The attack on the US Constitution in the wake of US National Security Agency leaks over massive surveillance, compromises the fourth and ninth amendments. Massive surveillance programs indiscriminately monitor every kind of digital or electronic communication of Americans and foreigners. The United States and their relationships with the “Five Eyes” does this legally by monitoring foreign governments and having foreign allied governments monitor our citizens. Then under an agreement these allied powers exchange information about each other’s citizens and their digital communications to subvert the laws put in place to protect privacy. This is wrong.
This incursion happens to corporate secrets and could be viewed legally as espionage. The effect of this spying works to perpetuate the largess of multi-nationals while stifling competition and innovation through oppressive taxation and regulation. This happens without probable cause and reasonable assumption as required by the law. To the mis-fortunate, the burden of proof is shifted from the government of the United States to the citizen. Hindered by a police state, Americans who would otherwise remain anonymous before their government face instead a cliché exclaiming, “You have nothing to fear if you’re not doing anything wrong.” Countries who pursued this irrationality in the 20th century saw the death of over a 100 million people to Nazism, communism and socialism. This kind of nationalism should remain an anathema to American ideas, culture and legality. Instead this apparatus supports a crony-capitalistic nepotism to solve political and social problems created by the political class. Lobbying interests are served before the privacy of individual citizens. Corporations helping the government, obtain this ability help to cast a net of surveillance over all the citizens of the country with cameras in cop cars and at traffic stops. Snooping goes on with big data and the groceries you buy using your value card and each credit card transaction leaves a finger print of your buying habits to be scrutinized by an all-powerful state. This is all done by borrowing your money and that of your children’s to spy on you. This is an indignation that freemen should not suffer.
Americans face a deluge of revelations recently regarding their government spying on them. Edward Snowden released over 50,000 documents and only a small portion has been revealed to the public. Read on to discover what is known about this incursion against your human rights and click the links below to be part of the solution to the problem.
Following the Second World War, the US and its allies had defeated Nazi Germany. However, American and Soviet interests remained at a crossroads. Soviet power had increased in Eastern Europe and Communist interests in China overtook the nationals who fled to Taiwan. As states like East Germany, Poland, Hungary, and China fell under Communist power, the West watched an iron curtain hinder freedom in the form of tyranny and a police state. This subservience became a threat to US national interests globally even as the banking cartel in the US funded both sides. Having gained valuable insight into sharing information to ensure the success of allied forces in the contract, the governments of the United Kingdom and the United States agreed on March 05, 1946 to share intelligence information in what became the UKUSA Security Agreement . In the following decades Canada, Australia and New Zealand were added to this initially secret treaty but only after the Australians investigated a location called Pine Grove that was initially run by the US Central Intelligence Agency early in the 1970′s and knowledge of this program was made public in a series of raids known as the Murphy Raids. The Australian Prime Minister was fired over it.
Article II, Section 2 of the US Constitution states, “The President…shall have Power, by and with the Advice and Consent of the Senate, to make Treaties, provided two thirds of the Senators present concur.” Once the President decides a treaty is good it is sent to the US Senate’s Foreign Relations’ Committee for Ratification. After review it is sent to the full Senate, which ratification requires 67 votes. The Senate may consider amendments independent of the President and send the treaty back to the President for final ratification and implementation of the treaty.
While it is apparent in matters of national security, the US President may authorize international policy from an executive-only perspective. It is evident the USAUK Agreement was not negotiated with the Congress. A sole-executive agreement can only be negotiated and entered into through the president’s authority in areas of: (1) in foreign policy, (2) as commander-in-chief of the armed forces, (3) from a prior act of Congress, or (4) from a prior treaty. Agreements beyond these competencies must have the approval of Congress (for congressional-executive agreements) or the Senate (for treaties). Understanding the UKUSA Agreement above notes that this falls under the second portion of a sole-executive agreement and Congressional Consent and Approval is not required in these kinds of treaties. There are obligations of the executive that apply and shall be noted below. This is why militarism and terrorism are consistently used to spy on everyone.
The power of this law can not super-cede the US Constitutional limitations explicitly stated in first eight amendments of the Bill of Rights. This is supported by the US Supreme court, in a landmark 1957 case where a woman was accused and brought to trial by military tribunal of murdering her husband. The US and UK had a military agreement at the time that allowed US Servicemen and their families to be tried by military tribunal while stationed overseas as a matter of jurisdiction. In Reid v. Covert, the US Supreme Court agreed with the petitioners, concluding that United States citizens were entitled to the protections of the Bill of Rights, notwithstanding that they committed crimes in foreign soil. This was despite these agreements made by the executive .
The result of these arrangements has created the largest intelligence gathering apparatus in the history of the world. The governments of the “Five Eyes” have heavily invested in information gathering technology to the point of intrusive behaviors towards individual citizens who no longer can remain anonymous before their government. Personal emails, surfing habits and books that are checked out of libraries are spied on for suspicious behavior.
Recent revelations by Booz Allen Hamilton contractor and defector, Edward Snowden, have brought new light to several surveillance programs . While the Echelon story broke in the UK back in 2001, Snowden’s revelations have brought several programs including, PRISM, XKEYSCORE, and TEMPORA to light. These revelations represent only a small portion of Edward Snowden’s 50,000 document leak and have caused problems with US allies in France and Germany as a result. American civil liberties groups have formed efforts to restore constitutional protections toward the people of the United States as a result of these revelations and Congress has refused to impeach a single official in the Obama Administration over these issues and not a single special prosecutor has been appointed by the US Department of Justice. There are rogue extra-constitutional elements at play.
A country that refuses to target and profile Islamic terrorists for fear of reprisals from organizations like CAIR, but targets ordinary citizens instead because of their dissenting views, has a real problems. When the Fusion Center in Boston targeted peaceful anti-war Veterans groups instead of following the leads the US Federal Bureau of Investigation and Russian Intelligence Apparatus gave them, these limited resources failed to prevent the tragedy at the Boston Bombing. How many other opportunities are missed because this kind of intrusion is misappropriating the targeting of intelligence gathering assets? Why is not the consensus among Americans, journalists, writers and politicians in a non-partisan fashion exclaiming that our enemies of state aren’t ordinary people in the United States that need to be controlled but outlaw banks who launder billions for the US Central Intelligence Agency and drug traffickers?
This program, rumored since the 1970′s, is designed principally for non-military targets: governments, organizations and businesses in virtually every country. The Guardian UK broke a story from concerned civil libertarian groups noting its construction by the US National Security Agency and the British GCHQ. It was part of the “Five Eyes” agreements noted above . ECHELON is a surveillance technology that focuses on electronic methods of communication like: cell phones, fax machines, and email networks. By listening to these communications, the technology behind this system searches for keywords. This system can even listen to phone calls and search them for keywords. Targeting is also determined by these keyword searches. The US and UK governments are through to tap the deep water cables that allow communications to exist between continents as well as satellite communications that perform the same tasks. It is believed that large pools of data are collected and then processed.
