Thursday, April 11, 2013

The Vast Left-Wing Conspiracy: From Zero to Smearing Mitch McConnell In 60 Seconds

By
April 11, 2013
Connect these dots, beginning, where else, in the pages of Mother Jones in January of this year.
Revealed: The Massive New Liberal Plan to Remake American Politics
A month after President Obama won reelection, America’s most powerful liberal groups met to plan their next moves. Here’s what they talked about.
Greenpeaces Phil Radford notes that for decades conservatives have aimed to shrink local, state, and federal governments by reforming the rules so they could install like-minded politicians, bureaucrats, and judges. Radford calls it “a 40-plus-year strategy by the Scaifes, Exxons, Coors, and Kochs of the world…to take over the country.
“So last spring Brune, Cohen, Jealous, and Radford called up their friends on the left and, in June, convened the Democracy Initiatives first meeting. A handful of groups attended, and they began to focus on the triad of money in politics, voting rights, and dysfunction in the Senate.
So, who was there and what else was discussed? Let me help you – keywords Mother Jones, CREW and  Senator McConnell:

By December, the Democracy Initiative’s ranks had swelled to 30 to 35 groups, Brune says. (He expects it to be 50 by the end of the winter.) Other attendees at the December meeting included top officials from the League of Conservation Voters, Friends of the Earth, Public Campaign, the AFL-CIO, SEIU, Common Cause, Voto Latino, the Demos think tank, Piper Fund, Citizens for Responsibility and Ethics in Washington, People for the American Way, National People’s Action, National Wildlife Federation, the Center for American Progress, the United Auto Workers, and Color of Change. (A non-editorial employee of Mother Jones also attended.)
According to a schedule of the meeting, the attendees focused on opportunities for 2013. On money in politics, Nick Nyhart of Public Campaign, a pro-campaign-finance-reform advocacy group, singled out Kentucky, New York, and North Carolina as potential targets for campaign finance fights. In a recent interview, Nyhart said the Kentucky battle would likely involve trying to oust Senate Minority Leader Mitch McConnell (R-Ky.), Public Enemy No. 1 for campaign finance reform, who faces reelection in 2014. In New York, Nyhart said, activists are pressuring state lawmakers, including Gov. Andrew Cuomo, to pass a statewide public financing bill in 2013. And in North Carolina, the fight is more about countering the influence of a single powerful donor, the conservative millionaire Art Pope, whose largesse helped install a Republican governor and turn the state legislature entirely red.
Fast-forward to today and what do we find? Oh and bonus points for noticing that ABC basically mimics the Left’s talking point by casting McConnell as a “roadblock” in their headline. But, that’s just … journalism – cough, cough.
Within a span of six hours, Democrat-aligned PPP releases a Kentucky Senate Poll: McConnell remains extremely unpopular,  Democrat-aligned Majority PAC released a micro-site attacking GOP Senate Leader McConnell and ABC bites: Democrats Call Mitch McConnell ‘Washington’s Top Roadblock’. Meanwhile, Mother Jones posted a story featuring what appears to be illegally obtained audio … by whomever recorded it. There may be more to report on that front going forward.
Then, within hours of the Mother Jones story going public, DSCC Executive Director Guy Cecil was tweeting about what are now known to be false allegations based upon an inaccurate transcript: “How many McConnell Senate staffers participated in gathering opposition research on Democrats? Was this part of their day-to-work?”
Answer none: Relying on Mistaken Transcription, Liberal Magazine Accuses McConnell of Breaking the Law.
But that didn’t stop CREW – who, as you may recall was at the very same meeting Mother Jones reported on back in January. Coincidence?
Today, Citizens for Responsibility and Ethics in Washington (CREW) asked the FBI and the Senate Select Committee on Ethics to investigate whether Sen. Mitch McConnell (R-KY) violated federal law and Senate rules by misusing Senate staff or resources to conduct opposition research on potential campaign opponents.
Thus, the circle is squared on this little look at the vast online Left-wing conspiracy as it exists today.

