We Are Change Shocking! Mail
- Assange: Deep State Working to Remove Trump, Install Pence
- Arkansas Rejects Law Banning Medical Marijuana – Again
- Project Veritas Video Exposes Teacher Raped Students at Knife Point, Protected By Union
- Judge Rules In Favor Of Privacy On Fingerprint-Locked Phones
- White House Fence Jumper Believed BuzzFeed’s ‘Golden Showers’ Dossier Was His Fault
- A CIA Cyber False Flag
- Police Attempt To Lie About ‘New Law’ To Force An Attorney To Stop Recording
- What You Weren’t Taught: The U.S. Government’s National Experiment in Extermination
- Trump Gave CIA Secret New Authority To Launch Drone Strikes
- Turkey May Soon Unleash Millions Of Refugees
- Congressman Arrested For Refusing To Leave ICE Office In Chicago
- Snoop Dogg Pulls Fake Gun On Trump Parody In New Music Video
- U.S. Delta Force, SEAL Team 6 Prepare To Take Out Kim Jong-Un
- Saudi Crown Prince Flies To Washington To Meet With Donald Trump
- Kellyanne Conway Claims Trump Tower May Have Been Spied On Through Microwaves
|Assange: Deep State Working to Remove Trump, Install Pence
Posted: 14 Mar 2017 12:05 PM PDT
Julian Assange has sensationally claimed that Hillary Clinton and the intelligence community are pushing for the removal of President Donald Trump.
In a series of tweets, Assange wrote that “Clinton stated privately this month that she is quietly pushing for a Pence takeover.”
Assange also wrote that “Two IC [intelligence community] officials close to Pence stated privately this month that they are planning on a Pence takeover. Did not state if Pence agrees.”
Pence denied the accusations, calling them “absurd and offensive.”
Assange responded in a tweet expressing that “It should be noted that both the officials close to Pence and Hillary Clinton spoke of moving towards an ‘impeachment’ not other action.”
Assange has continuously accused the deep state of plotting against the 45th President. The evidence is mounting that the “intelligence community” and the establishment are working overtime to undermine President Trump, from the leak of private conversations from inside the Trump administration to the emerging audio of Speaker of the House Paul Ryan saying he would not defend Donald Trump.
The post Assange: Deep State Working to Remove Trump, Install Pence appeared first on We Are Change.
|Arkansas Rejects Law Banning Medical Marijuana – Again
Posted: 14 Mar 2017 11:45 AM PDT
For the second time this month, the Arkansas Senate on Monday rejected a bill to ban medical marijuana in the state.
Arkansas State Senators voted 15-10 on Monday against Sen. Bill 357 co-sponsored by Republican Sen. Jason Rapert.
Opposing the bill, Republican State Senator Jeremy Hutchinson emphasized that the medical marijuana amendment approved by voters mandates that the Legislature may not amend its provisions legalizing medicinal use of marijuana “stalks, seeds, roots, dried leaves, flowers, oils, vapors, waxes and other portions of the marijuana plant and any mixture or preparation thereof.”
“The point is, they said we couldn’t touch it,” Hutchinson said.
What both sides of the debate may have missed are the dozens of studies on the health benefits of marijuana, including a report that marijuana compounds kill cancer cells.
Twenty-eight states, Washinton D.C., and the U.S. territories of Guam and Puerto Rico have already adopted comprehensive medical marijuana laws that allow seriously ill patients to access medical marijuana if their doctors recommend it.
Eight states and D.C. have enacted laws making possession of limited amounts of marijuana legal for adults 21 years of age and older.
Four states — Alaska, Colorado, Oregon, and Washington — have established systems for regulating the recreational production and sale of marijuana.
In Congress, proposed bill H.R.975 seeks to amend the Controlled Substances Act to provide for a new rule regarding the application of the Act to marijuana. Passage of this Act would halt federal officials from prosecuting individuals and businesses in the 29 states that permit either the medical or legalized decriminalization for adults to use and distribute marijuana lawfully – ending the raids on marijuana dispensaries and on private citizens in states that have voted to accept marijuana.
The post Arkansas Rejects Law Banning Medical Marijuana – Again appeared first on We Are Change.
|Project Veritas Video Exposes Teacher Raped Students at Knife Point, Protected By Union
Posted: 14 Mar 2017 07:53 AM PDT
A shocking new undercover video from Project Veritas captured the senior counsel for a New York teacher’s union admitting to defending a junior high school teacher who forced students to perform oral sex at knife point. It remains unknown if the predator is still at large.
The 16-minute long hidden-camera video that was released on Tuesday morning is sure to chill parents to their cores.
Unknowingly speaking to a Project Veritas undercover journalist at a union holiday party in December, 2015, Mitchell Rubinstein, the senior counsel for New York State United Teachers, smiled continuously as he described the case of a junior high school teacher he defended two decades ago.
The teacher, referred to only as “Mike,” was accused by multiple male students of forcing them to perform oral sex at knife-point, according to Rubinstein. The union lawyer describes how there was overwhelming evidence of his guilt, including students knowing the name of his pet parrot, his phone number, and describing furniture in his home. He also asserts that the court had subpoenaed the teacher’s phone records, and found calls to one of his alleged victim’s girlfriends — implying that the student was in fact in his home.
Rubinstein also claimed that the teacher admit to the sexual abuse.
Rubinstein casually describes informing the teacher that he would go to jail if “this goes bad.”
“And I go to him, dude, you know, you’re going to go to jail if this goes bad, because like forced sex with like a minor. This is like the worst…you know, as bad as it gets,” Rubinstein explains.
The Project Veritas journalist asks, “but you were defending the teacher?”
“I’m always defending the teacher,” Rubinstein replied.
The teacher was eventually convinced to resign, but was not convicted and therefore could still be at large, Project Veritas notes. It is possible that he could still be teaching, as he was not registered as a sex offender.
