I’m going to keep reposting this from Cougar_w in 2012 until you can all recite it from memory:
These fuckers are going to print hard enough to wake the dead. They’ll print like mo’fos, print like mad men, print like fly pimps. Print until their eyes bleed.
They will print via the swaps, via bank bailouts and mergers, via fixed Treasury yields, via real honest-to-God negative interest rates, via loans to banks on no collateral, via payroll tax reductions, and in the end via actual fiat paper instruments which they might very well drop in bails from actual mutherfucking helicopters.
They will not give two figs what anyone thinks.
Here is why.
Because this is the Goddamned end of it my friend. There is no accounting beyond this point. There will be no history of it. No one to take notes…
View original post 237 more words
Information Courtesy of KSL-TV
In 2011 KSL-TV out of Utah conducted a year-long investigation of the FBI Field Office in Salt Lake City regarding security violations. The alleged violations had been first reported by a special agent in Phoenix and alleged a leak of classified information that could threaten national security. Greg Bretzing, now out of the FBI’s Portland, OR. branch and current Special Agent in Charge of the Malhuer Occupation and LaVoy Finicum shooting was an Assistant Special Agent in Charge at the time of the investigation. The report prompted the Salt Lake City field office to begin re-evaluating its security procedures, according to sources inside the FBI. Security clearance procedures were reassessed to ensure each individual had the appropriate credentials and access.
The story detailed allegations of multiple violations of internal FBI policies, including lax oversight of classified documents stored inside the FBI’s Salt Lake City field office; violations of policies that govern the issuance and use of FBI credentials; the failure to enforce rules that restrict access to areas where classified documents are kept; and concerns that high-level FBI officials may have covered up a formal complaint of security violations. The FBI declined to officially comment on any of the allegations.
Nearly a dozen self-described whistleblowers — including those with strong ties to the FBI’s Salt Lake field office — have come forward to expose potentially serious security breaches, including the removal of classified documents from the office contrary to strict FBI protocol. The whistleblowers were interviewed as part of the yearlong investigation which was able to corroborate much of what each source reported by conducting individual interviews without the knowledge of other sources. The sources provided details of multiple violations of internal FBI policies, including lax oversight of highly classified documents stored inside the Salt Lake City office’s Secret Compartmented Information Facility; the failure to enforce rules that restrict access to areas where classified documents are kept; violations of policies that govern the issuance of FBI credentials; and concerns that high-level FBI officials may have covered up a formal complaint of security violations.
“The actions that Salt Lake City is taking definitely could jeopardize national security,” one FBI source said. “That’s a big problem. That’s a huge problem with catastrophic consequences.””[that] turned that place upside down,” an FBI source said “It [was] pandemonium.” “It’s a huge deal,” another FBI source said. “We’re talking about the pinnacle of law enforcement. And they’ve got corruption inside their own office.”Special Agent in Charge James McTighe and the two assistant special agents in charge, Ken Porter and Greg Bretzing, were said to be visibly concerned. Dan Ward, the special agent in charge of security, was reportedly just as worried.
These individuals spoke on the condition that their identities be protected. “There is a severe problem with the Salt Lake office,” one source told KSL. “None of them will come forward because they know the FBI will come after them with a vengeance.” “People are afraid,” another FBI source said. “People are afraid to say anything. This has been going on for years.”
Sources who worked in Salt Lake field say concerns about security were heightened when the FBI granted high-level credentials to certain non-FBI task force members. In a specific example, all cite the credentials provided to Utah State fraud investigator Shane Tiernan, when he was appointed to an FBI-led task force on health care and then the violent crimes task force. Those sources said Tiernan was given an FBI Secure Access Control System key card, known as a SACS badge. This type of badge is considered a high-level credential, usually allowing 24-hour access to the FBI field office. Sources say however, Tiernan frequently wore his FBI-issued SACS badge and allegedly was allowed to maintain his credentials even after he left public service.
“He had credentials after he was off the task force and during the time he was a civilian employee. He was in another state working as a civilian. When he returned to Utah, he still had those credentials, which is a direct violation of FBI policy,” said a former state investigator who worked with Tiernan. “Shane Tiernan knows about the improprieties of the FBI,” said one source knowledgeable of the FBI probe. “The FBI’s not going to do anything to him. The FBI will never besmirch his name because he’ll turn around and take down the supervisors that he knew.” One such alleged improper practice involves an agent “loaning” an FBI-issued automatic firearm to Tiernan for a period of one year, according to three separate sources who worked with Tiernan at the time.