Soros Intensifies Anti-Austerity Rhetoric, Suggests Germany Exit the EU

Soros to Germany: Your Policies Have Failed & You Should Consider Exiting the EU
George Soros. (Getty Images)
George Soros continued his long-standing anti-austerity crusade on Tuesday, telling members of the euro zone’s largest economy that its policies have failed and that it should consider exiting the 27-member union.
“The financial problem is that Germany is imposing the wrong policies on the euro zone. Austerity doesn’t work. You can’t shrink the debt burden by shrinking the budget deficit,” Soros said during a speech in Frankfurt on Tuesday.
Soros also accused Germany of fouling up the Cypriot €10 billion ($13.07 billion) bailout by supposedly insisting the country’s depositors forfeit a percentage of their savings.
“In the bailout of Cyprus, Germany went too far, what happened in Cyprus undermined the business model of the European banks which relies heavily on deposits,” he said.
The legendary investor’s remarks were made during a lecture entitled “How to save the European Union from the euro crisis.” In his speech, Soros said “a large share of the responsibility [for the crisis]” belongs to Germany.
“I want to make it clear in advance that I am not blaming Germany. Whoever was in charge would have made similar mistakes…I realize that I risk antagonizing you by putting the responsibility on Germany. But only Germany can put things right,” he added.
Soros suggested an ultimatum for Germany: Either drop your opposition to the mutualization of the EU’s debt (i.e. agree to the establishment of so-called “eurobonds”), or get out.
“My first preference is eurobonds; my second is Germany leaving the euro…It is up to Germany to decide whether it is willing to authorize eurobonds or not. But it has no right to prevent the heavily indebted countries from escaping their misery by banding together and issuing Eurobonds,” he said.
“In other words, if Germany is opposed to eurobonds it should consider leaving the euro and letting others introduce them,” he added
He went on to accuse Germany of refusing to take responsibility for its policies.
“Germany did not seek the dominant position into which it has been thrust and it is unwilling to accept the obligations and liabilities that go with it. Germany understandably doesn’t want to be the ‘deep pocket’ for the euro. So it extends just enough support to avoid default but nothing more,” he added.
If you’re surprised by Soros’ most recent comments, you shouldn’t be. Indeed, as noted elsewhere on TheBlaze, “the man who broke the Bank of England” has been pounding away at the anti-austerity, anti-Germany drum for months.
This latest iteration of an old theme is merely an escalation in the one-sided war of words between the billionaire philanthropist and Europe’s most profitable country.
But why is he so insistent that the EU drop austerity and accept debt mutualization?
by
Patrick Poole
Bio
July 21, 2012 - 11:29 pm
Page 1 of 4  Next ->   View as Single Page
The most recent salvo in the kerfuffle between Minnesota congressmen Michele Bachmann and Keith Ellison finds Ellison attacking Bachmann for her statements made on Glenn Beck’s radio program on Thursday, where she said:
GLENN:  Okay.  So when you wrote this letter, then Keith Ellison comes out.  And Keith Ellison is ‑‑ he has a record of being the Mafia hitman.
CONGRESSWOMAN BACHMANN:  Well, he has a long record of being associated with CAIR and with the Muslim Brotherhood. CAIR is an unindicted co‑conspirator, as stated in the large terrorist financing case that we’ve had in the United States of America and so he came out and essentially wanted to shut down the inspectors general from even looking into any of the questions that we were asking. So he wanted to shut it down.  In response I wrote another letter back to Keith Ellison, a 16‑page letter which I would encourage all of your listeners to go and read this letter. It’s what I call a bulletproof letter. I have 59 footnotes with one example after another of the penetration of the Muslim Brotherhood into the federal government…
In response, Ellison told the Huffington Post:
“I am not now, nor have I ever been, associated with the Muslim Brotherhood,” he said with a laugh.
In fact, it is his denial that is laughable.
But this weekend Ellison doubled-down on his denial, telling Politico:
I support American institutions. I don’t know enough about [the Muslim Brotherhood]. What I know about them is that in Egypt, one of their candidates has ascended to the presidency. I’ve never met that person. But I do think the United States should have a foreign policy where we talk to foreign leaders of all kinds. But no, I don’t have any, I don’t have any Muslim Brotherhood connections that she’s talking about.
According to Ellison’s impeccable logic, since he hasn’t met Egyptian Muslim Brotherhood leader and new Egyptian President Mohammed Morsi, therefore he has no knowledge of the Muslim Brotherhood.
But a mountain of evidence of his contacts with and support of Muslim Brotherhood front groups – identified as such by the U.S. government – shows that the Muslim Brotherhood definitely knows who he is.
Rewind to 2008, when Keith Ellison went on a 16-day hajj trip to Saudi Arabia paid for by the Muslim American Society (MAS) to the tune of $13,500.
As Scott Johnson at Powerline noted at the time that Ellison had conflicting stories about who paid for the trip:
The Star Tribune first reported on Ellison’s hajj in two puff pieces by Mitch Anderson this past December. Anderson first reported the statement of Ellison spokesman Rick Jauert that Ellison had paid for the trip himself. When Anderson returned to the story, he got such deep stuff from Ellison as this: “This is just me trying to be the best person I can be.” In the second story Anderson also reported that the MAS Minnesota paid for Ellison’s trip to Mecca, though Anderson didn’t pause to note the discrepancy between his two stories on this point.
As Fox News reported on the MAS sponsorship of Ellison’s trip, Ellison returned the favor to his benefactors by speaking at the 2007 and 2008 MAS-Minnesota conventions.
But who is MAS?

