Saturday, July 27, 2013

State Rep. Womick (R-TN) – First USA Politician to Call for the Discharge of All Muslims from the Military

State Rep. Womick (R-TN) – First USA Politician to Call for the Discharge of All Muslims from the Military ~ Video

State Rep. Womick (R-TN) clearly and factually articulates the concepts of Islam as well as the need for purging the United States military of Muslim Americans. If you are as educated about Islam and its theology as this politician is, you realize Rep Womick is offers a common sense solution that will both build up our troops but protect them from potential terrorist acts from within like the Ft. Hood massacre. Cleansing the military of Muslim Americans when we are “fighting a war on terrorism” makes more sense than cleansing the military and intelligence training files of concepts such as jihad and mujadeen. We can’t defeat an enemy that we cannot define or describe. To attempt to do so is like trying to box one’s shadow.
Hat Tip: Walid Shoebat Foundation

What Constitutes Unreasonable Search? Our Government’s Growing Disregard for the 4th Amendment !

What Constitutes Unreasonable Search? Our Government’s Growing Disregard for the 4th Amendment !

Posted by Scott Rohter on Friday, July 26, 2013

Justin Amash and John Conyers 4
Our Government’s Growing Disregard for the 4th Amendment
The Amash – Conyers Ammendment
An Unusual Alliance
By Scott Rohter, July 2013

Amash, Justin  Congressman MI
Congressman Justin Amash
The 4th Amendment states in part, “The Right of the People to be secure in their persons, houses, papers and effects against unreasonable searches and seizures shall not be violated…” It does not say that it might be violated whenever the White House thinks that it should be violated, or that it can be violated under certain circumstances with an order from a FISA Court. So stop infringing on my Right to be secure. There are enough willful, indiscriminate violations of the 4th Amendment going on in our country right now to make Russia’s Vladimir “Ras-Putin” blush and prompt the Kremlin to issue a public apology on behalf of the KGB for providing the official working role model for our NSA. America is not living up to its reputation as the land of the free anymore, and about the only brave that are left here at home seem to be those politicians who have enough bravado or chutzpah to routinely and regularly violate our Constitution and the Bill of Rights with apparent impunity.
What the hell is the matter with some of the people that we elect and send to Washington to represent us today? Do they even know who we should still  be afraid of, and what we really need to be kept secure from? It’s not those bearded old men wearing dirty robes and hiding in faraway caves in south-eastern Afghanistan. It is actually clean shaven domestic culprits in designer suits plying the halls of Congress and plotting to destroy what’s left of our civil liberties.
A few days ago there was a vote in Congress on an amendment to the Defense Appropriations Bill. It was called the Amash – Conyers Amendment. It was an unusual alliance. Justin Amash is a young Republican Congressman from Michigan, and John Conyers is one of the old time Democrats in Congress from the same state. They normally do not agree on much, but they did this time. The  Amash – Conyers Amendment sought to scale back some of the excessive monitoring and electronic data collecting activities of the NSA that have steadily and insidiously been claimed by that agency since 9/11 and ever since the passage of the Patriot Act. This was the type of an alliance that will serve our country well. I would like to see more of it.

Congresswoman Michele Bachmann
Michele Bachmann
It was a close vote. The roll call was 217 to 205, but the Amendment to prohibit the routine surveillance and transfer of the phone records of all Americans, who are not the subject of a terrorist investigation or a FISA Court order was defeated unfortunately. Some of the more notable members of Congress who voted basically to continue the routine practice of mass telephone surveillance of American citizens are Michele Bachman from Minnesota, Steven King from Iowa, Peter King from New York, Greg Walden from Oregon, Paul Ryan from Wisconsin, Eric Canter from Virginia, and John Bonehead Boehner from Ohio. Congressmen Boehner, Canter, Walden and Ryan are all members of the House Republican leadership.

Louie Ghomert
Louie Ghomert
On the other side of this important issue there were some real American patriots who voted to end the practice of mass surveillance of American citizens by the NSA. Some of the more notable members of Congress who voted to stop this abominable practice are Congressman Louie Ghomert of Texas, a Republican, Tom McClintock of California, a Republican, Peter De Fazio of Oregon, a Democrat, Justin Amash of Michigan, a Republican, and John Conyers of Michigan, a Democrat. The vote on this amendment went across Party lines, and surprised many people, myself included.
The Obama Administration lobbied hard to defeat the Amash – Conyers Amendment which targeted Section 215 of the Patriot Act, and had an enforcement mechanism and a defunding provision for these unlawful activities of the NSA and in the end the President had his way. He won. An alternative amendment called the Pompano Amendment which is a much weaker amendment did pass afterwards by a voice vote. It merely reiterates the principle that non-suspect Americans are not supposed to be targeted by surveillance activities. It targets a different section of the Patriot Act, section 702. It does not have a defunding provision and there is no enforcement mechanism. This basically leaves the indiscriminate routine telephone surveillance practices of the NSA intact and unaffected.

James Sensenbrenner
James Sensenbrenner
One of the original writers of the Patriot Act is Congressman James Sensenbrenner of Wisconsin. As head of the committee that drafted the Patriot Act he probably knows it better than most, and has a better understanding of what that particular legislation was supposed to do than other Congressmen. Yesterday he voted Yes on the Amash – Conyers Amendment to curtail the growing, unlawful activities of the NSA, and to scale back its excessive monitoring and data collecting capabilities. He voted to prohibit the National Security Administration from indiscriminately monitoring American citizens who are neither the subjects of a terrorist investigation or a FISA Court order. “This is no longer the law that I wrote”, Congressman Sensenbrenner said of the Patriot Act. Congressman David Schweikert of Kansas also agrees with him. He said the Patriot Act has become an open season to fish in constitutionally prohibited waters.
Collecting irrelevant phone company data on its customers who are lawful American citizens and not the subjects of any terrorist investigation is absolutely wrong. It goes way beyond the original intent of the Patriot Act. Then both Congressman David Schweikert and James Sensenbrenner as well as everyone else who backed the stronger Amash – Conyers Amendment  voted yes on the Pompano Amendment in a voice vote.
If you liked this article then please subscribe to my free RSS Newsfeed on this page and also here at   Then join a great group of concerned patriots at

Corroborating Source Material

Select Related Articles

6 Apocalyptic Technologies That Most People Have Not Even Heard About Yet

6 Apocalyptic Technologies That Most People Have Not Even Heard About Yet
Share this article
Are you ready for the future? We live at a time when technology is advancing at an exponential pace. Today, scientists are rapidly developing bizarre new technologies that most science fiction writers never even would have dreamed of a couple decades ago.

For example, would you be willing to get rid of your bank card and start paying for things with only your face? Would you be willing to allow a technology company to put one large computer chip or thousands of really, really small ones (“neural dust”) into your brain?
These are some of the technologies that are coming. Our world is changing at an absolutely mind blowing rate, and to be honest none of us really knows what our world is going to look like a decade from now.

