Thursday, April 25, 2013

Photo Proof Of FEMA Coffins Being Moved Northbound On Georgia Highway Possibly To Chicago

When the driver of this truck noticed the photographer taking pictures, he immediately pulled off of the highway.
RELATED STORY: Obama and FEMA DETENTION CAMPS
I was the photographer. This picture was taken on highway 85 Northbound two miles south of Elberton, Ga. It is absolutely true.
May 8 2012: Thank you for posting on this forum! I was the photographer. This picture was taken on highway 85 Northbound two miles south of Elberton, Ga. It is absolutely true. I blew past the truck doing 82MpH. My tail lights were even with the front of the rigs cab when it occurred to me what they were. I slammed on my brakes to let the rig pass. As I pulled out my blackberry and positioned for the shot, the driver looked in his side-view mirror and slammed on his brakes. He then banked right to exit the highway onto an exit ramp towards Elberton. I could not operate the manual transmission, save the shot, and maneuver my vehicle to follow.
Thanks again to whomever posted this here. People need to see this.
Nick® source – Before It’s News
NTEB MUST-READ: The Blessed Hope!
Lawmaking in our nation has indeed taken a strange twist. Senators invite illegal aliens to testify before Congress…but American citizens working as law enforcement officers within our nation’s broken immigration system are purposely excluded from the process and prohibited from providing input.
Suffice it to say, following the Boston terrorist attack, I was appalled to hear the Gang of Eight telling America that its legislation was what American law enforcement needs.

Fourth Amendment threat CISPA slips quietly through House while media busy covering Boston bombing Learn more: http://www.naturalnews.com/040073_CISPA_internet_security_Fourth_Amendment.html#ixzz2RWiDxL9Y

(NaturalNews) Media coverage of late has focused primarily on the Boston Marathon terrorist attack, gun control, immigration "reform" and little else. Few outlets have paid much attention at all to a piece of legislation that essentially tears the heart out of the Fourth Amendment to the U.S. Constitution.

The legislation is called the "Cyber Intelligence Sharing and Protection Act," or CISPA, and it has already passed in the Republican-led House (248-168; 42 Democrats voted for the bill, while 28 Republicans voted against it).

There is some potentially good news, though, according to Scott Bomboy of the National Constitution Center. "Like gun control," he writes, "it's far from a done deal after the House passes CISPA. It would need Senate approval, and President Barack Obama has indicated he'll possibly veto CISPA if it comes to his desk."

Not a done deal, but still...

If he would use his veto power, two-thirds of both Houses would need to vote to override it and that seems unlikely, given Washington's hyper-partisan atmosphere.

But what is worrisome is that the legislation was passed in the House, largely by a party that is supposed to be all for smaller, less intrusive government. See how there isn't much difference these days between Republicans and Democrats?

At CISPA's core is the Fourth Amendment, which reads:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

That seems clear enough - no government intrusion into your private "effects" without "probable cause" and a search warrant. But, says Bomboy, CISPA would essentially nullify these rights as long as the federal government says it needs to do so to protect you:

CISPA is designed to let the federal government work with private companies to fight hackers and cybercriminals in and outside of the United States. As part of the effort to detect cyber threats, private companies could voluntarily share with the government data about Internet users. The sharing could be done in "real time" as the cybercops try to defeat and track down the evildoers. Companies could also share data among themselves as part of the effort.

Obviously there are big problems with this kind of legislation, to say nothing of the constitutional implications.

The most obvious drawback is, of course, the damage it does to constitutional privacy protections. Supporters of the measure say it protects consumers, but critics point out those so-called "protections" are intentionally vague or, in some cases, non-existent. "The government and companies can't look at your personal data, such as medical records and tax if they are part of the 'data dump' that is shared in real time," writes Bomboy. "But the law doesn't require that companies excise, or edit out, that information in the transfer process."

For another, no warrant will be needed before the government can obtain that kind of information. Also, none of the companies that cooperate with the government can be held legally liable for sharing your personal information - "a practice that seemingly conflicts with privacy policies on existing websites," Bomboy points out.

Rep. Jared Polis, D-Colo., is one of CISPA's primary congressional critics. In a speech on the House floor Apr. 17, Polis said, "This is the biggest government takeover of personal information that I've seen during my time here in Congress."

Telecom giants are okay with privacy violations

The American Civil Liberties Union agrees that the measure is "fatally flawed."

"The core problem is that CISPA allows too much sensitive information to be shared with too many people in the first place, including the National Security Agency," the ACLU says, in a statement.