by
Patrick Poole
Bio
July 21, 2012 - 11:29 pm
<- Prev  Page 2 of 4  Next ->   View as Single Page
Fortunately, federal prosecutors cleared up the matter back in December 2007 when they said in a court filing in the federal appeal of convicted terror operative Sabri Benkahla (page 58, footnote 13):
MAS was founded as the overt arm of the Muslim Brotherhood in America.

As support for that statement, the federal prosecutors cited a September 2004 investigative report by the Chicago Tribune, which chronicles the efforts by the international Muslim Brotherhood to create Islamic states worldwide including the U.S.
The group identified by the Chicago Tribune as the main organization operating today on behalf of the Muslim Brotherhood was MAS:
In recent years, the U.S. Brotherhood operated under the name Muslim American Society, according to documents and interviews. One of the nation’s major Islamic groups, it was incorporated in Illinois in 1993 after a contentious debate among Brotherhood members.

So in 2004 – four years before Ellison’s MAS-financed trip to Saudi Arabia – MAS had been identified in the establishment media as a front for the Muslim Brotherhood.
And in case there was any confusion on Ellison’s part, federal prosecutors addressed the issue again in December 2007 – one year before Ellison’s MAS hajj trip – saying that MAS was “the overt arm of the Muslim Brotherhood in America.”
That alone should prompt an apology by Ellison to Bachmann.
As the late Billy Mays would say, but wait, there’s more.
Another group that Ellison has a longtime association with is the Council on American-Islamic Relations (CAIR), going back at least as far as his 2006 campaign when he was first elected to Congress.
As Joel Mowbray reported in the Washington Times during that campaign, CAIR raised tens of thousands of dollars in bundled donations for Ellison’s election war chest and held CAIR fundraisers specifically for Ellison’s campaign.
Since that time, Ellison has reciprocated CAIR’s support by appearing at a number of fundraisers on the group’s behalf.
For example, immediately after his election Ellison gave this videotaped address to the CAIR national fundraiser on November 18, 2006:
The following year Ellison spoke on behalf of the CAIR-Los Angeles chapter:
And lest Ellison and his backers claim this is old news, here’s an advertisement for a CAIR-Los Angeles fundraiser where Ellison was the keynote speaker in May 2011:

Please note that this CAIR fundraiser was co-sponsored by none other than MAS.
So who is CAIR?

Investigation Reveals: Mo. Highway Patrol Gave Feds Confidential List of Concealed Carry Gun Permit Holders