Remember, ten years ago Facebook did not exist and five years ago the iPad did not exist. Our planet is fundamentally being transformed, and our scientists are rapidly turning the “impossible” into the possible. The following are 6 apocalyptic technologies that most people have not even heard about yet…

#1 Facial Recognition Software That Replaces Bank Cards

Will people soon pay for things by having their faces scanned at the checkout counter? That may sound absurd, but according to the Daily Mail a company from Finland has already launched this technology…

Bank cards are already being replaced by phones and wristbands that have payment technology built-in but the latest threat to the lowly plastic in your pocket could be your face.

A Finnish startup called Uniqul has launched what it calls the first ever payment platform based on facial recognition.

The system doesn’t require a wallet, bank card or phone – instead a camera is positioned at the checkout and takes a photo of a shopper’s face when they are ready to pay.

It then scans a database for the face and matches it to stored payment details in order to complete the transaction.

#2 Facial Recognition Technology Already Being Used In Stores And In Digital Advertising Displays

Do you remember the billboards in the movie “Minority Report” that used facial recognition technology to scan faces and produce appropriate ads? Personally, I never thought that I would see such a thing in my lifetime, but the truth is that a company called Amscreen already has over 6,000 digital screens that use this kind of technology. In fact, their advertising screens are already being viewed by approximately 50 million people…

Advertising network Amscreen recently launched a unique face-detection technology, originally developed by automated audience measurement firm Quividi.

Cameras have been installed in Amscreen’s digital advertising displays that can scan a person’s face and determine their gender, age, date, time and volume of the viewers.

This is so adverts are served to the most appropriate audience.

Amscreen already has over 6,000 digital screens seen by a weekly audience of over 50 million people.

And according to NPR, this kind of facial recognition technology is now being used in some retail stores to identify VIPs…

This lack of recognition is precisely what the VIP-identification technology designed by is supposed to prevent.

The U.K.-based company already supplies similar software to security services to help identify terrorists and criminals. The ID technology works by analyzing footage of people’s faces as they walk through a door, taking measurements to create a numerical code known as a “face template,” and checking it against a database.

In the retail setting, the database of customers’ faces is comprised of celebrities and valued customers, according to London’s . If a face is a match, the program sends an alert to staff via computer, iPad or smartphone, providing details like dress size, favorite buys or shopping history.

#3 Google Wants To Put A Chip In Our Brains?

Would you allow a technology company to put a chip in your brain?

According to a recent article in a major UK newspaper, apparently this is exactly what executives at Google believe will happen someday…

It began, just 15 years ago, as a service that enabled you to type a request into a personal computer and be given links to associated websites. Things have rather moved on. Soon Google hopes to have the ubiquitous presence of a personal assistant that never stops working, capable of conversing naturally in any language.
 Ultimately, as Page and co-founder Sergey Brin have asserted, the goal is to insert a chip inside your head for the most effortless search engine imaginable.

In fact, on a recent visit to Google the reporter writing the article quoted above was told the following by Google Vice President of Search Ben Gomes…

Where will it end? Gomes agrees that a chip embedded in the brain is far from a sci-fi fantasy. “Already people are beginning to experiment with handicapped people for manoeuvring their wheelchairs,” he says. “They are getting a few senses of direction with the wheelchair but getting from there to actual words is a long ways off. We have to do this in the brain a lot better to make that interaction possible. We have impatience for that to happen but the pieces of technology have to develop.”

#4 The Pentagon Is Developing A “Terminator Robot” Named Atlas

Did you know that the U.S. military is building robots?

Okay, so they aren’t quite like “the Terminator” yet. But apparently they are rapidly becoming very advanced…

ATLAS is 6 ft and 2 inces, it weighs 330 pounds. Its primary purpose is said to be joining in relief efforts particularly in those places where involvement of human beings is lethal or downright impossible. Boston Dynamics, who built the ATLAS body, say that the robot is strong and coordinated enough to climb using its hands and feet, as well as pick its way in congested spaces.
The people who have been called in to work on the robot are tasked with programming it to interact in the most efficient way it can be made to. DARPA has released a video which shows ATLAS walking, avoiding obstacles, withstanding brute force applied at its torso and even climbing the stairs.

So as these robots become more sophisticated, will there be any limits on how the U.S. military will employ them? A recent article in the Washington Post painted a frightening picture…

But what’s to stop the same indestructible robots that can walk over rubble, manipulate complex tools and enter burning buildings from being used in entirely different scenarios by the U.S. military? They might, for example, be able to march through debris-strewn war zones, manipulate weapons and hunt down terrorists, on a house-by-house basis. In other words, the DARPA Robotics Challenge could result in the creation of a real-life Terminator bot.

#5 Using Only Sound Waves To Levitate And Move Small Objects

Did you know that it is possible to levitate and move small objects using only small waves? Just check out what a team of scientists in Switzerland recently discovered…

A team of researchers in Switzerland have developed a way of levitating and transporting small objects using nothing but sound.

Using ultrasonic waves – that is, sound waves whose frequency is too high for humans to hear – scientists at the Swiss Federal Institute of Technology in Zurich have made water droplets, instant coffee crystals, styrofoam flakes, and a toothpick, among other objects, hang in midair, move along a plane, and interact with each other. It is the first time that scientists have been able to use sound to simultaneously levitate several objects next to each other and move them around.

#6 Ultrasonic Neural Dust

This is perhaps the most frightening technology on the list. The advances in the field of nanotechnology that we have seen over the past decade have been absolutely mind blowing. Now, some scientists are talking about actually being able to put thousands of tiny little computer chips inside our heads. The following is from a recent Time Magazine article…

Here’s how it might work: First you pop through the skull and the brain’s dura (the membrane surrounding the brain), dipping into the brain’s neural sea itself, roughly two millimeters down, where you position thousands of low-powered CMOS chips (the “neural dust,” each as tiny as millionths of a meter) to begin capturing neural signals using electrodes and piezoelectric sensors, which convert the data to ultrasonic signals.
Those signals are then picked up by a sub-dural transceiver (sitting just above the “dust” chips and simultaneously powering them ultrasonically), which relays the data to an external transceiver resting just outside the skull (ASIC, memory, battery, long-range transmitter), which in turn communicates wirelessly with whatever computing device.

Like most futurist notions, this one hasn’t been tested yet — it’s just a formal proposal — but it’s another fascinating glimpse into where we might be headed, bypassing clumsy literal BMI head-jacks for micro-scale interfaces that would link us, wire-free, to future galaxies of virtual information.

While many of these emerging technologies may sound very exciting, the truth is that it is important to remember that any technology is a two-edged sword.

A technology can be used for good or it can be used for evil.

And we certainly live at a time when the grip of the Big Brother surveillance grid that is being constructed all around us is rapidly getting tighter.

