USG Monitors Poop, Feeds Citizens Cocaine

Here’s the scoop on the fate of  poop in the Electronic Gulag from the American Chemical Society:

The war on drugs could get a boost with a new method that analyzes sewage to track levels of illicit drug use in local communities in real time. The new study, a first-of-its-kind in the U.S., was published in the ACS journal Environmental Science & Technology and could help law enforcement identify new drug hot spots and monitor whether anti-drug measures are working.

Kurunthachalam Kannan and Bikram Subedi note that to date, most methods to estimate drug use in the U.S. are based on surveys, crime statistics and drug seizures by law enforcement. But much illegal drug use happens off the radar. To better approximate usage, scientists have been turning to wastewater. Like a lot of other compounds from pharmaceuticals and personal care products to pesticides, illegal drugs and their metabolic byproducts also persist in sewage. In Europe, a number of studies have been done to see how well wastewater treatment plants are removing illicit drugs from sludge before treated water is released into the environment. But until now, no study in the U.S. had looked at this, likely leading to underestimates of abuse. Kannan and Subedi wanted to form a more complete picture of drug use, so they studied levels of illicit drugs at two wastewater treatment plants in Albany, New York.”

Notice that the scientists in this program are of Indian origin.  I wonder why these two didn’t put their expertise in sewage to better use by figuring out inexpensive ways to treat sewage which is a major need in India, as it is in the US.

As Mike Adams points out, it will only be a matter of time before toilets are microchipped to analyze your excreta in real time.

As he notes, if cocaine is finding its way into sewage and via the treatment procedure back into our drinking water, traces of it must be in the blood of all citizens, making the government guilty of forcing a class-A felony on its citizens.

Anyone drinking tap water is, therefore, consuming class-A felony controlled substances which can then be detected in their bodies in parts per billion concentrations. This is how the police state can arrest and imprison absolutely anyone by claiming they’re a drug user since there’s cocaine in their blood and it’s all over their twenty dollar bills, too!

There probably isn’t a single person living in America today who doesn’t have traces of cocaine on their person or in their blood. Notably, federal laws on cocaine possession make no exceptions for “inadvertent possession” or possession of trace amounts. Even one molecule of cocaine qualifies you to be charged with felony possession.

 

Secret Corporate Espionage, Harassment Of Citizens

From Alternet.org:

Hiring cops, spooks and vets to do corporate dirty work leads to one more trend enabling corporate espionage to flourish. That is a lack of accountability or legal consequence for espionage that clearly breaks domestic law, such as stealing documents, wiretapping, etc. In France or England, where some of these same activities have come to the attention of authorities, those responsible have been prosecuted and some perpetrators have even gone to jail. Not so in the U.S.

“Hiring former intelligence, military and law enforcement officials has its advantages,” the report notes. “First, these officials may be able to use their status as a shield. For example, current law enforcement officials may be disinclined to investigate or prosecute former intelligence or law enforcement agents… In effect, the revolving door for intelligence, military and law enforcement officials is yet another aspect of the corporate capture of federal agencies, and another government subsidy for corporations.”

What Americans Don’t Know

As detailed as the Center for Corporate Policy report is, author Gary Ruskin says most of the information was obtained “by accident.” It wasn’t freely given. It was the result of lawsuits, a handful of whisteblowers, mistakes by those hired to do the corporate espionage, boasts in trade press and other somewhat random sources.

But even so, there is a dark playbook that comes into view. Nonprofits are scrutinzed for vulnerabilities. Computers are hacked. Documents are copied or stolen. Phone calls and voice mail are secretly recorded. Personal dossiers are compiled. Disinformation is created and spread. Websites are targeted and taken down. Blackmail is attempted. Just as bad, Ruskin says, the Justice Department and Congress look the other way.

“The entire subject is veiled in secrecy,” his report says. “In recent years, there have been few serious journalistic efforts—and no serious government efforts—to come to terms with the reality of corporate spying against nonprofits.”

Steven Rosenfeld covers national political issues for AlterNet.

My Comment:

This excellent article describes the rampant misuse of surveillance technology to invade the privacy of thousands of ordinary citizens, to blackmail, harass, and threaten them.

It perfectly sums up my experience since 2007:

1.  Phone-tapping, landline and cell phones.

2. Appearance of private conversations in websites, in a disguised form, recognizable only to myself or very close friends.

