a number of polling places, since it would conflict with the federally scheduled time in 3 U.S.C. § 2..

Certainly, if a scheduled election is being held when terrorist or other types of attacks are conducted on voting places, destroying certain polling places in various precincts and disrupting the election generally in a State, then the power of the State to find under its general election contest and challenge procedures that the results of the election, because of such disruptions, are not viable or valid, and that, either a new election, or a continuation of the election (whereby those people who were not certified by election officials as having already voted could come to vote at a subsequent time), would appear to be in conformance with federal law, both at 2 U.S.C. § 8 (for congressional elections), as well as 3 U.S.C. § 2, in the case of the election of presidential electors. In such cases, the State had clearly “held an election,” but a choice was not necessarily made because the State has determined that the results could not fairly be ascertained.

However, if there is a disruption just prior to an election, could an election for presidential electors not be held, that is, be postponed and rescheduled in a particular State and still be in conformance with 3 U.S.C. § 2? There is no clear and definitive authority on this question, nor do there appear to be specific legal precedents bearing upon this issue. Even though the purpose in 1845 of this particular provision at 3 U.S.C. § 2, regarding the subsequent choosing of electors, was clearly to allow those States that required an absolute “majority” in a general election to be “elected” to hold a subsequent run-off election if no candidate’s electors received such a majority, the language itself may be open to broader interpretation.

It may be contended on the one hand, that the express constitutional authority of the State legislatures over the selection of presidential electors at Article II, Section 1, clause 2, which language allows the State legislatures to enact statutory schemes to protect the validity of their elections for presidential electors in the State, including fashioning protest or contest procedures, may be consonant with such an authority in the legislature itself to temporarily postpone or to authorize by State law the postponement and rescheduling of State-wide elections by the State executive in certain emergency circumstances. One of the major points made by the Supreme Court in both the earlier Palm Beach County case, and the latter Bush v. Gore decision, was the primacy of the state legislatures’ role in the manner of the selection of presidential electors. Although clearly the concepts of “time” and “manner” of election are not necessarily synonymous, this constitutional provision and the Supreme Court’s deference to the State legislatures may arguably give some credibility to the States’ attempts to statutorily prescribe a system whereby emergency procedures may be implemented with respect to all State-wide elections, including the general elections for federal office, which provide that such elections, while certainly scheduled for the federally prescribed date, because of such. emergency and exigent circumstances need to be rescheduled, postponed or continued at a subsequent time.

Furthermore, it may be noted that in addition to Article II, Section 1, clause 2 of the Constitution, the federal law at 3 U.S.C. § 5, which was part of the original Electoral Vote Count Act of 1887, provides the State legislatures with further statutory authority to finally and conclusively resolve within the State protests, challenges and contests of the election of presidential electors. One of the purposes of the original 1887 statute regarding counting of the electoral votes was to substantially devolve upon the States the burden for resolving conflicts over the election, selection and appointment of those states’ own electors for President and Vice President.47 As noted by the Supreme Court, this statute at 3 U.S.C. § 5:

… creates a “safe harbor” for a State insofar as congressional consideration of its electoral votes are concerned. If the state legislature has provided for final determination of contests or controversies by a law made prior to election day, that determination shall be conclusive if made at least six days prior to said time of meeting of the electors.

Clearly, there is an understanding that the States were intended to have the principal and initial responsibility for resolving the conflicts, arguments, controversies and difficulties involved in the processes of electing presidential electors. Thus, it is possible to argue that to harmonize the provisions for elections to federal office, that is specifically the provisions for subsequent congressional elections at 2 U.S.C. § 8 and the presidential provisions at 3 U.S.C. § 2, along with the authority devolved upon the States in 3 U.S.C. § 5, that it would be logical to read the federal statutes as permitting a postponement and an election on a subsequent date for both Congress and presidential electors under the State’s current laws when necessitated by emergency and exigent circumstances in the particular State and, as long as the matter is resolved in time, such resolution would be conclusive on Congress in counting the presidential electoral votes. Such a supposition might be bolstered somewhat by the alternative, that is, that the federal law could work to disenfranchise the voters of a particular State when that State believes it is necessary to temporarily postpone the regularly scheduled State-wide elections because of some extraordinary and disastrous event in the State.

While providing possible support for the State legislature’s authority to develop a scheme which could include postponement of elections for presidential electors in times of emergency, this argument of expanded State authority might not necessarily give any additional weight to an implied or inherent authority of the State Executive or the State courts to do so, absent an express delegation in law from the legislature.

Finally, as a policy matter there has been some consternation over allowing any State to postpone or otherwise reschedule an election for federal office. The grounds for any such postponement or rescheduling, as well as any express, implied or inherent authority, would have to be examined initially under State law and procedure, and no blanket statement could be made with respect to the interpretation in all of the States. Furthermore, there appears to be little legal or factual precedent to apply to such circumstances. Remembering that the presidential election is not necessarily in the nature of a national referendum, but is rather 51 simultaneous State/District elections for presidential electors, however, it may be asked as a matter of policy whether or not an event that occurred earlier in the State, or an event that occurs in a different State, would or should be enough to trigger a postponement of an election in any particular State as a matter of good public policy. It has been argued that a violent disruption of an election in Manhattan, New York City, should not necessarily affect, or at least could not predictably affect, an election in Manhattan, Kansas. Various commentators have noted that on the fateful day of September 11, 2001, despite the events unfolding in Manhattan in New York City, Pennsylvania, and in Arlington, Virginia, a primary election for federal congressional office, a contested congressional primary, on the South Shore of Massachusetts reportedly drew a larger than normal number of the voting age population. Problems and disruptions in one State may not necessarily or predictably affect the viability of the results in another..

Appendix: Constitutional and Federal Statutory Provisions

Congressional Elections.

Article I, Section 2, clause 1. The House of Representatives shall be composed of Members chosen every second year by the people of the several States ….

Article I, Section 2, clause 4. When vacancies happen in the Representation from any State, the Executive Authority thereof shall issue Writs of Election to fill such Vacancies.

Amendment Seventeen. The Senate of the United States shall be composed of two Senators from each State, elected by the people thereof, for six years ….

When vacancies happen in the representation of any State in the Senate, the executive authority of such State shall issue writs of election to fill such vacancies: Provided, That the legislature of any State may empower the executive thereof to make temporary appointments until the people fill the vacancies by election as the legislature may direct.

Article I, Section 4, clause 1. The times, Places and Manner of holding Elections for Senators and Representatives, shall be prescribed in each State by the Legislature thereof; but the Congress may at any time by Law make or alter such Regulations, except as to the Places of chusing Senators.

Article I, Section 5, clause 1. Each house shall be the Judge of the Elections, Returns and Qualifications of its own Members ….

Presidential Elections.

Article II, Section 1. The executive Power shall be vested in a President of the United States of America. He shall hold his Office during the Term of four Years, and, together with the Vice President, chosen for the same Term, be elected, as follows:

Each State shall appoint, in such Manner as the Legislature thereof may direct, a Number of Electors, equal to the whole number of Senators and Representatives to which the State may be entitled in the Congress ….

Article II, Section 1, clause 4. The Congress may determine the Time of choosing the Electors, and the Day on which they shall give their votes; which Day shall be the same throughout the United States.

Amendment XII. The Electors shall meet in their respective states, and vote by ballot for President and Vice-President, … and they shall make distinct lists of all persons voted for as President, and of all persons voted for as Vice-President, and of the number of votes for each, which lists they shall sign and certify, and transmit sealed to the seat of the government of the United States,. directed to the President of the Senate; — The President of the Senate shall, in the presence of the Senate and House of Representatives, open all the certificates and the votes shall then be counted ….

Dates of Federal Office Terms.

Amendment XX, Section 1. The terms of the President and Vice President shall end at noon on the 20 th day of January, and the terms of Senators and Representatives at noon on the 3 rd day of January, of the years in which such terms would have ended if this article had not been ratified; and the terms of their successors shall then begin.

Current Federal Statutory Provisions.

2 U.S.C. § 1. Time for election of Senators At the regular election held in any State next preceding the expiration of the term for which any Senator was elected to represent such State in Congress, at which election a Representative to Congress is regularly by law to be chosen, a United States Senator from said State shall be elected by the people thereof for the term commencing on the 3d day of January next thereafter.

2 U.S.C. § 7. Time of election The Tuesday next after the 1st Monday in November, in every even numbered year, is established as the day for the election, in each of the States and Territories of the United States, of Representatives and Delegates to the Congress commencing on the 3d day of January next thereafter.

2 U.S.C. § 8. Vacancies The time for holding elections in any State, District, or Territory for a Representative or Delegate to fill a vacancy, whether such vacancy is caused by a failure to elect at the time prescribed by law, or by the death, resignation, or incapacity of a person elected, may be prescribed by the laws of the several States and Territories respectively.

3 U.S.C. § 1. Time of appointing electors The electors of President and Vice President shall be appointed, in each State, on the Tuesday next after the first Monday in November, in every fourth year succeeding every election of a President and Vice President.

3 U.S.C. § 2. Failure to make choice on prescribed day Whenever any State has held an election for the purpose of choosing electors, and has failed to make a choice on the day prescribed by law, the electors may be appointed on a subsequent day in such a manner as the legislature of such State may direct.

3 U.S.C. § 5. Determination of controversy as to appointment of electors If any State shall have provided, by laws enacted prior to the day fixed for the appointment of the electors, for its final determination of any controversy or contest concerning the appointment of all or any of the electors of such State, by judicial or other methods or procedures, and such determination shall have been made at least six days before the time fixed for the meeting of the electors, such determination made pursuant to such law so existing on said day, and made at least six days prior to said time of meeting of the electors, shall be conclusive, and shall govern in the counting of the electoral votes as provided in the. Constitution, and as hereinafter regulated, so far as the ascertainment of the electors appointed by such State is concerned.”


The Table of Contents

  • Iran’s Revolutionary Guards impound foreign ship in the Gulf: state TV
  • Is Britain Making Itself a Target in the Gulf?
  • Unbowed, Trump intensifies attacks on four Democratic congresswomen
  • Here’s the real reason Trump is attacking ‘the Squad’: he’s scared of their politics
  • Trump’s SS family members
  • Kellyanne Conway’s Irish Ancestors Were the Enemy When Donald Trump’s Dad Was Arrested at a Klan Riot in 1927
  • Encyclopedia of American Loons
  • Anti-Vaxxers Spread a Plague of Ignorance
  • California took on anti-vaxxers, and won
  • The CIA Confessions: The Crowley Conversations

Continue Reading »

No responses yet

TBR News July 17, 2019

Jul 17 2019 Published by under Uncategorized


The Voice of the White House Washington, D.C. July 17, 2019:

“Working in the White House as a junior staffer is an interesting experience.

