• Free subscription via e-mail!

  • Support the site!

  • Join me on Facebook!

  • Categories

  • Archives

  • Recent Posts

  • February 2020
    S M T W T F S
    « Nov    
     1
    2345678
    9101112131415
    16171819202122
    23242526272829
  • Top Posts

  • RSS Farm Wars

  • RSS SMCC

  • RSS The PPJ

  • Meta

Blitz of “Cyber Attacks” as Rockefeller Bill Approaches

Rockefeller Computer copyKurt Nimmo
Infowars
July 8, 2009

A determined propaganda blitz is well underway as the government sets the stage for the passage of Cybersecurity Act of 2009, introduced in the Senate earlier this year. If passed, it will allow Obama to shut down the internet and private networks. The legislation also calls for the government to have the authority to demand security data from private networks without regard to any provision of law, regulation, rule or policy restricting such access. In other words, the bill allows the government to impose authoritarian control over electronic communications. Continue reading

ISP’s confirm ‘2012: The Year The Internet Ends’

Fight to save the Internet from becoming just another Pay-Per-View TV experience!

Read the entire article from ‘I Power’ HERE.

Media Consolidation and the March Towards a World Government

Write What You’re Told  Bush appointee Kevin Martin, head of the FCC, is “proposing to do away with media ownership rules that bar companies from owning both a newspaper and a television or radio station in the same city. In 2003, Kevin Martin voted with the then-FCC chairman to lift the same media ownership rules but the effort was overturned by the landmark Prometheus v. FCC decision” (Democracy Now, 2007). 

“Previous to his FCC job, Kevin Martin served on the Bush-Cheney transition team and was general council for Bush’s 2000 Presidential campaign. His wife, Cathie Martin is a former aide to Vice President Dick Cheney – and works in the White House as a special assistant to the President for economic policy” (Democracy Now, 2005). Considering that Mr. Martin has such close ties with the Bush administration, one cannot help but wonder if this is just another attempt by Bush and Company to limit the public’s access to information, as well as reward large media corporations for their cooperation in keeping information from the public.

This type of information manipulation is not new. David Rockefeller expressed his appreciation for members of the mass media in their efforts to help him in his march towards a world government in 1991:

We are grateful to the Washington Post, The New York Times, Time Magazine and other great publications whose directors have attended our meetings and respected their promises of discretion for almost forty years. It would have been impossible for us to develop our plan for the world if we had been subjected to the lights of publicity during those years. But, the world is now more sophisticated and prepared to march towards a world government. The supranational sovereignty of an intellectual elite and world bankers is surely preferable to the national auto-determination practiced in past centuries. (David Rockefeller, Baden-Baden, Germany 1991)

What we need is a diversity of information from media outlets that are not controlled by special interests, and not a monopoly of a few large corporations whose interests lie in reporting only government approved propaganda. A report done by the Media Information Center in 2004, “shows that only 5 huge corporations — Time Warner, Disney, Murdoch’s News Corporation, Bertelsmann of Germany, and Viacom (formerly CBS) — now control most of the media industry in the U.S. General Electric’s NBC is a close sixth.” The following chart shows the startling decrease in the “number of corporations that control a majority of U.S. media” from 1983 to 2004.

 

Media Reform Information Center, 2007 

Media Reform Information Center, 2007 

 

Kevin Martin’s proposal would not only increase multi-national corporate control over what is seen and heard, but also contribute to the stifling of alternate opinion and free speech, which is so important to a viable democracy. Tell the FCC that you will not put up with further limitations of your right to information from diversified sources. Act now, before it is too late.

 

 

Copyright 2007, Barbara H. Peterson

 

 

References:

 

David Rockefeller. (1991). Retrieved from http://www.fdrs.org/perception_of_freedom.html

 

Democracy Now. (2007). Retrieved from http://www.democracynow.org/article.pl?sid=07/10/22/1415254

 

Democracy Now. (2005). Retrieved from http://www.democracynow.org/article.pl?sid=05/03/17/1442219

 

Media Reform Information Center. (2007). Retrieved from

http://www.corporations.org/media/

 

Internet Found Guilty of Promoting Terrorism

Internet Censorship  According to HR 1955: Violent Radicalization and Homegrown Terrorism Prevention Act of 2007, the Internet is guilty of promoting terrorism, and is subject to sentencing by Congressional committee.