3.  Innuendo and slander republished by internet trolls and sometimes blogs. No facts or evidence, just reiteration of the slander, personal abuse. Cyber-stalking.

4.  Infiltrators or spies posing as clients, customers, or visitors, attempting to enter into business with me.

5. Emails deleted or blocked.  Computer trojans, spyware inserted.  VOIP conversations recorded. Blog hacking. Manipulation of Google hits. Threats to readers of the blog.  Manipulation of search results for specific posts. Monitoring via “fake” readers/commenters (they know who they are).

6. Work projects sabotaged.

7. Professional relations sabotaged.

8. At least one accident that seems to have been intentionally staged.

9. Theft of IP.

10. Using proxies to threaten, attack, or discredit through staged provocations. Street theater (paying random individuals to engage in behavior calculated to threaten/cause anxiety).

 

Jade Helm: The Drug Connection To China

Previous posts:

Jade Helm: Training, Terror, Or Hoax? (May 2, 2015)

Jade Helm –  Part II (May 3, 2015)

This is my third post on Jade Helm 15, the special forces drill spread out across nine US states that is scheduled to run from July 15 to September 15, 2015.

JADE HELM: THE DRUG CONNECTION TO CHINA

Again, my starting point is going to be the Jade Helm logo and name.  These things are usually carefully chosen and are worth more than cursory examination.

So far, I’ve suggested the following readings:

1. The crossed arrows and upright dagger is the logo of one of the Special Forces, the Green Berets. The Green Berets took their logo from British commandos, who got it from South Africa. (Uncontroversial).

2. The clog in the center symbolizes anarcho-syndicalism and revolution and is also associated with Jewish oppression and suffering, at the hands of the Nazis and Muslims (in the middle ages).

Connecting the Nazis and Islam is fairly typical of neo-conservativism and also, covertly, of left-liberalism.

(Convincing)

3. Jade Helm =  Green Helmet = Nazi helmet (Plausible, not convincing).

I am still dissatisfied with my parsing of this last part:

1. Since  the clog indicates syndicalism and leftist revolution and also evokes Jewish suffering under Nazis and Muslims,  a Nazi interpretation of the term Jade Helm is precluded rather than indicated.

2. The Nazi helmets are described as “apple-green” and sometimes “olive.” Jade might be green, but it’s not really the word you would use in that context.

What is Jade?

Jade is an opaque green stone and has a long association with China.

What is the Chinese angle in all this?

One. Communists run China.

But behind the egalitarian rhetoric, forrmer Chinese Premier Li Peng was and current PM Li Leqiang is at home with the rich and powerful, although whether they are in any way related either to a common family that includes the Hong-Kong plutocrat Li-Kashing  (worth over $35 billion) or to the “New World Order ruling-family blood-line” of Li, as suggested by conspiracy researcher Fritz Springmeier, is too much for me to figure out here.

Secondly, mega investment bank Goldman Sachs, which supplies governments and agencies with officials through out the West,has extended its reach into the state in China.

Goldman Sachs is a leading part of the Rothschild complex of ruling families and financial houses. The House of Rothschild is the architect of the New World Order.

Third, the Chinese holds over a trillion in US debt. The US government cannot meet those claims.

Fourth, received wisdom is that China has overtaken the  US as an economic power.

Just take a look at what Rabbi Cahn’s best-selling book says  – the American century is over; the Chinese century has begun.

China-boosting is very much a part of the Rockefeller/Rothschild New World Order.

And the Chinese recently announced a new economic world order.

Zion is not necessarily centered on Israel. It is more broadly “the kingdom of God on earth,” that is, a humanist/man-created utopia.

Zion,  in what is called British-Israel ideology, is also England’s “fair and pleasant land,” to quote gnostic William Blake’s  “New Jerusalem”.

British-Israel dogma holds that the “lost tribes” of Israel,  the ten northern kingdoms of Israel after the Assyrian invasion, were dispersed and eventually became the nations that now constitute Europe.

In Brit  Israel teaching, the thrones of Scotland and England derive from the House of David and the Anglo-Saxon race is the true Israel.

[This genetic dogma should not be confused with the authentic Christian teaching that believers in Jesus are the “true Israel.” That is a matter of belief and not blood.]

British-American belief and Zionist belief coincide, since the House of Rothschild is also married into the royalty of Britain and it also claims descent from the House of David.

So “the New Jerusalem” can be led as well from Britain (or America) as from Israel.