When I was younger, I worked as a summer-time job in a clinic for people who had moderate to severe mental problems and the current work closely, at times, echos the earlier one.

I am not an intimate of the President but I have encountered him from time to time and I daily see manifestations of his growing psychological problems.

He insults people, uses foul language, is frantic to see his name mentioned on main-line television and pays absolutely no attention to any advice from his staff that runs counter to his strange ideas.

He lies like a rug to everyone, eats like a hog, makes lewd remarks to female staffers and flies into rages if anyone dares to contradict him.

His latest business is to re-institute a universal draft in America.

He wants to do this to remove tens of thousands of unemployed young Americans from the streets so they won’t come together and fight him.

Commentary for July 16:”What is happening in the Republican Senate is extreme nervousness over Trump’s mouth problems. Elections are coming up next year and Republican Senators are very nervous about Trump’s ugly actions. They do not want to appear to back him on ugly and dangerous social issues and eventually, if Trump keeps it up we will initially see a few deserting the ranks and then a mass trend to condemn Trump and convince the voting public that they do not support his ugly views. True, rabid right winger and the Jesus Freaks will support him but they can not get him reelected alone.”


The Table of Contents

  • House moves to condemn Trump as he again attacks minority congresswomen
  • US nuclear weapon locations in Europe accidentally exposed in NATO committee report
  • Iran’s Not the Aggressor – The US Is
  • American Military actions 1950-present
  • US Military Casualties 1950-present
  • Encyclopedia of American Loons
  • The CIA Confessions: The Crowley Conversations

Continue Reading »

No responses yet

TBR News July 16, 2019

Jul 16 2019 Published by under Uncategorized


The Voice of the White House Washington, D.C. July 16, 2019:

“Working in the White House as a junior staffer is an interesting experience.

When I was younger, I worked as a summer-time job in a clinic for people who had moderate to severe mental problems and the current work closely, at times, echos the earlier one.

I am not an intimate of the President but I have encountered him from time to time and I daily see manifestations of his growing psychological problems.

He insults people, uses foul language, is frantic to see his name mentioned on main-line television and pays absolutely no attention to any advice from his staff that runs counter to his strange ideas.

He lies like a rug to everyone, eats like a hog, makes lewd remarks to female staffers and flies into rages if anyone dares to contradict him.

His latest business is to re-institute a universal draft in America.

He wants to do this to remove tens of thousands of unemployed young Americans from the streets so they won’t come together and fight him.

Commentary for July 16:”It is no secret in various official circles here in Washington, that the failed Deutsche Bank was firmly in the hands of the CIA and was used by them to finance various projects, to include assisting their Russian drug running friends to launder money. Like Trump, Deutsche Bank has been scrutinized for its dealings in Russia. The bank paid more than $600 million to regulators in 2017 and agreed to a consent order that cited “serious compliance deficiencies” that “spanned Deutsche Bank’s global empire.” The case focused on “mirror trades,” which Deutsche Bank facilitated between 2011 and 2015. The trades were sham transactions whose sole purpose appeared to be to illicitly convert rubles into pounds and dollars — some $10 billion worth.

The bank was “laundering money for wealthy Russians and people connected to Putin and the Kremlin in a variety of ways for almost the exact time period that they were doing business with Donald Trump,” “And all of that money through Deutsche Bank was being channeled through the same exact legal entity in the U.S. that was handling the Donald Trump relationship in the U.S. And so there are a lot of coincidences here.”

It wasn’t just Donald Trump who maintained a warm relationship with Deutsche. The German bank looked after his entire family. Jared Kushner, Ivanka, and Kushner’s mother Seryl Stadtmauer were all Deutsche clients.

The large German financial conglomerate Deutsche Bank, later to become one of Donald Trump’s favored institutions, became entangled with Russia after the bank bought boutique investment bank UFG in order to gain entry into Moscow’s financial markets. UFG’s chairman, Charles Ryan, was an American banker; his partner was Boris Fyodorov, formerly Russia’s Finance Minister in the Yeltsin administration. Deutsche’s future co-CEO, Anshu Jain, was the one who wants Deutsche to become more involved with Russia. Other investment banks soon found Deutsche’s business practices suspicious. Christopher Barter, at the time the CEO of Goldman Sachs Moscow, said later: “They were doing some very curious things. Nobody could make sense of their business. We found the nature and concentration of their business with VTB (Vneshtorgbank) quite galling. Nobody else could touch VTB.” VTB was known to be deeply connected to Russian intelligence, the FSB.

Trump is also well-known to have been up to his wattled neck in this project, a project to which elements of the German government not infiltrated by the CIA were informed and have reacted by firing known CIA-paid bank employees and firing carload lots of them, 74,000 in total. Eventually this will come out, hopefully before the next election.”



The Table of Contents                     

  • Deutsche Bank Faces Criminal Investigation for Potential Money-Laundering Lapses
  • Trump’s dealings with Deutsche Bank
  • Trump defiant as lawmakers blast his ‘racist’ attacks on four congresswomen
  • Trump fires again at congresswomen, accusing them of ‘spewing vile things’
  • Pompeo’s Big Lie on Iran
  • Merger Mania
  • Encyclopedia of American Loons

Continue Reading »

No responses yet

TBR News July 15, 2019

Jul 15 2019 Published by under Uncategorized

The Voice of the White House Washington, D.C. July 15, 2019:

“Working in the White House as a junior staffer is an interesting experience.

When I was younger, I worked as a summer-time job in a clinic for people who had moderate to severe mental problems and the current work closely, at times, echos the earlier one.

I am not an intimate of the President but I have encountered him from time to time and I daily see manifestations of his growing psychological problems.

He insults people, uses foul language, is frantic to see his name mentioned on main-line television and pays absolutely no attention to any advice from his staff that runs counter to his strange ideas.

He lies like a rug to everyone, eats like a hog, makes lewd remarks to female staffers and flies into rages if anyone dares to contradict him.

His latest business is to re-institute a universal draft in America.

He wants to do this to remove tens of thousands of unemployed young Americans from the streets so they won’t come together and fight him.

Commentary for July 15:” One thing I have clearly learned while working in the White House is that our President is a cartoon character. Cheats on his income tax and brags about it, takes bribes, cheats small businessmen and staff, has a raft of peculiar habits and actually thinks he is a king in Washington and all must bask in the light of his sun. He is loud and obnoxious and delights in tormenting people who cannot, or will not, fight back. If someone stood up to him, in public, he woud have a fatal stroke, believe me. He bought the Oval Office and it is up to the irate pubic to evict him when the time comes.”

The Table of Contents

  • Encyclopedia of American Loons
  • The Broken Encirclement Plan: Nato in Eastern Europe
  • Trump and the Numbers Game
  • An Israeli Nazi funding and arming the American far-right
  • The Domestic Spying Mania
  • The CIA Confessions:
  • The Crowley Conversations 

William Schnoebelen

A.k.a. Christopher Syn (name taken in the 1970s for numerological reasons)

William Schnoebelen is an evangelist, author (sometimes with his wife Sharon) and lecturer, known for his anti-Mormon, anti-masonic (yes) and anti-Wiccan views and for his fundamentalist Protestant viewpoint. His views are slightly more insane than Jack Chick’s (Schnoebelen is published by Chick Publications), and possibly only challenged by Gene Ray. He currently runs his own organization With One Accord Ministries (website here). His antipathy toward the organizations mentioned above can partially be explained by the fact that he is, in fact, himself a former Mormon and wiccan, as well as a Gnostic Bishop with the Monastery of the Seven Rays, voodoo priest, and member of the Church of Satan. He claims to have reached a high rank with the Freemason (reaching “Palladium Masonry”, which is a well-known hoax and doesn’t exist), and to have been part of the Illuminati (he has published the video “Exposing the Illuminati from within”: two parts, here and here. You get an idea of where he comes from.

To top it, Schnoebelen claims to have been a practicing vampire from 1979, and has released a nine-hour DVD program titled “Interview with an Ex-Vampire: A True Story” (hosted by one Stephanie Relfe, who provides a biography of Schnoebelen here), although there is ample evidence that Schnoebelen doesn’t quite know what “True Story” means. Unfortunately his vampire activities came to an end (he was also a practicing sorcerer) in 1980 when he failed a saving throw against an evangelical bank clerk who promised to “be praying for you in Jesus’ name,” was turned, and subsequently lost all his magical powers. He doesn’t like D&D, by the way (more on that below), and there is probably a connection here.

According to none other than Schnoebelen, part of Schnoebelen’s spiritual education was extra-terrestrial, apparently.

Sort of to complete the circle, he also has an “N.D. degree” from Trinity College of Natural Healing in Indiana, and is also certified by the Certified Natural Health Professionals organization in Warsaw, IN. His profile is here.

Among Schnoebelen’s numerous books are “Masonry: Beyond the Light”, which exposes the freemasons as Satanists; “Wicca: Satan’s little white lie”, which exposes Wiccans as Satanists; “Mormonism’s Temple of Doom’, which exposes Mormons as Satanists, and “Blood on the Doorpost”; which tells you how to conquer the Satanism in your life and achieve success through the power of the Law of Attraction and The Secret (yes, that The Secret). He may be most famous for his attacks on Mormonism, however, since some Mormon responders actually took it as a serious threat. Together with one Ed Decker Schnoebelen raised concerns about, among other things, the spires on Mormon temples, claiming that they were really “Satan’s spires” and represented “an up-side-down nail pointing defiantly toward heaven, as if to impale the Lord Jesus Christ anew when he comes in the clouds” and that because of “the trapezoidal shape” of the spires they “draw demons like fly paper”.

Besides such high-flown theology, Schnoebelen’s book “Space Invaders” is about UFOs and seems to assume that the eponymous Arcade game is a real-life documentary (“Bill shows how the “cute little space aliens” have their roots in the rituals of such black magicians as Aleister Crowley” and “reveals how flying saucers and ‘alien abductions’ may well figure into the end-time plans of the Beast. Drawing on Genesis 6”). Schnoebelen knows, since Schnoebelen has been a vampire. What more expertise in magic and the occult do you need?