In an Operation known as, Operation Ivy Bells, the US Navy in conjunction with the US Central Intelligence Agency and US National Security Agency, learned of Russian military communications via an underwater cable in the Sea of Okhotsk. The US wanted to learn about the Soviets submarine capabilities . During the Cold War, the Soviet Union had claimed this Sea as territorial waters which prohibited international sea traffic. The Soviet Union had installed sensitive listening capabilities to detect intrusion . The USS Halibut, lead by Captain James Bradley, sailed into dangerous waters and given the sensitive nature of the story, the sailors aboard were told their mission was to recover a Russian SSN-N-12 AshM. This missile was an anti-ship missile that was deployed by Soviet Naval Forces and could be used against allied forces. US Navy divers performed the mission successfully; recovering over 2 million pieces. The intelligence gathered allowed the US to deploy appropriate countermeasures against this weapon. While the cover story stuck, the US was successful at penetrating the Soviet Communications in the Sea by tapping this undersea cable. Early in the 1980′s the mission was compromised by a disaffected National Security Agency employee, named Roland Pelton, who took information about this operation and sold it to the Soviet Union. The USS Parche was dispatched to recover the listening device but US Navy divers were unsuccessful in obtaining it .
The USS Jimmy Carter, was launched May 13, 2004 and was the third and final Seawolf-Class submarine delivered to the US Navy. While she was being built, a special $887 million contract was awarded to Electric Boat to make extensive modifications to the initial design . These modifications included a multi-mission platform which allows divers to perform missions that include Remote Operational Vehicles and insertion of Seal Teams . It is largely believed the modifications also include sensitive intelligence gathering technologies. This was the most expensive Naval program ever costing 25% of the US Navy’s construction budget since 1991 on and the USS Jimmy Carter is considered 70 times quieter than the initial class of Los Angeles attack submarines . Rear Admiral Hank McKinney in a Defense-tech article about the USS Jimmy Carter, hypothesized the use of this platform in performing undersea cable taps noting:
The US Navy has for years carried out special surveillance missions with nuclear submarines. Most of these missions utilized attack submarines that were not extensively modified. Specialized communications intercept equipment were installed in existing spaces on board these submarines…In the case of USS Jimmy Carter, all the modifications were made before the submarine was delivered to the US Navy .
It is believed the USS Jimmy Carter has technology that allows the sub to tap undersea phone lines by inserting a sleeve over the undersea cable. Technology can be deployed that tethers a cable back out to sea in friendly waters and broadcast to a satellite information from the tap.
OTHER PRE-9/11 SURVEILLANCE PROGRAMS
When the United States determines a threat to the government the financial database that is kept of their monetary interests. This database as of 2008 had some 8 million names in it and was called Main Core . Projects MINARET  and SHAMROCK  were also operated by the National Security Agency. These programs targeted specific citizens and their communications traffic. Allegedly, there was no judicial oversight, and the project required no warrants for interception. Operating between 1967 and 1973, over 5,925 foreigners and 1,690 organizations and US citizens were included on the Project MINARET watch lists. National Security Agency Director, Lew Allen, testified before the Senate Intelligence Committee in 1975. He noted the National Security Agency had issued over 3,900 reports on the watch-listed Americans . The program was terminated by the Attorney General, Elliot Richardson. Project SHAMROCK focused on all traffic leaving the United States. The National Security Agency was given daily microfiche of all outgoing telephonic calls from the United States and then passed the information along to other members of the Intelligence Community . Another database was designed to track case management of the legal system. PROMIS allowed prosecutors to determine what attorney’s would plea-bargain a case out or who would take specific kinds of cases . The leverage this provided prosecutors over judges and defendant’s counsel could inhibit the rights of the accused by gambling with probability on if an attorney would settle or not. Converted to intelligence management it can track assets in various countries and be used for case management of operations around the globe .
WAR ON TERROR SURVEILLANCE
The broad sweeping powers of US-PATRIOT Act  in 2001, following the September 11th attacks and the anthrax attacks on political opponents of George W. Bush , provided a legal framework for the National Security Agency to expand its surveillance powers .
The BLARNEY is a program started in 1978 and it is a communication surveillance program, started in 1978 and operated under the legality of Foreign Intelligence Surveillance Act. It continued into the war on terror and it monitors wireless and wired communications where information is compiled by telephone companies . Between 2003 and 2006, in a room located at 611 Folsom Street, in San Francisco, California known as Study Group 3 to AT&T, a secure enclave that has fibre optic back bone trunks that allow AT&T and their customers listen to, sift, read, and process Internet traffic regionally and globally . Experts believe 20 such facilities exist around the US and that BLARNEY sifts through 75% of all Internet traffic . Like other programs, its intrusive nature collected large amounts of personal contact information that didn’t require probable cause to initiate the surveillance.
A program called TURBULENCE does more than look over the Internet for the National Security Agency . It is the progeny of the TRAILBLAZER project which was discontinued in 2006 due to being over budget and being unable to demonstrate results . The TURBULENCE project allows agents of the Intelligence Community to interject offensive cyber-warfare capabilities like malware and spy-ware onto people’s computers using known weaknesses in operating systems. TURBULENCE was developed as a series of smaller pilot programs which demonstrated capability unlike TRAILBLAZER. Some sub programs decrypt information on the web with National Security Agency’s super-computing. Allegedly the National Security Agency are able to decrypt most algorithms . This program has been criticized by Congress even after whistle-blowers went through official channels, for having similar problems as the TRAILBLAZER project to include massive fraud, waste and abuse. The Bush and Obama Administrations responses were to focus on leak with politically motivated witch hunts instead of correcting the problem  or as chief executives with their Attorney’s General choose to protect the constitutional liberties of their constituents for whom they were elected.
The National Security Agency collects additional information on global Internet traffic a database called PINWALE. It allows targeting directors and analysts to cherry pick the information and to target individuals . This database and its collection technologies requires Foreign Intelligence Surveillance Court (FISA) approvals and has a capacity of about 60GB of data production daily. Revelations about the database note it contains two partitions, “Sweet” and “Sour .” While the PINWALE database looks at Internet traffic, another database that manages the meta-data for people’s phone calls and is called MAINWAY. This database collects the information from calls originating with AT&T, SBC, Bell South and Verizon. It contains the meta-data of several trillion phone calls and also falls under the FISA judicial process.
Edward Snowden, son of a Coast Guard Officer, struggled in school at a young age. His parents got divorced and at age 16 he went to a local community college to study computers. His infamy however started long after he took courses at Anne Arundel Community College. He also had joined he Army. His stint with the Army resulted in a discharge due to him breaking both legs while still in training around 2003. This earned him a discharge. In 2005 he started working with the National Security Agency as a “Security Specialist” after initially being hired as a security guard. In 2006 Snowden landed a job with the US Central Intelligence Agency. In February of 2009 Snowden left the US Central Intelligence Agency to work for Booz Allen Hamilton in Japan and his opinions of the US surveillance programs shifted. He also realized that the processes built into the US system are created to keep the National Security Agency in check had failed. He was one of approximately 1000 system administrators who could surf the National Security Agency’s intra-net and not leave digital fingerprints. On 20 May he vanished after requesting a leave of absence from his employer and informing his employer he had a recent diagnosis of epilepsy . When he resurfaced he had made liaison with Laura Poitras and her colleague Glen Greenwald with the Guardian UK, a large media outlet in the United Kingdom. They met in Hong Kong. After their interviews and meeting in secret, the story posted and became the most widely watched story The Guardian had ever produced. Edward Snowden’s story in 2013 brought these issues to the forefront of Internet security and privacy discussions while also making him out to be a hero and a traitor among his countrymen. He lost his country and citizenship and escaped to Russia where he is currently living. His revelations have not brought a single Special Prosecutor or action to impeach from the Congress on any National Security Agency official for lying to Congress or subverting the Constitution. Beyond the embarrassment of the US spying on its allies, the inability of the Congress to act on behalf of the American people to defend the Constitution on these matters, must appear to foreign allies and foes as another sign of weakness and ineptitude.