In fact, Blake’s poem, “Jerusalem” was prominently featured at the London Olympics of 2012, which was clearly meant to be the inaugural ceremony of the New World Order.

There was also the 2012 logo at the Olympics that set off a fire-storm for looking exactly like the word Zion.

The global order, whether neo-conservative and pro-Israel, or liberal-left and anti-Israel, is  Zionist in this British-Israel sense.

Zion in this context is never the heavenly/spiritual paradise of the Gospel, which is a genuine Christian teaching.

The Zionist’ Zion is an earthly, not a spiritual, kingdom.

This Zion  is also the state-less utopia promised to communist dupes after the “proletarian” revolution. The dupes don’t seen through the skin-deep secular language  of communism to its sacred, occult skeleton.

Communism may be godless, but it is a godless religion, with capitalists as devils, workers as saints, Marx as its prophet, and a future classless, gender-less society as paradise.

This is the political and ideological back-ground you need before you understand why Jade Helm has got to refer to China.

Now for the role of China in Jade Helm 15.

In one sentence:

Chinese gangs partner with the drug cartels that control the area of Mexico below the main theater of Jade Helm – 15 in south-western USA.

Arrests last Christmas in the Philippines confirmed that Chinese gangs based in Hong-Kong – called triads – are heavily involved with Mexican drug gangs in the manufacture and supply of methamphetamine (“crystal meth”) for which there is massive demand in the US.

Tightening regulations on access to the precursor chemicals in Mexico and the US and lax regulation in China have given an opening to gangs in Hong-Kong to make money smuggling precursor chemicals, along with Asian gang members, into the West.

It is a lucrative trade, in which a single shipment can bring in $10 billion.

Two triads were named in the raid – “14K” and “Sun Yee On,” both among the three most important in Asia.

The triads are known to have deeply penetrated Hong-Kong and Chinese intelligence and  government with the backing of Hong-Kong’s plutocrats, including, reportedly, Li Ka Shing.

A 1997 Canadian Mounted Police report describes the extent of Hong-Kong and Chinese ownership of Canadian businesses and real estate; their ties to organized crime and to Chinese/Hong-Kong intelligence; and their control of the Canadian financial services industry.

A 1999 Intelligence Assessment by the US Southern Command (SouthCom) warned of the threat posed by Li Ka-shing’s containerized shipping facilities in the Bahamas and Panama. US intelligence services were afraid of the leverage Ka-shing possessed with the Panamanian government because of his business; they warned about his business dealings with the government of Communist China, including the Red Army; and they were certain that he was involved in smuggling drugs.

The report indicates that Li Ka-shing met with then Commerce Secretary Daley at a luncheon hosted by Goldman Sachs on its boat, “The Monkey’s Uncle,” on a Hong-Kong trade trip.

Also present were a who’s who” of organized crime families from Hong-Kong, including Henry Fok of the 14K Triad and Robert Kok, who was allegedly involved in smuggling heroin in Burma and whose son Peter was the business partner of the husband of Senator Dianne Feinstein’s (Dem – CA).

(To be continued in the next post)

 

Jade Helm: Part II

Previous Post on Jade Helm: 

 Jade Helm 15 – Training, Terror, Or Hoax? (5/2/15).

Jade Helm – Part II

The Symbolism of Jade Helm:

That the clog is a symbol of the Nazi concentration camp has been noted also on the Common Sense Show.

This is helpful, because overnight I was wondering if I was being  paranoid.

So the clog can symbolize anarcho-syndicalism, the French Revolution,  Jewish persecution by Muslims during the middle ages and by Nazis in the 20th century, and also orthodox Sephardic Jews, as I posted earlier.

That connection makes me more confident that Jade Helm could be read as Green Helmet, which is the color of the steel helmets of the Nazi army.

Here’s the Jade Helm logo again:

Special ops: Operation Jade Helm will involve Green Berets and SEALs and special forces from the Air Force and Marines starting in July and lasting 8 weeks

The Reach of Jade Helm:

I wrote before that some of the blogs were getting it wrong about the number of forces being deployed. 1200 is the number only in Texas.

This blog seems to think that that will be the largest number overall in any individual state, but that the largest numbers at any specific time will be in Florida and Mississippi, because the HQ’s of the operation are located there, at Eglin Airforce Base and Camp Shelby, respectively.

Eglin Airforce Base lies about 60 miles east of Pensacola in north-west Florida. Camp Shelby in southern Mississippi is the largest reserve training site in the country.