Rubinstein admits in the footage that he does not know what happened to Mike, other than a failed run for city council.
Project Veritas spent hundreds of man-hours trying to track down the identity of the teacher. Their investigation included sending a second undercover journalist to meet with him and even hiring two outside private investigation firms. Still, they were unable to find his last name.
“We hope that by releasing this video, people will come forward and help us find Mike,” James O’Keefe, founder of Project Veritas, wrote in a press release.
Teachers unions have long protected dirty educators — no matter the heinous nature of the allegations.
When unions and dirty teachers win, the students and our communities lose.
“Are the rights of the teachers union members so absolute that it can supersede the rights of a child not to be forced to have sex while a knife is pointed at their throat?” O’Keefe asks.
The post Project Veritas Video Exposes Teacher Raped Students at Knife Point, Protected By Union appeared first on We Are Change.
|Judge Rules In Favor Of Privacy On Fingerprint-Locked Phones
Posted: 13 Mar 2017 11:48 PM PDT
Congratulations, friend. You are now slightly more free thanks to a recent ruling by a federal judge in Chicago. The Federal Bureau of Investigations (FBI), the nation’s top law enforcement agency, previously filed a warrant to search the home of a man believed to be trafficking child pornography. U.S. Magistrate Judge David Weisman denied the request based on a lack of evidence to justify to the privacy intrusion.
The case deals with an FBI investigation involving suspects accused of trafficking images of child pornography via the internet. The prosecution representing the FBI requested a warrant, which would have given the bureau “the authority to compel any individual who is present at the subject premises at the time of the search” to provide a fingerprint or thumbprint needed to unlock an Apple device.
The Chicago Tribune reported:
“Weisman, a former federal prosecutor and FBI agent, wrote in his 14-page opinion last month that the government hadn’t presented enough facts in its application that would justify such sweeping “intrusions,” including any specific information about those who might be living at the residence or their connection to the child pornography investigation.”
Jennifer Lynch, a senior staff attorney at the Electronic Frontier Foundation, a nonprofit digital rights group, told the Tribune she was hopeful the ruling would send a sign to federal agencies seeking broad powers to access individuals’ cell phones without probable cause. “This is a very new area of the law. We’ve only had the ability to unlock our phones with our fingerprints for a few years now,” Lynch said. “And so in this situation, there’s nobody on the other side to say to the court this is outrageous and there are some cases to back us up.”
As the Tribune noted, in 2014 the U.S. Supreme Court ruled that police must obtain a warrant before they can search an arrestee’s phone. However, the Supreme Court also found that physical evidence, including a fingerprint, can be collected without a court-approved warrant. While it seems the Supreme Court is protecting the rights of the American population for the moment, it is troubling that the FBI is seeking to establish a precedent for warrants that allow access to every individual’s phone in a single home.
Some critics will argue that the government should have access to anything they want in their fight against crime, especially regarding something as disturbing and disgusting as child pornography. We should be cautious of accepting such extremist arguments. For example, the State has claimed the loss of freedom and privacy is necessary to fight terrorism. We can look around and see the obvious failure of that venture. When it comes to child pornography, some may falter and say the crime (or the possibility of the crime) justifies an “insignificant” loss of freedom. Be careful when it comes to these emotional ploys. Do not waver in your principles.
The reality is that the U.S. government has a number of agencies that already have access to your cell phone. This includes the NSA, FBI, CIA, and pretty much any federal, local, or state agency with access to a cell site simulator, aka stingray. If that doesn’t work, they can just remotely turn on your Smart TV. The push to get access to your phone via fingerprints is actually a part of the growing surveillance state, and more specifically, a part of the push for biometrics.
In fact, the FBI is already facing a new lawsuit from EPIC (Electronic Privacy Information Center) over the agency’s latest biometric identification system. The FBI’s Next Generation Identification (NGI) system is made up of fingerprints, iris scans, faceprints, and other facial recognition data. EPIC is suing regarding the FBI’s plan to include tattoos and scars in the database and is asking a judge to force the FBI to release records about its plan to share the biometric data with the U.S. Department of Defense.
EPIC filed a Freedom of Information Act request last year, but the FBI has so far refused to release the 35 pages of responsive records. EPIC and privacy advocates are concerned about the potential for cases of mistaken identity and abuse of the collected data. EPIC also highlights that even the FBI itself “stated that ‘[i]ncreased collection and retention of personally identifiable information presents a correspondingly increased risk that the FBI will then be maintaining more information that might potentially be subject to loss or unauthorized use.’”
Welcome to America in 2017. Big Brother and Big Sister are always listening, and you do not own your own fingerprint or face. For the moment we celebrate a slight victory, but now is not the time to rest. We must continue to expose and combat the eyes and ears of the State. Without privacy, there is no freedom. We are watching the concept of privacy quickly vanish before our eyes. It is up to every free heart and mind of the world to stand up and create new systems that serve the people, not the ruling class.
The post Judge Rules In Favor Of Privacy On Fingerprint-Locked Phones appeared first on We Are Change.
|White House Fence Jumper Believed BuzzFeed’s ‘Golden Showers’ Dossier Was His Fault
Posted: 13 Mar 2017 09:37 PM PDT
On Monday, February 27th I attended an event hosted by Roger Stone at the Hay Adams Hotel to celebrate the release of his new book — so did the White House fence jumper.
The formal event was beautiful and packed with journalists from Breitbart, the Atlantic, and many other outlets — as well as some of Stone’s biggest fans. Among them was Jonathan T. Tran, 26, who mingled his way through the crowd.
Following the event I went to Off the Record, the bar downstairs, with several friends. We sat at a table close to the entrance and laughed about the brilliant coasters adorned with artwork of Paul Ryan, President Donald Trump, and the first lady. Tran joined us, ordering a hamburger and fries. He seemed very much like everyone else in DC — a slightly awkward political junkie.