There’s an investigation unfolding in Missouri after it was revealed that the Missouri State Highway Patrol handed over concealed carry data to federal authorities. On at least two occasions – the latest of which was January — weapons data was delivered to the feds, according to an article published in the Columbia Daily Tribune.
In looking into the matter, officials noted that in Nov. 2011 and this past January, the patrol asked for the entire list of 185,000 concealed carry residents from the state’s Division of Motor Vehicle and Driver Licensing. Then, this information was apparently shared beyond the state’s boundaries.
This new information came out during hearings to investigate a revised driver licensing system, substantiating fears that gun information has been shared with federal officials.
Mo. State Highway Patrol Gave Feds Concealed Carry Gun Data
A handgun sits in the holster that belongs to a law enforcement officer during a news conference July 26, 2012 at the National Press Club in Washington, DC. The news conference was to announce a call for expanding background checks for firearm purchasers and banning high-capacity ammunition magazines. Credit: Getty Images 
Under state law, concealed weapon permit holders are confidential. As the Tribune notes, the only place where owners’ identities are stored is in driver license records. Those with a permit also have a special mark on their licenses pinpointing this designation.
State Sen. Kurt Schaefer, a Republican, has been looking into the new licenses and he is at the center of the discussion and investigation surrounding the handing over of information; the information about the highway patrol’s data sharing came out during questioning in the state’s Senate Appropriations Committee.
According to Schaefer, he was told that the list was given to federal authorities by the state highway patrol.
“Apparently from what I understand, they wanted to match up anyone who had a mental diagnosis or disability with also having a concealed carry license,” the senator explained. “What I am told is there is no written request for that information.”
Scharfer plans to push Col. Ron Replogle, superintendent of the Missouri State Highway Patrol, for additional answers during a hearing being held on Thursday morning. The Tribune has more about the concealed carry permit delivery to feds:
The patrol responded by confirming that it had shared the list of concealed weapons holders with federal authorities.
“The information was provided to law enforcement for law enforcement investigative purposes,” Capt. Tim Hull wrote in an email response to questions from the Tribune.
The only way to obtain the full list is through a special request. Only law enforcement is supposed to have access to concealed carry information and then only on an individual basis. When a law enforcement officer looks up an individual’s driving record, it shows whether they have a concealed carry endorsement.
Mo. State Highway Patrol Gave Feds Concealed Carry Gun Data
Credit: AP
Schaefer has a plethora of questions about the data and why it was given to federal authorities. Of particular note, he’s wondering where the list ended up going once it reached the feds and how the request was granted in the first place.
“I want to know who all was involved in this transaction because if this is just some phone call saying give me the list of all concealed carry holders, how did the person at the patrol who fulfilled that request know who was at the other end of the phone?,” the senator asked. “How did they know where to send it? How did they know what it was being used for?”
Considering how mental illness could be playing into confiscation efforts in states like New York, this story and others like it are increasingly important to explore.

SB-747 Public Health Impact Report.(2013-2014)

SHARE THIS:share this bill in Facebookshare this bill in Twitter



CALIFORNIA LEGISLATURE— 2013–2014 REGULAR SESSION

Senate Bill No. 747


Introduced  by  Senator DeSaulnier

February 22, 2013


An act to add Article 6 (commencing with Section 108670) to Chapter 5 of Part 3 of Division 104 of the Health and Safety Code, relating to public health.


LEGISLATIVE COUNSEL'S DIGEST


SB 747, as introduced, DeSaulnier. Public Health Impact Report.
Existing law requires the State Department of Public Health to regulate various consumer products, including food and drugs, for the protection of the people of the state.
This bill, known as the Public Health Epidemic Protection Act of 2013, would require the department, for every product intended for consumer consumption for which it has credible evidence that the product significantly contributes to a significant public epidemic, to conduct a risk assessment evaluation to determine whether the product contributes significantly to a significant public health epidemic, as defined, and whether the adverse public health risk would have a fiscal impact on the state of $50,000,000 or more. The bill would authorize the department to charge the manufacturer of the product for the reasonable costs of producing the risk assessment and would create the Public Health Fund, to be used by the department, upon appropriation by the Legislature, to fund the program. If the department determines that the criteria are met, the bill would require the manufacturer to create, for approval of the department, a public health impact report (PHIR) containing specified information, including a list of adverse public health impacts and a mitigation plan for those impacts. The bill would authorize the department to enforce the PHIR and would authorize the department to restrict or suspend sales of the product in the state if the PHIR is insufficient or if the manufacturer is not complying with the terms of the PHIR.
Vote: MAJORITY   Appropriation: NO   Fiscal Committee: YES   Local Program: NO  

The people of the State of California do enact as follows:

SECTION 1.