Most interestingly,  local HQ in at least 3 of the Texas counties involved will be set up at private ranches, two of them being that of Steve Blaylock and of T. Michael O’Connor.

Reportedly, the ranches were volunteered and the owners are not compensated in any way, not even with tax write-offs.

Previous Drills:

There was a large military drill in Fort Lauderdale, Florida, at the end of March.

On April 11, 2015, armed national guards patrolled a neighborhood in Ontario, California.

Abrogation of Law:

The National Defense Authorization Act of 2012 had a section providing for the indefinite detention of US citizens on suspicion of terrorism. The provision was reaffirmed by Obama in 2014.

Context of false-flags and black ops

A good article published at Global Research rounds up the various false-flags and black ops that make people wary of Jade Helm. It makes the point that the alternative media is not to be trusted either.

When the Washington Post condemns conspiracy theories by featuring them prominently, the reader is probably wise not to take either the theories or the critics at face-value but to reserve judgment until he understands all the facts for himself.

 

 

 

 

 

 

 

Jade Helm: Training, Terror, Or Hoax?

Update 9:

The clog in the Jade Helm logo has a number of associations.

Jews were forced to wear clogs around the neck during times of Islamic persecution in the 10th and 11th century; and, later, under the Nazis,  Jewish prisoners were forced to wear clogs rather than shoes.

Clogs are also associated with workers’ movements and with anarcho-syndicalism.

Among Sephardic Jewish women in Jerusalem, the wearing of clogs was associated with ascetic piety and conservatism.

Most interestingly, they were adopted by the sans-culottes, the Republicans, to differentiate themselves from the aristocrats, during the French Revolution, an upheaval that was one of the first triumphs of Masonic subversion.

Update 8

Several websites are claiming that Jade Helm is an acronym for Joint Assistance for  Deployment and Execution and Homeland Extraction of Local Militants.

They cite two Dept of Defense documents, only one of which I could find on the web and that one certainly doesn’t contain Jade Helm, although it does discuss global disarmament.

UPDATE 7

I had some more insights into the logo of Jade Helm, particularly the clog.

The anarcho-syndicalist link didn’t fully satisfy me, because communist/anarchism is only a front for much deeper affiliations.

Researching it a bit more, I found that the wearing of clogs in the Nazi camps was not the only time the Jews had been humiliated in this way.

Al-Hakim, the third Cairo Caliph who lived in the 10th-11th century, persecuted Jews and Christians, destroying some 30,000 churches in Egypt and the Near East between 1004 and 1014.  Jews were forced to wear clogs around their necks.

UPDATE 6

Here is the logo of Jade Helm 15

jadehelm1.jpeg

1. The “human domain” is a bit of military jargon that has become popular and just refers to the totality of the human environment in which battle is conducted.

2. The crossed swords comes from the logo of the Green Berets.

3.  “Jade Helm” could be a reference to the Green Berets, but I think it might hint at the helmets of  the Nazi army, which were green.

Through Operation Paper-Clip, the Nazis were foundational in the post-WW II organization of US intelligence.

Or, less conspiratorially,  Jade Helmet could refer to Jade Helmet in Wonderland Online, a video-game by the  Taiwanese studio Chinese Gamer International; in it, the characters have abilities linked to the four elements – strength from earth, support from water, attack from air, and agility from wind.

The transparent clog has been seen as a reference to the sabot (French –  wooden clog) and thus, to  sabotage/saboteurs.

The clog is a symbol of anarcho-syndicalism and revolution, thus Wikipedia:

“In Philadelphia, Pennsylvania, there is an anarcho-syndicalist bookshop called Wooden Shoe Books, and from 2001 to 2003 there was an anarchist magazine in Denmark called Sabot. There is also an American record label focusing primarily on punk-rock and genres revolving around it called Sabot Productions,[2] which uses exactly the same sabot picture seen on the right as their logo.

A flag depicting a regular leather shoe of a type worn by peasants in the 16th century was carried by the peasants in the German peasants war of 1524-1525, a proto-anarchist rebellion.”

But the image could at the same time be a reference to the clogs worn by Jewish prisoners in German camps.

Zionist Jews collaborated with the Nazis and enabled the Holocaust as a sacrificial offering (holo-caust, a word that came into usage in that way only in the late 1960s) for the acquisition of Israel,  a central component of the NWO.

The New World Order is an Anglo-Zionist project.