As we said our goodbyes and began to head our separate ways, Tran asked a friend of mine at the table if he could give him a ride to Trump International Hotel. I assumed that they knew each other and offered to walk with him, since I was heading there to have a drink as well.
We discussed the event, the city, and of course, Donald Trump. He told me how much he loves alternative media, and we agreed that the mainstream media had waged war on the president by no longer even pretending to hide their bias against him.
About halfway to the hotel, I realized that walking in expensive heels isn’t generally fun, and hailed a cab. After we got in, I asked Tran if he had been in town for CPAC, which had just concluded over the weekend. He explained that he had travelled across the country just for Stone’s event — and said that he did not even have a place to stay. He told me that he was planning to book a room at Trump International, though he was a bit concerned about the cost.
We walked into the hotel and took seats at the bar, and he kindly offered to buy my drink. I declined and purchased my own, but we sat together and chatted. He was fidgety, and wanted to move to a table so that he could see who was coming in, but I told him I wasn’t going to stay long and would rather just stay where we were.
At this point, Tran explained that he was actually in town because he was hoping that Donald Trump would be at Stone’s event. When the president did not attend, he decided to try to find a journalist to give a “massive story,” and was terribly disappointed that he did not meet anyone. I mentioned that I write for multiple outlets and may be interested — depending on what he had and what it was about. When I told him that I write for We Are Change he was excited, explaining that he was a fan, and claimed that he had “top secret insider information” — which was “not to be taken lightly.”
“I’m a source,” he told me.
“What?” I asked.
Tran pulled out a small piece of paper and a pen from his backpack and began to write something down, he passed me a note explaining that it was about the infamous “Golden Showers” dossier released by Buzzfeed. As I have been covering the dossier for Sputnik News, I told him I was listening.
He leaned in close and whispered:
Confused, I asked him to repeat himself.
“The Russian dossier, it’s my fault. I wrote it.”
Tran explained that he believed Christopher Steele’s dossier, which was irresponsibly released by BuzzFeed without any of it being substantiated, was adapted and partially plagiarized from a complaint that he had filed several years ago about a former roommate.
I blinked, and realized that this person probably didn’t actually know any of my friends.
He continued on to tell me that the CIA and FBI had been after him, painting him as schizophrenic so that nobody would believe his claims. He slipped me another note with his Twitter handle, which I have since misplaced.
Tran began scanning the room wide-eyed and impatiently, looking for someone “in the Trump administration” to get his information to, claiming that the president was in danger — and that he felt he was responsible for it. He asked me if I knew anyone who knew the president, and if I could help get a letter to him. I told him that I did not.
He was very worried about Trump’s safety, stressing that the president would understand if he could just speak to him.
At this point, I realized I needed to leave and alert security, just in case. I told him that I would be in touch, but that I needed to get home as it was getting late.
I walked over to the entrance and told a friend who works at the hotel that I was concerned about the person I was speaking with, as he was telling me a pretty wild tale. I suggested that they may want to keep an eye on him, especially if anyone from the administration came in, but also stressed that he is a very nice guy who is probably just having a bad time.
Moments later, Lee Stranahan from Breitbart News told me that he was heading to the hotel, and convinced me to stay and hang out. I decided to stay, but waited outside until he arrived with his friends.
When I went back into the hotel with them, Tran was no longer at the bar.
On Friday evening, March 10, Tran jumped the fence to the south entrance of the White House with two cans of mace, and a letter for the president. He is now charged with entering restricted grounds with a weapon, which carries a fine and up to 10 years in prison.
On Monday, a federal judge released Tran on his own recognizance provided that he stay within 100 miles of his home in Milpitas, California, other than for court appearances, and undergo a mental health evaluation. He is scheduled to be fitted with a GPS device on March 16 in California.
The post White House Fence Jumper Believed BuzzFeed’s ‘Golden Showers’ Dossier Was His Fault appeared first on We Are Change.
|A CIA Cyber False Flag
Posted: 13 Mar 2017 09:06 PM PDT
New revelations from Wikileaks’ ‘Vault 7’ leak shed a disturbing light on the safeguarding of privacy. Something already known and largely suspected has now become documented by Wikileaks. It seems evident that the CIA is now a state within a state, an entity out of control that has even arrived at the point of creating its own hacking network in order to avoid the scrutiny of the NSA and other agencies.
Article via Strategic-Culture
Reading the revelations contained in the documents released by WikiLeaks and adding them to those already presented in recent years by Snowden, it now seems evident that the technological aspect regarding espionage is a specialty in which the CIA, as far as we know, excels. Hardware and software vendors that are complicit — most of which are American, British or Israeli — give the CIA the opportunity to achieve informational full-spectrum dominance, relegating privacy to extinction. Such a convergence of power, money and technology entails major conflicts of interest, as can be seen in the case of Amazon AWS (Amazon’s Cloud Service), cloud provider for the CIA, whose owner, Jeff Bezos, is also the owner of The Washington Post. It is a clear overlap of private interests that conflicts with the theoretical need to declare uncomfortable truths without the need to consider orders numbering in the millions of dollars from clients like the CIA.
While it is just one example, there are thousands more out there. The perverse interplay between media, spy agencies and politicians has compromised the very meaning of the much vaunted democracy of the land of the Stars and Stripes. The constant scandals that are beamed onto our screens now serve the sole purpose of advancing the deep interest of the Washington establishment. In geopolitical terms, it is now more than obvious that the deep state has committed all available means toward sabotaging any dialogue and détente between the United States and Russia. In terms of news, the Wikileaksrevelations shed light on the methods used by US intelligence agencies like the CIA to place blame on the Kremlin, or networks associated with it, for the hacking that occurred during the American elections.