When Edward Snowden talked about the invasive aspects of the National Security Agency (NSA) he detailed a surveillance program called PRISM which allowed the National Security Agency to spy on businesses and individuals who used Microsoft services. Notably, Microsoft’s cloud based services and encryption technologies had been compromised by the Vendor. The allegation noted that Microsoft colluded with the National Security Agency. Furthermore, these revelations noted that Microsoft’s involvement with Skype allowed the National Security Agency to grab text, voice and video conversations from the communication software platform. This information was shared with the US Federal Bureau of Investigation and US Central Intelligence Agency . Microsoft denied this collaboration. Is it any wonder why the US Justice Department dropped its Anti-trust suit in 2001 if this allegation is true?
Mr. Snowden talked about the pervasive aspects of this program by stating that almost everything you do on-line is collected by the National Security Agency and they can do it without a warrant. Notably, your email, your social networking activity and browsing histories are collected in a repository. This collection technology included your meta-data as well. Snowden showed investigators the form used by National Security Agency to acquire this background information . One can simply type in an email address and massive amounts of data are sifted to collect information about a target.
The most significant revelation from Mr. Snowden is a program that involves a “Full Take” system that records more than meta-data and search histories. It records almost three days worth of the Internet. It indiscriminately takes in entire swaths of the net with minimal regard to the Constitution. What is published on Facebook, on a web-page, what web page you visit, the pornography you download, the text message you send to your mother on the way home all gets rolled up in this database. “Full-take” means it doesn’t miss anything, and ingests the entirety of each circuit’s capacity. Snowden noted, “If you send a single ICMP packet and it routes through the UK, we get it. If you download something and the CDN (Content Delivery Network) happens to serve from the UK, we get it. If your sick daughter’s medical records get processed at a London call center … well, you get the idea .”
Justifications and Potential Good
Recently, the implementation of these programs are sold to the US Congress, when the Intelligence Community is not lying to them , under the guise of stopping terrorists. Scouring the third and developing world for violent political interests, where Internet connections can often be scarce, seems a bit like over kill when selling it to the American People with a healthy dose of fear of another terrorist attack. 20 years ago it was about limiting the influence and spread of Soviet and Chinese Communism. Both of these are essential to the legality of these programs, due to a military purpose on the sole-executive treaty powers noted above, when they could be better used to protect intellectual property rights with our trading partners. Apologists note when an adversary is identified, such as a terrorist or even the fear of a terrorist, and political influence wielded from these programs, monitoring the enemies of the state, as a matter of national security, is decidedly in the best interest of the country. The monitoring of the world in this fashion can serve the interests of the United States by following the money of our adversaries, by limiting their access to our markets, and using the intelligence information gathered to inhibit their operations abroad. This information can solve crimes, can help field commanders on the battlefield, and limit the traffic of persons and drugs around the world. As a result of these efforts, the National Security Agency claimed in October of 2013 that it had stopped some 50 terrorist attacks without providing evidence  to the Congress. While classified, an estimated black budget of $10 Billion annually demonstrates the expense of these preventative efforts .
With the disintegration of the Soviet Union and advent of a technological revolution via the Internet, the atomization of anti-American sentiments  provides a variety of surveillance opportunities to defend the interests of the United States. It seems that a top down approach to big data has empowered a government in spending money to solve a problem a minority helped to create. Surveillance technology of the database that was created with Saudi-Intelligence to identify arms and money flowing in and out of Afghanistan , which Robin Cook referred to as Al-Queda, could have identified Osama bin Laden as a potential threat long before the US decided he wasn’t an asset to the US Central Intelligence Agency any longer . Surveillance technology could be used to stop the 12 million illegal alien immigrants who have invaded their porous borders . Instead the US Department of Homeland Security subjects US citizens to physical humiliation each time they fly . Grandmother’s in wheelchairs are groped. Cancer patients wearing diaper en-route to chem-therapy are humiliated and naked pictures of us all are taken in the name of safety. Nun are given pat-downs and pedophiles have been hired as they touch little children’s private areas in the name of national security. In the least we’re forced to be less productive when we travel, taking hours out of our schedule to stand in line and take our shoes off to be treated like second class citizens. No one is articulating the IQ of anyone who would want to stand in front of an x-ray machine for 8 hours a day either as a matter of economic choice. The state uses police powers to stop Americans at check points to harass them over their citizenship status, while simultaneously failing to deport known illegals by choice. The executive branch is not enforcing the laws to deport. The US government will not even profile Islamic terrorists but decide to profile your viewing habits if you feel their conduct deserves scrutiny. This is insanity!
This technology could be used to protect the individual rights of US citizens instead of targeting dissent by, protecting $200 billion annually in intellectual property of Americans that are stolen annually by competitive interests in Bangkok, Taiwan, Tokyo, Shanghai, Peking, and Hong Kong . Our patents, copyrights, and materials produced in the United States are often competitively out produced cheaper in China after they have been invented or marketed initially in the United States. This is not competition but intellectual theft. American know-how in big agriculture and big pharmaceuticals have lost billions over the years as the National Security Agency spies on Facebook for anti-government postings instead of protecting people’s right to say it and helping out our industry in maintaining intellectual sovereignty. The technology could be used to stop the inside trading that went on September 11th , or the involvement of rogue elements with in the US Intelligence Community in the drug trade in Afghanistan , Bosnia, Mexico and Vietnam  could be employed better than collecting what shows grandma is watching on the Tevo. This technology could be used to protect individual liberties instead of establishing a police state in places like Afghanistan and Iraq  where thousands of American servicemen died on behalf of their country. The brother of Afghanistan’s chief executive is connected to the drug trade and the Kharzi’s are back in power just like the US Central Intelligence Agency wanted before the Russian’s invaded in the 1970′s. While American Intelligence assets are being paid to watch for potential political dissent in the United States, this technology could have monitored the treacherous kleptomania behind the LIBOR banking scandal  in the UK where trillions were fleeced from the world economy or recently where silver and gold prices were manipulated by a minority . Appropriately focused, efforts could have prevented the BCCI, a bank with connections to the US Central Intelligence Agency, Osama bin Laden, and the drug trade, to funding the Pakistani atomic bomb project and AQ Khan network . This community of watchers could have prohibited Qaddafi’s Libya from obtaining 700 tons of Semtex explosives , or Saddam’s Iraq from obtaining large amounts of chemical weapons in the Iran-Iraq War . In these instances it was the empowerment of rogue interests in the West, even with in these institutions whose shroud of secrecy exclaimed as a national interest, that allowed this to happen.
