Monthly Archives: February 2012

In Post-NDAA Amerika, What is a Terrorist and Who Can Make You Disappear by Calling You One?

Suspected Terrorist

IN POST NDAA AMERIKA, WHAT IS A TERRORIST AND WHO CAN MAKE YOU DISAPPEAR BY CALLING YOU ONE?

Since corporate fascist puppet president Barack Obama signed the National Defense Authorization Act for Fiscal Year 2012 into law this past New Year’s Eve (NDAA: Public Law 112-81), the powers of indefinite detention claimed under the post-9/11 Authorization for Use of Military Force Act (AUMF: Public Law 107-40) have been codified. Now the mere suspicion of being a “terrorist” is sufficient grounds for an American citizen – on American soil – to be arrested and detained indefinitely without charge or trial. Obvious questions of constitutionality aside, this should prompt at least the cautious to ask questions like the following:

1. What is the legal definition of “terrorist”?

2. Who can make you disappear by calling you one?

To answer the first question, we searched the online version of the United States Code – “the codification of the general and permanent laws of the United States” – for a definition of “terrorist”. And to our amazement, we didn’t find one. Over 400 references to “terrorist” in the USC, yes. But a specific definition, no. What we did find is this:

Title 8 Section 1182(a)(3)(B) defines “terrorist activity” but not “terrorist”:

(iii) “Terrorist activity” defined As used in this chapter, the term “terrorist activity” means any activity which is unlawful under the laws of the place where it is committed (or which, if it had been committed in the United States, would be unlawful under the laws of the United States or any State) and which involves any of the following: (I) The highjacking or sabotage of any conveyance (including an aircraft, vessel, or vehicle). (II) The seizing or detaining, and threatening to kill, injure, or continue to detain, another individual in order to compel a third person (including a governmental organization) to do or abstain from doing any act as an explicit or implicit condition for the release of the individual seized or detained. (III) A violent attack upon an internationally protected person (as defined in section 1116(b)(4) of title 18) or upon the liberty of such a person. (IV) An assassination. (V) The use of any – (a) biological agent, chemical agent, or nuclear weapon or device, or (b) explosive, firearm, or other weapon or dangerous device (other than for mere personal monetary gain), with intent to endanger, directly or indirectly, the safety of one or more individuals or to cause substantial damage to property. (VI) A threat, attempt, or conspiracy to do any of the foregoing. (iv) “Engage in terrorist activity” defined As used in this chapter, the term “engage in terrorist activity” means, in an individual capacity or as a member of an organization – (I) to commit or to incite to commit, under circumstances indicating an intention to cause death or serious bodily injury, a terrorist activity; (II) to prepare or plan a terrorist activity; (III) to gather information on potential targets for terrorist activity; (IV) to solicit funds or other things of value for – (aa) a terrorist activity; (bb) a terrorist organization described in clause (vi)(I) or (vi)(II); or (cc) a terrorist organization described in clause (vi)(III), unless the solicitor can demonstrate by clear and convincing evidence that he did not know, and should not reasonably have known, that the organization was a terrorist organization;

(V) to solicit any individual – (aa) to engage in conduct otherwise described in this subsection; (bb) for membership in a terrorist organization described in clause (vi)(I) or (vi)(II); or (cc) for membership in a terrorist organization described in clause (vi)(III) unless the solicitor can demonstrate by clear and convincing evidence that he did not know, and should not reasonably have known, that the organization was a terrorist organization; or

(VI) to commit an act that the actor knows, or reasonably should know, affords material support, including a safe house, transportation, communications, funds, transfer of funds or other material financial benefit, false documentation or identification, weapons (including chemical, biological, or radiological weapons), explosives, or training – (aa) for the commission of a terrorist activity; (bb) to any individual who the actor knows, or reasonably should know, has committed or plans to commit a terrorist activity; (cc) to a terrorist organization described in subclause (I) or (II) of clause (vi) or to any member of such an organization; or (dd) to a terrorist organization described in clause (vi)(III), or to any member of such an organization, unless the actor can demonstrate by clear and convincing evidence that the actor did not know, and should not reasonably have known, that the organization was a terrorist organization. (v) “Representative” defined As used in this paragraph, the term “representative” includes an officer, official, or spokesman of an organization, and any person who directs, counsels, commands, or induces an organization or its members to engage in terrorist activity. (vi) “Terrorist organization” defined As used in this section, the term “terrorist organization” means an organization – (I) designated under section 1189 of this title; (II) otherwise designated, upon publication in the Federal Register, by the Secretary of State in consultation with or upon the request of the Attorney General or the Secretary of Homeland Security, as a terrorist organization, after finding that the organization engages in the activities described in subclauses (I) through (VI) of clause (iv); or (III) that is a group of two or more individuals, whether organized or not, which engages in, or has a subgroup which engages in, the activities described in subclauses (I) through (VI) of clause (iv).

http://www.law.cornell.edu/uscode/text/8/1182

Title 18 Section 2331 defines “international terrorism” and “domestic terrorism” [READ CLOSELY] but not “terrorist”:

As used in this chapter- (1) the term “international terrorism” means activities that- (A) involve violent acts or acts dangerous to human life that are a violation of the criminal laws of the United States or of any State, or that would be a criminal violation if committed within the jurisdiction of the United States or of any State; (B) appear to be intended- (i) to intimidate or coerce a civilian population; (ii) to influence the policy of a government by intimidation or coercion; or (iii) to affect the conduct of a government by mass destruction, assassination, or kidnapping; and (C) occur primarily outside the territorial jurisdiction of the United States, or transcend national boundaries in terms of the means by which they are accomplished, the persons they appear intended to intimidate or coerce, or the locale in which their perpetrators operate or seek asylum; (2) the term “national of the United States” has the meaning given such term in section 101(a)(22) of the Immigration and Nationality Act; (3) the term “person” means any individual or entity capable of holding a legal or beneficial interest in property; (4) the term “act of war” means any act occurring in the course of- (A) declared war; (B) armed conflict, whether or not war has been declared, between two or more nations; or (C) armed conflict between military forces of any origin; and (5) the term “domestic terrorism” means activities that- (A) involve acts dangerous to human life that are a violation of the criminal laws of the United States or of any State; (B) appear to be intended- (i) to intimidate or coerce a civilian population; (ii) to influence the policy of a government by intimidation or coercion; or (iii) to affect the conduct of a government by mass destruction, assassination, or kidnapping; and (C) occur primarily within the territorial jurisdiction of the United States.

http://www.law.cornell.edu/uscode/text/18/2331

Title 22 Section 2656f(d) defines “international terrorism”, “terrorism”, “terrorist group” and “terrorist sanctuary” but not “terrorist”:

(d) Definitions As used in this section- (1) the term “international terrorism” means terrorism involving citizens or the territory of more than 1 country; (2) the term “terrorism” means premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents; (3) the term “terrorist group” means any group practicing, or which has significant subgroups which practice, international terrorism; (4) the terms “territory” and “territory of the country” mean the land, waters, and airspace of the country; and (5) the terms “terrorist sanctuary” and “sanctuary” mean an area in the territory of the country- (A) that is used by a terrorist or terrorist organization- (i) to carry out terrorist activities, including training, fundraising, financing, and recruitment; or (ii) as a transit point; and (B) the government of which expressly consents to, or with knowledge, allows, tolerates, or disregards such use of its territory and is not subject to a determination under- (i) section 2405(j)(1)(A) of the Appendix to title 50; (ii) section 2371 (a) of this title; or (iii) section 2780 (d) of this title.

http://www.law.cornell.edu/uscode/text/22/2656f

I’m no attorney and I don’t play one on television. But after reading the above, it seems to me that the short answer to the question “What is the legal definition of terrorist?” is “That depends.”

Now on to the second question: Who can make you disappear by calling you one?

According to the Washington Post’s TOP SECRET AMERICA project, there are “45 government organizations (for example, the FBI) engaged in top-secret work [that can] be broken down into 1,271 sub-units (for example, the Terrorist Screening Center of the FBI).” I’m pretty sure they can. But they also mention “4,058 government organizations involved in domestic counterterrorism and homeland security” including 2,880 federal organizations that work at the state level, such as the FBI’s Joint Terrorism Task Forces (JTTFs), plus 818 state and 360 local organizations. I’m pretty sure they can, too. And then of course there’s the “1,931 companies engaged in top-secret work for the government.” I’d wager some or all of them can, as well.

http://projects.washingtonpost.com/top-secret-america/articles/methodology/

And that’s not all. We also have to consider the Nationwide Suspicious Activity Reporting Initiative (NSI):

http://nsi.ncirc.gov/

Using NaSI SARs (Suspicious Activity Reports), just about anyone can drop the dime the makes you disappear: a hateful former spouse, a jealous or jilted lover, that co-worker you’re always competing with, or maybe just a nosey neighbor. All they have to do is fill out one of these forms and click “Submit”:

http://amerikanreich.com/sar-list/

 

Our thanks to the OccupyWallSt.org Forum and Reddit r/Politics posters who contributed to the research for this release:

http://occupywallst.org/forum/please-help-us-determine-the-actual-precise-specif/

http://www.reddit.com/user/ironboltbruce/

###

NO MORE LEFT. NO MORE RIGHT. TIME TO UNITE. STAND AND FIGHT!

IronBoltBruce via VVV PR ( http://veritasvirtualvengeance.com | @vvvpr )

Img: http://veritasvirtualvengeance.files.wordpress.com/2012/02/suspected_terrorist.jpg

Vid: http://www.youtube.com/watch?v=LWvSFBVojjU

Spt: https://www.wepay.com/donate/ironboltbruce

Tag: #terrorist, #terrorists, #terrorism, #aumf, #ndaa, #bigbrother, #fascism, #fascist, #fascists, #ows, #vvvpr

 

###

We sometimes use links shortened with http://tinyurl.com to so they don’t break in emails. If you actually think we would use them to cloak phishing or malware, open them with this: http://longurl.org. We also want to thank the website design miami, website designer miami and website developer miami who support our efforts.


Fascism Anyone? The 14 Defining Characteristics of Fascism by Dr. Lawrence Britt

Occupy Fascism
FASCISM ANYONE? THE 14 DEFINING CHARACTERISTICS OF FASCISM BY DR. LAWRENCE BRITT
Originally published in the Spring 2003 edition of Free Inquiry Magazine

Dr. Lawrence Britt has examined the fascist regimes of Hitler (Germany), Mussolini (Italy), Franco (Spain), Suharto (Indonesia) and several Latin American regimes. He found 14 defining characteristics common to each:

1. Powerful and Continuing Nationalism – Fascist regimes tend to make constant use of patriotic mottos, slogans, symbols, songs, and other paraphernalia. Flags are seen everywhere, as are flag symbols on clothing and in public displays.

2. Disdain for the Recognition of Human Rights – Because of fear of enemies and the need for security, the people in fascist regimes are persuaded that human rights can be ignored in certain cases because of “need.” The people tend to look the other way or even approve of torture, summary executions, assassinations, long incarcerations of prisoners, etc.

3. Identification of Enemies/Scapegoats as a Unifying Cause – The people are rallied into a unifying patriotic frenzy over the need to eliminate a perceived common threat or foe: racial, ethnic or religious minorities; liberals; communists; socialists, terrorists, etc.

4. Supremacy of the Military – Even when there are widespread domestic problems, the military is given a disproportionate amount of government funding, and the domestic agenda is neglected. Soldiers and military service are glamorized.

5. Rampant Sexism – The governments of fascist nations tend to be almost exclusively male-dominated. Under fascist regimes, traditional gender roles are made more rigid. Divorce, abortion and homosexuality are suppressed and the state is represented as the ultimate guardian of the family institution.

6. Controlled Mass Media – Sometimes to media is directly controlled by the government, but in other cases, the media is indirectly controlled by government regulation, or sympathetic media spokespeople and executives. Censorship, especially in war time, is very common.

7. Obsession with National Security – Fear is used as a motivational tool by the government over the masses.

8. Religion and Government are Intertwined – Governments in fascist nations tend to use the most common religion in the nation as a tool to manipulate public opinion. Religious rhetoric and terminology is common from government leaders, even when the major tenets of the religion are diametrically opposed to the government’s policies or actions.

9. Corporate Power is Protected – The industrial and business aristocracy of a fascist nation often are the ones who put the government leaders into power, creating a mutually beneficial business/government relationship and power elite.

10. Labor Power is Suppressed – Because the organizing power of labor is the only real threat to a fascist government, labor unions are either eliminated entirely, or are severely suppressed.

11. Disdain for Intellectuals and the Arts – Fascist nations tend to promote and tolerate open hostility to higher education, and academia. It is not uncommon for professors and other academics to be censored or even arrested. Free expression in the arts and letters is openly attacked.

12. Obsession with Crime and Punishment – Under fascist regimes, the police are given almost limitless power to enforce laws. The people are often willing to overlook police abuses and even forego civil liberties in the name of patriotism. There is often a national police force with virtually unlimited power in fascist nations.

13. Rampant Cronyism and Corruption – Fascist regimes almost always are governed by groups of friends and associates who appoint each other to government positions and use governmental power and authority to protect their friends from accountability. It is not uncommon in fascist regimes for national resources and even treasures to be appropriated or even outright stolen by government leaders.

14. Fraudulent Elections – Sometimes elections in fascist nations are a complete sham. Other times elections are manipulated by smear campaigns against or even assassination of opposition candidates, use of legislation to control voting numbers or political district boundaries, and manipulation of the media. Fascist nations also typically use their judiciaries to manipulate or control elections.

Any questions, America?

###

NO MORE LEFT. NO MORE RIGHT. TIME TO UNITE. STAND AND FIGHT!

IronBoltBruce via VVV PR ( http://veritasvirtualvengeance.com | @vvvpr )

Img: http://veritasvirtualvengeance.files.wordpress.com/2012/02/occupy_fascism.jpg

Vid: http://www.youtube.com/watch?v=eLlLEtWEY4Y

Vid: http://www.youtube.com/watch?v=fCrj5XRI40Y

Vid: http://www.youtube.com/watch?v=L3kiC4i256w

Spt: https://www.wepay.com/donate/ironboltbruce

Tag: #corporatefascism, #fascism, #fascist, #fascists, #ows, #worldwarweb, #vvvpr

 

###

We sometimes use links shortened with http://tinyurl.com to so they don’t break in emails. If you actually think we would use them to cloak phishing or malware, open them with this: http://longurl.org. We also want to thank the web design miami beach, web designer miami beach and web developer miami beach who support our efforts.


World War Web Advisory #5: CyberWar: First SOPA/PIPA/PCIPA/S2105, Now HR2096/HR3523/HR3674/S1152/S2111

World War Web CyberWar
WORLD WAR WEB ADVISORY #5: CYBERWAR: FIRST SOPA/PIPA/PCIPA/S 2105, NOW HR 2096/HR 3523/HR 3674/S 1152/S 2111

With NDAA 2012 in place and EEA in process to control its citizens, and HR 658 enabling DHS WAASS Skynet drones to surveil the skies, America’s corporate-controlled Congress now shifts its focus to fast-tracking cyberfascism.

Sections 1021 and 1022 of the National Defense Authorization Act For Fiscal Year 2012 (NDAA: Public Law No: 112-81) codify the executive (civilian agency e.g. CIA/DHS/FBI) authority to arrest and hold indefinitely without charge or trial American citizens – indefinite detention – as claimed by Presidents Bush and Obama pursuant to the post-9/11 Authorization for Use of Military Force Act (AUMF: Public Law 107-40), and add to that authority the “option” of military detention as well. And although President Obama assured in his signing statement that his administration would refrain from exercising their military options, Presidential signing statements are merely political documents with no force of law or penalty for breach. Besides, once the Enemy Expatriation Act is passed (EEA: HR 3166/S 1698), should an American citizen’s rights become an obstacle our government will be able to simply revoke their citizenship (naturalized OR native born):

http://www.govtrack.us/congress/bill.xpd?bill=h112-3166

http://www.govtrack.us/congress/bill.xpd?bill=s112-1698

With NDAA in place and EEA in process to control the citizenry on the ground, the corporate fascist elite that controls our government and others next looked to secure the skies. They accomplished that on Valentines Day, when their puppet President Obama signed HR 658 into law and thereby authorized the release of up to 30,000 drones into American air space and enabled the Department of Homeland Security (DHS) Wide Area Aerial Surveillance System (WAASS) – a “1984 Meets Terminator” Big Brother Skynet domestic surveillance nightmare that we could not end:

http://tinyurl.com/6qgh38g

So with the real world firmly under their control, our corporate fascist masters now look to dominate the virtual. And in eager pursuit of that aim, the otherwise seemingly gridlocked Democrats and Republicans in our House and Senate have been showering each other with wave after wave of bipartisan support for so-called “anti-piracy”, “anti-pornography”, “cyber crime”, “cyber intelligence” and “cyber security” bills which taken together put us on a global fast-track to “cyber fascism”. In our previous advisories we warned you about the Stop Online Piracy Act (SOPA), Protect IP Act (PIPA), Protecting Children from Internet Pornographers Act (PCIPA), and the recently-unveiled Cybersecurity Act of 2012 (S 2105). To that laundry list of Orwellian euphemisms and acronyms – some of which have been delayed, but NONE of which are dead – we now add five more bills you’d be wise to track:

H.R. 2096: Cybersecurity Enhancement Act of 2011

http://www.govtrack.us/congress/bill.xpd?bill=h112-2096

H.R. 3523: Cyber Intelligence Sharing and Protection Act of 2011

http://www.govtrack.us/congress/bill.xpd?bill=h112-3523

H.R. 3674: PRECISE Act of 2011

http://www.govtrack.us/congress/bill.xpd?bill=h112-3674

S. 1152: Cybersecurity Enhancement Act of 2011

http://www.govtrack.us/congress/bill.xpd?bill=s112-1152

S. 2111: Cyber Crime Protection Security Act

http://www.govtrack.us/congress/bill.xpd?bill=s112-2111

Additional Reading:

http://tinyurl.com/7xz7e59

http://tinyurl.com/6ro4hqk

###

NO MORE LEFT. NO MORE RIGHT. TIME TO UNITE. STAND AND FIGHT!

IronBoltBruce via VVV PR ( http://veritasvirtualvengeance.com | @vvvpr )

Img: http://veritasvirtualvengeance.files.wordpress.com/2012/02/world_war_web_cyberwar.jpg

Vid: http://www.youtube.com/watch?v=hqkPleXkKhs
( Cyberwar Hype Fuelling A Cybersecurity Industrial Complex )

Spt: https://www.wepay.com/donate/ironboltbruce

Tag: #sopa, #pipa, #pcip, #pcipa, #h2096, #h3523, #h3674, #s1152, #s2105, #s2111, #cybersecurity, #cyberwar, #ows, #worldwarweb, #vvvpr

 

###

We sometimes use links shortened with http://tinyurl.com to so they don’t break in emails. If you actually think we would use them to cloak phishing or malware, open them with this: http://longurl.org. We also want to thank the web designs mobile, web designers mobile and web developers mobile who support our efforts.