 The Legislature finds and declares all of the following:
(a) Public health for the people of the state is now, and in the future, a matter of statewide concern.
(b) The health and well-being of all people is a critical element in supporting a healthy and prosperous California, including economic sustainability, increasing workforce participation and productivity, and slowing the ongoing rise of medical care expenditures.
(c) California and its residents face a growing burden of largely preventable chronic illness, including heart disease, stroke, obesity, and diabetes.
(d) It is the intent of the Legislature to find ways to develop and maintain public health, prevent negative public health risks, provide the people of the state with protection from products sold in the state that pose significant negative health risks, and development mitigation strategies.
(e) It is the intent of the Legislature to take immediate steps to identify products sold in the state for consumer consumption that pose a critical public health risk and coordinate any actions necessary to prevent or mitigate those risks.
(f) It is the intent of the Legislature to regulate products sold in the state for consumer consumption that pose significant public health risks and mitigate their use in order to prevent chronic illness and improve public health.

SEC. 2.

 Article 6 (commencing with Section 108670) is added to Chapter 5 of Part 3 of Division 104 of the Health and Safety Code, to read:
Article  6. Public Health Impact Assessments
108670.
 This article shall be known, and may be cited, as the Public Health Epidemic Protection Act of 2013.
108671.
 (a) The State Department of Public Health shall, for every product intended for consumer consumption that the department has credible evidence that the product significantly contributes to a significant public epidemic, conduct a risk assessment evaluation. The department, in doing the risk assessment evaluation, shall use currently available research, data, and studies to determine the following:
(1) If the product contributes significantly to a significant public health epidemic, as recognized by the federal Centers for Disease Control and Prevention.
(2) If there is evidence that the adverse public health risk would have a fiscal impact on the state of fifty million dollars ($50,000,000) or more.
(b) The department may charge the manufacturer of the product for the reasonable costs of producing the risk assessment pursuant to this section. Fees collected pursuant to this subdivision shall be placed in the Public Health Fund, which is hereby established in the State Treasury and which may be used by the department, upon appropriation by the Legislature, for the implementation of this article.
108672.
 (a) If a risk assessment determines that the product meets both of the requirements in subdivision (a) of Section 108671, the department shall require the product’s manufacturer to create a public health impact report (PHIR). The PHIR shall be submitted to the department for approval.
(b) The PHIR shall include all of the following:
(1) A list of adverse public health impacts that cannot be avoided if the product is sold in the state.
(2) The benefits, costs, and alternatives to the consumer product.
(3) Alternatives available, if any.
(4) A mitigation plan sufficient to minimize the adverse public health impacts identified in paragraph (1).
(c) The department may take actions necessary to enforce the PHIR, including, but not limited to, requiring that the manufacturer establish a trust or place moneys in escrow sufficient to cover the estimated costs of implementation.
(d) If the department determines that the PHIR prepared by the manufacturer is insufficient or that the manufacturer is not complying with the terms of the PHIR, then the department may restrict or prohibit the sale of the product in this state.
108673.
 The department shall enact all regulations necessary to implement this article pursuant to the Administrative Procedure Act (Chapter 3.5 (commencing with Section 11340) of Part 1 of Division 3 of Title 2 of the Government Code).

I Don’t Trust the Government’: Ted Nugent Tells CNN What He Thinks of Senate’s Gun Bill (and Recommends Eric Holder Be Arrested)

‘I Don’t Trust the Government’: Ted Nugent Tells CNN What He Thinks of Senate’s Gun Bill (and Recommends Eric Holder Be Arrested)