The National Security Agency should not be used to protect these rogue elements within the US or the UK. These are the real advantages of employing this technology for the National interest. Instead it appears that rogue elements with in the US Intelligence and Defense Establishments purposefully target these assets in multiple mis-directions and the foreign policy implementations perpetuate these nefarious activities only to have the US change its mind (i.e. double cross). Instead, we have Americans babysitting poppy fields in Afghanistan  and the chief executive stating that after a decade of fighting al-Qaeda we’re going to say they’re our allies in Syria. Saddam used those weapons against his people and against the Iranians. Qaddafi used the explosives to blow up a plane with innocent people on it near Lockerbie, Scotland. We can do so much better than misuse this on borrowed money from our grandchildren who have not even had a chance to vote on it yet, by people who aren’t following our laws or Constitution. This is lawless behavior and if the Congress will not act Americans must put someone in Congress who will. The House of Representatives must go back to the people every two years. Vote. Get involved. Stop this madness.
The evolution of the US Government from the protectorate of civil libertarian freedoms toward a political police state  that is beholden to lobbing interests, has a devalued its currency . Profits are made through crony business deals with the state, limits the options of individual citizens and the free markets. Americans have lost opportunity, representation and ground in the political systems which metastasize toward a ripe corruption. The inception of the American experiment, in its idealized form, began with a revolt against taxes. Americans opposed England’s force to use the king’s money instead of the colonial script in the Currency Act of 1764. The hard fought freedom caused their 7th President, to kill the central bank by refusing to renew the charter and earn the distinction of being the only president to pay off the national debt. In the early part of the 20th Century the US would establish a Central bank that would take the world’s most valuable currency and devalue it. With in a few generations, the United States would go from the number one lender in the world in 1970 to the biggest debtor in the world . America’s Gold from Fort Knox has disappeared  and while remaining the world’s mightiest military power, interventionist policies have largely inhibited the free and fair trade while benefiting a few globalists. The ire this has incurred from both friend and foe have limited the choices and professional and political opportunities of future Americans. It burdens Americans with a debt they are likely unable to repay . America endures the worst business tax rate on the globe . Many saddled with this debt cannot even vote yet and those who wish to engage in business and commerce are forced into business decisions looking elsewhere for opportunity. These are real challenges to the American people and their government, that is supposed to be working for them, rather than creating a culture of dependency, fails to inhibit the incursion of foreign debt from trading partners in China, Japan and Saudi Arabia. Trillions are owed.
Instead of using these immense powers of surveillance technology to protect the ability of the common man to engage fairly among their contemporaries in commerce, the aforementioned scandals appear at least superficially to be the result of insiders and corruption. They are lead by banks who’s lobbyists ensure the US Congress supports banking interests as sovereigns above the people. Americans must borrow each dollar this banking cartel before its put into circulation and pay interest on that dollar when Congress has been given the Constitutional authority to print money. With all this surveillance it is a shame $350 trillion in derivatives manipulation by several large UK banks were not under the purview of the ‘National Interest’ as a target of the Intelligence Community . Instead these criminals falsely inflated or deflated the LIBOR (London Interbank Offered Rate) rates to profit from trades and then give the impression they were credit worthy when they were closer to insolvency. Those in the know profited while governments saddled with debt mounted to subjugate their people. The result will be undoubtedly, a sovereign debt crisis in the United States, likely where oil in the Western States will be sold to holders of those notes, as well as an oppressive tax that will look like debt slavery. The US Treasury has an arm of Intelligence Professionals that gather information in the national interests, for limiting fraud, organized crime, money laundering and other financial crimes . Why were they not defending the interests of the United States in these matters instead of a few large political fat-cat baking donors?
On another note, the US Federal Reserve’s policy of monetizing one trillion dollars of bonds annually puts pressure on the hegemony the US dollar on world exchange markets. The dollar as a result of its history is the Reserve currency of the world. Markets saw the dollar fall relative to gold in recent years. Gold remained on the rise and hit $1900 an ounce in the fall of 2011 . Officials realized this could cause a run on the dollar relative to its exchange rates with other currencies. Foreign and domestic holders of the dollar would sell, it was estimated, and this could crash the markets around the world. The Central Bank of the United States wasn’t the only player in the market, and in collusion with these commodities, selling gold to lessen demand and create an artificial market supply, absorbed demand that otherwise would have pushed gold prices higher . This is fraud. They weren’t really trading physical gold but paper futures trades on the Comidity Exchange, Inc. Chicago’s Globex is a computerized trading system used for derivatives, currency and futures contracts. Several large global banks are trading members of the COMEX: JP Morgan, HSBC and Bank Nova Scotia and these members conduct the majority of the trading volume . Why wasn’t this prevented as money was fleeced from what should have been a free exchange? Notably, Germany has asked for its gold back and these banks have not obliged. Where was the political will and focus on a Private banking cartel in the Untied States, who devalues the currency in such a fashion that could bring down the entire monetary system?
This is what the intelligence gathering apparatus of the United States were doing instead:
3000 National Security Agency (NSA) Violations Noted In Audit
Responding to the claims of Edward Snowden the US National Security Agency conducted an internal investigation. The Washington Post reported that the National Security Agency broke the law thousands of times in violation of US code and executive order between April 2011 and March 2012. Furthermore the audit showed the National Security Agency changed documentation, in reports to Congress and the Justice Department regarding specifics over National Intelligence issues as a matter of executive privilege . No one in Congress has stepped up to demand a Special Prosecutor be appointed or officials in the executive branch become impeached. Notably Congress has not stepped up, a special prosecutor has not been appointed and no one in the executive branch has been impeached over this allegation.
Verizon Meta-data Warrant
In April of 2013, the United States Foreign Intelligence Surveillance Court issued a warrant to allow the National Security Agency to collect meta-data on all the phone calls made by Verizon Wireless, one of the largest telecommunications carriers in the United States. The Warrant required the telecommunications company to turn over its meta-data secretly to the National Security Agency all of its meta-data not focused on a specific case or area of probable cause but every day. The broad sweeping allegation was backed up by a warrant signed by a judge and presented to the Guardian UK . Notably and as a side-bar, Verizon Wireless paid no income tax either . Notably Congress has not stepped up, a special prosecutor has not been appointed and no one in the executive branch has been impeached over this allegation.
In 2000 a consortium of countries led by the French and Chinese laid the world’s longest undersea cable. Administered by SingTel, the South-East Asia – Middle East – Western Europe 3, runs from the German coast into the Mediterranean over 39,000 km through France, Italy, Greece, Turkey, Egypt, Saudi Arabia, Pakistan, India, Mamymar, Malaysia, Australia, Korea and Japan. This cable allows many of these countries to communicate on the Internet and via telephone. The German paper, Süddeutsche Zeitung, revealed the UK and US intelligence agencies tapped the SEA-ME-WE-3 cable completed in 2000 . Notably Congress has not stepped up, a special prosecutor has not been appointed and no one in the executive branch has been impeached over this allegation.