He is no fan of Harry Potter, and produced a video “Harry Potter: Politically Correct Paganism” with Jan Markell (already covered) and one Wendell Amstutz. Neither is he a fan of Dungeons and Dragons, which involves evil, brainwashing (“Erosion of family values – the Dungeon Master (DM) demands an all-encompassing and total loyalty, control and allegiance”), real sorcery, Satanism, immorality (“male characters in the game often try to seduce female characters”) and – worst of all – science (“In this worldview, there is no sovereign God; but rather the universe is run like a gigantic piece of machinery”). Updated here.

Diagnosis: Clinically unable to distinguish imagination and reality (preciously few of his claims about his own past have been substantiated) the amazing Bill Schnoebelen is one of a kind. He’s probably harmless.

Don Schmierer

Don Schmierer is an insanely lunatic and thoroughly evil person. Together with Scott Lively and Caleb Lee Brundidge, Schmierer participated in a 2009 workshop in Kampala to, pretty much, provide the architecture for the Ugandan anti-gay bill (discussed here). Schmierer is a board member of Exodus International, an organzation devoted to promoting “freedom from homosexuality through the power of Jesus Christ”. After the law passed in Uganda and brought about some horrible deaths Schmierer said he felt “duped”, arguing that he had been invited to speak on “parenting skills” for families with gay children and that, although he claimed homosexuals could be converted into heterosexuals, he had no idea some Ugandans were contemplating the death penalty for homosexuality.

There are reasons to think Don is not as stupid as he claims he is, and even if he were he would nevertheless be responsible.

It is telling that he mentioned receiving threats and more than 600 hate mails related to his visit: “I spoke to help people,” he said, “and I’m getting bludgeoned from one end to the other.” No, Don. You are not the victim here, and you don’t get to claim that you are.

Diagnosis: Vile loon who should be charged with crimes against humanity; he is a representative for a very dangerous trend: extremist religious organizations who, unable to establish theocracy or use violence against those they dislike in the US, targets Africa instead – and are extremely successful at it. Exodus (headed by one Alan Chambers) is one such organization.


The Broken Encirclement Plan: Nato in Eastern Europe

The first serious, and successful, U.S. direct interference in Russian leadership policies was in 1953.

An ageing Josef Stalin, suffering from arteriosclerosis and becoming increasingly hostile to his subordinates, was poisoned by Laverenti P. Beria, head of his secret police.

Beria, a Mingrelian Jew, very ruthless and a man who ordered and often supervised the executions of people Stalin suspected of plotting against him, had fallen out of favor with Stalin and had come to believe that he was on the list of those Stalin wished to remove.

With his intelligence connections, Beria was contacted by the American CIA through one of his trusted agents in Helskinki and through this contact, Beria was supplied dosages of warfarin

The first drug in the class to be widely commercialized was dicoumarol itself, patented in 1941 and later used as a pharmaceutical. potent coumarin-based anticoagulants for use as rodent poisons, resulting in warfarin in 1948. The name warfarin stems from the acronym WARF, for Wisconsin Alumni Research Foundation + the ending -arin indicating its link with coumarin. Warfarin was first registered for use as a rodenticide in the US in 1948, and was immediately popular; although it was developed by Link, the WARF financially supported the research and was assigned the patent.

Warfarin was used by a Lavrenti Beria to poison Stalin. Stalin’s cooks and personal bodyguards were all under the direct control of Beria. He acknowledged to other top Soviet leaders that he had poisoned Stalin, according to Molotov’s memoirs, Nikita Khrushchev and others.

Warfarin is tasteless and colorless, and produces symptoms similar to those that Stalin exhibited.

Stalin collapsed during the night after a dinner with Beria and other Soviet leaders, and died four days later on March 5, 1953.

Foreign Minister Vyacheslav Molotov, in his political memoirs (published posthumously in 1993), claimed that Beria told him that he had poisoned Stalin. “I took him out,” Beria supposedly boasted. And after Stalin was found unconscious, medical care was not provided for many hours. Other evidence of the murder of Stalin by Beria associates was presented by Edvard Radzinsky in his biography of Stalin. It has been suggested that warfarin was used; it would have produced the symptoms reported.

After the fall of Gorbachev and his replacement by Boris Yeltsin, a known CIA connection, the Russian criminal mob was encouraged by the CIA to move into the potentially highly lucrative Russian natural resource field.

By 1993 almost all banks in Russia were owned by the mafia, and 80% of businesses were paying protection money. In that year, 1400 people were murdered in Moscow, crime members killed businessmen who would not pay money to them, as well as reporters, politicians, bank owners and others opposed to them. The new criminal class of Russia took on a more Westernized and businesslike approach to organized crime as the more code-of-honor based Vory faded into extinction.

The Izmaylovskaya gang was considered one of the country’s most important and oldest Russian Mafia groups in Moscow and also had a presence in Tel Aviv, Berlin, Paris, Toronto, Miami and New York City. It was founded during the 1980s under the leadership of Oleg Ivanov and was estimated to consist of about 200 active members (according to other data of 300–500 people). In principle, the organization was divided into two separate bodies—Izmailovskaya and Gol’yanovskaya  which utilized quasi-military ranks and strict internal discipline. It was involved extensively in murder-for-hire, extortions, and infiltration of legitimate businesses.

The gangs were termed the Oligarchy and were funded by the World Bank, the International Monetary Fund and the Israeli-owned Bank of New York all with the assistance of the American government.

The arrival of Vladimir Putin as the new leader of Russia was at first ignored in Washington. A former KGB Lt. Colonel who had been stationed in East Germany, Putin was viewed as inconsequential, bland and colorless by the purported Russian experts in both the Department of State and the CIA.

Putin, however, proved to be a dangerous opponent who blocked the Oligarchs attempt to control the oil fields and other assets, eventual control of which had been promised to both American and British firms.

The Oligarchs were allowed to leave the country and those remaining behind were forced to follow Putin’s policies. Foreign control over Russian natural resources ceased and as both the CIA, various foreign firms and the American government had spent huge sums greasing the skids, there was now considerable negative feelings towards Putin.

The next serious moves against Russia came with a plan conceived by the CIA and fully approved by President George W. Bush, whose father had once been head of the CIA.

This consisted of ‘Operation Sickle’ which was designed to surround the western and southern borders of Russia with states controlled by the United States through the guise of NATO membership. Included in this encirclement program were the Baltic States, Poland, the Czech Republic, Georgia and a number of Asiatic states bordering southern Russia. It was the stated intention of the NATO leadership to put military missiles in all these countries.

The so-called “Orange Revolution” funded and directed by the CIA, overthrew the pro-Moscow government in the Ukraine, giving the United States theoretical control over the heavy industrialized Donetz Basin and most importantly, the huge former Soviet naval base at Sebastopol.

The Georgia Train and Equip Program (GTEP) was an American-sponsored 18-month, $64-million program aimed at increasing the capabilities of the Georgian armed forces by training and equipping four 600-man battalions with light weapons, vehicles and communications. The program enabled the US to expedite funding for the Georgian military for Operation Enduring Freedom.

On February 27, 2002, the US media reported that the U.S. would send approximately two hundred United States Army Special Forces soldiers to Georgia to train Georgian troops. The program implemented President Bush’s decision to respond to the Government of Georgia’s request for assistance to enhance its counter-terrorism capabilities and addressed the situation in the Pankisi Gorge.

The program began in May 2002 when American special forces soldiers began training select units of the Georgian Armed Forces, including the 12th Commando Light Infantry Battalion, the 16th Mountain-Infantry Battalion, the 13th “Shavnabada” Light Infantry Battalion, the 11th Light Infantry Battalion, a mechanized company and small numbers of Interior Ministry troops and border guards.

Eventually, responsibility for training Georgian forces was turned over to the US Marine Corps in conjunction with the British Army. British and American teams worked as part of a joint effort to train each of the four infantry battalion staffs and their organic rifle companies. This training began with the individual soldier and continued through fire team, squad, platoon, company, and battalion level tactics as well as staff planning and organization. Upon completing training, each of the new Georgian infantry battalions began preparing for deployment rotations in support of the Global War on Terrorism

The CIA were instrumental in getting Mikhail Saakashvili, an erratic politician, pro-West, into the presidency of Georgia but although he allowed the country to be flooded with American arms and “military trainers” he was not a man easily controlled and under the mistaken belief that American military might supported him, commenced to threaten Moscow. Two Georgian provinces were heavily populated by Russians and objected to the inclusion in Georgia and against them, Saakashvili began to make threatening moves.

The 2008 South Ossetia War or Russo-Georgian War (in Russia also known as the Five-Day War) was an armed conflict in August 2008 between Georgia on one side, and Russia and separatist governments of South Ossetia and Abkhazia on the other.

During the night of 7 to 8 August 2008, Georgia launched a large-scale military offensive against South Ossetia, in an attempt to reclaim the territory. Georgia claimed that it was responding to attacks on its peacekeepers and villages in South Ossetia, and that Russia was moving non-peacekeeping units into the country. The Georgian attack caused casualties among Russian peacekeepers, who resisted the assault along with Ossetian militia.

Georgia successfully captured most of Tskhinvali within hours. Russia reacted by deploying units of the Russian 58th Army and Russian Airborne Troops in South Ossetia, and launching airstrikes against Georgian forces in South Ossetia and military and logistical targets in Georgia proper. Russia claimed these actions were a necessary humanitarian intervention and peace enforcement.

When the Russian incursion was seen as massive and serious, U.S. president George W. Bush’s statement to Russia was: “Bullying and intimidation are not acceptable ways to conduct foreign policy in the 21st century.” The US Embassy in Georgia, describing the Matthew Bryza press-conference, called the war an “incursion by one of the world’s strongest powers to destroy the democratically elected government of a smaller neighbor”.

Initially the Bush Administration seriously considered a military response to defend Georgia, but such an intervention was ruled out by the Pentagon due to the inevitable conflict it would lead to with Russia. Instead, Bush opted for a softer option by sending humanitarian supplies to Georgia by military, rather than civilian, aircraft. And he ordered the immediate evacuation of all American military units from Georgia. The huge CIA contingent stationed in the Georgian capital fled by aircraft and the American troops, mostly U.S. Marines, evacuated quickly to the Black Sea where they were evacuated by the U.S. Navy.

British and Israeli military units also fled the country and all of them had to leave behind an enormous amount of military equipment to include tanks, light armored vehicles, small arms, radio equipment, and trucks full of intelligence data they had neither the time nor foresight to destroy.