Perhaps this is too generous a depiction of matters, given that the general public has yet to see any evidence of the hacking of the DNC servers. In addition to this, we know that the origin of Podesta’s email revelations stem from the loss of a smartphone and the low data-security measures employed by the chairman of Hillary Clinton’s presidential campaign. In general, when the 16 US spy agencies blamed Russia for the hacking of the elections, they were never specific in terms of forensic evidence. Simply put, the media, spies and politicians created false accusations based on the fact that Moscow, together with RT and other media (not directly linked to the Kremlin), finally enjoy a major presence in the mainstream media. The biggest problem for the Washington establishment lies in the revelation of news that is counterproductive to the interests of the deep state. RT, Sputnik, this site and many others have diligently covered and reported to the general public every development concerning the Podesta revelations or the hacking of the DNC.
Now what is revealed through Wikileaks’ publications in Vault 7 is the ability of a subsection of the CIA, known as Umbrage, to use malware, viruses, trojans and other cyber tools for their own geopolitical purposes. The CIA’s Umbrage collects, analyzes and then employs software created variously from foreign security agencies, cyber mafia, private companies, and hackers in general. These revelations become particularly relevant when we consider the consequences of these actions. The main example can be seen in the hacking of the DNC. For now, what we know is that the hacking – if it ever occurred – is of Russian origin. This does not mean at all that the Kremlin directed it. It could actually be very much the opposite, its responsibility falling into the category of a cyber false-flag. One thing is for sure: all 16 US intelligence agencies are of the view that “the Russians did it”. That said, the methods used to hack vulnerabilities cannot be revealed, so as to limit the spread of easily reusable exploits on systems, such as the one that hosted the DNC server. It is a great excuse for avoiding the revelation of any evidence at all.
So, with little information available, independent citizens are left with very little information on which to reliably form an opinion on what happened. There is no evidence, and no evidence will be provided to the media. For politicians and so-called mainstream journalists, this is an acceptable state of affairs. What we are left with instead is blind faith in the 16 spy agencies. The problem for them is that what WikiLeaks revealed with Vault 7 exposes a scenario that looks more likely than not: a cyber false-flag carried out by the Central Intelligence Agency using engineered malware and viruses made in Russia and hypothetically linking them back to hacking networks in Russia. In all likelihood, it looks like the Democrats’ server was hacked by the CIA with the clear objective of leaving Russian fingerprints and obvious traces to be picked up by other US agencies.
In this way, it becomes easier to explain the unique views of all 16 spy agencies. Thus, it is far more likely that the CIA intentionally left fake Russian fingerprints all over the DNC server, thereby misleading other intelligence agencies in promoting the narrative that Russia hacked the DNC server. Of course the objective was to create a false narrative that could immediately be picked up by the media, creating even more hysteria surrounding any rapprochement with Russia.
Diversification of computer systems.
The revelations contained in the Wikileaks vault 7 (less than 1 % of the total data in Wikileaks’ possession has been released to date) have caused a stir, especially by exposing the astonishing complicity between hardware and software manufacturers, often intentionally creating backdoors in their products to allow access by the CIA and NSA. In today’s digital environment, all essential services rely on computer technology and connectivity. These revelations are yet more reason why countries targeted by Washington, like China, Russia, Iran and North Korea, should get rid of European and American products and invest in reducing technological dependence on American products in particular.
The People’s Republic has already started down this track, with the replacement of many network devices with local vendors like Huawei in order to avoid the type of interference revealed by Snowden. Russia has been doing the same in terms of software, even laying the groundwork to launch of its own operating system, abandoning American and European systems. In North Korea, this idea was already put into practice years ago and is an excellent tool for deterrence for external interference. In more than one computer security conference, US experts have praised the capabilities of the DPRK to isolate its Internet network from the rest of the world, allowing them to have strong safety mechanisms. Often, the only access route to the DPRK systems are through the People’s Republic of China, not the easiest way for the CIA or NSA to infiltrate a protected computer network.
An important aspect of the world in which we live today involves information security, something all nations have to deal with. At the moment, we still live in a world in which the realization of the danger and effect of hacking attacks are not apparent to many. On the other hand, militarily speaking, the diversification and rationalization of critical equipment in terms of networks and operability (smartphones, laptops, etc) has already produced strong growth in non-American and European manufacturers, with the aim of making their systems more secure.
This strengthening of technology also produces deleterious consequences, such as the need for intelligence agencies to be able to prevent the spread of data encryption so as to always enjoy access to any desired information. The birth of the Tor protocol, the deployment of Bitcoin, and apps that are more and more encrypted (although the WikiLeaks documents have shown that the collection of information takes place on the device before the information is encrypted) are all responses to an exponential increase in the invasion of privacy by federal or American government entities.
We live in a world that has an enormous dependence on the Internet and computer technology. The CIA over the years has focused on the ability to make sure vulnerable systems are exploited as well as seeking out major security flaws in consumer products without disclosing this to vendors, thereby taking advantage of these security gaps and leaving all consumers with a potential lack of security. Slowly, thanks to the work and courage of people like Snowden and Assange, the world is beginning to understand how important it is to keep personal data under control and prevent access to it by third parties, especially if they are state actors. In the case of national security, the issue is expanded exponentially by the need to protect key and vital infrastructure, considering how many critical services operate via the Internet and rely on computing devices.
The wars of the future will have a strong technological basis, and it is no coincidence that many armed forces, primarily the Russian and Chinese, have opted in recent years to training troops, and conducting operations, not completely relying on connectivity. No one can deny that in the event of a large-scale conflict, connectivity is far from guaranteed. One of the major goals of competing nations is to penetrate the military security systems of rival nations and be able to disarm the internal networks that operates major systems of defense and attack.
The Wikileaks revelations are yet another confirmation of how important it is to break the technological unipolar moment, if it may be dubbed this way, especially for nations targeted by the United States. Currently Washington dictates the technological capacities of the private and government sectors of Europe and America, steering their development, timing and methods to suit its own interests. It represents a clear disadvantage that the PRC and its allies will inevitably have to redress in the near future in order to achieve full security for its vital infrastructure.