Major telecommunications companies - no doubt as a way to win favor with the federal government - are on board with CISPA, but, Bomboy notes, "Facebook and Microsoft had signed on to support CISPA, but now they are reportedly backing away. Google appears to be on the fence about the issue."

Benjamin Franklin, one of our nation's founders, once said of a situation very much like this, "Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety."

Sources for this article include:

http://news.yahoo.com/cispa-fourth-amendment-143420272.html

http://www.motherjones.com

http://www.salon.com/2013/04/22/anonymous_pushes_anti_cispa_protests/

ACLU Uncovers Illegal Debtors’ Prisons Across Ohio

April 25, 2013

Source: Disinfo

Despite being blatantly unconstitutional, citizens are commonly being jailed for their inability to pay tickets and fines, wreaking havoc on people’s lives (and costing the state far greater sums than the unpaid tickets), ACLU Ohio reveals:
The resurgence of contemporary debtors’ prisons sits squarely at this intersection of poverty and criminal justice. In towns across the state, thousands of people face the looming specter of incarceration every day, simply because they are poor.
For Ohio’s poor and working poor, an unaffordable traffic ticket or fine is just the beginning of a protracted process that may involve contempt charges, mounting fees, arrest warrants, and even jail time. The stark reality is that, in 2013, Ohioans are being repeatedly jailed simply for being too poor to pay fines.
The U.S. Constitution, the Ohio Constitution, and Ohio Revised Code all prohibit debtors’ prisons. The law requires that, before jailing anyone for unpaid fines, courts must determine whether an individual is too poor to pay.
Despite clear constitutional and legislative prohibitions, debtors’ prison practices are alive
and well throughout Ohio. An investigation by the ACLU of Ohio uncovered conclusive evidence
of these practices in 7 of the 11 Ohio counties examined. Courts in Huron, Cuyahoga, and Erie counties are among the worst offenders. In the second half of 2012, over 20% of all bookings in the Huron County Jail were related to failure to pay fines. There is no evidence that any of these people were given hearings to determine whether or not they were financially able to pay their fines, as required by the law.
D
epartment of Homeland Security
DHS Directives System
Instruction Number:
110
-
01
-
001
Revision Number:
00
Issue Date:
6/8/2012
PRIVACY POLICY FOR
OPERATIONAL USE OF SOCIAL
MEDIA
I.
Purpose
Th
is
Instruction
implement
s
Department of Ho
meland Security (DHS) Directi
ve
110
-
01,
Privacy Policy for
Operational Use of Social Media
.
II.
Scope
This Instruction applies throughout DHS regarding the
access
to and collection, use,
maintenance
,
retention
, disclosure, deletion, and destruction of Personally Identifiable
Information
(PII) in relation to operational use of social media, with the exception
of
operational use of social media for
:
(a)
communications and
outreach
with the public
authorized by the Office of Public Affairs
;
(b) situational awareness
by the
National
Operatio
ns Center
;
(
c)
situational awareness
by
C
omponents
other than the
National
Operations Center, upon approval by the Chief Privacy Officer following completion of a
Social Media Operational Use Template
;
and (
d
)
the conduct of authorized intelligence
activit
ies carried out by the Office of Intelligence and Analysis, the intelligence and
counterintelligence elements of the United States Coast Guard, or any other
Component
performing authorized foreign intelligence or counterintelligence functions,
in accordance with the provisions of Executive Order 12333
, as amended
.
This
Instruction does not apply to the Office of the Inspector General; however, the OIG will
comply with the spirit of the Instruction.
III.
References
A.
Public Law 107
-
347, “E
-
Government Act of 200
2,
as amended
, Section
208 [44 U.S.C.
§
3501 note]
B.
Title 5, United States Code (U.S.C.), Section 552a, “Records maintained
on individuals” [The Privacy Act of 1974, as amended]
C.
Title 6, U.S.C., Section 142,
Privacy
o
fficer
D.
Title 44, U.S.C., Chapter 3
5, Subchapter III, “
I
nformation Security” [The
Federal Information Security Management Act of 2002, as amended
(FISMA)
]
-
1
Instruction #
110
-
01
-
001
Revision
#
00
­
E.
Title 6
,
C.F.R., Chapter 1, Part 5, “
Disclosure o
f
records and information”
F.
Directive 047
-
01, “Privacy Policy and Compliance”
G.
DHS Sen
sitive Systems Policy Directive 4300A
H.
Privacy
-
related memoranda issued by the Office of Management and
Budget
,
including:
1.
OMB Memorandum 10
-
22
, “Guidance for Online Use of Web
Measurement and Customization Technologies” (June 25, 2010)
2.