The immediate result of this demarche was the defection of the so-called “NATO Block” eastern Europeans from the Bush/CIA project who saw the United States as a paper tiger that would not, and could not, defend them against the Russians. In a sense, the Russian incursion into Georgia was a massive political, not a military, victory.

The CIA was not happy with the actions of Vladimir Putin and when he ran for reelection, they poured money into the hands of Putin’s enemies, hoping to reprise the Ukrainian Orange Revolution but the effort was in vain.

On September 6, 2016, Vladimir Putin’s state limousine, travelling on a Moscow highway, was slammed into by a car which jumped the median strip.

Putin’s driver was killed but Putin was not in the car at the time.

Shortly after this incident, a WikiLeaks release disclosed the CIA’s ability to get control of a car’s computer system and cause it to go out of control.


Trump and the Numbers Game

July 15, 2019

There were 56.5 million Hispanics in the United States in 2015, accounting for 17.6% of the total U.S. population.

The Hispanic Mexican population of the United States is projected to grow to 107 million by 2065.

The share of the U.S. population that is Hispanic has been steadily rising over the past half century. In 2015, Hispanics made up 17.6% of the total U.S. population, up from 3.5% in 1960, the origins of the nation’s Hispanic population have diversified as growing numbers of immigrants from other Latin American nations and Puerto Rico settled in the U.S.

For example, between 1930 and 1980, Hispanics from places other than Mexico nearly doubled their representation among U.S. Hispanics, from 22.4% to 40.6%. But with the arrival of large numbers of Mexican immigrants in the 1980s and 1990s, the Mexican share among Hispanics grew, rising to a recent peak of 65.7%.

California has the largest legal poplation of Mexicans, 14,013,719. And  California is also home to almost 25% of the country’s undocumented population. California is followed by Texas where 31.14%,(8,500,000) are Mexican, Florida has 4,223,806 Mexicans, Illinois 2,153,000, Arizona,1,895,149, Colorado, 1,136,000 Georgia, 923,000, North Carolina, 890,000, and Washington, 858,000 Mexicans.

Given the fact that President Trump has strong personal dislikes for both Blacks and Latinos, manifest in his recent vicious treatment of Mexican immigrants in their legal attempts to immigrate to the United States, the sheer number of Mexicans now resident in the United States ought to give him, and his far-right Republican Congressional supporters serious pause in their denial of entrance for legal immigrant attempts and the subsequent brutal maltreatment of small children of these immigrants.

If the Mexican voting population of the United States were to organize, like the recent organizing of the black voting population of Alabma in opposition to the fanatical Judge Moore, the results in the November elections could well prove to be a stunning disaster for both Trump and the Republicans.

Numbers certainly count but Trump is obviously unaware of their potential danger, both to him and his right-wing radical supporters.


An Israeli Nazi funding and arming the American far-right

July 14, 2019

One of the more interesting personalities involved in the growing American neo-Nazi political movement is one using the name of ‘Al Chapman.’

As far as can be ascertained, the paternal side of Al Chapman’s family were from Wilno, Lithuania. His grandfather Chaim Shapiro was a Lubavitch rabbi who fled to Stockholm disguised as a Christian. Chaim Shapiro married Esther Domeratsky at Viborg on February 17, 1941 and immigrated to Israel in 1947.

Ilán Shapiro was born in Israel on September 8, 1949, in Tel Aviv. After military service in the IDF, extended from 30 to 36 months by a temporary decree in January 1968, he came to the USA in 1971 to attend an English language school in New York to perfect the colloquial English he learned as a child.

After his English studies, Ilán Shapiro returned to Israel where he became involved with the Israeli think tank JINSA (Jewish Institute for National Security Affairs). Ilán Shapiro returned to the United States via Canada in 1979 as Alan A. Shapiro. Shapiro has also been closely associated with the Chabad Lubavitch Hasidics, who follow the Qabala and hold extremist and insulting opinions of non-Jews. He is also believed to have links to AIPAC and is believed by U.S. counter intelligence to be probably a Mossad operative.

Currently residing in the Washington area, where he has strong, daily, connections with the Trump White House,  the clean-shaven Shapiro cultivates a more-American-than-the-Americans image, sometimes going by the name Al Chapman, and is heavily involved in gun shows and, notably, the Third Reich militaria scene in the US. He has been tracked on a number of Internet militaria forums under a variety of pseudonyms.

Shapiro/Chapman is involved in the trading of high end Third Reich militaria and Nazi VIP memorabilia but maintains a firewall between the public and himself. He is said to be involved in the supply of high end fakes to a small group of US and Europe-based dealers.

As Al Shapiro, he sometimes claims to have served in the Six Day War in June 1967 but would have been three months short of his 18th birthday at the time. As Al Chapman, he has claimed to have served in the US Air Force in Vietnam but no record of this service has been found.

Shapiro was taught colloquial English as a child and when he was finished with his obligatory IDF service, he came to the United States to find his fortune and better serve his employers, the Israeli government and people. In due time, Alan became connected with a number of the Hebraic Illuminati in and around Washington, an area that has proven to be of rich pickings for some.

At one period or another, Alan was a very early associate and, as they like to say, a “close friend” of the notorious “Roger Steele” late of “Hollywood Military Hobbies.” Steele, whose real name was Gaylord Earnest Wessock, was a well-known homosexual, convicted counterfeiter and an outlet for the forged and fantasy daggers of James P. Atwood, fake SS insignia and caps manufactured by one John Nesbitt or ‘Reisenhaft’ of California, Inventor of the famous “SS Viking Ring” and other fantasy pieces.

After “Steele’s” death as the result of a stroke, Shapiro sold ‘Hollywood Military Hobbies’ customer lists to a number of dealers as well as the Los Angeles office of the FBI. He later changed his name to “Al Chapman” and ran several retail, mail order outlets, mostly in Miami, Florida.

Shapiro/Chapman then bought a small print shop in Jacksonville, Florida and began to manufacture various German Third Reich lower level documents, such as preliminary certificates for high military decorations. He had an aide, Malcolm Ransome, type in names, add stamps and so on and antique these by soaking them in diluted coffee and stuffing them into a commercial clothes dryer for age.

Shapiro/Chapman sold these documents widely, both in the United States and the UK to a number of militaria dealers (see Mollo, Andrew; Foreman, Adrian; Fischer, Malcom; Ulrich of England; the Klenau Auction in Germany; Merschintsky, Wolfgang; Zyla, Raymond;  Snyder, Charles; Globe Militaria; Andrei Huskins; Stuart, Emily; OMSA; Kleitmann, K.G.; Rich, Dr. Edward P.; Manion’s Auction; Steffans, Roger Auctions.)Using the lists of “Steele’s” customers, he later became an advisor to the Justice Department’s OSI team investigating the existence and identification of alleged neo-Nazi groups in the United States. He has made a liaison with the Wiesenthal Foundation in Los Angeles and the San Diego office of the DHS. He was a collaborator with Andrew Allen, a wealthy San Francisco real estate developer, in penetrating and virtually destroying Willis Carto’s right-wing and anti-Semitic ‘Spotlight’ paper.

Shapiro still manufactures, and sells, fake documents, but the good news is that his printer always uses paper with chemical paper-whiteners and as these were never in use before 1951, an ultra violet light (or “blacklight”) will cause these recent fakes to fluoresce.

Shapiro banks in Paris with a branch of the BNP and uses three different sham American (and one Canadian) corporations to bank his incomes and avoid the American IRS. In what he mistakenly believes is a confidential email, he has boasted of having cheated the IRS out of over three hundred thousand dollars in unpaid taxes.

He has also been the man who supplied the manufacture for the many fake “SS Honor Rings” being sold. His mistake here is not to know that after November 11, 1943, by order of Himmler, no actual rings were presented, only the papers. Most of Shapiro’s ” SS Honor Rings” bearing Himmler’s signature are dated with the spring solstice in March 1944 and therefore are dead giveaways as fakes.

The policy of the supporters of the far right groups is to exacerbate latent racism in the United States to the point where public violence erupts and the political polarization of the public becomes manifest. By encouraging and arming the far right and neo nazi groups, the Scavenius group is laying the groundwork for an acceptable and militant government reaction, the institution of draconian control over the entire population and the rationale for national and official government control, all in the name of law and order. It is planned that the far right and neo nazi groups be taken into the law enforcement structure and used to put down any public demonstrations that the government deems to be a potential threat to their policies.


The Domestic Spying Mania

July 15, 2019

by Christian Jürs

  1. Federal control of all domestic media, the internet, all computerized records, through overview of all domestic fax, mail and telephone conversations,

2 .A national ID card, universal SS cards being mandatory,

  1. Seizure and forced deportation of all illegal aliens, including millions of Mexicans and Central Americans, intensive observation and penetration of Asian groups, especially Indonesian and Chinese,
  2. A reinstitution of a universal draft (mandatory service at 18 years for all male American youths…based on the German Arbeitsdienst.
  3. Closer coordination of administration views and domestic policies with various approved and régime supportive religious groups,
  4. An enlargement of the planned “no travel” lists drawn up in the Justice Department that would prevents “subversive” elemetst from flying, (this list to include “peaceniks” and most categories of Muslims)
  5. The automatic death penalty for any proven acts of sedition,
  6. The forbidding of abortion, any use of medical marijuana,
  7. Any public approval of homosexual or lesbian behavior to include magazines, websites, political action groups and soon to be forbidden and punishable.

As the popularity of drones for domestic surveillance grows in the United States, so do privacy concerns for citizens just going about their daily business. Designer Adam Harvey has come up with a line of anti-drone clothing that is much more stylish than an aluminum foil hat.

The anti-drone clothes include a hoodie, a scarf, and a burqa. They are made with a metalized fabric designed to thwart thermal imaging. They work by reflecting heat and masking the person underneath from the thermal eye of a drone. The designs may hide you from certain drone activities, but they would definitely make you noticeable to people out on the street.

The scarf and burqa are both inspired by traditional Muslim clothing designs. Harvey explains the choice, saying, “Conceptually, these garments align themselves with the rationale behind the traditional hijab and burqa: to act as ‘the veil which separates man or the world from God,’ replacing God with drone.”

The anti-drone garments are part of a larger line of clothing called Stealth Wear. These are called  “New Designs for Countersurveillance.” The manufacturer states: “Collectively, Stealth Wear is a vision for fashion that addresses the rise of surveillance, the power of those who surveil, and the growing need to exert control over what we are slowly losing, our privacy.”

If drones get to be more commonplace in our communities, it’s not too much of a stretch to see this sort of fashion becoming more mainstream, much like RFID-blocking wallets and passport holders.