Snowden’s documents provided to the Guardia note that Paypal has cooperated with the National Security Agency on multiple efforts. Notably, the National Security Agency gathers personal financial information of people who use this service and others, stores it and shares it as it deems appropriate. A Former National Security Agency official, William Binney commented on this use stating, “The ANS has had the cooperation of major financial institutions, including credit card companies, to obtain all financial transactions of these companies’ clients-international and domestic. Further, the ANS not only obtains and stores the financial data of Americans and foreigners, but it also shares them with other government agencies such as the FBI and DEA .” Notably Congress has not stepped up, a special prosecutor has not been appointed and no one in the executive branch has been impeached over this allegation.
What Does this Mean?
Civil Libertarians are concerned because even in instances where the National Security Agency is not violating rather than protecting the Constitutional Rights of the people. This is increasingly dangerous when the government views the individual citizens as a threat to the government and not an overreaching government as a threat to the people. With the sweeping powers of the USPATRIOT Act, the President can declare anyone a terrorist with very minimal burdens of proof placed upon the state to act . The Federal Government having an alleged terrorist, instead of protecting the Constitutional rights of an American citizen, can then suspend Constitutional rights under the law to include the law of Habeus Corpus, a right to a speedy trial, and to confront their accused in court. The Federal Government under these powers can indefinitely detain a terrorist with out bringing the individual to a trial. Most Americans believing the enemy of State is a stereo-typical Wahabbist jihadi roaming the mountains of Afghanistan in search of people to blow up for his or her cause believe this is a good thing until they realize it could happen to them.
In 2009 President Obama called Christians terrorists . A 2011 Politico article noted that Vice President equated members of the Tea Party movement in the Untied States as terrorists . Life News reported in 2012 that President Obama called Americans with a pro-life view terrorists . Similar views have filtered into other aspects of the executive branch. In Texas, during a pre-mobilization brief for soldiers at Fort Hood, the US Army identified Christians and Tea Party members as terrorists in 2013 . Reporter Paul Joseph Watson reported in 2013, that the US Department of Homeland Security, as part of its public service announcements saw Veterans Groups and Tea Party members as terrorists . It is evident that mixing politics as an opposition perspective can lead to a domestic classification as a terrorist under the PATRIOT Act and a large voting block in the US has been alienated and rendered a potential enemy of state.
The fourth amendment to the US Constitution states, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
These broad surveillance powers compromise the most basic elements of our rights to privacy. In 1965 a landmark Supreme Court case, Griswold v. Connecticut ruled that Americans have a right to privacy guaranteed by the US Constitution citing the 9th amendment and protected by due process in the 4th amendment in the case . In a Federal District case that is likely headed for the Supreme court, a judge ruled the National Security Agency programs as unconstitutional . The judge noted the programs were almost Orwellian in nature. In a similar case in New York, William Paul Harvey III, a Federal district a judge, ruled the programs as Constitutional . Judge Harvey noted that in the months before the attacks on September 11th, if the National Security Agency had been allowed to intercept phone calls from US domestic services from Khalid al-Mihdhar, who was living in San Diego and would become one of the hijackers the US Government could have stopped the attacks. The agency could not at the time capture that information.
CLASS ACTION LEGAL ACTION
Echoing Senator Church in the 1970′s , Congressman Rand Paul has consistently addressed this issue stating that he will take it to the Supreme Court. He stated in a press conference, “I would love anybody that supports that fight to sign on to my class-action lawsuit.” The next step is, Is it constitutional to collect, with a single warrant to Verizon, can you collect 100 million people’s records?” Americans have a right to privacy. Your government has to have probable cause to look at your text messages on your phone. It must have reasonable suspicion that you are breaking the law before reading your emails. Join Senator Rand Paul and sign the petition. Interested parties should visit the Congressman’s web site at:
CONTACT CONGRESS AND TELL THEM TO STOP THE SPYING AND IMPEACH
Americans need to contact their Congressperson and tell them that spying on Americans goes against the 4th and 9th amendments of the Constitution. Tell them to impeach officials of the executive branch to include the President if he is involved. The Attorney General’s office who approved these programs in their legality needs to be impeached. Impeachment must start in the US House of Representatives. Click the link, type in your zip code and write them.
Companies in the United States like Microsoft and Apple come installed on computers that are sold in most retailers. Additionally, companies like Verizon, AT&T, Sprint, and T-Mobile sell telephones with iOS and Android. The challenges with these systems, if Edward Snowden is to believed, is the reason for the frequent updates on these systems is due to security patches and flaws in the architecture. What is troubling is that these patches are consistent and have remained so through generations of software and rework to the point that planned obsolescence of Operating Systems seems to be the business model. When these companies roll out a new version of their OS it is ripe with security holes and unfortunately for the world of programmers who may have competencies to fix, they are unable to assist Apple, Google and Microsoft in fixing those problems. They have closed systems to protect their intellectual property which is not secure.
Furthermore, if the United States is a leader in the world of information software technology and networking hardware, the consortium of providers that run the back bone of the Internet, and telephone networks, has back doors built into it, it limits users of these networks to any back door surveillance the National Security Agency may be interested in watching. Logs are kept on switches by providers who are required by law to maintain those logs.
One way to address this concern amongst advocates against these closed systems is the open-sourced community. There are many distributions of an Operating System called LINUX which for basic computing that meets most users needs for both the desktop and telephonic operating systems. From humble beginnings this open sourced software has its code shared with millions of programmers around the world and any holes in the programming of the kernel or applications are noted by programmers adapting the programs to their specific needs. When weaknesses are found by the community, new updates are made often quicker than the pace that a private closed-sourced company like Apple or Microsoft performs. Even if you’re not a programmer with a strong background in information technology this Operating System has less virus and malware in existence for it while also having all the conveniences of a modern operating system. The advantage of switching to Linux is that across a platform you can have secure computing systems whose web cam or microphone can’t be listened to as a back-door process of the National Security Agency.
Switching Operating Systems cannot limit your Internet Service Provider or Wireless Service from logging your Internet surfing but anonymous surfing protocols below can assist you with that process. Furthermore, there are other technologies that can secure your system from cyber-snoops. To go Microsoft and Apple free try Ubuntu:
The Communications-Electronics Security Group (CESG) reported on the security of Operating Systems in 2013. In a series of evaluation and testing conducted by this UK based group, they reviewed the following categories: Virtual Private Networking, Disk Encryption, Authentication, Secure Boot, Platform Integrity and Application Sand-boxing, Application Whitelisting, Malicious Code Detection and Prevention, Security Policy Enforcement, External Interface Protection, Device Update Policy, Event Collection for Enterprise Analysis, and Incident Response. Notably, Ubuntu 12.04 (Precise Pangolin) is the operating system that passed most of the tests, way ahead of Windows 8 or Mac OS X.
A firewall places a barrier between your computer and the Internet. It can limit the kinds of things that your computer does over the network. Your computer communicates over the Internet through various ports and opening and closing or filtering these ports is something that an advanced firewall can do for your system. There are several open-sourced firewall programs for Linux, Windows, and Apple. Newer Operating Systems seem to have some of these features built in built in firewall but if Edward Snowden is to believed, the closed-sourced ones like Windows, Apple, iOS, and Android have back doors built into bypass these firewalls. Firewalls help monitor your system’s communication between your network and the Internet to help stop intrusions and attacks. They are particularly useful for controlling the activities of Internet facing applications.