This article first appeared on Strategic-Culture.org and was authored by Federico Pieraccini.
|Police Attempt To Lie About ‘New Law’ To Force An Attorney To Stop Recording
Posted: 13 Mar 2017 07:19 PM PDT
The officer tried to lie to an attorney about a “new law” prohibiting him from filming police.
Article via True Activist
Jesse Bright, a resident of North Carolina, is an attorney who drives for Uber on the side in order to pay off his student loans.
He’s an advocate for people filming police during encounters with them in order to properly document interactions, should they find themselves in court, so when he was pulled over last month one of the first things he did was take out his phone and start recording.
It turned out that the passenger he had in his car had just exited a known drug house, where he may have been involved in an illegal transaction, but Bright was unaware of any of these details before police descended on the vehicle to detain the passenger. Bright decided to film, though he wasn’t the one being arrested, and was told almost immediately by Wilmington police Sgt. Kenneth Becker to stop recording. When Bright refused, Becker came around and falsely stated,
The officer was not aware that Bright was also an attorney, even questioning him after he declared his legal background, and continued to be rude to Bright throughout the long encounter. Becker made the decision on the spot to call in a K-9 unit to sniff Bright’s car, and even said, “You better hope we don’t find something in your car.”
The suspicion surrounding Bright is reasonable, considering he had just left a drug house with a stranger, but it wasn’t until Bright defied Becker by continuing to exercise his right to record that the officers make him exit the vehicle in order to search it. Later, a K-9 indicates that there may be drugs in the car, which gives the police probable cause to search the vehicle, and Bright is met with attitude by Becker, who seems pleased to search Bright’s car.
The problem at large in this case is Becker’s attempt to lie about a law prohibiting people from filming police officers. If Bright hadn’t been an attorney, like most citizens, he may have believed the officer, stopped recording, and risked not having visual proof of anything that occurred in the following interaction. It begs the question of how many times Becker and other officers all over the country have had people stop recording under the pretense that the law prohibited them from doing so.
As for the Wilmington Police Department, an internal affairs investigation is underway regarding this incident and an official statement was released.
Bright did not want to publicize the incident, but when Becker never returned his phone calls and the department didn’t apologize for what occurred, he decided to release the video. He wants this video to serve as a warning to others who find themselves in similar situations.
Watch the beginning of the encounter below.
What are your thoughts on this news? Please share, like, and comment on this article!
This article (Police Attempt To Lie To Attorney About “New Law” To Force Him To Stop Recording) is free and open source. You have permission to republish this article under a Creative Commons license with attribution to the author and TrueActivist.com
The post Police Attempt To Lie About ‘New Law’ To Force An Attorney To Stop Recording appeared first on We Are Change.
|What You Weren’t Taught: The U.S. Government’s National Experiment in Extermination
Posted: 13 Mar 2017 07:13 PM PDT
You probably didn’t hear much about this in school — even though 10,000 people were killed.
In desperation to make effective the floundering Prohibition on alcohol, the U.S. government — unable to convince the public consumption of booze constituted a moral transgression — intentionally poisoned the supply in a last-ditch attempt to enforce State-mandated sobriety.
This “chemist’s war of Prohibition” became, as the outspoken opponent and New York City chief medical examiner in the 1920s, Charles Norris, hauntingly described, “our national experiment in extermination.”
Rather than keep people away from bathtub gin and the constant flow of liquor in hidden speakeasies — the State-sanctioned toxic experiment killed thousands of people who simply wanted to imbibe.
Alcohol poisoning in the time of Prohibition had become commonplace — anyone with a grasp on forced taboos will tell you government control of vice furiously fuels black markets — as home distillers, including those keen to profit unethically, concocted batches of booze made with questionable ingredients.
Hospitals accustomed to treating illnesses caused by bad batches of homemade alcohol — bootleg supplies not infrequently were tainted with metals and other contaminants — were not prepared for a spate of deaths in New York City over the Christmas holidays in 1926. This wasn’t, they realized, a typical case of toxic back-alley booze — in a mere two days, 23 people lost their lives.
People began dropping like flies, in fact, and a list of similar incidents quickly lengthened.
Thirty-three people perished in just three days in Manhattan in 1928 from tainted hooch believed to be wood alcohol — and by that time, the public felt federal intervention might be necessary. However, as TIME reported shortly afterward.
By the time of the repeal of Prohibition in the December 5, 1933, ratification of the Twenty-first Amendment, estimates surmise no less than 10,000 had perished as a direct result of the government’s horrendously ill-fated poisoning program. As Slate’s Deborah Blum reported,
In order to poison the supply, the government had to turn to the base ingredient commonly used by bootleg manufacturers, as TIME Magazine explained,
Prohibition had widespread support, and although not everyone agreed with the government’s new method of coercion meant to quash the nation’s obvious love affair with alcohol — TIME noted New Jersey Senator Edward I. Edwards called it “legalized murder” — those who did pontificated on the supposed amorality of drinking as justification for poisoning deaths.
“The Government is under no obligation to furnish the people with alcohol that is drinkable when the Constitution prohibits it,” asserted poisoning and Prohibition advocate, Wayne B. Wheeler. “The person who drinks this industrial alcohol is a deliberate suicide … To root out a bad habit costs many lives and long years of effort. …”
The Chicago Tribune strikingly editorialized in 1927, as cited by Slate,
Myriad ruinous government programs, in particular, prohibitions on alcohol and cannabis, have been implemented under the premise of protecting the people from some misbegotten ill — but, in practice, these efforts too often play out more disastrously than if the State had never intervened in the first place.
Ratification of the Eighteenth Amendment to the Constitution in 1919 meant a ban on the sale, manufacture, and transport of alcoholic beverages — and the subsequent passage of the Volstead Act provided the rules for enforcement of Prohibition when it went into effect in 1920.