In light of the controversy surrounding the shooting of LaVoy Finicum and considering the other allegations of impropriety, corruption and political incest and nepotism surrounding key individuals of the Government, Judge Ann Aiken, Judge Stephen Grasty, Sheriff Dave Ward, involved with the Malhuer Occupation, this revelation is troubling in the extreme.
Posted By Becky on Feb 7, 2016 ~ Written by Diane Rodgers
We captured this article from TVOI News – Voice of Idaho before it disappeared! When we went to look for the article we noticed it was in “cache” form only, meaning that someone has taken the website & article down. So we have cut & pasted the article here, word for word, including pics & links, for future reference.
Feb. 7, 2016
About two years ago the Nation watched as Cliven Bundy stood in opposition against an unjust seizure of his ranch and grazing rights by the BLM. The event grew as patriotic Americans responded and came to his aid. The growing protest was ultimately successful in forcing the BLM to turn tail and retreat in face of the growing support that they could no longer control.
Fast forward now to January 2, 2016 and we have a similar situation with the BLM in small town out west called Burns, Oregon.
Since the start of this protest, the MainStream Media (MSM) has been putting forth articles and news reports using such adjectives as “armed militants”, “right wing racists”, “terrorists” or “armed thugs”. Every story I read or listened to was basically the same, always one sided. I follow the belief that there are 3 sides to every story; you could call it her side, his side and the Truth. So when only one side is ever told, it is safe to assume that there is an agenda afoot. An agenda the MSM never speaks about.
So in my quest to get to the Truth, I decided to take an eight day vacation from my full time job to travel 3,000 miles via plane and car to that small town out west call Burns. What you are about to read is exactly what I witnessed and learned from my westward trip. I hope that this article, and those to follow, will help you see through the smokescreen of lies the media, at the bequest of our federal government , have been and are still telling us as the means to controlling the narrative.
Contrary to the MSM stories one finds on the situation in Burns Oregon, the real terrorists in Burns Oregon are not the farmers, ranchers or loggers, nor are they the patriotic first responders.
The farmers, ranchers and loggers are salt of the earth people. They are hardworking folks who bust their butts every day to earn a living as many of us do on a daily basis.
The Patriotic first responders; men and women who have left behind their lives, families, friends and jobs in order to come to Burns to bring attention to the illegal land grabs and the usurpation of our Constitution. These people present no threat to the people of Burns as evidenced by the fact that they frequent the local stores, shops, restaurants and bars without any issues.
At first glance, it is easy to accept the media story that Sheriff David Ward invited the FBI to take over local control of the situation to help protect the citizens of Burns Oregon from a band of “armed occupiers”. But that is for another article. So let’s take a closer look at several key issues that most may not be seeing.
In past decades whenever there was a civil protest it was customary for the local police and maybe the use of the state police to control and insure that the protest remains peaceful. During the protests of the late 60’s when demonstration began turning violent, State’s at the request of their Governors started to call in the National Guard to assist the police in maintaining order and protecting the public.
The question to ask is why didn’t Oregon Governor, Kate Brown, in accordance withTitle 32 of the United States Code, call for the Oregon National Guard to assist in any local police action in response to the “armed occupiers” at the Malheur Refuge. Could it be that Gov. Kate Brown was appointed to her position, not elected by the People of her State, as was Sheriff David Ward of Harney County? Could it be that these appointed officials are beholden, not the good People of Oregon, but strictly to those entities that placed them in their position and power. Another unusual fact is that Special Agent Greg Bretzing in charge of the Malhuer Refuge Occupation happens to be linked to a Nation Security breach along with other fraud and corruption violation, as reported by The Shasta Lantern. Click here to view that article.
But, here in Burns the situation is much different and potentially much more ominous and deadly, as evidenced by the murder of LaVoy Finicum, by agencies yet to be fully disclosed. Authorities acting under the color of law but not in adherence to our laws, first closed down the Burns school system, even though the “armed occupiers”, of which only 4 are now remaining, are located 30 plus miles from downtown Burns in the middle of nowhere. WHY? Why was this necessary?
Road blocks, closures and check points are now common place in in and around Burns. Many of the local people have claimed that they are being randomly pulled over by “authorities” demanding they provide their ID’s for just driving down the street. There are locals being stopped at armed check points and forced out of their vehicle at gun point while their personal belongings and vehicle are thoroughly searched.