HR 1955 can be found in its entirety by clicking this link: HR 1955 text. While reading this bill, it occurred to me that one of the main thrusts of the bill, as indicated in the following excerpt, is to declare the Internet guilty of promoting terrorism, and to lay the foundation for sentencing. Please pay careful attention to numbers 2 and 3:

SEC. 899B. FINDINGS

The Congress finds the following:

1. The development and implementation of methods and processes that can be utilized to prevent violent radicalization, homegrown terrorism, and ideologically based violence in the United States is critical to combating domestic terrorism.

2. The promotion of violent radicalization, homegrown terrorism, and ideologically based violence exists in the United States and poses a threat to homeland security.

3. The Internet has aided in facilitating violent radicalization, ideologically based violence, and the homegrown terrorism process in the United States by providing access to broad and constant streams of terrorist-related propaganda to United States citizens.

4. While the United States must continue its vigilant efforts to combat international terrorism, it must also strengthen efforts to combat the threat posed by homegrown terrorists based and operating within the United States.

5. Understanding the motivational factors that lead to violent radicalization, homegrown terrorism, and ideologically based violence is a vital step toward eradicating these threats in the United States.

Let’s go through the relative portions of this bill, starting with items 2 and 3, listed above:

The promotion of violent radicalization, homegrown terrorism, and ideologically based violence exists in the United States and poses a threat to homeland security. The Internet has aided in facilitating violent radicalization, ideologically based violence, and the homegrown terrorism process in the United States by providing access to broad and constant streams of terrorist-related propaganda to United States citizens.

The Internet is charged with promoting violent radicalization, homegrown terrorism, and ideologically based violence, which poses a threat to homeland security, and has been found guilty as charged.  

HR 1955 then goes on to determine sentencing by creating a commission that shall be “established within the legislative branch of the Government: the National Commission on the Prevention of Violent Radicalization and Homegrown Terrorism” (HR 1955 Section 899C(a)). This Commission is composed of 10 members, appointed for the life of the Commission. The Commission shall:

Not later than 18 months after the date on which the Commission first meets…submit to the President and Congress a final report of its findings and conclusions, legislative recommendations for immediate and long-term countermeasures to violent radicalization, homegrown terrorism, and ideologically based violence, and measures that can be taken to prevent violent radicalization, homegrown terrorism, and ideologically based violence from developing and spreading within the United States…
(HR 1955 Section 899C(q)).

Section 899D of HR 1955 then creates “a university-based Center of Excellence for the Study of Violent Radicalization and Homegrown Terrorism in the United States (hereinafter referred to as ‘Center’)” (HR 1955 Section 899D (a)), to establish a method for carrying out the sentence recommended by the Commission.

The Center’s purpose shall be

…to study the social, criminal, political, psychological, and economic roots of violent radicalization and homegrown terrorism in the United States and methods that can be utilized by Federal, State, local, and tribal homeland security officials to mitigate violent radicalization and homegrown terrorism (HR 1955 Section 899D (b)).

Section 899E internationalizes the efforts in section 899D:

(a) International Effort- The Secretary shall, in cooperation with the Department of State, the Attorney General, and other Federal Government entities, as appropriate, conduct a survey of methodologies implemented by foreign nations to prevent violent radicalization and homegrown terrorism in their respective nations.

(b) Implementation- To the extent that methodologies are permissible under the Constitution, the Secretary shall use the results of the survey as an aid in developing, in consultation with the Attorney General, a national policy in the United States on addressing radicalization and homegrown terrorism.

The Congressional verdict is in. The Internet is guilty of facilitating terrorism, and poses a threat to homeland security. Congress acts as judge and jury, convicts the defendant of the crime of promoting terrorism, and the Internet now awaits sentencing by the Commission; the method of carrying out that sentence to be determined by the Center.

Here are the steps in chronological order:

1. Congress accuses the Internet of having facilitated, and continuing to facilitate violent radicalization, in direct violation of HR 1955 Section 899B(2), and reaches a verdict of guilty.

2. The National Commission on the Prevention of Violent Radicalization and Homegrown Terrorism committee (Commission) (HR 1955 Section 899C(a)) is assigned to submit sentencing recommendations.

3. A university-based Center of Excellence for the Study of Violent Radicalization and Homegrown Terrorism in the United States (Center) is given the task of determining the best method/s for carrying out the sentence recommended by the Commission.

4. Step 1, the verdict is in. Steps 2 and 3, sentencing recommendations, and method of dispensing sentencing are awaiting completion. When these steps are completed, the next step is to pronounce sentencing.