Anti-alcohol organizations constantly sermonized on the evils of drinking, and though the notion seems almost quaint in 2017, the post-war atmosphere in the U.S. welcomed any movement to prevent further degradation of morals — or, more accurately, the morals of a specific group of people whose grandstanding centered around alcohol.
Unsurprisingly, vocal support for the platform overrepresented the reality — the business of banned booze immediately and decisively boomed. Blum wrote,
None of that shock nor the high-and-mighty stance from which the temperance movement preached moral uprightness ever targeted the government for recklessly condemning random alcohol drinkers to death.
When the State takes the reins of any flippantly righteous high horse, it’s a veritable guarantee the program is doomed to failure — and Prohibition was no exception.
Indiscriminately killing more than 10,000 people by deliberate poisoning, however, belies the less candid goal the government would never admit: control at any cost.
What are your thoughts? Please comment below and share this news!
This article (What You Weren’t Taught: The US Government’s National Experiment in Extermination) by Claire Bernish is free and open source. You have permission to republish this article under a Creative Commons license with attribution to the author and The Free Thought Project.
The post What You Weren’t Taught: The U.S. Government’s National Experiment in Extermination appeared first on We Are Change.
|Trump Gave CIA Secret New Authority To Launch Drone Strikes
Posted: 13 Mar 2017 06:53 PM PDT
Aims to Dial Back Obama’s Efforts to Transfer Strike Authority to Pentagon
Article via Antiwar
While President Obama’s terms in office marked the beginning of widespread use of CIA drones for assassination campaigns, in his last couple of years in office, he dramatically shifted focus, aiming to limit CIA drone operations to intelligence gathering and confining the authority to carry out strikes to the Pentagon.
President Trump appears to have quietly reversed that limitation since coming into office, with reports out of the Wall Street Journal quoting officials as saying the CIA once again has the authority to carry out such strikes, with Syria explicitly singled out as the main target for this authority, and officials saying that it would likely expand elsewhere around the region.
It is particularly noteworthy that this change appears to have been made some time ago, and that the Trump Administration simply never told anyone about it. Even today, they have refused to comment on the matter.
The Pentagon is required to report on its use of drone strikes, and to intermittently offer reports estimating the number of civilians killed. While the Pentagon’s reports often grossly underestimate the death toll, that they offer figures at all was a change from the early CIA-centric drone war.
The CIA generally refuses to confirm or deny carrying out any drone strikes, and thus never accounts for who did or didn’t get killed. While the lack of even nominal disclosure makes it impossible to say how many drone strikes the CIA has launched under this new authority, it is noteworthy that the Pentagon has offered virtually no feedback on the flurry of drone strikes against Yemen in the past two weeks, which might suggest that they are part of a covert campaign.
This article first appeared on Antiwar.com and was authored by Jason Ditz.
The post Trump Gave CIA Secret New Authority To Launch Drone Strikes appeared first on We Are Change.
|Turkey May Soon Unleash Millions Of Refugees
Posted: 13 Mar 2017 05:49 PM PDT
Article via Zero Hedge
As we noted moments ago, the tit-for-tat aggression resumed its escalation between Turkey and the Netherlands, with Turkish Deputy Prime Minister Numan Kurtulmus exclaiming from Ankara that “Europe’s politicians are under fascist, neo-nazi influence” and in response, Turkey will suspend all high-level diplomatic meetings and cancel all flight permissions for Dutch politicians.
As part of its furious response, Turkey said it would impose various travel sanctions on Dutch diplomats such as halting all high-level political discussions with the Netherlands in the wake of the Dutch government’s decision to bar two cabinet ministers from campaigning in the country. Kurtulmus said during a news conference following a weekly cabinet meeting that Ankara also is closing its air space to Dutch diplomats until the Netherlands meets Turkish requests, according to the AP.
Kurtulmus also says the Dutch ambassador to Turkey, who was traveling when the diplomatic row started, won’t be allowed to return, and said that Turkey’s government plans to advise parliament to withdraw from a Dutch-Turkish friendship group.
It was unclear what the sudden Turkish escalation means for economic ties between the two nations: as a reminder, Dutch direct investment in Turkey amounts to $22 billion, making the Netherlands the biggest source of foreign investment with a share of 16%. Furthermore, Turkish exports to the Netherlands totalled $3.6 billion in 2016, making it the tenth largest market for Turkish goods, according to the Turkish Statistical Institute. Turkey imported $3 billion worth of Dutch goods in 2016. Should the diplomatic spat lead to a collapse in trade relations, a Turkey recession is all but assured.
Kurtulmus said the political sanctions will apply until the Netherlands takes steps to “redress” its actions. He said: “There is a crisis and a very deep one. We didn’t create this crisis or bring to this stage.”
However the most troubling development, and one which has the potential to sway the outcome of the Dutch election which will be held in less than two days, is that in the final power play aimed towards Merkel, Kurtulmus exclaimed that since “Europe has not kept its promises on the migrant deal, for us that agreement has ended.”
Which means that one year after it collected $3 billion for the migrant deal, Turkey has just voided the agreement, and the next step would be that Turkey is about to flood Europe with refugees currently held inside Turkish borders. And since by some estimates Turkey currently harbors over 2 million potential migrants, Europe’s refugee situation is about to get far worse, and as a corollary, support for anti-immigrant political organizations across the continent is about to take another step function higher.
This article first appeared on ZeroHedge.com and was authored by Tyler Durden.
|Congressman Arrested For Refusing To Leave ICE Office In Chicago
Posted: 13 Mar 2017 03:19 PM PDT
Illinois Democrat Rep. Luis Gutierrez and seven others were handcuffed by police Monday after refusing to leave an Immigrations and Customs Enforcement (ICE) office in Chicago protesting immigration.
Gutierrez, an advocate for immigration reform, was at a meeting between ICE officials and immigration lawyers, activists, community leaders and other elected officials, NBC Chicago reported.