One rancher, Thom Davis, related his story in which he had a slowly dying horse on the range that needed to be humanly put down in order to relieve its suffering. The only trouble being that he was not that far from one of these check points and feared that should he have ended the horse’s suffering with a shot to the head, he too would have suffered the same fate. A fate that was later confirmed when he talked to the sheriff.
In another case the authorities actually took their vehicle a quarter mile beyond the check point and made them walk to get it.
Yet, in another case, Alexandra Puckett, described in a facebook post, the treatment and gun point threats from authorities that her husband and his mom encountered while trying only to feed their cows.
These actions taken by authorities have more in common with those of a Military Occupying Force in Iraq or Afghanistan they do with normal police actions here in American. The terrorization of Burns and throughout Harney County is, by no stretch of the imagination, being conducted by the ever increasing militarization of Federal and State agencies. With many reports of in conjunction with an illegal and unconstitutional buildup of a foreign mercenary army of PMC’s, an invading army if you will, acting under the color of law but not in adherence to our laws. Claim as they do that they are FBI, their tactics and use of vehicle void of any US military or alphabet agency marking or insignia’s, and lack of compliance with US Law, even when asked they present no documentation that they are indeed FBI. A video clip of this fact can be seen here.
Additionally, other armored assets from distant counties are in Burns. I ask, is all this really necessary to protect the public from 4 people still at the Refuge located 30 miles away, armed with a few rifles and hand guns, and already contained by authorities so they cannot escape from there. Or is something else going on here?
Further there are claims that Blackhawk helicopters are being stationed at Burns Airport and in the surrounding area. For a link to that report click here.
In a recorded phone call to Major Bomar, Judge Darby explains that the forces present in Burns are most likely under the command and control of the UN and the IMF. In other words, foreign forces acting freely on US soil, a clear violation of our Constitution.
Judge Darby audio click here.
Why, you ask, would foreign PMC’s be doing here on the ground in the middle of nowhere in eastern Oregon, and under whose authorization are they being allowed to operate? Could it be that they are here to seize control of these lands for the mineral rights and related wealth for foreign governments? Well, as usual it’s all about following the money. In this case the money is the mineral wealth that these lands contain.
As most are aware Hillary Clinton has sold our uranium to Russia, for personal gain and power. While China is buying up as much gold as possible, and gold is another mineral the lands out west are still rich in. Could China be laying claim to this gold as collateral for our national debt?
It is time for the People of America to start asking questions of their representatives as to whose authority these foreign forces and here operation under and why none of them are Obeying their Oath to protect and defend the Constitution against all enemies foreign and domestic!
It’s time We The People embrace our differences, differences that make each and every one of us an Individual, Unite in One Voice and Demand a Redress of Grievances to address these issues in a manner that is consistent with the procedures set forth in the US Constitution . Our Founders wrote in the Declaration of Independence :
“That whenever any Form of Government becomes destructive to these ends, it is the Right of the People to alter it, and to institute new Government, laying its foundations on such principles and organizing its powers in such form, as to them shall deem most likely to effect their Safety and Happiness”
Therefore, We have the Constitutional Right and Duty to cast aside an overbearing federal government and build anew, by putting the Power back into the hand of its Rightful Owners…We the People.
To do otherwise plays into their bloody hands.
There has been a lot of conjecture in the past 40 years in patriot circles about the existence of government “round up lists”. Large-scale disaster and war planning exercises, like REX-84 (Readiness Exercise-1984) and Jade Helm 2015, have stimulated endless discourse about whether or not the government maintains a so-called “red list” and “blue list” of people that they deem to be dissidents who they might target for harassment, travel restrictions, or even detention without due process of law. Because any such lists would presumably be developed and updated under the wraps of a security classification and the Need To Know rule, this topic is understandably rife with conjecture, speculation, and even downright fabrication. So, in this essay, I will do my best to restrain my inner John Bircher and just stick to the facts. I’ll simply state the facts and add a bit of well-reasoned extrapolation, based on known technological trends.
The Real Face of FEMA
The centerpiece of all the speculation is the Federal Emergency Management Agency (FEMA). In my estimation, most of the chit chat on the Internet about “secret FEMA camps” is highly sensationalized. Civil internment is probably the lowest priority of any of FEMA’s contingency missions, and some would describe it as an almosthypothetical contingency.