UPDATE 5

I just saw this report of a massive military drill in Fort Lauderdale that went on for 3 hours on March 27.

I’m not sure of the date….elsewhere, the drill was supposed to have gone on from March 24-27.

The Baltimore riots started on April 19 and ran on until the end of the month, with 250 people arrested and a state of emergency declared within the city limits.

UPDATE 4:

Correction : the number 1200 is only the number operating in Texas. It’s wrongly reported on several sites.

UPDATE 3:

Evangelical Christians who teach that Jesus is the only way have been listed as one of 72 groups classified as potential terrorists, alongside threats like Al Qaeda. Also listed as threats are Tea Party activists, constitutionalists, anti-abortion activists, and people who monger conspiracy theories or attack the New World Order.

I fit the profile in at least 4 categories, if not 5.

UPDATE 2:

Granting that there is a need for RMT (Realistic Military Training), why is it being spread out over 9 states?

And why so much hubbub around the exercise? You would think the whole thing would have been kept much more secret to avoid this kind of controversy around it. This way, the entire world is tipped off about the nature of US training. So that too doesn’t  make sense.

It also doesn’t make sense that only 1200 forces are involved in such an expensive, time-consuming exercise.

(Correction: It’s 1200 in Texas).

And finally, it doesn’t make sense that an exercise that is supposed to train the military to infiltrate civilian populations abroad is working with the FBI, DHS, and local police. What do those outfits have to do with foreign enemy situations?

UPDATE 1:

Here’s a thought that came to me:

JADE HELM =  GREEN (THE COLOR OF JADE) HELMET

Per wikipedia:

In 1935 the Wehrmacht adopted a lower, lighter version of the M1916/18 “coal scuttle” helmet; this became the ubiquitous German helmet of World War II, worn by all branches of the Wehrmacht and SS, police, fire brigades and Party organizations. Collectors distinguish slight production variants as the M35, M40 and M42. Heer helmets were originally painted “apple green,” a semigloss feldgrau somewhat darker than the uniform color; wartime factory and field painting covered a gamut from very dark black-green to slate-grey to olive-green (and sand-yellow in Africa), increasingly in matte or textured paint to eliminate reflections.”

ONGOING POST

(Links and information will be added at the bottom, as I find them)

Truth and Action blog describes Jade Helm 15, an unconventional warfare military drill being run across select states in the country that is causing panic among right-wing and anti-state blogs:

“JH is a challenging eight-week joint military and Interagency (IA) Unconventional Warfare (UW) exercise conducted throughout Texas, New Mexico, Arizona, California, Nevada, Utah and Colorado.

UPDATE: Mississippi, Florida and Louisiana have now been added to the list, bringing the total number of states participating to 9.”

The left-liberal websites of course pooh-pooh any concerns as “right-wing” insanity.

Salon:

The governor of one of the 50 states ordered his National Guard forces to “monitor” the U.S. military to ensure they are not planning to turn Texas into Nazi Germany. This is, by the way, the same U.S. military that has 15 bases in the state of Texas.

There’s really only one thing to ask these Real American Patriots at a time like this: Why do they hate the troops so much?”

Of course, it has nothing to do with”hating the troops.”

If the military has become the tool of an unconstitutional, power-hungry ruling cabal, as many fear it is, the Governor of Texas should be commended for ordering the State Guard to monitor the military in its planned “interactions” with civilians.

Even people who who don’t believe any of the conspiracy theories about Jade Helm and see it as bonafide training for survival in hostile territory, envisage scenes that have tremendous potential for violent confrontation:

They’re going to set up cells of people and test how well they’re able to move around without getting too noticed in the community.”

There is no way of knowing exactly what the scenario presented to the troops will be, but it is a certainty that this is not a federal takeover.

At some point, some or all of the troops will be captured. They will begin attempting to “resist” interrogation and plan their “escape.”

Why the big secret?

These exercises are very common. Let’s suppose you were 1000 miles from where you had to be and you had little or no funds to get there. What would you have to do to arrive safely at your destination while avoiding law enforcement and a military detachment?

These training exercises are not discussed because America’s most elite units will most likely be committing a slew of minor crimes along the way. They will certainly trespass, engage in petty theft, sneak onto a train, hide in the back of an 18-wheeler, they might even steal a car. This training is absolutely necessary for these troops’ survival in extreme situations, however, the public reaction to the above wouldn’t be favorable.””

More below on Jade Helm 15.