The government intelligence agencies and their allied private contractors now regularly accesses all emails, chats, searches, events, locations, videos, photos, log-ins and any information people post online with a warrant, which the U.S. Foreign Intelligence Surveillance Court always  grants secretly and without being ever made public.

And the revelation of Prism, a secret government program for mining major Internet companies, states that the government now has direct access to Internet companies’ data without a warrant.

Every company impacted – Google, YouTube, Yahoo, Facebook, Apple, Microsoft, Skype, PalTalk and AOL – publically deny knowing about the program or giving any direct access to their servers. These denials are intented to bolster public confidence in their services because in reality, all of these entities cooperate fully with requests for customer information.

Google is the supplier of the customized core search technology for Intellipedia, a highly-secure online system where 37,000 U.S. domestic and foreign area spies and related personnel share information and collaborate on investigative missions.

And there is absolutely nothing one can commit to the Internet that is private in any sense of the word

In addition, Google is linked to the U.S. spy and military systems through its Google Earth software venture. The technology behind this software was originally developed by Keyhole Inc., a company funded by Q-Tel , a venture capital firm which is in turn openly funded and operated on behalf of the CIA.

Google acquired Keyhole Inc. in 2004. The same base technology is currently employed by U.S. military and intelligence systems in their quest, in their own words, for “full-spectrum dominance” of the American, and foreign, political, social and economic spheres.

However, Internet Service Providers and the entertainment industry are now taking Internet monitoring to a whole new level….

If someone download copyrighted software, videos or music, all Internet service providers (ISP)  have the ability to detect this downloading.

The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet. In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies., to include the FBI, NSA, the CIA and the DHS.

There is far too much data on the Internet for human investigators to manually search through all of it and so automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic and identify and report to human investigators traffic considered interesting by using certain “trigger” words or phrases, visiting certain types of web sites, or communicating via email or chat with suspicious individuals or groups. Billions of dollars per year are spent, by agencies such as the Information Awareness Office, NSA, and the FBI, to develop, purchase, implement, and operate systems such as Carnivore, NarusInsight, and ECHELON to intercept and analyze all of this data, and extract only the information which is useful to law enforcement and intelligence agencies. One flaw with NSA claims that the government needs to be able to suck up Internet data from services such as Skype and Gmail to fight terrorists: Studies show that would-be terrorists don’t use those services. The NSA has to collect the metadata from all of our phone calls because terrorists, right? And the spy agency absolutely must intercept Skypes you conduct with folks out-of-state, or else terrorism. It must sift through your iCloud data and Facebook status updates too, because Al Qaeda.Terrorists are everywhere, they are legion, they are dangerous, and, unfortunately, they don’t really do any of the stuff described above.

Even though the still-growing surveillance state that sprung up in the wake of 9/11 was enacted almost entirely to “fight terrorism,” reports show that the modes of communication that agencies like the NSA are targeting are scarcely used by terrorists at all.

Computers can be a surveillance target because of the personal data stored on them. If someone is able to install software, such as the FBI’s Magic Lantern and CIPAV, on a computer system, they can easily gain unauthorized access to this data. Such software can be, and is   installed physically or remotely. Another form of computer surveillance, known as van Eck phreaking, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters. The NSA runs a database known as “Pinwale”, which stores and indexes large numbers of emails of both American citizens and foreigners.


The government agencies have been fully capable to look at any and all emails.

A warrant can easily grant access to email sent within 180 days. Older emails are available with an easier-to-get subpoena and prior notice.

Government officials also are fully capable of reading all the ingoing and outgoing emails on an account in real time with a specific type of wiretap warrant, which is granted with probable cause for specific crimes such as terrorism.

Google received 122,503 user data requests involving 2,375,434 users from the U.S. government in 2016. It granted about 98 percent of those requests.

Microsoft, with its Outlook/Hotmail email service, received 61,538 requests involving 52,291 users, at least partially granting 92  percent of those requests.


With the advent of smartphones and SIM cards, cellphones are no longer strictly for storage of digits and 180-character short messages.

Cellphones assist in navigating for car trips, to enable making Internet purchases and to watch events on television stations.   It is possible to deposit checks with a bank app and a camera, locate businesses of interest and also to use transportation by using a QR-code. Phones hold our coupons, our favorite cat videos and functions as a credit card when we forget ours at home.

The NSA collects subscriber information from major cell phone carriers. This information is primarily based on metadata, such as location and duration of calls, along with numbers dialed, all in search of links to suspected terrorists.

In 2013, to date, law enforcement agencies made 2.3 million requests for subscriber information.

These government requests for surveillance information from the NSA, are limited to metadata. That doesn’t mean that the content of conversations is off-limits. To listen in, the government just needs a warrant, one that’s granted through the secret Foreign Intelligence Surveillance Court.

The court approves almost every request, fully denying just nine out of 133,900 government applications for surveillance over its 33-year existence, according to Foreign Intelligence Surveillance Act reports submitted to Congress.

Although this is not new technology, law enforcement authorities are using our own cell phones to spy on us more extensively than ever before as a recent Wired article described….

Mobile carriers responded to a staggering 1.3 million law enforcement requests last year for subscriber information, including text messages and phone location data, according to data provided to Congress.

A single “request” can involve information about hundreds of customers. So ultimately the number of Americans affected by this could reach into “the tens of millions” each year.

The number of Americans affected each year by the growing use of mobile phone data by law enforcement could reach into the tens of millions, as a single request could ensnare dozens or even hundreds of people. Law enforcement has been asking for so-called “cell tower dumps” in which carriers disclose all phone numbers that connected to a given tower during a certain period of time.

So, for instance, if police wanted to try to find a person who broke a store window at an Occupy protest, it could get the phone numbers and identifying data of all protestors with mobile phones in the vicinity at the time — and use that data for other purposes.

Perhaps you should not be using your cell phone so much anyway. After all, there are more than 500 studies that claim to show that cell phone radiation is harmful to humans.

The official and unofficial tapping of telephone lines is widespread. In the United States for instance, the Communications Assistance For Law Enforcement Act (CALEA) requires that all telephone and VoIP communications be available for real-time wiretapping by Federal law enforcement and intelligence agencies. Two major telecommunications companies in the U.S.—AT&T Inc. and Verizon—have contracts with the FBI, requiring them to keep their phone call records easily searchable and accessible for Federal agencies, in return for $1.8 million dollars per year. Between 2003 and 2005, the FBI sent out more than 140,000 “National Security Letters” ordering phone companies to hand over information about their customers’ calling and Internet histories. About half of these letters requested information on U.S. citizens.

Human agents are not required to monitor most calls. Speech-to-text software creates machine-readable text from intercepted audio, which is then processed by automated call-analysis programs, such as those developed by agencies such as the Information Awareness Office, or companies such as Verint, and Narus, which search for certain words or phrases, to decide whether to dedicate a human agent to the call.

Law enforcement and intelligence services in the United Kingdom and the United States possess technology to remotely activate the microphones in cell phones, by accessing phones’ diagnostic or maintenance features in order to listen to conversations that take place near the person who holds the phone.

Mobile phones are also commonly used to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily even when the phone is not being used, using a technique known multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone. The legality of such techniques has been questioned in the United States, in particular whether a court warrant is required. Records for one carrier alone (Sprint), showed that in a given year federal law enforcement agencies requested customer location data 8 million times.


Think Uncle Sam knows where you buy your coffee? He might be able to tell you the exact cafe.

It all starts with that stripe on the back of your credit card, which gets swiped through thousands of readers every year.

That solid black bar is made up of millions of iron-based magnetic particles, each one 20-millionths of an inch wide. Each credit-card owner has a personalized strip full of intimate data sitting right inside his or her pocket. Any purchase can be traced directly back to your wallet.

Although the scope of credit-card tracking efforts are unknown, the Journal reported that the NSA has established relationships with credit card companies akin to those that they had established with phone carriers, which provide them with data under warrant, subpoena or court order. These former officials didn’t know if the efforts were ongoing.

What could they find? Based on the technology of the mag stripe, quite a bit.

Even with just the metadata – digitally contained bits of information – on a credit card, they could most likely see when and where a purchase was made, and how much it cost.


Whether they’re walking to work, withdrawing money from an ATM or walking into their favorite local grocer, Americans could be within sight of one of the United States’ estimated 30 million surveillance cameras.

Police use them to monitor streets, subways and public spaces. Homeowners put them on their houses. Businesses mount them in stores and on buildings.

In Boston, for example, the FBI used still photos and video pulled from cameras to identify suspects after the Boston Marathon bombing. The images showed the suspects making calls from their cellphones, carrying what the police say were bombs, and leaving the scene.

New high-tech, high-definition security camera manufacturers give police departments the options of thermal imaging, 360-degree fields of view and powerful zoom capabilities for identifying people. Advances in camera technology enable new ways to monitor American citizens.

Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage, but analysis of footage has been made easier by automated software that organizes digital video footage into a searchable database, and by video analysis software (such as VIRAT and HumanID). The amount of footage is also drastically reduced by motion sensors which only record when motion is detected. With cheaper production techniques, surveillance cameras are simple and inexpensive enough to be used in home security systems, and for everyday surveillance.

In the United States, the Department of Homeland Security awards billions of dollars per year in Homeland Security grants for local, state, and federal agencies to install modern video surveillance equipment. For example, the city of Chicago, Illinois, recently used a $5.1 million Homeland Security grant to install an additional 250 surveillance cameras, and connect them to a centralized monitoring center, along with its preexisting network of over 2000 cameras, in a program known as Operation Virtual Shield. Speaking in 2009, Chicago Mayor Richard Daley announced that Chicago would have a surveillance camera on every street corner by the year 2016.

As part of China’s Golden Shield Project, several U.S. corporations, including IBM, General Electric, and Honeywell, have been working closely with the Chinese government to install millions of surveillance cameras throughout China, along with advanced video analytics and facial recognition software, which will identify and track individuals everywhere they go. They will be connected to a centralized database and monitoring station, which will, upon completion of the project, contain a picture of the face of every person in China: over 1.3 billion people Lin Jiang Huai, the head of China’s “Information Security Technology” office (which is in charge of the project), credits the surveillance systems in the United States and the U.K. as the inspiration for what he is doing with the Golden Shield Project.

The Defense Advanced Research Projects Agency (DARPA) is funding a research project called Combat Zones That See that will link up cameras across a city to a centralized monitoring station, identify and track individuals and vehicles as they move through the city, and report “suspicious” activity (such as waving arms, looking side-to-side, standing in a group, etc.).