5. After the sentence is pronounced, the final step is to carry out the sentence recommended by the Commission, and implement it using the method/s arrived at by the ‘Center.’

Will the government take this to its logical conclusion and eliminate the Internet as we know it? I believe it will try. 

Copyright 2007, Barbara H. Peterson 

Homeland Security Links 9/11 Truthers to Taliban

360px-us_department_of_homeland_security_seal_svg.png  Do you remember when Bush Jr. said, “either you are with us, or you are with the terrorists”? Well, he meant it. The House Homeland Security sub-committee on terrorism risk assessment convened a hearing on 11-06-2007 to discuss “using the Web as a weapon – the Internet as a tool for violent radicalization and homegrown terrorism.” In a video of this meeting, which was last aired by C-Span on 11-12-2007, members of the sub-committee clearly pointed to Internet sites that question the legitimacy of the official 9/11 story as tools for recruiting terrorists.

During the course of the hearing, Mark Weitzman of the Simon Wiesenthal Center displayed a Power Point Presentation illustrating what his organization considers terrorist recruitment sites. Here is his testimony:

To illustrate the trends described above, we have put together a short PowerPoint demonstration. Without going into deep detail in these written remarks, I would like to offer some brief descriptions of the material that will be shown. The presentation begins with a look at how 9/11 is viewed in some eyes online, including those who applauded it as well as some conspiracies sites. The presence of the conspiracy site is significant, since so much of what passes as fact online is actually based on some form of conspiracy…

Next is a series of sites of media portals which show some of the varied methods that the Islamists use to get their message out, including some based on United States servers. These are followed by some looks at charts and other manuals on how to use violence, along with a novel interpretation of jihad that calls for an “electronic jihad.”

One of these “media portals” displayed in the Power Point presentation is Architects and Engineers for 9/11 Truth. This site is sandwiched between a Taliban training manual, and several Taliban recruitment sites showing how to make bombs, take captives, and blow buildings up.

Representative Jane Harmon posed the following question to Bruce Hoffman regarding extremist groups using the Internet to recruit potential terrorists: “So this movement develops them into violent killers?” Bruce Hoffman, a Georgetown University security studies professor, and Chairman of the Rand Corporation in Counterterrorism and Counterinsurgency, stated that “falsehoods and conspiracy theorists have become so ubiquitous and believed that you almost have some sort of parallel truth, and it has become a very effective tool for recruiting people.” The “people” he is referring to are potential terrorists. Mark Weitzman stated: “These people are constructing their own version of reality, full of conspiracy theories, full of doctored videos, that will recruit or inflame the emotions.” 9/11 “conspiracy theorist” groups are included in this generalization.

By portraying sites such as Architects and Engineers for 9/11 Truth as terrorist recruitment organizations, the Department of Homeland Security has taken a dangerous step towards punishing anyone who questions the government. If you go to the A&E Website, you will see that it is a group of “  212  architectural and engineering professionals and   518  other supporters including A/E students who have joined…in demanding of Congress a truly independent investigation of the collapse of the WTC buildings.” Their mission statement is, “To research and to disseminate the truth of the 9/11 “collapses” of all 3 WTC high-rise buildings to every architect and engineer.” I cannot find any indication that this site promotes terrorism, much less recruits terrorists for the Taliban, yet the Department of Homeland Security has taken the stance that the site is “intended to recruit or inflame the emotions” (Weitzman, M.), and lumps it in with sites disseminating the Taliban Training Manual, and advocating suicide bombings.

Rita Katz, director of the SITE Institute – The Search for International Terrorist Entities went on to blame the Internet for Bush Jr.’s failed “war on terror,” and Representative Charles Dent stated that one possible way to help fight purported Internet terrorism would be to “turn the Internet into a less reliable source of information” by putting up phony Websites to collect information on terrorists as well as disseminate false information. Parry Aftab, Executive Director of Wiredsafety.org, also suggested that the government should collect IP addresses of suspected terrorist Websites to aid in the fight against terror on the Internet. Websites such as Architects for 9/11 Truth for instance?

If all Websites that disagree with the official government explanation of the collapse of the WTC towers is placed on a list of suspected terrorist Websites, what is next? Like Bush Jr. stated: “either you are with us, or you are with the terrorists.”

Copyright 2007, Barbara H. Peterson

%d bloggers like this: