Tag Archive: Deception


This Is How The Feds Illegally Obtain Evidence Of A Crime And Lie About It In Court

 

 

 

” The president continues to dispatch his National Security Agency (NSA) spies as if he were a law unto himself, and Congress—which is also being spied upon—has done nothing to protect the right to privacy that the Fourth Amendment was written to ensure. Congress has taken an oath to uphold the Constitution, yet it has failed miserably to do so. But the spying is now so entrenched in government that a sinister and largely unnoticed problem lurks beneath the surface.

  NSA documents released by Edward Snowden show that the feds seriously deceived Congress and the courts in an effort to spy upon all of us and to use the gathered materials in criminal prosecutions, even though they told federal judges they would not. Among the more nefarious procedures the feds have engaged in is something called “parallel reconstruction.” This procedure seeks to hide the true and original source of information about a criminal defendant when it was obtained unlawfully.

  Thus, in order to maintain the facade of spying only for domestic intelligence purposes, and to appear faithful to public and secret promises (the FISA court only sits in secret) that any evidence of criminal behavior inadvertently discovered by NSA spies will not be used in criminal prosecutions, and so as to keep the mechanisms of domestic spying hidden from non-FISA federal judges who are more likely to apply normative interpretations of the Fourth Amendment than their FISA court colleagues, the NSA and the DOJ began the process of parallel reconstruction.

  Parallel reconstruction consists largely of the creation of a false beginning—an untrue one—of the acquisition of evidence. This, of course, is criminal. Lawyers and agents for the NSA and DOJ may no more lawfully lie to federal judges and criminal defense attorneys about the true origins of evidence than may a bank robber who testifies in his own defense claiming to have been at Mass at the time of the robbery.

  While parallel reconstruction is deceptive, unlawful and unconstitutional, I suspect it is but the tip of a dangerous iceberg spawned by the unbridled NSA spying that Bush and Obama have given us. When you mix a lack of fidelity to the plain meaning of the Constitution with a legal fiction, and then add in a drumbeat of fear, enforced secrecy, and billions of unaccounted-for taxpayer dollars, you get a dangerous stew of unintended tyrannical consequences.”

 

Read the whole thing at Reason

 

 

 

 

 

 

 

 

 

 

 

 

Top Grimes Donor: “She’s Going To F**k ‘Em When She Gets Elected”

 

 

   Here is part one of Project Veritas’ undercover investigation . Hidden cameras catch her lying to voters about her support for the coal industry .

 

 

 

 

 

 

 

Published on Oct 6, 2014

” Kentucky U.S. Senate candidate Alison Grimes has vehemently and repeatedly claimed to oppose President Obama’s coal and environmental policies in what has become an increasingly significant campaign issue. A team of investigative journalists, led by Project Veritas Action’s founder James O’Keefe, went undercover in multiple Grimes campaign offices to determine if her opposition to the core principles of her own political party is genuine or an intentional deception.”

 

 

And here is part two filmed at a recent New York fundraiser attended by the usual leftist fellow travelers …

 

 

 

 

 

Published on Oct 7, 2014

” Part Two of investigative report where chorus of campaign workers insist that Senate candidate Alison Grimes deceives voters about her energy policy. Investigators secretly record video at Grimes fundraising event attended by Hollywood mogul Harvey Weinstein, real estate tycoon Niko Elmaleh and New York Knicks owner James Dolan at a swanky NY restaurant. She will do what she has to do to get elected then “f**k” the coal industry, says the major donor. “

 

 

 

Project Veritas Action 

 

 

 

 

 

 

 

 

 

 

How Covert Agents Infiltrate The Internet To Manipulate, Deceive, And Destroy Reputations

 

 

 

 

” One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

  Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

  By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

  Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:”

 

 

 

 

” We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?

  As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. “

 

 

   This Glenn Greenwald piece is a must read for all that have any interaction with the internet . Yes , this means you . We’re all targets now . No one is safe from attempts to destroy dissent facilitated with our own tax dollars and conducted by our own government .

 

 

 

 

 

 

 

 

 

 

 

Four Arabic Words Every Infidel Must Know

 

 

 

 

” In 539 BC, King Belshazzar of Babylon saw a dismembered hand-written four prophetic words on the wall. This “handwriting on the wall was finally interpreted by the prophet Daniel as predicting the fall of the kingdom. He was right. Babylon fell to the Medes-Persians that very night.”

Like the “handwriting on the wall” that Prophet Daniel had interpreted, there are fourArabic words which could lead to submission of the entire world to Islam, if non-Muslims do not fully understand their meaning and implications. Those words are taqiyya , twariya , kitman and muruna .

 

Taqiyya

Taqiyya is defined as dissimulation about ones Muslim identity. It comes from the verse in the Quran that says, “Let believers not make friends with infidels in preference to the faithful – he that does has nothing to hope for from Allah – except in self-defense (illaan tattaqoo minhum tuqatan (Quran 3:28). 

This “self-defense” justifies dissimulation.Islamic Sharia Law provides, “When it is possible to achieve an aim by lying but not by telling the truth, it is permissible to lie if attaining the goal is permissible, and lying is obligatory if the goal is obligatory.” “

 

 

 

    Read the whole thing … Islam is all about world conquest and it’s tenets allow encourage killing , lying , cheating and deception in order to facilitate the Global Caliphate . We ignore the truth of Islam at our peril .

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

… Four State Dept. Officials Keep Jobs After Phony Resignations

 

 

 

Remember These Men: Christopher Stevens,Sean Smith,Glen Doherty & Tyrone Woods 

They Died At The Behest Of A Corrupt And Dishonest Administration That Continues To Stonewall And Play These Obscene Parlor Games With The Active Collusion Of The Mainstream Media .

 

 

” Not only was the security situation at Benghazi a failure of the State Department, as a report to Congress detailed, the public show ofsupposed accountability that resulted in the ‘resignation‘ of four diplomatic officials was a farce.

As Josh Margolin at the NY Post uncovered:

The four officials supposedly out of jobs because of their blunders in the run-up to the deadly Benghazi terror attack remain on the State Department payroll — and will all be back to work soon, The Post has learned.

The highest-ranking official caught up in the scandal, Assistant Secretary of State Eric Boswell, has not “resigned” from government service, as officials said last week. He is just switching desks. And the other three are simply on administrative leave and are expected back. ”

 

 

 

More From That ” most honest , open and transparent ” Administration

 

 

 

” The name Richard Windsor may sound innocuous, but it is allegedly one of the secret “alias” email accounts used by Obama EPA Administrator Lisa Jackson.

“That is the name — sorry, one of the alias names — used by Obama’s radical EPA chief to keep her email from those who ask for it,” Chris Horner, senior fellow at the Competitive Enterprise Institute and author of the new book “The Liberal War on on Transparency,” told the Daily Caller News Foundation in an email.

In his book, Horner revealed the existence of “alias” email accounts used by EPA administrators. The first such transparency dodge, he writes, came from Carol Browner, former director of the Obama White House Office of Energy and Climate Change Policy and Bill Clinton’s EPA administrator. “

Shhh, don’t tell your employees their jobs are in danger .

   ” Senate Minority Leader Mitch McConnell (Ky.) and other Republicans pointed to guidance
issued Monday by the Department of Labor that said it would be “INAPPROPRIATE” for defense
firms to issue layoff notices to employees before
the election due to the pending cuts.

“The president doesn’t want people reading about pink slips in the weeks before his election, so the White House is telling people to keep the effects of these cuts secret — ‘Don’t tell anybody,’ he says, ‘keep it a secret’ — until, of course, after the election,” McConnell said on the Senate floor Tuesday. ”

  This is how the dems look after the working man . Don’t give them any warning that their job is on the line til after they vote .

  Open and honest my ass ..

  ” Lockheed Martin CEO Bob Stevens pressed the issue last month when he threatened to issue
layoff notices to all 123,000 of his employees on the Friday before the election due to a provision in U.S. labor law requiring large employers to notify employees 60 days in advance of layoffs caused by a foreseeable event.

   Trade groups have claimed 1 million defense jobs could be at risk from the pending cuts, which are known as sequestration and were triggered by the failure of a supercommittee of lawmakers to reach a debt deal last year. “