OMB Memorandum 10
-
23
, “Guidance for Agency Use of Third
-
Party Websites and Applications”
(June 25, 2010)
3.
OMB
Memorandum 07
-
16, “Safeguarding Against and Responding
to the Breach of Personally Identifiable Information" (May 22, 2007
)
4.
OMB
Memorandum 06
-
20, “FY 2006 Reporting Instructions
for
the
Federal Information Security Management Act and Agency Privacy
Management” (July 17, 2006)
5.
OMB
Memorandum 06
-
19, “Reporting Incidents Involving
Personally Identifiable Information and Incorporating the Cost for
S
ecurity
in Agency Information Technology Investments” (July 12, 2006)
6.
OMB
Memorandum 06
-
15, “Safeguarding Personally Identifiable
Information” (May 22, 2006)
7.
OMB
Circular No. A
-
130, “
Transmittal Memorandum #4,
Management of Federal Information Resources” (November 28, 2000
)
I.
Privacy policy guidance and requirements issued (as updated) by the
Chief Privacy Officer
and published on the Privacy Office website
, including:
1.
Privacy Policy Guidance Memorandum 2008
-
02,
DHS Policy
Regarding Privacy Impact Assessments
(December 30,
2008)
2.
Privacy Policy Guidance Memorandum 2008
-
01,
The Fair
Information Practice Principles: Framework for Privacy Policy at the
Department of Homeland Security
(December 29, 2008)
3.
Handbook for Safeguarding Sensitive Personally Identifiable
Information at
DHS (
March
20
12)
-
2
Instruction #
110
-
01
-
001
Revision
#
00
­
IV.
Definitions
A.
Counsel means the Office of the General Counsel attorney, from either the
Immediate Office of the General Counsel or component counsel, assigned to
provide legal advice to the component covered by this Instruction.
B.
Fair Inf
ormation Practice Principles
means the policy framework
adopted by the Department in
Directive
047
-
01
, Privacy Policy and Compliance,
regarding the
collection, use, maintenance
, disclosure
, deletion
, or destruction
of
Personally Identifiable Information.
C.
Individual
means a natural person, including a United States citizen,
Legal Permanent Resident, visitor to the United States,
alien,
DHS employee, or
DHS contractor.
D.
Operational Use
means
authorized use of social media to
collect
personally identifiable
i
nformation
for the purpose of enhancing situational
awareness, investigating an individual
in a criminal, civil, or administrative
context, making a benefit
determination about a person,
making
a personnel
d
etermination about a
Department employee
,
making
a suitability determination
about a prospective Department employee, or for any other
official Department
purpose that has the potential to affect the rights, privileges, or benefits of
an
individual
.
Operational use does not include the use of search eng
ines for
general Internet research, nor does it include the use of social media for
professional development such as training and continuing education
or for
facilitating
internal meetings
.
E.
Personally Identifiable Information (PII
)
means
any
i
nformation
that
permits the identity of an individual to be directly or indirectly inferred,
including
other information
that is
linked or linkable to
an
individual
.
For example, when linked or linkable to an individual, such information
includes a
name,
S
ocial
S
ecurity number, date and place of birth, mother’s maiden name,
Alien Registration
Number
,
account number, license number, vehicle identifier
number,
license plate
number
,
device identifier or serial number
, internet protocol
address,
biometric
identifier
(
e.g.,
facial recognition
photograph, fingerprint, iris
scan, voice print)
,
education
al information
, financial
information
, medical
information
, criminal or employment
information
,
information created specifically
to identify or authenticate an individual (
e.g.,
a random generated number)
.
F.
Privacy
Compliance Documentation
means any document required by
statute or by the Chief Privacy Officer that supports compliance with DHS privacy
policy, procedures, or requirements, including but not limited to the Social Media
Operational Use Template (Template)
, Privacy Impact Assessments
(PIAs)
,
System of Records Notices
(SORNs)
,
Notices of Proposed Rulemaking for
-
3
Instruction #
110
-
01
-
001
Revision
#
00
­
---
-
_JU
,
IL
Mary
Ellen
Callahan
Date
Chief
Privacy
O icer
2.
Components
complete
implementation
of
this
Instruction,
including
obtaining
approval
from
the
Chief
Privacy
O icer
of
Templates
for
categories
of
operational
use
of
social
media
in
existence
prior
to
this
Instruction,
within
120
days,
except
that
Compo
nents
complete
training
of
all
pe%inent
employees
within
165
days.
VII.
Questions
Address
any
questions
or
concerns
regarding
these
Instructions
to
the
DHS
Privacy
O ice
or
to
the
relevant
Component
Privacy
O icer
or
PPOC.
-
10
-
Instruction
#
110-01-001
Revision
#
00