“They were asking about specific cases and about the general conduct of ICE and deportations,” Gutierrez’s director of communications, Doug Rivlin said.
“The congressman has decided that he did not get the answers he was looking for from the ICE regional director and he’s going to be staying inside until he gets answers, even if that means risking arrest,” said Rivlin, according to NBC.
Gutierrez now free said he didn’t know if he was going to be arrested for the protest he noted that he wasn’t sure if he will further be detained for his act of disobedience.
“I was arrested, cuffed then cuffs were cut off. Waiting for further word on if/when we will be arrested,” Gutierrez said on Twitter.
The post Congressman Arrested For Refusing To Leave ICE Office In Chicago appeared first on We Are Change.
|Snoop Dogg Pulls Fake Gun On Trump Parody In New Music Video
Posted: 13 Mar 2017 02:57 PM PDT
In a new music video called “BADBADNOTGOOD” a remix of Lavander, legendary rapper Snoop Dogg shoots a clown parody of President Donald Trump named Ronald Klump.
In the video, the Donald Trump parody Klump at one point announces the deportation of all dogs in a press conference. Snoop then gets pissed off and grabs his gun and meets up with Klump in the parking lot.
“Nobody’s dealing with the real issue with this f–king clown as president, and the shit that we dealing with out here, so I wanted to take time out to push pause on a party record and make one of these records for the time being.” In a climactic scene, Snoop pulls a gun on the Trump clown in a parking lot. Later, a chain-bound Trump tries in vain to join Snoop and his accomplice in smoking a blunt. Read Snoop’s elaboration on the song and video concept below, reported Billboard.
“The ban that this motherf–ker tried to put up; him winning the presidency; police being able to kill motherf–kers and get away with it; people being in jail for weed for 20, 30 years and motherf–kers that’s not black on the streets making money off of it — but if you got color or ethnicity connected to your name, you’ve been wrongfully accused or locked up for it, and then you watching people not of color position themselves to get millions and billions off of it. It’s a lot of clown sh-t going on that we could just sit and talk on the phone all day about, but it’s a few issues that we really wanted to lock into [for the video] like police, the president and just life in general.”
Snoop Dogg also targeted police brutality with lyrics like, “Trying to keep from dying in these muthaf–kin’ streets/ F–k the police/ From a black man’s point of view.”
Snoop Dogg isn’t the only mainstream rapper to criticize President Trump, as rap songs as a form of protest music make their first popular appearance since the 90s. Rapper Eminem has also criticized the 45th president calling him a “b*tch” in a song with Big Sean called “No Favors.”
The post Snoop Dogg Pulls Fake Gun On Trump Parody In New Music Video appeared first on We Are Change.
|U.S. Delta Force, SEAL Team 6 Prepare To Take Out Kim Jong-Un
Posted: 13 Mar 2017 02:42 PM PDT
Article via Zero Hedge
On March 1, the WSJ reported that the options contemplated by the White House in response to recent North Korean acts, include “the possibility of both military force and regime change to counter the country’s nuclear-weapons threat.”
The review came es amid recent events have strained regional stability including last month’s launch by North Korea of a ballistic missile into the Sea of Japan, and the assassination of the estranged half brother of North Korean leader Kim Jong Un in Malaysia.
And, according to a report in Yonhap, said “regime change” may come far sooner than expected: the South Korean website writes that U.S. special operations forces, including the unit that killed Osama Bin Laden, will take part in joint military drills in South Korea “to practice incapacitating North Korean leadership in the case of conflict”, a military official said Monday.
The U.S. Navy’s Special Warfare Development Group, better known as the SEAL Team 6, will arrive in South Korea for joint military drills and take part in an exercise simulating a precision North Korean incurion and “the removal of North Korean leader Kim Jong-un”, according to the Ministry of National Defense Monday.
The U.S. Navy SEAL Team Six will join the annual Foal Eagle and Key Resolve exercises between the two allies for the first time, along with the Army’s Rangers, Delta Force and Green Berets.
The counter-terrorism unit is best known for its removal of Al-Qaeda leader Osama bin Laden in May 2011, known as Operation Neptune Spear. It will be the team’s first time participating in the annual Foal Eagle and Key Resolve exercises, which will run through late April.
The ministry did not say when the SEAL Team 6 will arrive. The Japan Times reported that the American unit boarded the USS Carl Vinson, a Nimitz-class aircraft carrier, last Friday and are currently training in South Korean waters. The carrier will arrive in Busan Port Wednesday, according to the Japanese newspaper. The ministry did not say when the SEAL Team 6 will arrive, however according to The Japan Times, the American unit will arrive in Busan Port Wednesday, according to the Japanese newspaper.
As Korea JoongAng Daily adds, also set to touch down in South Korea is Delta Force, a special mission unit of the U.S. Army whose main tasks include hostage rescue and counterterrorism, said the Defense Ministry. Together with SEAL Team 6, they will practice removing Kim Jong-un and destruction of North Korea’s weapons of mass destruction.
“It will send a very strong message to North Korea, which is constantly carrying out military provocations,” a ministry official said.
“A bigger number of and more diverse U.S. special operation forces will take part in this year’s Foal Eagle and Key Resolve exercises to practice missions to infiltrate into the North, remove the North’s war command and demolition of its key military facilities,” a ministry official told Yonhap News Agency asking not to be named.
F-35 stealth fighters will also fly from U.S. Navy bases in Japan this month and carry out strike simulations on key North Korean facilities. A joint amphibious landing operation, which will kick off next month, will see the deployment of support ships the USS Bonhomme Richard, USS Green Bay and USS Ashland.
The beefing up of U.S. special operation forces in the drills comes after North Korean leader Kim said in a New Year’s speech that the country was in the “final stage” of test-firing an intercontinental ballistic missile, the first of its kind, and pushed through two separate missile tests earlier this year, the latest on March 6. North Korea claimed through its state-run media that the most recent drill was aimed at striking “the bases of the U.S. imperialist aggressor forces in Japan.”