Governments often initially claim that cameras are meant to be used for traffic control, but many of them end up using them for general surveillance. For example, Washington, D.C. had 5,000 “traffic” cameras installed under this premise, and then after they were all in place, networked them all together and then granted access to the Metropolitan Police Department, so they could perform “day-to-day monitoring”.

The development of centralized networks of CCTV cameras watching public areas – linked to computer databases of people’s pictures and identity (biometric data), able to track people’s movements throughout the city, and identify whom they have been with – has been argued by some to present a risk to civil liberties. Trapwire is an example of such a network.


A joint Pentagon/Department of Transportation plan to conduct a permanent surveillance of all motor vehicles using the Federal Highway System is code named ARGUS. It was initially a part of an overall public surveillance program instituted and organized by Admiral Poindexter, who was convicted of various criminal acts as the result of the Iran-Contra affair and then brought back to government service by the Bush Administration. Following public disclosure of Poindexter’s manic attempts to pry into all aspects of American life and his subsequent public departure from government service (he is still so employed but as a “private consultant” and not subject to public scrutiny) many of his plans were officially scrapped. ARGUS, however, is still valid has been fully developed and now is in experimental use on twelve Federal highways across the country..

This surveillance consists of having unmanned video cameras, soon to be installed over all Federal highways and toll roads with Presidential approval. These cameras work 24/7 to video all passing vehicles, trucks, private cars and busses. The information is passed to a central data bank and entered therein. This data can readily viewed at the request of any authorized law enforcement agency to include: private investigative and credit agencies licensed to work with Federal law enforcement information on any user of the road systems under surveillance. Provision will be made, according to the operating plans, to notify local law enforcement immediately if any driver attempts to obscure their license plate number and instructs them to at once to “apprehend and identify” the vehicle or vehicles involved. Federally-funded high-tech street lights now being installed in American cities are not only set to aid the DHS in making “security announcements” and acting as talking surveillance cameras, they are also capable of “recording conversations,” bringing the potential privacy threat posed by ‘Intellistreets’ to a whole new level.

The program has cost to date over $5 billion over a three year period.

This program can easily be installed and running on a nationwide basis within two years from its commencement.

It also is now a Federal crime to attempt to damage or in any way interfere with these surveillance devices.

Some states such as Colorado are using cameras as an alternative method of charging motorists toll fares. As a motorist drives through the toll lanes, motion-activated cameras capture an image of the license plate and the driver is billed.

Cameras are watching if you speed or run a red light, too.

Also, police departments in several metro areas began employing cameras to deter traffic infractions and raise revenue.

Libertarians and electronic privacy advocates oppose these methods, citing a lack of transparency in the use of the cameras and the retention of the data they collect.


As many as 30,000 domestic drones will travel the skies above U.S. soil within 20 years, according to a report for Congress by the Federal Aviation Administration.

Congress has called on the FAA to integrate unmanned aircraft into the national air system by 2017.

Already, the FAA has approved domestic drone use by 81 agencies, including schools, police departments and the Department of Homeland Security.

Among the applicants approved: the Arlington Police Department in Texas; California State University in Fresno; Canyon County Sheriff’s Office in Idaho; the city of Herington, Kan.; the Georgia Tech Research Institute; Kansas State University; the Miami-Dade Police Department in Florida; the Mississippi Department of Marine Resources; the Seattle Police Department; and the Universities of Alaska at Fairbanks, California-Davis and Florida.

Although these drones range in size, most are able to hover tens of thousands of feet in the sky, collecting images of people on the ground below.

Based on current trends – technology development, law enforcement interest, political and industry pressure, and the lack of legal safeguards – it is clear that drones pose a looming threat to Americans’ privacy.

Law enforcement agencies all over the United States are starting to use unmanned drones to spy on us, and the Department of Homeland Security is aggressively seeking to expand the use of such drones by local authorities….

The Department of Homeland Security has launched a program to “facilitate and accelerate the adoption” of small, unmanned drones by police and other public safety agencies, an effort that an agency official admitted faces “a very big hurdle having to do with privacy.”

The $4 million Air-based Technologies Program, which will test and evaluate small, unmanned aircraft systems, is designed to be a “middleman” between drone manufacturers and first-responder agencies.

The EPA is already using drones to spy on cattle ranchers in Nebraska and Iowa. Will we eventually get to a point where we all just consider it to be “normal” to have surveillance drones flying above our heads constantly?

The FBI uses aerial surveillance drones over US soil, and has agreed that further political debate and legislation to govern their domestic use may be necessary.

The bureau’s director admitted it used drones to aid its investigations.

However, the potential for growing drone use either in the US, or involving US citizens abroad, is an increasingly charged issue in Congress, and the FBI acknowleged there may need to be legal restrictions placed on their use to protect privacy.

It is known that drones are used by border control officials and have been used by some local law enforcement authorities and Department of Homeland Security in criminal cases.

“To the extent that it relates to the air space there would be some communication back and forth [between agencies],” Mueller said.

 “Pre-Crime” Surveillance Cameras

Also aiding and abetting police in their efforts to track our every movement in real time is Trapwire, which allows for quick analysis of live feeds from CCTV surveillance cameras. Some of Trapwire’s confirmed users are the DC police, and police and casinos in Las Vegas. Police in New York, Los Angeles, Canada, and London are also thought to be using Trapwire.

Using Trapwire in conjunction with NGI, police and other government agents will be able to pinpoint anyone by checking the personal characteristics stored in the database against images on social media websites, feeds from the thousands of CCTV surveillance cameras installed throughout American cities (there are 3,700 CCTV cameras tracking the public in the New York subway system alone), as well as data being beamed down from the more than 30,000 surveillance drones taking to the skies within the next eight years. Given that the drones’ powerful facial recognition cameras will be capable of capturing minute details, including every mundane action performed by every person in an entire city simultaneously, soon there really will be nowhere to run and nowhere to hide, short of living in a cave, far removed from technology.

NGI will not only increase sharing between federal agencies, opening up the floodgates between the Department of Homeland Security, the State Department, the Department of Justice, and the Department of Defense, but states can also get in on the action. The system was rolled out in Michigan in February 2012, with Hawaii, Maryland, South Carolina, Ohio, New Mexico, Kansas, Arizona, Tennessee, Nebraska, and Missouri on the shortlist for implementation, followed by Washington, North Carolina, and Florida in the near future.

Going far beyond the scope of those with criminal backgrounds, the NGI data includes criminals and non-criminals alike – in other words, innocent American citizens. The information is being amassed through a variety of routine procedures, with the police leading the way as prime collectors of biometrics for something as non-threatening as a simple moving violation. For example, the New York Police Department began photographing irises of suspects and arrestees in 2010, routinely telling suspects that the scans were mandatory, despite there being no law requiring defendants to have their irises scanned. Police departments across the country are now being equipped with the Mobile Offender Recognition and Information System, or MORIS, a physical iPhone add-on that allows officers patrolling the streets to scan the irises and faces of individuals and match them against government databases.

To start with, there’s the government’s integration of facial recognition software and other biometric markers into its identification data programs.

The FBI’s Next Generation Identification (NGI) system is a $1 billion project that is aimed at dramatically expanding the government’s current ID database from a fingerprint system to a facial recognition system. NGI will use a variety of biometric data, cross-referenced against the nation’s growing network of surveillance cameras to not only track your every move but create a permanent “recognition” file on you within the government’s massive databases. Researchers at the Massachusetts Institute of Technology’s Media Lab are developing software that can read the feelings behind facial expressions. In some cases, the computers outperform people. The software could lead to empathetic devices and is being used to evaluate and develop better advertisements.

By the time it’s fully operational in 2018, NGI will serve as a vast data storehouse of “iris scans, photos searchable with face recognition technology, palm prints, and measures of gait and voice recordings alongside records of fingerprints, scars, and tattoos.” One component of NGI, the Universal Face Workstation, already contains some 13 million facial images, gleaned from “criminal mug shot photos” taken during the booking process. However, with major search engines having “accumulated face image databases that in their size dwarf the earth’s population,” the government taps into the trove of images stored on social media and photo sharing websites such as Facebook.A company known as BRS Labs has developed “pre-crime” surveillance cameras that can supposedly determine if you are a terrorist or a criminal even before you commit a crime and dozens of these cameras are being installed at major transportation hubs in San Francisco….

In its latest project BRS Labs is to install its devices on the transport system in San Francisco, which includes buses, trams and subways.

The company says will put them in 12 stations with up to 22 cameras in each, bringing the total number to 288.

The cameras will be able to track up to 150 people at a time in real time and will gradually build up a ‘memory’ of suspicious behavior to work out what is suspicious.

Mobile Backscatter Vans

Police all over America will soon be driving around in unmarked vans looking inside your cars and even under your clothes using the same “pornoscanner” technology currently being utilized by the TSA at U.S. airports….

American intelligence agencies are set to join the US military in deploying American Science & Engineering’s Z Backscatter Vans, or mobile backscatter radiation x-rays. These are what TSA officials call “the amazing radioactive genital viewer,” now seen in airports around America, ionizing the private parts of children, the elderly.

These porno scanner wagons will look like regular anonymous vans, and will cruise America’s streets, indiscriminately peering through the cars (and clothes) of anyone in range of its mighty isotope-cannon. But don’t worry, it’s not a violation of privacy. As AS&E’s vice president of marketing Joe Reiss sez, “From a privacy standpoint, I’m hard-pressed to see what the concern or objection could be.”

RFID Microchips

Most Americans don’t realize this, but RFID microchips are steadily becoming part of the very fabric of our lives. Many of your credit cards and debit cards contain them. Many Americans use security cards that contain RFID microchips at work. In some parts of the country it is now mandatory to inject an RFID microchip into your pet.

District officials said the Radio Frequency Identification System (RFID) tags would improve safety by allowing them to locate students — and count them more accurately at the beginning of the school day to help offset cuts in state funding, which is partly based on attendance.

Automated License Plate Readers

Automated license plate readers are being used to track the movements of a vehicle from the time that it enters Washington D.C. to the time that it leaves….

More than 250 cameras in the District and its suburbs scan license plates in real time, helping police pinpoint stolen cars and fleeing killers. But the program quietly has expanded beyond what anyone had imagined even a few years ago.

With virtually no public debate, police agencies have begun storing the information from the cameras, building databases that document the travels of millions of vehicles.