1. The drill will be running for 3 months from July  15 – September 15.

Some states have been designated as hostile, including Utah, Texas, and New Mexico.

2. There have been many such drills before, although not anywhere as large. Some of them also designated parts of the US as hostile territory.

3. Special forces (Green Berets, Seals, Marines) will be involved.

The 82nd Airborne Division is also involved.

4. 1200 Special Ops personnel will be involved.

Correction: That’s 1200 in Texas.

Lila: That really is not a lot of people.

5. They will be dropped into select cities from planes and will be armed with weapons filled with blanks.

6. Unlike previous exercises,  Jade Helm will involve the police, FBI, JPRA (Joint Personnel Recovery Agency), DHS ( Homeland Security), FEMA (Federal Emergency Management Agency) and electronic warfare.

7. The goal is to test current plans to reduce or control “events and populations” engaged in “unconventional warfare” against the authority of the US government.

Unconventional warfare used to be called guerilla warfare and according to a 1951 manual includes the following:

The term…includes organized and directed passive resistance, espionage, assassination, sabotage and propaganda, and, in some cases, ordinary combat.”

That means that anyone running a blog, participating in strikes, marches, or other non-violent anti-government activities, including merely communicating through social media sites or posting comments, could be considered a dissident, traitor, spy, or jihadi, as Bob English found out a few months ago.

Now you know why I have spent so much time on the thankless and unlovely task of deconstructing people I suspect of acting as provocateurs, such as Ann Barnhardt, whose histrionics have surely created a fat data-base for the Feds to trawl.

The focus of special ops expertise is usually such things reconnaissance, espionage, assassinations, and extraction of key enemy figures.

In this case, that would be prominent (and maybe not-so prominent) dissidents and internal enemies, such as patriot groups, drug cartels, and Hispanic revanchists.

8. There will be exercises involving the following:

a. Cutting off the flow of goods and services and information in and out of selected areas.

b. Infiltrating civilian groups.

c. Staged provocations or operations.

d. Reporting of suspicious activities or noises by civilians.

9. The exercises will be carried out mostly in remote areas between 11 pm and 4 am, with the knowledge of local law enforcement..

10. The novel “Day of Wrath,” William R. Forstchen, August 29, 2014, involves a scenario in which ISIS enters the US  and slaughters people in a new 9-11, and it  has been linked to the rationale of Jade Helm.

A month later, Fox News ran a story that immigration unions were warning that immigration loop holes were creating a serious threat of ISIS infiltration.

11. Considering the level and complexity of propaganda in the US, it would be simplistic to think that all activists are simply cautioning people sincerely.  My sense is that key activists/websites are involved in the program in a kind of entrapment scenario, intended to precipitate confrontation, for whatever end – whether gun control, or martial law, or some other constraint on civil liberties.

There could also be a legitimate threat in the region that needs the cover story of a military drill and the ISIS angle might be a red herring to distract from the actual objective.

This blogger connects Jade Helm to ISIS and the Baltimore riots, which he sees as instigated.

 

The United States Of Spying

Andrew Napolitano via Lew Rockwell:

“When Gen. Michael Hayden, the director of both the CIA and the NSA in the George W. Bush administration and the architect of the government’s massive suspicionless spying program, was recently publicly challenged to deny that the feds have the ability to turn on your computer, cellphone or mobile device in your home and elsewhere, and use your own devices to spy on you, why did he remain silent? The audience at the venue where he was challenged rationally concluded that his silence was his consent.”

When I read this, I’m convinced that my experience in the past few years of having my private conversations surface in a wide-range of web-sites was not imagination or paranoia at all.

I am more than ever certain that the right explanation is spying by someone with access to government technology who was either a lawless private contractor or the witless employee of one of those urban DHS (Dept of Homeland Security) fusion centers that have become notorious for spying on anti-government dissidents.

Witless, because even the most brain-dead flunky of the government should know that venting your political opinion on a blog, sans any act of armed insurrection, espionage, or other illegal activity, is constitutionally-protected, indeed highly valuable, speech and that the government is not permitted in any way, shape, or form, to go on fishing expeditions in people’s private lives (remember those things?) to either back into charges, in the case of people who are engaged in wrong-doing, or to twist arms, in the case of people who are not  doing anything wrong and can only be coerced by the government’s own illegal actions or threats thereo.

 

Former Canadian Dep. Minister Convicted Of Child Pornography

CORRECTION:

Since I posted this piece, I’ve had time to look at the way in which Levin was charged and find that it’s really not clear what happened.

Beyond the possession of child pornography on his computer – and that’s quite easily downloaded by someone else –  is there hard evidence that he committed any of the crimes about which he, admittedly, fantasized.

Did he actually counsel a real mother with a real daughter to rape her child…. or did he respond to an FBI officer engaged in entrapment, which response, devoid of actual criminal action, is something of a manufactured thought-crime, however repugnant those thoughts might be?

ORIGINAL ARTICLE

From Lifesite News comes a report that the high-level Canadian bureaucrat behind a controversial child sex-ed program, has been convicted in court of being a child pornographer.  (For the American equivalent of the program, see here).

Ben Levin claims to have molested his own daughters and was recorded counseling mothers to molest their own children and prepare them for him to molest them.

For those who think that theories about a  global network  of pedophilic criminals in government are mere conspiracy theory, this will be an eye-opener about how and to what end our rulers are subverting instincts and cultural practices that have protected civilization for millenia:

Ontario Premier Kathleen Wynne’s former deputy minister of education, Benjamin Levin, was convicted March 3 in a Toronto courtroom to three charges involving child pornography: making written child pornography, counseling a person to commit a sexual assault, and possession of child pornography.

After Justice Heather Adair McArthur of the Ontario Court of Justice accepted Levin’s guilty plea to the three charges, crown counsel Allison Dellandrea said neither the crown nor Levin’s lawyer, Clayton Ruby, disputed the “agreed statement of fact.”

Among the more lurid details contained in the statement are the admission that Levin, in internet chats, claimed he had sexually abused his own daughters, hoped his daughters would make his grandchildren available to him for sex, and counseled an undercover officer on how to groom a child for sexual abuse. The statement acknowledges that there is no evidence Levin actually abused his children and he has not been charged for that offense.

Levin, in a light grey suit, sat slightly slumped in a chair to the left of lawyer Gerald Chan, often resting his head on his right hand and only once glancing behind at the 40 or so spectators filling the 1000 Finch Avenue courtroom.

These were news media, parents, grandparents, and the odd blogger, some of whom palpably recoiled as Dellandrea read out the statement of facts describing the events leading to the 63-year-old’s arrest on July 8, 2013.

At that time, Toronto police seized three laptops, 11 thumb drives, an XD Olympus memory card, a Samsung cell phone, and an external hard drive from Levin’s home.

They discovered 79 files of child pornography on two of the laptops and the external hard drive, but only 15 images and two videos were accessible to Levin. The rest of the child pornography was found in “computer system-generated folders” created without Levin’s knowledge while he used the Yahoo! Messenger program.

Levin had also created a Word document titled “aaa3” which compiled details of the approximately 1,750 people he had chatted with online “on the subject of subversive sexually interests, primarily those related to sexual contact between parents and children.”

Levin frequented a website, designated as “M” (as it is under ongoing police investigation) that described itself as an “alternative sexual lifestyle social networking site” with chat rooms on “incest” and “teens.”  Levin created his profile on M in 2010, describing his gender as “couple,” and his sexuality as “nothing is taboo.”  His profile, under the username BandB, had been visited 5,103 times, had 29 subscribers and was marked as a favorite by 44 users, according to the statement.

On August 7, 2012, Levin started an online chat with Toronto undercover police officer Janelle Blackadar, who posed as a “sexually submissive, young, single mother with a subversive interest in the sexualization of her children,” the statement reads.

Levin told Blackadar that “he sexually abused his own daughters and other children when they were as young as 12 years old, and encouraged D.C. Blackadar to do the same.” There is no evidence that Levin actually did so, nor has he been charged with this offence, the statement points out.”

Big brother IS watching you

Nick Cohen at the Guardian explains why people who justify national ID schemes are completely mistaken:

The British, who survived the First and Second World Wars, the cold war and IRA bombs appear willing to tear up their civil liberties because of Islamist murderers. ….
The standard reply to the public’s belief that “if you’ve nothing to hide you’ve nothing to fear” is to ask: “So you don’t draw your curtains then?”
It is good as far as it goes, but a better warning against unconstrained police surveillance comes from our experience online. Malice and mobbish rage drive the Twitter storms that break more often than the autumn rains…..
The same people who scream “censorship” and “persecution” when one of their own is targeted lead the slobbering pack when the chance comes to censor and persecute their enemies. They want them fined, punished and sacked, and never pause for a moment to consider their dizzying double standards or reflect that the weapons they use against others will one day be turned on them……
Employers examine Facebook pages before they hire staff. A politically incorrect post can lead to your sacking or demotion. …..
Give it the chance and the authoritarian political class will ape the authoritarian managerial elite and be just as malicious as the Twitter heresy hunters.
The Dorset council that used surveillance powers designed to catch gangsters to spy on a mother who was trying to get her child into a decent school is a symbol of our times.
However outrageous and ham-fisted its behaviour was, the authorities could say that parents are breaking the rules if they game the school system. The police will make the same argument once they have the freedom to roam the web. They will say they have a duty to collect evidence of any crime, however minor. They will do it because they can.”

I found the Cohen article archived at aadhaar-articles.blogspot.com, which is an archive of articles focusing on aadhaar and related concerns.

Aadhaar run by “private shop” accountable to no-one

The New Indian Express points out that the Indian biometric ID is essentially being collated and bared for snooping by foreign governments and private corporations, with no accountability to Indian citizens.

The material collected can be used to track, monitor, and control citizens.

It can subject them to unlawful governmental surveillance, as well as to criminal attacks.

The material can also be used to silence dissidents, frame patsies and scape-goats, and terrorize the population at large:

In 2012, the IB warned the state about loopholes in Aadhaar, but the government continued with the enrolment process, sidestepping security concerns.

The NSA top secret documents leaked last week point to the covert operation. “Identity Intelligence is exploiting pieces of information that are unique to an individual to track, exploit and identify targets… ,” the papers stated.

Three types of data is being mined by the NSA which includes “biometric, biographic and contextual.” Biometric data shows an individual’s physical or behavioural traits like face, iris, fingerprints, voice etc. Biographic data gives details of life history, including address, school, and profession while contextual data is about individual’s travel history and financial bank details.

Although, the US government had earlier scrapped Aadhaar-like project for its residents, it surprisingly mounted covert ops to infiltrate biometric database in other countries. The decision of the US to not allow biometric profiling of residents was followed by China, Australia and UK and similar proposals were shot down by the respective governments.

The intelligence agencies raised the contentious provision in the contract agreement that allows foreign vendors to keep the biometric data for next 7 years making it easy prey for NSA. “The contract agreement signed by UIDAI with foreign vendors is absurd. Private companies can easily share it with US spy agency. We have seen how they arm twist private players to gain foothold in their server,” a top intelligence official said, adding the UIDAI also had arrangements with certain private software firms for technology assistance. “

The Bible says you are not your brother’s keeper

Gary North  (h/t LRC) describes how the left twists the Biblical story of Cain and Abel to support the welfare state.

In the story, Cain murders his innocent brother Abel out of envy of his piety and is questioned about it by God shortly after.

North argues that Cain’s famous reply to God,  “Am I my brother’s keeper?” should not be read to support the idea that people ought to be their brothers’ keepers, as it frequently is.

Cain was only temporizing.

He knew full well where Abel’s murdered body lay, since he’d put it there.

And he knew full well that God knew he’d put it there.

God’ question to Cain was only intended to find out whether Cain was willing to admit what he’d done to Abel.

Cain’s answer really has the opposite meaning from the commonly accepted one.

In this version, a keeper can only “keep” (that is, monitor) someone who is mentally non compos or physically incapacitated.

Since Abel was neither, Cain could not be  Abel’s “keeper.”

Cain was perfectly right on this point.

Which was why he made it, since he knew he was perfectly wrong on everything else.

Reading Cain’s reply this way, anyone who is someone’s “keeper” is obliged to “monitor” them.

The “kept” ones  necessarily lose their physical and moral freedom, since they no longer have full responsibility for the consequences of their actions.

Having full responsibility for the consequences of your actions is roughly what it means to be a legal adult.

Obviously, if other people have to foot the bill for your actions, they are going to watch your actions very closely.

The bill could run up steeply, otherwise.

And that is  just what happens when the government (as proxy for the the public) is obliged to provide for its citizens (that is, for everyone).

The bill runs up.

To stop that happening, ostensibly, the government tightens the screws.

When everyone (as the government) monitors everyone (as the public), the results are pretty much what you have in the US, the UK, Europe, and many other countries following the same dysfunctional model of nationhood – a top-heavy bureaucratic police-state, with endless, infinite surveillance.