I think that it is important to step back and understand how much life has changed over the past several decades. We used to have much more liberty and much more freedom than we have today. Just consider the following examples from a recent article posted on the Economic Policy Journal…

In 1975:

1. You could buy an airline ticket and fly without ever showing an ID.

2. You could buy cough syrup without showing an ID.

3. You could buy and sell gold coins without showing an ID

4. You could buy a gun without showing an ID

5. You could pull as much cash out of your bank account without the bank filing a report with the government.

6. You could get a job without having to prove you were an American.

7. You could buy cigarettes without showing an ID

8. You could have a phone conversation without the government knowing who you called and who called you.

9. You could open a stock brokerage account without having to explain where the money came from.

10. You could open a Swiss bank account with ease. All Swiss banks were willing and happy to open accounts for Americans.

Yes, facial recognition technology could have some positive uses, but will we eventually be required to have our faces scanned wherever we go?

Yes, robots can be used to do a lot of great things, but will governments around the globe eventually be deploying armies of “killer robots” against all of us and against each other?

Just because technology is advancing does not mean that life will necessarily be better in the future.

Technology is increasingly being used to watch, track, monitor and control the things that we do. As this web of technology gets even tighter, we may find that we do not really like how it has changed our lives.

That is why it is important for society to have some very important discussions about privacy, liberty and freedom while we still can.

If we don’t set up limits on the use of these technologies now, someday we might end up bitterly regretting it.

Muslim Honor Killing In Canada: “So Many Stab Wounds That From Her Waist Up, There Was No Body” (Geller, Atlas Shrugs)

Muslim Honor Killing In Canada: “So Many Stab Wounds That From Her Waist Up, There Was No Body” (Geller, Atlas Shrugs)

Sharipa Fazli, shaking her head, says her sister suffered so many stab wounds that from her waist up, “there was no body.”
Yasin Wafa, 17 months, is the son of the dead woman and her husband, who is charged in her fatal stabbing. Every night, little Yasin Wafa scurries over to his grandparents’ front door, hoping his mom will be picking him up as she used to.
Honor violence, honor murder is not just an Islamic tradition, it’s Islamic law.
A manual of Islamic law certified as a reliable guide to Sunni orthodoxy by Al-Azhar University, the most respected authority in Sunni Islam, says that “retaliation is obligatory against anyone who kills a human being purely intentionally and without right.” However, “not subject to retaliation” is “a father or mother (or their fathers or mothers) for killing their offspring, or offspring’s offspring.” (‘Umdat al-Salik o1.1-2). In other words, someone who kills his child incurs no legal penalty under Islamic law.
As Robert Spencer notes: “Muslims commit 91 percent of honor killings worldwide. A manual of Islamic law certified as a reliable guide to Sunni orthodoxy by Al-Azhar University, the most respected authority in Sunni Islam, says that ‘retaliation is obligatory against anyone who kills a human being purely intentionally and without right.’ However, ‘not subject to retaliation’ is ‘a father or mother (or their fathers or mothers) for killing their offspring, or offspring’s offspring.’ (‘Umdat al-Salik o1.1-2). In other words, someone who kills his child incurs no legal penalty under Islamic law. The Palestinian Authority gives pardons or suspended sentences for honor murders. Iraqi women have asked for tougher sentences for Islamic honor murderers, who get off lightly now. Syria in 2009 scrapped a law limiting the length of sentences for honor killings, but the new law says a man can still benefit from extenuating circumstances in crimes of passion or honour ‘provided he serves a prison term of no less than two years in the case of killing.’ And in 2003 the Jordanian Parliament voted down on Islamic grounds a provision designed to stiffen penalties for honor killings. Al-Jazeera reported that ‘Islamists and conservatives said the laws violated religious traditions and would destroy families and values.’”
Toddler cries for slain mother stabbed to death in Ajax home The Star, July 26, 2013 (thanks to Devorah)
Nasira Fazli, whose body was found riddled with stab wounds, left behind a toddler. Her husband faces second-degree murder charges.
Every night, little Yasin Wafa scurries over to his grandparents’ front door, hoping his mom will be picking him up as she used to. For the past week, she hasn’t come. Nasira Fazli, 31, was brutally stabbed dead last Friday in her Ajax home.
Her husband, Feraidon Mohammad Imbrahem, 31, is charged with second-degree murder. He was arrested without incident Friday at their home and was remanded into custody Saturday. He will return to court Aug. 6.
Yasin, 17 months old, had just started calling Nasira Fazli “ma-ma” days before she was murdered, his grandmother says, adding he now cries for “ma-ma” when being put to bed.
“Everybody is crying, crying,” says Shahla Fazli, surrounded by pictures of her dead daughter at her Pickering home. Yasin is nearby, in his aunt Sharipa Fazli’s arms, snuggling his face into her shoulder.
Shahla Fazli spreads some pictures out on the floor. In some, Nasira Fazli is smiling next to her husband, but his eyes in the images have been scratched and poked out by her brothers.
The Fazli family says they had some concerns about Nasira Fazli’s safety, but troubling issues were always dealt with internally, without involving police and potentially destroying the relationship.
Nasira Fazli was the rock of her family. She bought a house for her parents and siblings, with whom she lived. A Canadian citizen who emigrated from Afghanistan 24 years ago, she wed Imbrahem nearly three years ago in her home country.
It was an arranged match, but she knew him well, as did her mother. She returned to Canada pregnant, gave birth to Yasin, their only child, and sponsored Imbrahem to join her about four months ago.
Nasira Fazli worked in customer service at American Express and dreamed of starting a happy family, but cracks emerged in the marriage when she and Imbrahem got their own place, the Fazli family says.
“He was so demanding,” says Sharipa Fazli, lowering her voice to a whisper as she expresses the fears her family had.“He was stubborn. It was his way or the highway.”
About a month ago, Sharipa Fazli alleges, Imbrahem threatened her sister after an argument over caring for Yasin.
“He wasn’t adjusting well to life here,” she says. “Back home, he was a doctor, and here he was nothing.”
Sharipa Fazli says her mother met with Nasira Fazli and Imbrahem after the alleged threat and they chose not to contact police. Imbrahem had apologized, showing his arm tattoo of Nasira’s name and promising he’d never hurt her.
Nasira Fazli did not want to risk ruining her husband’s chances of permanent residency, the Fazli family says. He was given another chance.
Sharipa Fazli, shaking her head, says her sister suffered so many stab wounds that from her waist up, “there was no body.”
Det.-Sgt. J.J. Allan, of the Durham Region police homicide unit, says Nasira Fazli suffered “several” stab wounds and police are “investigating the relationship between the victim and the accused, and other allegations.”
The Fazli family says there were also concerns for little Yasin; Nasira Fazli had begun going out of her way to not leave her son alone with Imbrahem. But again, the family only dealt with it internally.
“She didn’t want to ruin his reputation,” says Sharipa Fazli, letting Yasin climb out of her arms and onto the floor. “He was well respected back home.”
Yasin wanders around and settles by a set of stairs, putting his hand against a wall and turning his toward it.
“He has no parents,” says Sharipa Fazli, looking at him lovingly. “He’s been having a hard time adjusting.”
Pamela Geller is the Editor of Atlas Shrugs and a regular contributor to The D.C. Clothesline.
Follow The D.C. Clothesline on Facebook