A firewall should protect while not being too intrusive or too complicated to handle. Firewalls come in two flavours; software based and hardware based
A secure third party product like pfSense is a great solution for the large scale networks. Endian makes an exceptional product if you are looking for a hardware based product that can integrate with your network and can scale users to a small network. IPCop is another product that you can install and it performs the following duties: packet filtering, proxy, traffic shaping, Virtual Private Networking and secure remote access, user authentication, name services, and time server. AVS is another product you can use to secure your system from intrusion.
HARD DRIVE ENCRYPTION
There are several great products that are not tied to your Operating System as an out of the box solution. Like the other systems described by Edward Snowden, if the encryption algorithms are compromised on these systems when you install them perhaps some open-sourced encryption algorithms will assist you in securing your data. A Leading product in this market is True-Crypt. It works on Windows, Apple, and Linux distributions. It’s website notes:
TrueCrypt is software for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted right before it is saved and decrypted right after it is loaded, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc).
Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on the fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume. Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on the fly (right before they are written to the disk) in RAM. Note that this does not mean that the whole file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. There are no extra memory (RAM) requirements for TrueCrypt. For an illustration of how this is accomplished, see the following paragraph.
Securing your data in email is another challenge. The minute you send that key over the network to another server you may have problems. While there are a few programs that will help you secure your email over yahoo, gmail, and other free mail servers its best to probably pony up the cash and get a $10/Yr email service from a provider that is not your Internet service provider. If you’re committed to using free mail you can use Mailvelope to secure some of your traffic so its not all out in the open. You can manage also your own mail server and encrypt it, which usually is not an option for the technically challenged. If you’re looking to empower your desktop mail client you’ll need an encryption plug-in. Enigmail is a Thunderbird Extension that allows you to install the GNUPG encryption algorithm. If you’re going to install this GNUPG on Windows you need to install GPG4Win to facilitate this for your system.
The GNU Privacy Guard Website states:
GNU Privacy Guard or GNUPG is the GNU project‘s complete and free implementation of the OpenPGP standard as defined by RFC4880. GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. A wealth of frontend applications and libraries are available. Version 2 of GnuPG also provides support for Secure/Multipurpose Internet Mail Extensions.
ANONYMOUS WEB SURFING
When your Internet Service Provider can track the web sites that you’re traveling to this happens because they have DNS servers that answer all the calls you put to the server for the sites you type into your browser. One way to avoid this is to anonymously surf the web and a tool to do this is called TOR. Download TOR and TORMail if you want. What makes this unique is that TOR allows your computer to become a Peer-To-Peer Network around the globe and surf the net anonymously with other TOR users on the network by hopping through several other computers so that people watching for you can’t see you at your address on the Internet.
The TOR Website Notes:
The TOR software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tor Browser Bundle lets you use TOR on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a per-configured web browser to protect your anonymity, and is self-contained.
An increasing number of censoring countries are using Deep Packet Inspection (DPI) to classify Internet traffic flows by protocol. Tor uses bridge relays to get around a censor that blocks by IP address, the censor in these countries and likely the National Security Agency can use DPI to recognize and filter TOR traffic flows even when they connect to unexpected IP addresses.
The invasion of privacy from the National Security Agency and the hostile attitude of the US Government towards ordinary citizens, including Christians is a cause for alarm. Our founding fathers left England and the Netherlands to venture to a place where freedom of worship was a hallmark of the society. Tolerance and pluralism are great American values the rest of the world has looked to us for leadership. Our Members of the society have a right to remain anonymous before their Government until probable cause is brought by the state and that burden of proof remains on the state to prove! Having Big Brother look at their systems and spy on allies of the United States only to exchange that data with the “five eyes” to get around the US laws robs all of their freedom. Furthermore, this technology is employed on a large scale to benefit friends and companies in crony deals to offset markets and by looking the other way with these resources, usually at dissent, allowing large financial institutions to steal trillions of dollars. Americans are subjected to groping at airline security check points as a matter of national interest. This is madness and it needs to stop.
Get involved. Step away from your distractions. Protect yourselves and inform others. You are America and they work for you. Remind them of that when you vote.
 R. Norton-Taylor, “Not so secret: deal at the heart of UK-US intelligence,” The Guardian UK., 2010. [On-line]. Available: http://www.theguardian.com/world/2010/jun/25/intelligence-deal-uk-us-released. [Accessed: 10-Feb-2014].
 “Reid v. Covert, 354 US. 1,” 1957.
 G. Greenwald, “Edward Snowden: The whistle-blower behind the NSA surveillance revelations,” The Guardian, Jun-2013.
 “Q&A: What you need to know about Echelon,” The Guardian UK., 2001. [On-line]. Available: http://news.bbc.co.uk/2/hi/science/nature/1357513.stm. [Accessed: 12-Feb-2014].
 M. Carle, “Operation Ivy Bells,” http://www.military.com. [On-line]. Available: http://www.military.com/Content/MoreContent1/?file=cw_f_ivybells. [Accessed: 12-Feb-2014].
 N. Polmar and T. B. Allen, “Ivy Bells,” Random House: Spy Fact of the Day. [On-line]. Available: http://www.randomhouse.com/features/spybook/spy/961219.html. [Accessed: 12-Feb-2014].
 Y. M. Hirschson, “Operation Ivy Bells,” Z-Man Magazine, pp. 106–107, Mar-2012.
 “Electric Boat is Awarded $887 Million Contract Modification for Third Seawolf,” General Dynamics, 1999. [On-line]. Available: http://www.generaldynamics.com/news/press-releases/detail.cfm?customel_dataPageID_1811=13076. [Accessed: 13-Feb-2014].
 J. J. Buff, “USS Jimmy Carter: SSN-23,” http://www.military.com, Jun-2004.
 “USS Jimmy Carter- Seawolf class fast attack submarine,” Bluebird Marine Systems, 2013. [On-line]. Available: http://www.bluebird-electric.net/submarines/seawolf_class_submarine_nuclear_fast_attack_uss_jimmy_carter.htm. [Accessed: 12-Feb-2014].
 Noah Max, “Jimmy Carter: Super Spy?,” Defense Tech, 2005.
 A. Goodman, “Main Core: New Evidence Reveals Top Secret Government Database Used in Bush Spy Program,” Democracy Now!, Jul-2008.
 “Project Minaret 2.0: Now, with 58% More Illegal Targeting!,” The Empty Wheel, 2013. [On-line]. Available: http://www.emptywheel.net/2014/01/22/project-minaret-2-0-now-with-58-more-illegal-targeting/#more-40532. [Accessed: 11-Feb-2014].
 J. Ponder, “Operation Shamrock: NSA’s First Domestic Spying Program Was Revealed by Congress in 1975,” Pensito Review, 2006. [Online]. Available: http://www.pensitoreview.com/2006/05/13/operation-shamrock-nsas-first-domestic-spying-program-was-shut-down-by-congress-in-1975/. [Accessed: 11-Feb-2014].