Sporting a graying beard and his signature camouflage hat, rocker and gun rights advocate Ted Nugent on Thursday dismissed the Senate’s gun control bill as a “feel-good measure” that won’t stop any shootings. Towards the end of his interview on CNN, Nugent recommended that Attorney General Eric Holder be arrested for gun trafficking.
“I don’t support the bill. I agree with the 90-plus percent of the law enforcement heroes out there, the real warriors of the street, that reject this as a feel-good measure ,” Nugent said bluntly. “I reject it out of hand as a feel-good measure that’s not going to accomplish anything. It won’t stop any shootings, that’s for sure.”
Nugent said he supports police enforcing the gun laws that are already on the books, rather than adding even more regulations. The Senate gun bill would expand background checks and likely include amendments from senators in both parties.
Ted Nugent Tells CNN What He Thinks of Senates Gun Bill (and Recommends Eric Holder Be Arrested)
Credit: AP
CNN’s Erin Burnett then asked Nugent about New York’s new gun legislation that allows police to confiscate firearms from people who are determined to be mentally ill. TheBlaze has reported on the instance where a law-abiding gun owner’s guns were confiscated by mistake in New York.
Nugent said he simply doesn’t trust the “bureaucracy” to “accurately or responsibly or legally identify someone with mental issues.” However, the rocker did say he wants guns out of the hands of the mentally ill, but that it’s not the governments responsibility to determine who is mentally ill.
“I just don’t trust the government. I don’t trust the government that claims it’s going to reduce the budget while they increase the budget,” he added.
Throwing a curve ball, Nugent then asked Burnett if she wants to reduce gun trafficking. Naturally, Burnett answered yes. “Then you would support my recommendation that we arrest Eric Holder,” Nugent said.
“Well, no, I don’t support that,” Burnett replied.
“Well, if you want to stop gun trafficking why don’t we go after the guy trafficking guns? That would be Eric Holder,” Nugent shot back, clearly referring to Operation Fast and Furious where 2,000 guns were allowed to walk across the U.S.-Mexico border.
Before the interview ended, Nugent made sure to tell Burnett, “I love you madly.”
Watch the always entertaining Ted Nugent via CNN/Mediaite below:

Glen Beck: Obama Wants To Kill Christians? MSM News Report

Thursday, April 11, 2013 18:34
0

According to Glenn Beck, if what he is going to share with you is true, our military is in grave danger. What was once considered 'conspiracy theory' is now seeing the light of day on the mainstream news media. 15 minutes of must listen TV; 'conspiracy theory' no more.

“This is astonishing and offensive,” read a draft of the letter written by Rep. Doug Lamborn (R-CO). “We call on you to rescind this briefing and apologize for its content and set the record straight on the Army’s view on these faith groups by providing a balanced briefing on religious extremism.”

Material presented to soldiers at training session.

Lamborn is referring to an Army training session conducted last year that featured a presentation listing Evangelical Christianity and Catholicism as examples of extremism – alongside Al Qaeda and Hamas.

“To say that Evangelicals or Catholics are somehow in the same league with Al Qaeda or the KKK is outrageous,” Lamborn told Fox News.

He said it appeared the Army was using material gleaned from the Southern Poverty Law Center.


Published on Apr 11, 2013

Privacy Documents for U.S. Secret Service

DHS/USSS/PIA-001 - Customer Proprietary Network Information (CPNI)

Customer Proprietary Network Information, December 17, 2008 (PDF, 12 pages - 177 KB). The US Secret Service (USSS) and the Federal Bureau of Investigation (FBI) co-sponsor and manage the CPNI reporting website, which is a tool for telecommunications carriers to report a breach of its customer proprietary network information to law enforcement. The USSS and the FBI conducted this Privacy Impact Assessment (PIA) because the CPNI reporting website contains personally identifiable information (PII).
Associated SORN(s):

DHS/USSS/PIA-002 - Targeted Violence Information Sharing System (TAVISS)

Targeted Violence Information Sharing System (TAVISS) July 13, 2010 (PDF, 14 pages – 207 KB). The Secret Service created TAVISS to conduct name checks and determine whether a subject is of protective interest to any agency within the TAVISS network. The Secret Service conducted this PIA because TAVISS contains PII regarding subjects of protective interest to the Secret Service and participating agencies in the network.
Associated SORN(s):

DHS/USSS/PIA-003 – Protective Research Information System Management System (PRISM-ID)

Protective Research Information System Management (PRISM-ID) November 12, 2010 (PDF, 13 pages – 193 KB) The Secret Service created and uses the PRISM-ID system to record information that assists the agency in meeting its protective mission, including the protection of the President, Vice President, their immediate families, former Presidents and First Ladies, major candidates for the presidency and vice presidency, foreign heads of state visiting the United States, and other individuals authorized to receive Secret Service protection. This PIA was conducted because PRISM-ID collects PII.
Associated SORN(s):