Report: Illegal Aliens Released by Federal Gov’t Committed 19 Murders, 142 Sex Crimes

Report: Illegal Aliens Released by Federal Gov’t Committed 19 Murders, 142 Sex Crimes

Illegal Aliens Released by Federal Government Committed 19 Murders, 142 Sex Crimes
An illegal immigrant from El Salvador is searched on the tarmac at Phoenix-Mesa Gateway Airport (AP Photo/Matt York)
While the Obama administration shuts down Border Patrol stations and loosens U.S. immigration policy, a new report by the House Judiciary Committee reveals that upwards of 36,000 illegal aliens were cut loose by federal law enforcement between October 27, 2008 and July 31, 2011. A number of these illegal immigrants went on to commit 19 murders and 142 sex crimes.
“The crimes charged against these illegal immigrants include nearly 2,000 DUI (11.9%), over 1,400 drug violations (8.8%), and more than 1,000 major criminal offenses and violent crimes (6.9%), including murder, assault, battery, rape, kidnapping, child molestation, domestic abuse, lynching, stalking, and torture,” the report says.
The report, issued today, was conducted by the nonpartisan Congressional Research Service (CRS) and contains an “analysis of crosschecked data” from the Department of Homeland Security (DHS) that was subpoenaed by the House Judiciary Committee last November. The Committee subpoenaed DHS after the Obama administration’s announcement to stop deporting some illegal aliens identified by Secure Communities, a program that flags illegal immigrants who have been arrested and booked in local jails, according to the report.
“President Obama’s reckless amnesty agenda is dangerous and deadly for Americans.  Rather than protect the American people he was elected to serve, President Obama has imposed a policy that allows thousands of illegal immigrants to be released into our communities,” Committee Chairman Lamar Smith (R-Texas) said in a statement. ”They have committed thousands of more crimes, including 19 murders, 3 attempted murders, and 142 sex crimes, which could have been avoided.”
He continued: “For example, after an illegal immigrant was released, he and another illegal immigrant were arrested on suspicion of killing a man.  And this is just one case.  Illegal immigrants released from jail have committed other crimes, including nearly 2,000 DUI, over 1,400 drug violations, and more than 1,000 major criminal offenses and violent crimes, which consist of murder, assault, battery, rape, kidnapping, child molestation, domestic abuse, lynching, stalking, and torture.”
Illegal Aliens Released by Federal Government Committed 19 Murders, 142 Sex Crimes
Central American migrants stand at the rail tracks after getting off a train during their journey toward the US-Mexico border in Ixtepec, Oaxaca, southern Mexico. (AP Photo/Eduardo Verdugo)
These are the “key findings” from the CRS report:
  • The data provided to the House Judiciary Committee by DHS includes 276,412 records of charges against illegal and criminal immigrants identified by Secure Communities between October 27, 2008 and July 31, 2011.  There are 159,286 unique individuals in the database and 205,101 unique arrest incidents.
  • Of those released, CRS found that about 17% of illegal and criminal immigrants, or 26,412, were rearrested on criminal charges.   These 26,412 recidivists accounted for a total of 42,827 arrests and 57,763 alleged violations.
  • The categories of crimes charged include nearly 8,500 DUI (14.6%), over 6,000 Drug Violations (10.9%), more than 4,000 Major Criminal Offenses (7.1%), which includes murder, assault, battery, rape, and kidnapping, nearly 3,000 Theft (4.9%), and over 1,000 Other Violent Crimes (2.1%), which includes carjacking, child cruelty, child molestation, domestic abuse, lynching, stalking, and torture.
  • These crimes committed by both illegal and legal immigrants include 59 murders, 21 attempted murders, and 542 sex crimes.
  • Of those rearrested, nearly 30%, or 7,283, were illegal immigrants. Since 46,734 illegal immigrants were released, this means they have a recidivism rate of 16%.  These illegal immigrants should have been deported but the Obama administration’s lax immigration policies released them back into our communities.
  • The crimes charged against these illegal immigrants include nearly 2,000 DUI (11.9%), over 1,400 drug violations (8.8%), and more than 1,000 major criminal offenses and violent crimes (6.9%), including murder, assault, battery, rape, kidnapping, child molestation, domestic abuse, lynching, stalking, and torture.
  • These crimes committed by illegal immigrants include 19 murders, 3 attempted murders, and 142 sex crimes.
Read the entire report here.





hide my ass


really if they start to take our guns i hope they take all the obama voters 1 st

Obama & Dems USE Tragedy, Grief & Guns to Distract

Debt Ceiling,Gun Control,Obama,Biden,Distraction,spending,tragedy
by 03) Mike Madden on January 12, 2013
In a recent New York Times article about the Debt Ceiling, Americans were told that the United States already hit the ceiling near the end of 2012, and that Timothy Geithner will have some "creative accounting to accomplish in order to buy some time to raise the limit, yet again.
President Barack Obama already said "there should be no negotiation on raising of the debt limit" and in fact, said "we don't have a spending problem in the government."
Over one trillion dollars in deficits a year is not overspending to Barack Obama.
So, how would Democrats continue to dodge their spending problem while ensuring the people's direct Representatives in Congress will not have time to pressure negotiations, like so many times before?
The President needs a distraction. And the gun control issue is a great one right now.  Let's see how ABC's Jake Tapper reacts to this push and the President. Video courtesy Business Insider.
Barack Obama felt this issue was so important he put his Vice President in charge of the administrations position on the gun issue.  Biden let everybody talk and then he spoke.  With his usual aplomb he said in reference to gun control that there was no silver bullet.  What good can come from this man looking at an issue as important as the complete dismantling of the Second Amendment.
There are so many other issues that we could work on in a meaningful fashion without violating the constitution.  Things like the House and Senate actually passing a budget, cutting spending at a federal level to bring expenditures into line with revenue.
The Times is right when they say congress is constitutionally bound to pay the bills.  But they are also allowed by the constitution to vote for spending cuts and how the money from the American people is spent.  But what are we discussing?  Whether or not to ban a weapon that can be attributed to less than 500 deaths every year.  That would be rifles folks becasue the FBI does not differentiate between a rifle and an assault weapon.
Here is the data from the FBI
Weapons 2006 2007 2008 2009 2010
Total 15,087 14,916 14,224 13,752 12,996
Total firearms: 10,225 10,129 9,528 9,199 8,775
Handguns 7,836 7,398 6,800 6,501 6,009
Rifles 438 453 380 351 358
Shotguns 490 457 442 423 373

The first and most striking thing about this chart is that every year, the death-rate by all weapons are on a steady decline.
This is not reported anywhere when discussing the ban on any one weapon of the strict control of weapons by the government.
  • Consider the sleepy town of Kennessaw, Georgia.  A few years back the town passed a bill requiring all residents own a gun.  As result, this town had no murders in the year 2000 and  again, had none in 2010.  Zero. None!
  • Chicago on the other hand has some of the most restrictive gun laws and the rate of murder by gun is very high.
Is this a sincere attempt to save lives or just a political ploy to distract from the most pressing issue facing the American people.  Spending and the National debt?  But you need to listen to the people who are working for Barack Obama because at every turn they continue to talk about unilateral presidential action.  Obama himself has said the words to the effect that he will use every tool at his disposal.
What you the Amercian people need to remember is a few simple words.
I do solemnly swear (or affirm) that I will faithfully execute the office of President of the United States, and will to the best of my ability, preserve, protect, and defend the Constitution of the United States.
Barack Obama will violate this if he issues any executive order on guns.  But how about Congress.  Here is their oath.
I do solemnly swear (or affirm) that I will support and defend the Constitution of the United States against all enemies, foreign and domestic; that I will bear true faith and allegiance to the same; that I take this obligation freely, without any mental reservation or purpose of evasion; and that I will well and faithfully discharge the duties of the office on which I am about to enter: So help me God.
Two quick points, both oaths swear to protect the  the Constitution and oddly the congressional one still says so help me God.  So God help them, for they have all failed at keeping solemn this simple oath.
To Subscribe to the Conservative Report Newsletter, just add your email below & a confirmation email will be sent to you

We Love Our Guns’: Missouri Lawmakers Prepare to Override Governor’s Veto

We Love Our Guns’: Missouri Lawmakers Prepare to Override Governor’s Veto

Posted on: July 27th, 2013
With the help of a few Democrats, Missouri’s Republican-led Legislature appears to be positioned to override Gov. Jay Nixon’s veto of a high-profile bill that seeks to nullify federal gun-control laws in the state and make criminals out of federal agents who attempt to enforce them.
Several of Nixon’s fellow Democrats confirmed to The Associated Press that they would vote to override his veto when lawmakers convene in September, even while agreeing with the governor that the bill couldn’t survive a court challenge. Many of them noted that in some parts of Missouri, a “no” vote on gun legislation could be career ending.
“We love our guns and we love hunting. It’s not worth the fight for me to vote against it,” said Rep. T.J. McKenna, D-Festus. But, he added, “the bill is completely unconstitutional, so the courts are going to have to throw it out.”

i really dont share much on this but this is for beginners

Hacking is an act of penetrating computer systems to gain knowledge about the system and how it works. What are Hackers
Technically, a hacker is someone who is enthusiastic about computer programming and all things relating to the technical workings of a computer. Under such a definition, I would gladly brand myself a hacker. However, most people understand a hacker to be what is more accurately known as a cracker.
What are Crackers?
Crackers are people who try to gain unauthorized access to computers. This is normally done through the use of a ‘backdoor’ program installed on your machine. A lot of crackers also try to gain access to resources through the use of password cracking software, which tries billions of passwords to find the correct one for accessing a computer.
What damage can a Hacker do?
This depends upon what backdoor program(s) are hiding on your PC. Different programs can do different amounts of damage. However, most allow a hacker to smuggle another program onto your PC. This means that if a hacker can’t do something using the backdoor program, he can easily put something else onto your computer that can. Hackers can see everything you are doing, and can access any file on your disk. Hackers can write new files, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information.
How do Hackers hack? There are many ways in which a hacker can hack. Some are as follows.
NetBIOS ICMP Ping FTP rpc.statd HTTP
NetBIOS hacks are the worst kind, since they don’t require you to have any hidden backdoor program running on your computer. This kind of hack exploits a bug in Windows 9x. NetBIOS is meant to be used on local area networks, so machines on that network can share information. Unfortunately, the bug is that NetBIOS can also be used across the Internet – so a hacker can access your machine remotely. ICMP Ping (Internet Control Message Protocol)
ICMP is one of the main protocols that make the Internet work. It standards for Internet Control Message Protocol. ‘Ping’ is one of the commands that can be sent to a computer using ICMP. Ordinarily, a computer would respond to this ping, telling the sender that the computer does exist. This is all pings are meant to do. Pings may seem harmless enough, but a large number of pings can make a Denial-of-Service attack, which overloads a computer. Also, hackers can use pings to see if a computer exists and does not have a firewall (firewalls can block pings). If a computer responds to a ping, then the hacker could then launch a more serious form of attack against a computer. FTP (File Transfer Protocol)
FTP is a standard Internet protocol, standing for File Transfer Protocol. You may use it for file downloads from some websites. If you have a web page of your own, you may use FTP to upload it from your home computer to the web server. However, FTP can also be used by some hackers… FTP normally requires some form of authentication for access to private files, or for writing to files
FTP backdoor programs, such as
Doly Trojan Fore Blade Runner simply turn your computer into an FTP server, without any authentication.
This is a problem specific to Linux and Unix. The problem is the infamous unchecked buffer overflow problem. This is where a fixed amount of memory is set aside for storage of data. If data is received that is larger than this buffer, the program should truncate the data or send back an error, or at least do something other than ignore the problem. Unfortunately, the data overflows the memory that has been allocated to it, and the data is written into parts of memory it shouldn’t be in. This can cause crashes of various different kinds. However, a skilled hacker could write bits of program code into memory that may be executed to perform the hacker’s evil deeds. HTTP HTTP stands for HyperText Transfer Protocol..
HTTP hacks can only be harmful if you are using Microsoft web server software, such as Personal Web Server. There is a bug in this software called an ‘unchecked buffer overflow’. If a user makes a request for a file on the web server with a very long name, part of the request gets written into parts of memory that contain active program code. A malicious user could use this to run any program they want on the server.
Where and how to start Hacking
After you get yourself a good scanner, scan some prefixes and find some cool dialups, then do the following: First Method:
From your terminal, dial the number you found. You will hear a series of Beeps. (Telling you that you are connecting to a remote computer. After few seconds you will hear something like CONNECT 9600. It then identifies the system you are on. If nothing happens after it says CONNECT 9600 try hitting ENTER a number of times. If you get a bunch of garbage adjust your parity, data bits, stop bits etc. until it becomes clear. Now when you get connected to the server you can apply either of the above mentioned methods.
Second Method: The TELNET way
Get your local dialups. Then you dial the number from your terminal & connect. Press Enter and wait for a few seconds. Then it will say Terminal Type your terminal emulation. If you don,t know what it is hit ENTER. It will give you a prompt @. Type c(connects to the host) Type NAU (Network user address) that you want to connect. Find out the type of system you are on UNIX, VAX/VSM, PRIME. Here is a list of some Telenet commands and their functions.
c Connect to a host. stat Shows network port. Full Network echo. half Terminal echo. Telemail Mail. (need ID and password) mail Mail. (need ID and password) set Select PAD parameters cont Continue. d Disconnect. hangup Hangs up. access Telenet account. (ID and password)
What is cracking?
Cracking is an art of removing software copyright protection from a program normally a shareware. Most of us must have observed that when we buy a computer magazine normally a CD full of software comes with it but they have restriction like u can only use it for 15 days or 30 days or more according to company either after that software refuses to work or legally u are not authorized to use it and u have to buy it from the respective vendor or some times it boots up with annoying pop up window or they give sucking adds or it will show TRIAL mark on everything that u do with the software. Now to your rescue comes a cracker who cracks the software for u. What he does is to remove any such protection mentioned above or any other from that software so that u can evaluate it for as long as u wish and when u are totally satisfied u then buy it, cracking removes all restriction from that program.
What is a Crack
Crack is a piece of software or small program made in any programming language depending upon Cracker choice which removes restriction from the software u want and helps u in using your favorite program for as long as u want without any forced banner, adds or just any kind of restriction. There are basically three kinds of Crack that we mainly use which are as follows:
1. Serial Number 2. Patch 3. Key Generator
What type of protection does the software have?
Usually when u get a software it allows u a trial of 15 or 30 days depending upon company and either u are free to use all features or some features are blocked which are available on full version and after the evaluation period u are not authorized to use u have to but it from the vendor or others authorized source. Now how can u remove them? Of course u have to Crack them basically u can use that software after the evaluation period by either entering the registration code or serial number or u can run a patch (an exe or other file) in the folder in which the software is installed normally the folder is in place something similar to this C:\Program Files\Your software. Or there is something like a key generator that generates the required registration code for u. Some software have different kind if protection like if u want to register that program (i.e. want to use it without restriction and others) it demands a serial number or registration code which normally u can get when u pay the price of software to the company and they send it to u, according to the data u would have entered onto their site when u would have purchased the software. That means registration code for a particular name could not be used for the other so Cracker came up with something called a key generator that will generate key according to your information like name or others just as the company would have done it. So u gets to use your software without actually paying for it.
Why Cracking is not a Bad Practices?
Because cracking is done for gaining knowledge and information by a cracker and to test the weakness in the security of a program and to help people buy things worth their money software are heavily price starting from 30$ to 30000$ or even more and the company expects u too see and use it only 15 days or so which is not enough and there are time when u end up in bad deal; to help u a cracker cracks it with the intention that u get things worth your money ; a cracker never wants that u use his crack for something immoral if u like a program or software buy it , because what we all don’t know that a hell of a hard work is put into making a software and by not paying royalty to the programmer for his software by in turn paying to the company u are doing a wrong thing and doing injustice to the programmer and something that is illegal. If u like software does buy it, programmer deserves something in return of his hard work. Cause if everyone starts using a crack no one will buy the software and company will have no money to pay the programmer and no new programs will be made think on it!!!
Black hat or White hat! Computer Hacking Explained A Brief Hacking History
One might not suspect that the art, or scourge, of computer hacking was created at one of the havens for technological excellence. True, at MIT (Massachusetts Institute of Technology), a group of students developed the technique and borrowed their name from the “hackers” of the late 1800s who found amusement in pranking the emerging telephone companies.Getting their laughs and skills from hacking and cracking into primitive computers and exploiting the Arpanet (predecessor to the internet), they created a novelty that would become the target of federal crackdown in years to come. To define hacking in short, we can say that an artistic criminal offense of breaking into another remote system without the owner’s consent for the purpose of stealing information is what is hacking.
However, the act of hacking started out innocently, and was basically a method of trying to figure out how computer systems worked. The 1970s saw the rise in “phreaking,” or phone hacking, headed by John Draper. This method allowed the user of a “blue box,”, when used with a Captain Crunch whistle of 2600 hertz which accessed the AT&T long distance system, to make free long distance calls. Hackers initiated with accessing the free phone calls through a varied range of sources, thereby managing to circumvent into the nation’s radio system and the phoning system resulting in a tremendous phone fraud nationwide.
After the age of “phreaking,” computers became not only the target, but also the forum, for a growing hacker population to communicate. The creation of bulletin board systems (BBS) allowed this communication and the technological possibility of more serious government and credit card hacking became possible. At this time in the early 80’s, hacking groups such as the Legion of Doom began to emerge in the United States, giving organization, and thus more power to hackers across the country.
Once this happened, breaking into the computers became a legitimate activity, with its own groups and soon its own voice with the 2600 magazine, launched in 1984. The effects of computer hacking were serious. Two years later, inevitably, Congress launched the Computer Fraud and Abuse Act that outlawed hacking. Over the years, there was a series of noticeable occurrences as the worst consequential effect of computer hacking on more high profile cases such as the Morris Worm, responsible for infecting government and university systems, and the Mitnick case in 1995, which captured Kevin Mitnick, steeling as many as 20000 credit card numbers.
In 1999, security software became widely known by the public, and with the release of new Windows programs, which were littered with security weaknesses, they became successful because of necessity. This fraudulent act of computer hacking is perhaps the major problem confronting the rapidly expanding population of Internet users today, with the systems still trying to battle online hackers.

better be better then me

Hacking Vs. Programming

What is the difference between Hacking and programming? One opinion I have heard expressed is that a hacker can put a lot of code together in a hurry but if a change is needed the code has to be completely rewritten. A programmer may take a little longer but if changes are needed they are more quickly and easily installed without the need for a complete rewrite. One source I heard attributed an observation like this to Maggie Johnson of Google. It rings true to me though. Hacking is usually described as “quick and dirty.” You though a bunch of code together and make it up as you go along. Some hackers are quite brilliant and can do amazing things in incredibly short periods of time. And then they move to the next thing. Or perhaps they stay with the same thing because no one else can understand it well enough to fix it, modify it or improve it. Job security? Perhaps but not a good thing for the people who use, or importantly pay for, the software.
I do a little hacking – that is to say toss something together in a short period of time without a lot of planning – from time to time. I’m not a genius though and typically this ends poorly. The performance is poor, the maintainability is poor, and no one else wants to use it. This may make be biased against this way of doing things I guess. I prefer to program – to think things out, to plan, to proceed in an organized fashion. I saw the difference made clear to me my first year of teaching (a long time ago). I was working on a little game programming of my own and decided to show it to some of my students. As I explained how I had set things up around a number of constants that is hoped would make the program more easily expandable one of the students turned to another and said “Look at that. He’s just starting and already he is planning for additions.” That is one of the real keys, in my opinion, to real programming.
I was a major in Systems Analysis in college. This was during a time when computer science majors were rare and software engineering majors rarer still. But one of the things my professors drilled into our heads was that programs had to be maintainable and extensible. We were taught from day one that programs are not finished but, in a sense, abandoned. More likely at some point you declare victory and more on. But others will maintain these programs and expand them and adapt them. Making their lives easier is a good thing. Think of the Golden Rule – program was you would want the programmers whose code you are modifying to have programmed. I think that is how it is written. Smile
The hackers get a lot of attention these days. These are the basketball players who make the slam dunk that makes it to the highlight reel. But basketball games are won by teams of players executing on the basics – the solid play well executed, the dribble, the layup, the pass that gets the ball to the star. In the long run we need more real programmers to make solid, dependable programs that don’t have be be rewritten from scratch when a change is needed.

the Obama administration's move to an embarrassing failure of U.S. .. and leaks predicted Israel

First page news : the Obama administration's move to an embarrassing failure of U.S. .. and leaks predicted Israel

Wrote "ambassador" that leaked U.S. forums news about Israel's responsibility for the raids targeted Navy stores near the Syrian port of Latakia has drawn sharp Israeli criticism amounted to far as to accuse the administration of U.S. President Barack Obama of endangering Israel. This was followed by the U.S. leaks leaks Russian reports that Israeli aircraft, which raided the vicinity of Latakia launched from Turkish rules invented by Russians most likely to arouse the Arab world against Turks and Aazlohm, of what is happening in Syria.
He has denied Turkish Foreign Minister Ahmet Davutoglu hours after the Russian report.
This prompted Israeli commentators to say that the international war behind these leaks that made ​​Tel Aviv relationship between Washington and Moscow.
He said military commentator in "Yediot" mail Ron Ben-Yishai, the Obama administration recently wandering move from failure to failure embarrassing. Ben-Yishai went on to say that the last of these failures, leaks on American raids on the perimeter of Latakia, which repeat the mistakes the Americans have already apologized for.
I tried "Maariv" understand the underlying interests behind the non-specific sources in the American administration to download responsibility for the bombings of Israel. It stated that goes on in Washington recently Asir debate on sound policy that should be followed towards Syria. Thus, the U.S. infusion, which was attributed to Israel's responsibility for the attack on the stores rockets "ياخونت", the guarantor that serves more or less the two camps.
In contrast, the leak could serve the Pentagon, which opposes all U.S. intervention, because the infusion proves that Israel is able to address the threats against herself, and this precludes the possibility of U.S. intervention in Syria, currently at least.
Generally drew «Maariv» that if the impression created by the line taken by the Pentagon is correct, and that the U.S. impede decision arming opponents and give them a superiority crucial, every attack on a convoy weapon or means of combat advanced dedicated to «Hezbollah» sponsor to happen errors in appreciated by Assad and militarily deterioration. And the Pentagon is not interested in such a situation. However, if one can imagine the existence of certain forums in the United States on deepening confrontation and push Israel and Syria to put the war lead to the removal of Assad. Such a scenario, will acquit the dilemma that Americans are busy to intervene when Israel to work instead of them.