 G. P. Hastedt and S. W. Guerrier, “National Security Advisor,” in Spies, Wiretaps, and Secret Operations: An Encyclopedia of American Espionage, Google Boo., ABC-CLIO, 2010, p. 555.
 B. Schneier, “Project Shamrock,” 2005. [Online]. Available: https://www.schneier.com/blog/archives/2005/12/project_shamroc.html. [Accessed: 11-Feb-2014].
 R. L. Fricker, “PRISM’s Controversial Forerunner,” Consortorium News, 2013. [Online]. Available: http://consortiumnews.com/2013/07/11/prisms-controversial-forerunner/. [Accessed: 11-Feb-2014].
 R. L. Fricker, “The INSLAW Octopus,” Wired Magazine, 2004. [Online]. Available: http://www.wired.com/wired/archive/1.01/inslaw_pr.html. [Accessed: 11-Feb-2014].
 “Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001 (2001; 107th Congress H.R. 3162) – GovTrack.us.” [Online]. Available: http://www.govtrack.us/congress/bills/107/hr3162. [Accessed: 26-Mar-2013].
 P. M. Prothero, “Anthrax Scare Hits Congress,” UPI.com, Washington, D.C., 2001.
 “Surveillance Under the USA PATRIOT Act,” American Civil Liberties Union, 2010. [Online]. Available: https://www.aclu.org/national-security/surveillance-under-usa-patriot-act. [Accessed: 11-Feb-2014].
 J. Kloc, “Forget PRISM: FAIRVIEW is the NSA’s project to ‘own the Internet,’” The Daily Dot, 2013. [Online]. Available: http://www.dailydot.com/news/fairview-prism-blarney-nsa-internet-spying-projects/. [Accessed: 11-Feb-2014].
 M. Klein, “Declaration of Mark Klein,” 2006.
 S. Gorman and J. Valentino-DeVries, “New Details Show Broader NSA Surveillance Reach,” The Wallstreet Journal, 20-Aug-2013.
 S. Gorman, “Costly NSA initiative has a shaky takeoff,” Baltimore Su, Washington, D.C., 11-Feb-2007.
 K. Zetter, “New Yorker Sheds New Light on NSA’s Warrantless Wiretapping and Data Mining,” Wired Magazine, May-2011.
 B. Schneier, “The NSA Is Breaking Most Encryption on the Internet,” Schneier on Security, 2013. [Online]. Available: https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html. [Accessed: 11-Feb-2014].
 “NSA Whistleblower Tom Drake,” Government Accountability Project. [Online]. Available: http://www.whistleblower.org/action-center/save-tom-drake. [Accessed: 11-Feb-2014].
 K. Zetter, “NSA Secret Database Ensnared President Clinton’s Private E-mail,” Wired Magazine, Jun-2009.
 “NSA Section 702 ‘Loop Hole’.pdf.”[Online]. Available: https://www.aclu.org/files/natsec/nsa/20130816/NSA Section 702 “Loop Hole”.pdf. [Accessed: 11-Feb-2014].
 L. Harding, “How Edward Snowden went from loyal NSA contractor to whistleblower,” The Guardian U.K., 2014. [Online]. Available: http://www.theguardian.com/world/2014/feb/01/edward-snowden-intelligence-leak-nsa-contractor-extract. [Accessed: 11-Feb-2014].
 R. W. Neal, “Snowden Reveals Microsoft PRISM Cooperation: Helped NSA Decrypt Emails, Chats, Skype Conversations,” International Business Times, 2013. [Online]. Available: http://www.ibtimes.com/snowden-reveals-microsoft-prism-cooperation-helped-nsa-decrypt-emails-chats-skype-conversations. [Accessed: 11-Feb-2014].
 G. Greenwald, “XKeyscore: NSA tool collects ‘nearly everything a user does on the internet,’” The Guardian UK, 2013. [Online]. Available: http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data. [Accessed: 11-Feb-2014].
 D. Storm, “Snowden warns Tempora surveillance ‘snarfs’ everything, even worse than NSA’s PRISM,” Computerworld, 2008. [Online]. Available: http://blogs.computerworld.com/privacy/22442/snowden-warns-tempora-surveillance-snarfs-everything-even-worse-nsas-prism. [Accessed: 11-Feb-2014].
 A. Sewer, “The CIA Lie To Congress? It’s Happened Before,” The American Prospect, 2009. [Online]. Available: http://prospect.org/article/cia-lie-congress-its-happened. [Accessed: 19-Dec-2013].
 S. Nelson, “NSA Director: Surveillance Stopped 50 Terror Plots,” Report, US News and World, Washington, D.C., 18-Jun-2013.
 J. Sahadi, “What the NSA costs taxpayers,” CNN Money, 2013. [Online]. Available: http://money.cnn.com/2013/06/07/news/economy/nsa-surveillance-cost/. [Accessed: 11-Feb-2014].
 D. Farah, “The Atomization of Terrorist Efforts,” The Counterterrorism Blog, 2008. [Online]. Available: http://counterterrorismblog.org/2008/04/the_atomization_of_terrorist_e.php. [Accessed: 11-Feb-2013].
 W. Madsen, “Al Qaeda – The Database,” http://www.truthseeker.com, 2005. .
 “CIA created al-Qaeda and gave $3 Billion to Osama bin Laden,” Military and Froeign Affairs Journal: Veterans Today, 2012. [Online]. Available: http://www.theinsider.org/news/article.asp?id=0228. [Accessed: 20-Mar-2013].
 “Illegal Immigration | NumbersUSA.” [Online]. Available: https://www.numbersusa.org/numbers/illegal-immigration. [Accessed: 10-Feb-2014].
 G. S. Brown, “Could a Grandmother’s TSA ‘Humiliation’ Have Been Avoided?,” ABC News, Fort Worth, TX, 19-Jul-2012.
 T. Porter, “US Loses £200bn a Year in Intellectual Property Thefts,” International Business Times, 2013. [Online]. Available: http://www.ibtimes.co.uk/china-hacking-intellectual-property-theft-cyber-crime-470521. [Accessed: 11-Feb-2014].
 L. Schall, “Insider trading 9/11 … the facts laid bare,” Asia Times, 20-Mar-2012.
 Colonel Eugene Khrushchev, “Afghanistan: Is Creating a ‘Narco-State’ Considered ‘Nation-building?,’” Veterans Today, 2012. [Online]. Available: http://www.veteranstoday.com/2012/11/12/afghanistan-is-creating-a-narco-state-considered-nation-building/. [Accessed: 18-Mar-2013].
 “Bosnia Drugs Misery – Institute for War and Peace Reporting – P230.” [Online]. Available: http://iwpr.net/report-news/bosnia-drugs-misery. [Accessed: 13-Mar-2013].
 “Mexico Points Finger at U.S. for Drug War.” [Online]. Available: http://www.youtube.com/watch?v=BxHkYhv0qGw. [Accessed: 19-May-2013].
 A. W. McCoy, The Politics of Heroin: CIA Complicity in the Global Drug Trade. Chicago Review Press, 2003, p. 734.
 “Human Rights Watch: Iraq becoming ‘police state,’” USA Today, 2012. [Online]. Available: http://usatoday30.usatoday.com/news/world/story/2012-01-22/iraq-police-state/52741944/1. [Accessed: 20-Mar-2013].