DHS/USSS/PIA-004 – Counter Surveillance Unit Reporting (CSUR) Database

Counter Surveillance Unit Reporting (CSUR) Database, July 27, 20110 (PDF, 11 pages - 182.95KB). The Secret Service created this database to assist Secret Service employees in managing, analyzing, and distributing intelligence information regarding threats or potential threats to the safety of individuals, events, and facilities protected by the Secret Service. The Secret Service conducted this PIA because CSUR contains PII regarding subjects of protective interest to the Secret Service.
Associated SORN(s):

DHS/USSS/PIA-007 – Forensic Services Division (FSD) Polygraph System

Forensic Services Division (FSD) Polygraph System, December 15, 2011 (PDF, 14 pages – 212.73 KB) . The Forensic Services Division (FSD) Polygraph Branch of the Secret Service uses the FSD Polygraph system to track all polygraph examinations that it administers. This database contains information on applicant and criminal polygraph examinations and their results. USSS conducted this PIA because the system contains PII of individuals who undergo an exam.

DHS/USSS/PIA-008 – Secret Service Use of Advanced Imaging Technology

Secret Service Use of Advanced Imaging Technology, December 23, 2011 (PDF, 7 pages – 687.61KB).  The Secret Service deployed Advanced Imaging Technology (AIT) at Secret Service protective sites as a secondary means of personnel screening at protected sites, used only if primary screening measures indicate that an individual requires an additional level of screening.

DHS/USSS/PIA-009 - Field Investigative Reporting System (FIRS)

Field Investigative Reporting System (FIRS), March 7, 2012 (PDF, 18 pages - 9.82 MB).  The Secret Service created FIRS for the reporting of law enforcement activities that fall within the Secret Services jurisdiction, such as investigating counterfeiting and electronic crimes. The Secret Service conducted this PIA because FIRS is a new system that contains PII regarding subjects of criminal investigations.
Associated SORN(s):

DHS/USSS/PIA-010 – Enterprise Investigative System (EIS)

Enterprise Investigative System (EIS), March 30, 2012 (PDF, 14 pages – 9.06 MB).  The Secret Service uses EIS to collect information about ongoing and resolved investigations, and on individuals seeking access to USSS protected events. EIS is a compilation of six applications that are used collectively in support of fulfilling the investigative mission to protect the integrity of the nation’s financial systems. This PIA was conducted because EIS collects PII.
Associated SORN(s):

DHS/USSS/PIA-011 – Cyber Awareness Program (Cyveillance) 

Cyber Awareness Program (Cyveillance), December 14, 2012 (PDF, 12 pages – 173 KB).   The Secret Service uses the Cyveillance system as part of its Cyber Awareness Program. Cyveillance searches for information regarding the Secret Service and investigatory and protective intelligence information. The Secret Service conducted this PIA because, while the primary purpose of Cyveillance is not to collect PII, the content of interest to the Secret Service that is collected by Cyveillance may contain PII.  No SORN.

DHS/USSS/PIA-013 – Clearances, Logistics, Employees, Applicants and Recruitment (CLEAR)

Clearances, Logistics, Employees, Applicants, and Recruitment (CLEAR), January 3, 2013, (PDF 10 pages, 198 KB).  CLEAR assists USSS employees in managing applicant data throughout the hiring process. The Secret Service conducted this Privacy Impact Assessment (PIA) because CLEAR contains personally identifiable information (PII) of persons applying for federal employment with USSS.
Associated SORNs:

US teargas arrives in Egypt for Muslim Brotherhood use

Teargas canisters from the United States have been sold to Egypt, arriving on Sunday in the Abadeya port in Suez

by The Commentator on 9 April 2013 10:39
Egypt-teargas-usa
19
A shipment of teargas canisters from the United States arrived at the Egyptian Abadeya Port in Suez on Sunday, according to official documents obtained by the Al-Masry Al-Youm newspaper.
Five containers carrying around 140,000 teargas canisters were apparently shipped to the Egyptian Interior Ministry by the Aramex International courier service.
The Egypt Independent reports that the shipping documents state that only the Egyptian government may use the canisters, and that they are forbidden to re-export the shipment or sell it to third parties.
The documents state that the shipment set sail from the port of Wilmington in Pennsylvania on 14 March on board the SS Jamestown. A letter of credit was forwarded without specifying the name of the bank. The Egyptian government paid the freight fees.
In February this year, Al-Masry Al-Youm reported that the Interior Ministry agreed to import teargas canisters for $2.46 million, to be shipped by an Egyptian military cargo plane.
Interior Ministry spokesperson Hani Abdel Latif said that the ministry imported the grenades in order to protect state facilities.
Egyptian authorities have recently used teargas against various demonstrations, including a recent crackdown on protests on Saturday, when demonstrators threw fireworks and reportedly attempted to gain access to a court and the prosecutor-general's office in central Cairo.
Read more on: teargas, egypt, United States, protests, and muslim brotherhood