Obama's visit to the region revealed briefed capacity and its ability to balance

Yediot - Nahum Barnia, the
.. And Olmert will leave office despite the fact that the methods used to it somewhat objectionable
Obama's visit to the region revealed briefed capacity and its ability to balance
In airstrip Knesset yesterday put our first big plate of the type used to chart the movement of troops before a major military operation. They put on the board of a large map with the State of Israel plus areas, and a map of the tour route. A military helicopter is one of the model Enechuv (Blackhawk) was parked on the ground, and a second helicopter يسعور waited in the air, both Thriqan through Mahrkathma of the budget of the Department of the Army. Swarms of fundamentalists who provide them with a rose garden and views of the neighboring natural scenes and pairs of young men and women sitting there on the seats for dating before marriage - all stopped their normal movement at once and took active military moves watching with anticipation and curiosity.
Ariel Sharon is the culprit in everything. When Sharon was the head of the opposition was able to host the outgoing Texas Governor George W. Bush. This matter was at the beginning of the 2000 election campaign. The candidate who tops the rows in the Republican Party, John McCain, while Bush was lagging behind. Sharon sat down with him in the Knesset cafeteria and then shaved in a small helicopter on a tour of civilian over groins Aldiktin to the state of Israel. Both described the trip as a very influential event later: Sharon were able to score in the tally obtain the support of the U.S. president, either Bush has cemented through the support through the scenes he saw with his own eyes.
Since then, every Israeli politician tries to repeat that feat. When asked Tzipi Livni even presented to the helicopter Obama خاصرتي Israel Aldiktin accompanied by Gen. even shows the military aspects, Ehud Barak insisted to be that person. Legend says that Mike Herzog, Barak's chief of staff had threatened that they would not يصرفوا helicopter Livni said Barak was not in this round. Herzog says that this is a myth. But the Israeli army helicopters Exchange. Obama will not come alone, also said members of his crew. There are 29 people accompanying him wherever he went and that Obama was in the air they are in the air. During the trip he sat Barack Obama off while the Livni was at his side. Chopper stepped up to the top even be possible to portray the candidate against the backdrop of the Temple Mount (Haram al-Sharif) and from there continued west Amtdd the corridor through Bmoudiein north along the seam until Kfar Saba and Qalqiliya, and from there south along the coastline. Candidate found it difficult in the vulnerability of the existence of difficulties Khasrtin Diktin the State of Israel because he was forced all the time to ensure a balance between Barak and Livni. Blocked in advance that there is a problem he must be crossed: Livni locked in competition for the post of prime minister, Barak and Netanyahu. From here, he has to listen to each and every one of them politicians are aware of such sensitivities. As well as with kindergarten parameters.
In the evening, when he conducted an interview with Obama (interview recently published in "Yediot Ahronot"), said the like imposes fact: "I realize that this election season in Israel. Set of figures that offset would run the competition soon on the prime minister."
Obama rival John McCain was in the country before 4 months in March last victory in the primaries in the Republican Party was saying, but he has not officially announced yet. Considered a working visit visit: He came with two other prominent members of the Senate, Democrat Joe Lieberman and Republican Lindsey Graham, both of which support the elected president of the United States. They traveled to Iraq and then came to Israel. I covered his visit in Sderot. Ehud Barak joined for the trip, but also alone in this time. Army journalists from the Americans, who was waiting for Obama in Sderot, McCain did not wait. The three senators visited the house, which received a blow from a Qassam rocket, and toured in other areas. McCain seemed tired old man. His responses to questions were very balanced degree of appearing not to attention. When stopping Uri Bar-Lev, the commander of the southern police and explained to him the difference between Qassam and Grad McCain's past militarism woke up from the days of the Lebanon war was suddenly knows what he is talking about Bar-Lev.
Obama had prepared a similar path: beta Mahdoma and children cut off his leg. And the Museum of the Qassam rockets. Israel extended its problems and Thompskint in front of her guests: in the helicopter told him Barak battles and victories and how they occupy this region in 1948 and those in 1967 and on the ground Haddthoh defeat sustained when he was walking down the street in Sderot witness citizens flock to the side of the road waving pictures and banners talk about their suffering . It seems that no one has injured بالبلبلة and confusion between Gaadamak and Obama. Free is probably the reason.
In the preliminary round Search officials in the Ministry of Foreign Affairs from the house demolished even feeds guest of him. They did not find. This is apparently a time of calm and found a compromise represented by Omer family's house was demolished by a Qassam rocket in December last. The problem is that the house already demolished now: Family destroyed entirely rebuilt. And the state that will pay for repairs.
Child Usher تويتو who lost his leg carrying a wheelchair to their site. Osher well understood forcibly required of him is the American candidate will say what they asked him to say. Tell him that he hoped to be president of the Peace and then give him a police hat of the type used during the period of disengagement as a gift. Obama will not be wearing a hat: This was not part of the plan. He does not accept the exit plan. Is سينحني iPod and affection towards the child, just as McCain did with the child, which they brought to him during his visit to Sderot four months ago. But that the child cried from fear when approached by McCain. تويتو not cry. Tzipi Livni, knelt at his feet, while Barak was beside him, Avi Dichter, Minister of Internal Security all those surrounded him.
During his visit, McCain more consideration to Lieberman because he felt he understood the psychological the Jews Almetzahmin from around the most of it. But Obama acted differently without emotion and in the correct place.
Israeli politicians interviewed tried to brief him on a series of issues Iran passing through بخوفهم of a rapid U.S. withdrawal from Iraq and the end of Syria, Hezbollah and Hamas. In each of these issues quickly Obama to auditions مستضيفيه same phrases that saved his advisers. This is what happens when a candidate at the height of the campaign: it looks for the inside and not outside. And intellectual focus all his energy on not making mistakes. One correspondence American said "peak yesterday was when he said that both sides should submit concessions to reach an agreement. Actually it's great wisdom. Are right of course, but they also know that the image of Obama surrounded by soldiers Americans enthusiasts It eats food with them at a military base in Iraq, equivalent to more weight than all the words uttered by and Sicolha during his visit.
This image - and other images with the leaders of the world, which appears naturally well-informed and confident of himself and like there was always one of them.
Then during the interview, which it of curved talked about Jews in America thinks its direction. It seemed to me that this was the most important section in our conversations is righteously admitted that there is a problem, but he said there is exaggeration in photographed. According to the polls, will support 65 per cent of Jewish voters and that's good, in my opinion, although it is less than it earned Democratic candidates in the past. "There are those who have adopted a wait and see approach. That we take into account the extent of concern in connection with American Jews of Israel and in the process of foreign policy is generally possible to understand it., But they will come back on Election Day."
We talked about the decisive contribution of the Jews in the civil rights movement that fought for equality of blacks in the fifties and sixties. I talked about the television series "Roots," which described the suffering of blacks who came to America as slaves. Occurred about the fact that the series was very popular in Israel.
Not find tragically basis in the fact that the Jews specifically interact with suspicion with Black candidate for the presidency? I asked him. He preferred to talk about the tragedies and historical similarities between Jewish suffering and the suffering of blacks. "Part of صلتي of the Jewish people based on this historical connection," he said. "We are, and you know the meaning of the Diaspora and the discrimination and suffering. Should bind these common experiences and to be above all through."
At the bottom of the hotel was waiting for the mayor of Jerusalem Uri to Oblinski and the dozens of Jews who want to read the candidate. I remembered the old tale about the leader who led a group tourists from Israel. At the conclusion of Nozha stood next to the door of the bus waiting for tipping. Travelers passed in front of it, one by one, without pay. In the end the latter gave him a plate of money. "Maybe not kill Jesus," the guide said, "but certainly you may Ngstm his life even today."

Hand of God
In 86 World Cup matches before the final resolution of Diego Armando Maradona, the Argentine star of the team the fate of the England team in order to insert it in his hand. Log in Mardin, another goal in the same game later. This was a rare goal in the quality and Argentina triumphed lead to 2.1. In spite of this shift goal that was not the goal disturbing milestone in the history of football. "Idallah" sports analysts used to launch this name it. With all due respect to the machine, so it should make winning games.
State Prosecutor Moshe Lador far from being a monster. I have no doubt he would reject both hands any comparison between the goal that won then and between sacking Ehud Olmert imminent. Although you still have to worry about moves judicial investigation, which resulted from pre-primer with Morris تلانسكي, all of demanding fair game in court and outside. Moshe Lador person, and fair in all respects enter your age is not a goal in the leg or in the head or in the chest. Enter this goal is in his hand. Olmert fought a war against the public prosecutor until this week mouth closed and hands tied. His lawyers are the ones who spoke on his behalf. Special media adviser hired recently joined the group when he wanted to speak warned Minister of Justice and Attorney General of the government, said it would be considered obstruction of the investigation. He reiterated that it is better for him to avoid this calamity included each other Musaúbh. This week at the end of the stage of preliminary in تلانسكي certificate decided to step foot on. In the three newspapers published things uttered by Olmert to "close" or "closed-door talks."
Olmert is convinced he is a victim of arrogance and evil tendencies by officials of the Public Prosecution and the led to ÇĎćŃ. His complaint centered on happenings: forbidden him to talk about the content of the accusations against him. For ÇĎćŃ says Olmert persuaded the court to ratify the forty certificate تلانسكي primaries fake pretexts. Olmert's claim that might affect it was baseless and was based on the order cynical uttered by تلانسكي during interrogation. They photographed the court that he actually threatened.
Lador a mistake and it will not pay the price. Olmert and eventually will be forced to end his term as prime minister. A preliminary تلانسكي in the month of May leaks investigation did do. Olmert's resignation so short is not something new in our country. The machine knew how to overcome such events in the past and will know how to do it now, without a doubt. The problem that officials worry now is the possibility that he has been here excessive use or misuse of power. Mazuz, Lador and their colleagues have not assigned until they are the leaders of the state. And Mghm lies in their ability to link to a fair trial without violating the rules of the game.
I have no doubt that the investigators with Olmert had sped away from the belief that he is guilty. This assumption, even if it is true is a seductive trap: It is tempting to reach the investigator improper conviction. Olmert's what he did - and other people in its various issues - they can do with anybody suspicious in their eyes. This possibility of harmful and even dangerous. In the end there was no danger in the تلانسكي not return here, but on the contrary Vcbhatt that emerged during the interrogation may be involved in a criminal investigation in the United States. So I really appreciate that we shall see him here for a long time in the near time. There may come a day migrate to the country. It will be the last Zionist.