Washington and Seoul stress that the annual military drills are purely defensive, although Pyongyang sees them as a rehearsal for an invasion. South Korea’s military said around 290,000 domestic soldiers and 10,000 U.S. soldiers will participate in this year’s drills, which by scale would be approximately the same as last year, the largest to date.
While the US may have decided to remove the element of surprise from a potential tactical strike inside North Korea in order to spook Kim Jong-Un, it is just as likely that by exposing their intentions, the US may have precipitated a response from the Korean leader which will make such a military operation inevitable, even as the geopolitical fallout for the region from such an action could be dire.
As a reminder, last week an analysis by the Predata-Beyond Parallel strategic consultancy predicted that there is a 43% chance of North Korean WMD activity taking place in the next 14 days, rising to 62% in the next 30 days. Beyond Parallel defines WMD activity as nuclear tests and ballistic missile launches.
This article first appeared on ZeroHedge.com and was authored by Tyler Durden.
The post U.S. Delta Force, SEAL Team 6 Prepare To Take Out Kim Jong-Un appeared first on We Are Change.
|Saudi Crown Prince Flies To Washington To Meet With Donald Trump
Posted: 13 Mar 2017 02:09 PM PDT
Article via Zero Hedge
Saudi Deputy Crown Prince, Mohammed bin Salman, responsible for the kingdom’s reforms, left on Monday for Washington to meet President Donald Trump on a visit expected to pitch the world’s top oil exporter as an attractive investment destination.
It will be the first meeting since Trump took office in January between the U.S. President and the prince who is next in line to lead Saudi Arabia, and is in charge of the kingdom’s efforts to revive state finances by diversifying away from falling crude oil revenues, of which the upcoming Aramco IPO will be a critical component.
Under the Saudi plan, which seeks to promote the private sector and make state-owned companies more efficient, Riyadh plans to sell up to 5 percent of state oil giant Saudi Aramco in what is expected to be the world’s biggest initial public offering. Last year, facing a surging budget deficit due to slumping oil prices, the kingdom announced an austerity drive to reduce state spending, although industry sources say it has also promised major development projects later this year to soften the economic impact of those cuts.
According to Reuters, a royal court statement said that in his talks with Trump and other U.S. officials, Prince Mohammed, who heads a supercommittee driving economic reform and is also Saudi defense minister, was expected to “discuss reinforcing bilateral relations and review regional issues of mutual interest”. It said that the working visit would start on Thursday but gave no further details.
John Sfakianakis, director of economic research a the Gulf Research Center, said the focus of the visit would be “to showcase Saudi investment opportunities… the Saudi Aramco IPO as well as the reforms undertaken in the wider economic space.”
Meanwhile, with the crown prince headed to Washington, Saudi king Salman is similarly probing the ground for investment in Asia, and is currently in Japan on a month-long Asia tour to build ties with the world’s fastest growing importers of Saudi crude and promote investment opportunities, including the sale of a stake in its giant state firm Saudi Aramco. He is headed to China soon after.
Trump spoke by telephone with Salman soon after he took office in January and agreed to support safe zones in Syria, according to a White House statement. Salman invited Trump “to lead a Middle East effort to defeat terrorism and to help build a new future, economically and socially,” for Saudi Arabia and the region, Saudi media reported. Before his departure for the United States, Prince Mohammed met Citigroup’s CEO Michael Corbat in Riyadh on Sunday for a similar discussion on investment opportunities in the kingdom and globally, SPA reported.
As a reminder, Saudi Arabia was one of the most aggressive financial backers of the Hillary Clinton presidential campaign, which could prove problematic for the upcoming trip seeking US generosity.
Furthermore, with the US itself desperate for Trump’s economic proposals to lead to renewed spending domestically, the Saudis may have to get in line.
This article first appeared on ZeroHedge.com and was authored by Tyler Durden.
The post Saudi Crown Prince Flies To Washington To Meet With Donald Trump appeared first on We Are Change.
|Kellyanne Conway Claims Trump Tower May Have Been Spied On Through Microwaves
Posted: 13 Mar 2017 12:59 PM PDT
U.S. President Donald Trump’s senior adviser Kellyanne Conway has bizarrely claimed that surveillance on Trump Tower could have been from “microwaves that turn into cameras.”
Conway told the Bergen Record in an interview that Trump tower could’ve been spied on through any number of ways.
Conway went on to say that the monitoring could be done with “microwaves that turn into cameras,” adding: “We know this is a fact of modern life.”
After her comments, she received wide criticism on social media with one person choosing to create a Twitter account called “KellyannesMicro” to mock Conway.
She also tweeted out a series of messages that the comments were being taken out of context.
Her comments come amid the Congress-set deadline day for President Donald Trump to provide evidence for the March 4 tweets in which he alleged Obama wiretapped him at Trump Tower in the months leading up to Election Day.
Although this reporter knows of no way to spy on you through your microwave, it’s important to note that microwave radiation weapons are documented to exist. The idea might not be as far-fetched as you assume.
The program details its goals:
Additionally, in 2011 WIRED reported that the Air Force said they wanted mind reading drones, so anything is possible. It’s also important to note that surveillance bugs or spy cams can be placed anywhere, so yes, the microwave in Trump tower could have been spying on Trump associates. It’s not really such a tinfoil hat conspiracy theory. In addition to the potential of spy cams and surveillance bugs being planted, it’s also not so far-fetched in this day and age to think that a microwave could be manufactured with a secret camera built into it and replaced as a decoy by a spy agency.
Up to this point, Trump and his team have not provided any evidence to their claims that Obama tapped Trump tower.
The post Kellyanne Conway Claims Trump Tower May Have Been Spied On Through Microwaves appeared first on We Are Change.