Obama Martial Law Agenda Is Being Leaked to Civilians by Enlisted Military

http://www.youtube.com/watch?v=APsBSvXVH1E

Aviation Security Policy, National Security Presidential Directive 47 / Homeland Security Presidential Directive 16

National Security Presidential Directive-47/Homeland Security Presidential Directive-16 (NSPD-47/HSPD-16) details a strategic vision for aviation security while recognizing ongoing efforts, and directs the production of a National Strategy for Aviation Security and supporting plans. The supporting plans address the following areas: aviation transportation system security; aviation operational threat response; aviation transportation system recovery; air domain surveillance and intelligence integration; domestic outreach; and international outreach.
An over-arching national strategy is necessary to optimize the coordination and integration of government-wide aviation security efforts. The Strategy sets forth U.S. Government agency roles and responsibilities, establishes planning and operations coordination requirements, and builds on current strategies, tools, and resources.
Supporting Plans
Supporting plans have been drafted by the Departments and Agencies as required by NSPD-47/HSPD-16.
  • Aviation Transportation System Security Plan (PDF, 19 pages - 115 KB) seeks to enhance public security and economic growth by promoting global aviation security practices aimed at reducing vulnerabilities associated with the aviation transportation system. It sets forth a risk-based implementation plan for the continued reduction of vulnerabilities within the aviation transportation system. The development of this plan was led by the Secretaries of Homeland Security and Transportation.
  • Aviation Operational Threat Response Plan (PDF, 20 pages - 111 KB) ensures a comprehensive and coordinated U.S. Government response to air threats against the United States or U.S. interests. The development of this plan was led by the Secretary of Defense and the Attorney General.
  • Aviation Transportation System Recovery Plan. Rapid recovery from an attack or similar disruption in the Air Domain is critical to the economic well-being of our Nation. A credible capacity for rapid recovery will minimize an incident’s economic impact. The ATSR Plan includes recommended measures to mitigate the operational and economic effects of an attack in the Air Domain. The development of this plan was led by the Secretaries of Homeland Security and Transportation.
  • Air Domain Surveillance and Intelligence Integration Plan (PDF, 26 pages - 140 KB) In order to have effective knowledge of the threat to the United States and U.S. interests in the Air Domain, the U.S. Government must have a plan to coordinate requirements, priorities, and implementation of national air surveillance resources and the means to share this information with appropriate stakeholders. The ADSII Plan supports an enhanced surveillance capability to detect and deter threats that could lead to an attack on the U.S. aviation transportation system. The development of this plan was led by the Secretary of Defense and the Director of National Intelligence.
  • Domestic Outreach Plan (PDF, 12 pages - 67 KB) The successful implementation of NSPD-47/HSPD-16 must include coordination with State and local government authorities and consultation with appropriate private sector persons and entities. The DO Plan ensures that this proper coordination with the private sector and local government authorities takes place. The development of this plan was led by the Secretaries of Homeland Security and Transportation.
  • International Outreach Plan (PDF, 13 pages - 69 KB) U.S. Government efforts must be global efforts and developed with the cooperation of other governments and international organizations. The IO Plan is aimed at ensuring the proper coordination with entities abroad. The development of this plan was led by the Secretary of State.

Department of Homeland Security Management Directives

On This Page:

Volume 0000 - General Management and Administration

Back To Top

Volume 1000 - Budget and Finance

Back To Top

Volume 2000 - Communications

Back To Top

Volume 3000 - Human Capital

Back To Top

Volume 4000 - Information Technology Systems

Back To Top

Volume 6000 - National Security and Defense Programs

Back To Top

Volume 8000 - Information Analysis and Infrastructure Protection

Back To Top

Volume 10000 - Science & Technology

Back To Top

Volume 11000 - Security

Back To Top