Nowhere is that more prevalent than in the District, which has more than one plate-reader per square mile, the highest concentration in the nation. Police in the Washington suburbs have dozens of them as well, and local agencies plan to add many more in coming months, creating a comprehensive dragnet that will include all the approaches into the District.

Data Mining

The government is not the only one that is spying on you. The truth is that a whole host of very large corporations are gathering every shred of information about you that they possibly can and selling that information for profit. It is called “data mining”, and it is an industry that has absolutely exploded in recent years.

One very large corporation known as Acxiom actually compiles information on more than 190 million people in the U.S. alone….

The company fits into a category called database marketing. It started in 1969 as an outfit called Demographics Inc., using phone books and other notably low-tech tools, as well as one computer, to amass information on voters and consumers for direct marketing. Almost 40 years later, Acxiom has detailed entries for more than 190 million people and 126 million households in the U.S., and about 500 million active consumers worldwide. More than 23,000 servers in Conway, just north of Little Rock, collect and analyze more than 50 trillion data ‘transactions’ a year.

Cable television spying

When people download a film from Netflix to a flatscreen, or turn on web radio, they could be alerting unwanted watchers to exactly what they are doing and where they are.

Spies will no longer have to plant bugs in your home – the rise of ‘connected’ gadgets controlled by apps will mean that people ‘bug’ their own homes.

The CIA claims it will be able to ‘read’ these devices via the internet – and perhaps even via radio waves from outside the home.

Everything from remote controls to clock radios can now be controlled via apps – and chip company ARM recently unveiled low-powered, cheaper chips which will be used in everything from fridges and ovens to doorbells.

These web-connected gadgets will ‘transform’ the art of spying – allowing spies to monitor people automatically without planting bugs, breaking and entering or even donning a tuxedo to infiltrate a dinner party.

‘Particularly to their effect on clandestine tradecraft. Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters –  all connected to the next-generation internet using abundant, low-cost, and high-power computing.’

One of the world’s biggest chip companies, ARM, has unveiled a new processor built to work inside ‘connected’ white goods.

The ARM chips are smaller, lower-powered and far cheaper than previous processors – and designed to add the internet to almost every kind of electrical appliance.

It’s a concept described as the ‘internet of things’.

Futurists think that one day ‘connected’ devices will tell the internet where they are and what they are doing at all times – and will be mapped by computers as precisely as Google Maps charts the physical landscape now.

The forced conversion to High Definition TV means we will only be able to receive a digital TV signal instead of an analog TV signal. This began in 2009. The surveillance specialists will then have the ability to manipulate that digital signal in any direction desired, for any purpose desired.

In addition, all of the newer wide-screen High Definition TVs found in retail outlets today have both tiny cameras and audio detection devices covertly installed within them so the NSA can both observe and listen to everything within it operatinal radius.  The conversion boxes that have been offered with those free government coupons will have the same detection and surveillance devices.

And covert monitoring/tracking chips have been installed in all automobiles manufactured since 1990

  1. Don’t buy the newer HD TVs and don’t get their conversion box. Forget getting TV from broadcast or cable or satellite directly. One idea is to watch TV shows from your older computer with currently availabe TV reception hardware/software (newer computers probably have the surveillance devices installed) or send the video and audio from the computer into the AV jacks on your TV or VCR.
  2. Watch TV shows from programs previously recorded on VHS tapes or from DVDs using your older TV and VCR equipment. This could become a cottage industry overnight if enough people become aware of the covert surveillance agenda riding along on the coattails of the forced conversion to High Definition digital television.
  3. You can listen to only television audio from many inexpensive radios that include the TV audio bands from channel 2-13

In most cases, audio is good enough for me. I’m mainly looking for those few comedy offerings here and there that will provide a laugh. Most sitcoms are just awful: ‘boring’ or ‘banal’ would be complimentary descriptions.

There are also many “black box technologies” being developed out there that the public does not even know about yet.

Then there are the nation’s public schools, where young people are being conditioned to mindlessly march in lockstep to the pervasive authoritarian dictates of the surveillance state. It was here that surveillance cameras and metal detectors became the norm. It was here, too, that schools began reviewing social media websites in order to police student activity. With the advent of biometrics, school officials have gone to ever more creative lengths to monitor and track students’ activities and whereabouts, even for the most mundane things. For example, students in Pinellas County, Fla., are actually subjected to vein recognition scans when purchasing lunch at school.

Of course, the government is not the only looming threat to our privacy and bodily integrity. As with most invasive technologies, the groundwork to accustom the American people to the so-called benefits or conveniences of facial recognition is being laid quite effectively by corporations. For example, a new Facebook application, Facedeals, is being tested in Nashville, Tenn., which enables businesses to target potential customers with specialized offers. Yet another page borrowed from Stephen Spielberg’s 2002 Minority Report, the app works like this: businesses install cameras at their front doors which, using facial recognition technology, identify the faces of Facebook users and then send coupons to their smartphones based upon things they’ve “liked” in the past.

Making this noxious mix even more troubling is the significant margin for error and abuse that goes hand in hand with just about every government-instigated program, only more so when it comes to biometrics and identification databases. Take, for example, the Secure Communities initiative. Touted by the Department of Homeland Security as a way to crack down on illegal immigration, the program attempted to match the inmates in local jails against the federal immigration database. Unfortunately, it resulted in Americans being arrested for reporting domestic abuse and occasionally flagged US citizens for deportation. More recently, in July 2012, security researcher Javier Galbally demonstrated that iris scans can be spoofed, allowing a hacker to use synthetic images of an iris to trick an iris-scanning device into thinking it had received a positive match for a real iris over 50 percent of the time.

The writing is on the wall. With technology moving so fast and assaults on our freedoms, privacy and otherwise, occurring with increasing frequency, there is little hope of turning back this technological, corporate and governmental juggernaut. Even trying to avoid inclusion in the government’s massive identification database will be difficult. The hacktivist group Anonymous suggests wearing a transparent plastic mask, tilting one’s head at a 15 degree angle, wearing obscuring makeup, and wearing a hat outfitted with Infra-red LED lights as methods for confounding the cameras’ facial recognition technology.

Consider this, however: while the general public, largely law-abiding, continues to be pried on, spied on and treated like suspects by a government that spends an exorbitant amount of money on the security-intelligence complex (which takes in a sizeable chunk of the $80 billion yearly intelligence budget), the government’s attention and resources are effectively being diverted from the true threats that remain at large – namely, those terrorists abroad who seek, through overt action and implied threat, to continue the reign of terror in America begun in the wake of the 9/11 attacks.

The CIA Confessions: The Crowley Conversations

July 15, 2019

by Dr. Peter Janney

On October 8th, 2000, Robert Trumbull Crowley, once a leader of the CIA’s Clandestine Operations Division, died in a Washington hospital of heart failure and the end effects of Alzheimer’s Disease. Before the late Assistant Director Crowley was cold, Joseph Trento, a writer of light-weight books on the CIA, descended on Crowley’s widow at her town house on Cathedral Hill Drive in Washington and hauled away over fifty boxes of Crowley’s CIA files.

Once Trento had his new find secure in his house in Front Royal, Virginia, he called a well-known Washington fix lawyer with the news of his success in securing what the CIA had always considered to be a potential major embarrassment.

Three months before, on July 20th of that year, retired Marine Corps colonel William R. Corson, and an associate of Crowley, died of emphysema and lung cancer at a hospital in Bethesda, Md.

After Corson’s death, Trento and the well-known Washington fix-lawyer went to Corson’s bank, got into his safe deposit box and removed a manuscript entitled ‘Zipper.’ This manuscript, which dealt with Crowley’s involvement in the assassination of President John F. Kennedy, vanished into a CIA burn-bag and the matter was considered to be closed forever.

The small group of CIA officials gathered at Trento’s house to search through the Crowley papers, looking for documents that must not become public. A few were found but, to their consternation, a significant number of files Crowley was known to have had in his possession had simply vanished.

When published material concerning the CIA’s actions against Kennedy became public in 2002, it was discovered to the CIA’s horror, that the missing documents had been sent by an increasingly erratic Crowley to another person and these missing papers included devastating material on the CIA’s activities in South East Asia to include drug running, money laundering and the maintenance of the notorious ‘Regional Interrogation Centers’ in Viet Nam and, worse still, the Zipper files proving the CIA’s active organization of the assassination of President John Kennedy..

A massive, preemptive disinformation campaign was readied, using government-friendly bloggers, CIA-paid “historians” and others, in the event that anything from this file ever surfaced. The best-laid plans often go astray and in this case, one of the compliant historians, a former government librarian who fancied himself a serious writer, began to tell his friends about the CIA plan to kill Kennedy and eventually, word of this began to leak out into the outside world.

The originals had vanished and an extensive search was conducted by the FBI and CIA operatives but without success. Crowley’s survivors, his aged wife and son, were interviewed extensively by the FBI and instructed to minimize any discussion of highly damaging CIA files that Crowley had, illegally, removed from Langley when he retired. Crowley had been a close friend of James Jesus Angleton, the CIA’s notorious head of Counterintelligence. When Angleton was sacked by DCI William Colby in December of 1974, Crowley and Angleton conspired to secretly remove Angleton’s most sensitive secret files out of the agency. Crowley did the same thing right before his own retirement, secretly removing thousands of pages of classified information that covered his entire agency career.

Known as “The Crow” within the agency, Robert T. Crowley joined the CIA at its inception and spent his entire career in the Directorate of Plans, also know as the “Department of Dirty Tricks. ”

Crowley was one of the tallest man ever to work at the CIA. Born in 1924 and raised in Chicago, Crowley grew to six and a half feet when he entered the U.S. Military Academy at West Point in N.Y. as a cadet in 1943 in the class of 1946. He never graduated, having enlisted in the Army, serving in the Pacific during World War II. He retired from the Army Reserve in 1986 as a lieutenant colonel. According to a book he authored with his friend and colleague, William Corson, Crowley’s career included service in Military Intelligence and Naval Intelligence, before joining the CIA at its inception in 1947. His entire career at the agency was spent within the Directorate of Plans in covert operations. Before his retirement, Bob Crowley became assistant deputy director for operations, the second-in-command in the Clandestine Directorate of Operations.