 LIBOR Scandal More Than Fraud – Whole Game is Rigged. United Kingdom: The Real News, 2012.
 “Expert Warns CNBC: Gold Prices May Have Been Rigged Like Libor.” [Online]. Available: http://www.moneynews.com/Markets/Gold-Prices-libor-rig/2012/07/10/id/444891. [Accessed: 04-Apr-2013].
 “AQ Khan & Iran – Does Bush Really Want to Open Up this Can of Worms?,” The Daily Koz, 2008. [Online]. Available: http://www.dailykos.com/story/2008/06/17/537313/-AQ-Khan-Iran-Does-Bush-Really-Want-to-Open-Up-this-Can-of-Worms. [Accessed: 10-Feb-2014].
 J. Koyen and A. Zaitchik, “Semtex: The Magic Marble of Pardubice,” The Praugue Pill, 2001. [Online]. Available: http://prague.tv/articles/zine/semtex. [Accessed: 11-Feb-2014].
 “Rumsfeld ‘helped Iraq get chemical weapons,’” Mail Online. [Online]. Available: http://www.dailymail.co.uk/news/article-153210/Rumsfeld-helped-Iraq-chemical-weapons.html. [Accessed: 11-Feb-2014].
 “Afghanistan: Troops Guarding the Poppy Fields | Did You Know on WordPress.com.” [Online]. Available: http://rainbowwarrior2005.wordpress.com/2009/11/20/afghanistan-troops-guarding-the-poppy-fields/. [Accessed: 18-Mar-2013].
 J. Whitehead, A Government of Wolves: The Emerging American Police State. SelectBooks, 2013, p. 288.
 A. Fergusson, When Money Dies: The Nightmare of Deficit Spending, Devaluation, and Hyperinflation in Weimar Germany, Adobe Pers. London, U.K.: Ludwig von Mises Institute, 1975, p. 161.
 RT, Jim Rogers: “US the largest debtor nation in history.”United States of America: Youtube Video, 2011.
 B. Borino, “Fort Knox Looted of 7,000 Tons of Gold in 1973-1974 says 1981 Article!,” Boston Globe, Fort Knox, KY, 15-Dec-1981.
 M. Hendrickson, “It’s Official: Federal Debt Will Never Be Paid,” Front Page Magazine, May-2013.
 K. Pomerleau, “Another Study Confirms: U.S. Has One of the Highest Effective Corporate Tax Rates in the World,” Tax Foundation, 2013. [Online]. Available: http://taxfoundation.org/blog/another-study-confirms-us-has-one-highest-effective-corporate-tax-rates-world. [Accessed: 14-Nov-2013].
 “LIBOR scandal brings gold price manipulation once more to the fore – GOLD ANALYSIS – Mineweb.com Mineweb.” [Online]. Available: http://www.mineweb.com/mineweb/content/en/mineweb-gold-analysis?oid=154982&sn=Detail. [Accessed: 04-Apr-2013].
 S. L. Ireland., “Office of Intelligence and Analysis (OIA),” US Department of Tresury. [Online]. Available: http://www.treasury.gov/about/organizational-structure/offices/Pages/Office-of-Intelligence-Analysis.aspx. [Accessed: 11-Feb-2014].
 S. Curtin, “Gold Will Rise Again: Mike Pento Sees $1800 By Year-End,” Yahoo Finance, 2012. [Online]. Available: http://finance.yahoo.com/blogs/daily-ticker/gold-rise-again-mike-pento-sees-1800-end-133516409.html. [Accessed: 11-Feb-2014].
 Paul_Craig_Roberts, “Inside Story of Gold Price Manipulation – The Naked Gold Shorts,” The Market Oracle UK, 2014. [Online]. Available: http://www.marketoracle.co.uk/Article44041.html. [Accessed: 11-Feb-2014].
 B. Gellman, “NSA broke privacy rules thousands of times per year, audit finds,” The Washington Post, Washington, D.C., 15-Aug-2013.
 E. Snowden, “Verizon forced to hand over telephone data – full court ruling,” The Guardian U.K., pp. 1–4, 05-Jun-2013.
 P. Garofalo, “30 Major Corporations Paid No Income Taxes In The Last Three Years, While Making $160 Billion,” Think Progress, 2011. [Online]. Available: http://thinkprogress.org/economy/2011/11/03/360185/30-corporations-no-taxes/. [Accessed: 13-Nov-2013].
 I. Allen, “Western spy agencies tapped major undersea fiber optic cable,” Intelnews.org, 2013. [Online]. Available: http://intelnews.org/2013/08/29/01-1331/. [Accessed: 13-Feb-2014].
 S. Edmonds, “BFP Breaking News- Omidyar’s PayPal Corporation Said To Be Implicated in Withheld NSA Documents,” Boiling Frogs Post, 13-Dec-2013.
 “How the USA PATRIOT Act redefines ‘Domestic Terrorism,’” American Civil Liberties Union, 2002. [Online]. Available: http://www.aclu.org/national-security/how-usa-patriot-act-redefines-domestic-terrorism. [Accessed: 11-May-2013].
 Obama calls Christians, Veterans, and Anti Abortionists Terrorists. United States of America: Youtube Video, 2009.
 J. Allen and john Bresnahan, “Sources: Joe Biden Likened Tea Partiers To Terrorists,” Politico, Washington, D.C., 2011.
 S. Ertelt, “Obama Administration Calls Pro-Lifers Terrorists Again,” Life News, 2012. [Online]. Available: http://www.lifenews.com/2012/07/06/obama-administration-calls-pro-lifers-terrorists-again/. [Accessed: 11-Feb-2014].
 T. Starnes, “Does Army consider Christians, Tea Party, a terror threat?,” Fox News, 2013. [Online]. Available: http://www.foxnews.com/opinion/2013/10/23/does-army-consider-christians-tea-party-terror-threat/. [Accessed: 11-Feb-2014].
 P. J. Watson, “» War On Terror’s New Targets: Veterans, Tea Partiers, Anti-Fed Activists,” Alex Jones: Infowars, 2013. [Online]. Available: http://www.infowars.com/war-on-terrors-new-targets-veterans-tea-partiers-anti-fed-activists/. [Accessed: 13-Apr-2013].
 A. McBride, Griswold v. Connecticut. United States of America: Public Broadcasting System, 1965.
 B. Mears and E. Perez, “Judge: NSA domestic phone data-mining unconstitutional,” CNN Justice, 16-Dec-2013.
 A. Liptak and M. S. Schmidt, “Judge Upholds N.S.A.’s Bulk Collection of Data on Calls,” The New York Times, 2013. [Online]. Available: http://www.nytimes.com/2013/12/28/us/nsa-phone-surveillance-is-lawful-federal-judge-rules.html?_r=0. [Accessed: 11-Feb-2014].
 L. K. Johnson, “Appendix A: CIA Counterintelligence: An Excerpt From the Church Committee Report,” Westport, CT, 2011.
 B. Fung, “Rand Paul: ‘We will go’ to the Supreme Court on NSA surveillance,” The Washington Post, 2014.