Bob Crowley first contacted Gregory Douglas in 1993 when he found out from John Costello that Douglas was about to publish his first book on Heinrich Mueller, the former head of the Gestapo who had become a secret, long-time asset to the CIA. Crowley contacted Douglas and they began a series of long and often very informative telephone conversations that lasted for four years. In 1996, Crowley told Douglas that he believed him to be the person that should ultimately tell Crowley’s story but only after Crowley’s death. Douglas, for his part, became so entranced with some of the material that Crowley began to share with him that he secretly began to record their conversations, later transcribing them word for word, planning to incorporate some, or all, of the material in later publication

Conversation No. 99

Date: Friday, August 22, 1997

Commenced: 3:17 PM CST

Concluded: 3:35 PM CST

GD: Robert, we have talked about Clinton and I have been reading about his alleged tie ins with your people and the smuggling of drugs. Anything to it?

RTC: Oh yes, much true there. Drugs are brought up from South America, for cocaine and heroin and Mexico for marijuana. They just fly it in over the border and land at a safe small airfield, unload and go back from whence them came. Arizona is popular and some ranchers there are very rich from taking in landing fees.

GD: Clinton’s involvement?

RTC: His brother is hophead and Bill does like under the counter money. So does his wife. It’s a wink and a nod type of thing.

GD: Money corrupts and big money corrupts big people.

GD: Yes, anyone is for sale.

GD: I recall the story of the man in the bar who saw a beautiful woman come in. She sat next to him and he asked her if she would spend the night with him for a thousand dollars. She said she certainly would. Then he asked her if she would drop the price to fifty dollars. When she said, in some anger, ‘what do you think I am? He replied, ‘we already know that. I’m just trying to establish the price.’

RTC:(Laughter)  I haven’t heard that one but it does fit. And don’t be fooled by Clinton. He is a large man, very smooth, a great talker and very jovial. Have you offed in a second and think nothing about it. Well, he’s done his duty and will retire, a rich man.. And he will write a book and the New York Times will rave about it.

GD: Yes, they praised Posner’s totally idiotic book on the Kennedy killing.

RTC: Oh that piece of shit. I mean both the book and the author. What an odious ass kisser that one is. Bought and paid for. And so is the Times. They print just what we tell them to print, where our operations are concerned, and kill whatever we tell them to. I have had to deal with them in the past. We toss them a few nice bones from time to time but they do as they are told, believe me.

GD: So much for freedom of the press.

RTC: (Laughter) What a joker you are, Gregory. The Jews own all the major papers in this country, and we work with them. They won’t print a negative word about Israel and on the domestic scene, they do as we ask them. In point of fact, the Jews here think they are going to own everything but in fact, they are here on sufferance. They’ve been kicked out of every country they have lived in throughout history. Mostly a bunch of swindlers, con men and the like. On sufferance. If things get bad here, the men in power, and they are not Jews, will use them as scapegoats and force them out. We don’t  need concentration camps here as long as El Al can take them back to their Mediterranean paradise. Personally, the sooner the better before they ruin the stock market with their backdoor scheming and we have another depression.

GD: They had little to do with the ’29 one, however.

RTC: Just you wait, Gregory, they’ll do it again, mark my words. Yes, Hitler was right about them. Parasites. Never create anything and attach themselves to the system like leeches.

GD: As far as Clinton is concerned, he doesn’t have to worry about the Jews because of his wife but the born again morons hate him. Old Ken Staar is from Chicago and is as crazy as they come. As a matter of fact, all of these raging twits should be shoved into the El Al baggage compartments and shipped off with the Jews. By the way, did you know that the precious wailing wall in Jerusalem is not the foundation of Soloman’s temple but was built by the Arabs about 600 AD? How ironic it is to see devout Jews licking the stones that some Arab mason pissed on hundreds of years before. And there enough pieces of the true cross floating around to build a six room house.

RTC: The relic business was booming once.

GD: Well, now they sell other things, don’t they? I rarely read the main stream press because I don’t trust Israel and the press knocks themselves out to kiss their ass. I predict that if the US doesn’t disengage over there, the frustrated Arabs will start attacking us next. Washington said it best: No entangling alliances. Of course no one will follow such a course but the time will come when they wish they had.

RTC: I’m afraid so. This is beginning to sound like a Nazi party meeting but the truth will out, won’t it?

GD: Not in the New York Times, it won’t.

RTC: Isn’t the truth what people want to believe?

GD: Or are told to believe. If you lie to people long enough, they will either come to believe the lies or will recognize them for what they are and turn on the liars. I predict both of these concepts because one always follows the other.


(Concluded at 3:35 PM CST)



No responses yet

TBR News July 14, 2019

Jul 14 2019 Published by under Uncategorized

The Voice of the White House Washington, D.C. July 14, 2019:

“Working in the White House as a junior staffer is an interesting experience.

When I was younger, I worked as a summer-time job in a clinic for people who had moderate to severe mental problems and the current work closely, at times, echos the earlier one.

I am not an intimate of the President but I have encountered him from time to time and I daily see manifestations of his growing psychological problems.

He insults people, uses foul language, is frantic to see his name mentioned on main-line television and pays absolutely no attention to any advice from his staff that runs counter to his strange ideas.

He lies like a rug to everyone, eats like a hog, makes lewd remarks to female staffers and flies into rages if anyone dares to contradict him.

His latest business is to re-institute a universal draft in America.

He wants to do this to remove tens of thousands of unemployed young Americans from the streets so they won’t come together and fight him.

Commentary for July 14:” According to Pakistani government intelligence, the CIA is heavily involved with al-Quaeda and IS and introduced them into Afghanistan for guerrilla actions so as to be able to convince Washington to increase the number of American troops into that country to protect the highly profitable opium fields.

If one looks at a map showing the locations of the known opium fields in Afghanistan and then looks at another map showing US military units in place, the two are nearly identical.

Russian intelligence is well aware that the US CIA and the Pentagon are secretly supporting the Saudi-raised Sunni IS, a branch of which is now very active in Afghanistan.

It is very well known that a major portion of Afghanistani gum opium is taken over by CIA people and most of it is shipped to Columbia.

A portion of this opium goes to Kosovo where it is also refined and then shipped up through Germany to Russia. This annoys the Russians who have made a strong effort to put a halt to something that killed over 50,000 Russians last year from heroin overdoses.

Here we have an interesting situation.

Russia, with good reason, objects to having heroin smuggled into her country and attempts to put a stop to it.

The United States, a country that, via its agencies, is heavily involved in the international drug trade, objects to this attitude.

Therefore, in addition to all Russia’s oil and gas which America badly needs, the US has an excellent motive for making Russia a handy enemy.

Enemies are necessary to stimulate public support for more profitable (to some at least) small wars.


The Table of Contents

  • Hong Kong extradition protesters escalate fight in suburbs
  • What’s Really Going On in Hong Kong?
  • U.S. appeals court blocks Trump administration birth control exemptions
  • This Death Star presidency is no ally for modern Britain
  • American Carnage: a masterful must-read on Trump’s Republican takeover
  • U.S. appeals court blocks Trump administration birth control exemptions
  • Jeffrey Epstein: how US media – with one star exception – whitewashed the story
  • Encyclopedia of American Loons
  • The CIA Confessions: The Crowley Conversations

Continue Reading »

No responses yet

TBR News July 12, 2019

Jul 12 2019 Published by under Uncategorized

The Voice of the White House Washington, D.C. July 12, 2019:

“Working in the White House as a junior staffer is an interesting experience.

When I was younger, I worked as a summer-time job in a clinic for people who had moderate to severe mental problems and the current work closely, at times, echos the earlier one.

I am not an intimate of the President but I have encountered him from time to time and I daily see manifestations of his growing psychological problems.

He insults people, uses foul language, is frantic to see his name mentioned on main-line television and pays absolutely no attention to any advice from his staff that runs counter to his strange ideas.

He lies like a rug to everyone, eats like a hog, makes lewd remarks to female staffers and flies into rages if anyone dares to contradict him.

His latest business is to re-institute a universal draft in America.

He wants to do this to remove tens of thousands of unemployed young Americans from the streets so they won’t come together and fight him.

Commentary for July 12:”Poor Trump wants to project the public an image as a powerful businessman, a studly ladies’s man and a friend of fanatic Jesus Freaks and American Nazis. In truth, he is a chronic liar, made money swindling people, is a tax cheat, and is also a weak personality who boosts his self-image by threats, bigotry and bluster. The Jesus Freaks and neo-nazis love him and the rest of the country views him as they would a smelly wino begging money from them in a public park.”

The Table of Contents

  • The Death of Privacy: Government Fearmongers to Read Your Mail
  • Russia delivers missile system to Turkey in challenge to NATO
  • Ruining a country near you soon: the beta males who think they’re alphas
  • An Oveview of Drones
  • Alex Acosta resigns as US labor secretary following Epstein plea deal scandal
  • Encyclopedia of American Loons
  • The CIA Confessions: The Crowley Conversations

Continue Reading »

No responses yet

TBR News July 11, 2019

Jul 11 2019 Published by under Uncategorized

The Voice of the White House Washington, D.C. July 11, 2019:

“Working in the White House as a junior staffer is an interesting experience.

When I was younger, I worked as a summer-time job in a clinic for people who had moderate to severe mental problems and the current work closely, at times, echos the earlier one.

I am not an intimate of the President but I have encountered him from time to time and I daily see manifestations of his growing psychological problems.

He insults people, uses foul language, is frantic to see his name mentioned on main-line television and pays absolutely no attention to any advice from his staff that runs counter to his strange ideas.

He lies like a rug to everyone, eats like a hog, makes lewd remarks to female staffers and flies into rages if anyone dares to contradict him.

His latest business is to re-institute a universal draft in America.

He wants to do this to remove tens of thousands of unemployed young Americans from the streets so they won’t come together and fight him.

Commentary for July 11: “Almost every day, the American court system deals Trump another blow by rejecting his addlepated ideas. He runs around the White House offices, bellowing like a glandered elephant in a forest fire and comes up with another scheme that is bound to enrage everyone except his pointy headed supporters (the ones wearing American flag underpants and little red hats on their pointy heads) And the national deficit is growing daily and he does nothing about trying to reduce it. He should divorce his wife, marry Boris Johnson and move to some part of England without electricity.”


The Table of Contents

  • How Iran Would Battle the U.S. In a War (It Would Be Bloody)
  • The US-UK ‘special relationship isn’t broken – it’s just entering a dangerous new phase
  • Trump abandons effort to put citizenship question on 2020 census
  • U.S. government posts $8 billion deficit in June
  • It’s About Time We Recognize What Fuels Terrorism
  • Encyclopedia of American Loons
  • The CIA Confessions: The Crowley Conversations
  • Huge racket in fake Nazi relics exposed

Continue Reading »

No responses yet

« Prev - Next »