Most Americans don’t realize it, but FEMA’s key mission is not disaster relief to the general public. Instead, their highest priority mission is assuring Continuity of Government (COG) following an external attack or following a widespread disaster that disrupts command, control, communications, and intelligence (C3I) assets and processes. If FEMA’s budget were ever drastically slashed, then the very last of their missions to be de-funded would be COG. In FEMA-speak, the COG part of their mission is listed under “National Continuity Programs”. They prefer to use the term Continuity of Operations (COOP), and that same term is used by the Department of Homeland Security (DHS). These taskings fall under the purview of FEMA’s National Continuity Programs Directorate and are organized per the National Continuity Policy Implementation Plan (NCPIP).
The COG/COOP mission was further clarified in 2007, under the National Security and Homeland Security Presidential Directive (National Security Presidential Directive NSPD 51/Homeland Security Presidential Directive HSPD-20. Therein, the term COG morphed into “Enduring Constitutional Government” (ECG).
A wiki article on NSPD 51 notes: “Conservative activist Jerome Corsi and Marjorie Cohn of the National Lawyers Guild have said that [NSPD 51] is a violation of the Constitution of the United States in that the three branches of government are separate and equal,with no single branch coordinating the others.”
A 2009 document prepared for the transition of the executive branch of government to the incoming Obama administration used the following euphemistic vanilla wording to describe FEMA’s COG/COOP mission:
“FEMA provides continuity services, not only for FEMA, but also for the entire Federal government, across the Nation, for common and asymmetric threats alike. It is essential for FEMA to maintain high-performance continuity services in the form of exercises, planning, standards, training, communications, and resiliency measures.”
In the same briefing binder there are also some more concrete but still slightly obtuse descriptions of FEMA’s COG/COOP responsibilities:
The criticality of continuity programs can be traced to three foundations. First, continuity programs, led by NCP, directly reflect the first of eight National Essential Functions (NEFs), “Ensuring the continued functioning of our form of government under the Constitution….” Second, continuity programs form the foundation of the seven remaining NEFs by ensuring that the government structures are in place to govern and support the economic, defensive, and social well being of the Nation. Third, continuity programs form the foundation of the National Response Framework (NRF), ensuring government structures at each tier (local, State, and Federal) are in place under all circumstances to sustain their essential functions, deliver essential services, and accept the assistance provided under the NRF. When government departments and agencies are inoperable and their continuity programs fail, the NRF will also fail.
NCP is responsible for ensuring Federal, State, local, Tribal, and territorial governments are capable of performing their essential functions during any situations that may disrupt normal operations.
NCP develops, publishes and trains continuity capability through Federal Continuity Directives and Non-Federal Continuity Guidance circulars, planning templates, and instruction for Federal, State, and local governments.
In a subsection, there is also this description:
Mount Weather Emergency Operation Center (MWEOC):
The MWEOC, located in Berryville, Virginia, is a continuity of operations (d) relocation site for several aspects of DHS and FEMA. The facility provides operational space for FEMA and DHS Emergency Relocation Group members to perform Departmental and Agency mission essential functions.
“A Billion Here, and Billion There…”
In recent Federal budgets FEMA’s Disaster Relief Fund has ballooned to around $7 billion per year, but that comes out of a more than $10 billion annual budget. So where is the other $3 billion spent? It’s spent on a whole lot of things, and many of them fall into categories like “administration, training, and interagency liaison”. Even though the big bunkers were built decades ago, still included in FEMA’s budget are many line items that relate to intelligence fusion, “national continuity”, and “continuity of operations”.
When FEMA Administrator Craig Fugate testified before the congressional Subcommittee on Disaster Preparedness about his agency’s 2015 $10.38 billion budget request, he pointed out that the FEMA is now working more closely with the DHS. Another key point that came up in the hearings was that 2015 was the first year that 25% of the agency’s budget was not formally set aside for law enforcement/terrorism prevention.
With its traditionally strong COG/COOP emphasis, FEMA long ago invested manybillions of dollars to ensure continuity of the executive branch of the Federal government. The Mount Weather complex is reportedly just one of several redundant deep underground bunkers. Some of these facilities were developed by other government organizations, partly for the sake of redundancy. Although they have established deep hardened bunker facilities with accommodations for Federal legislators and some Federal judges, their main focus is directed toward sheltering the White House staff and the directors and key staff of all of the Federal law enforcement agencies. Meanwhile, the U.S. military organizations each have their owninfrastructures in place for protecting both their C3I networks and safely housing their general staff and related personnel.
Because of security classifications, it is difficult to know exactly how FEMA’s budget is being spent and how much of that might be directed toward contingency plans for housing of “displaced persons”. A lot could be hidden under that guise. Essentially the only difference between building a temporary city to house natural disaster refugees and one that is built to house detainees is the presence or absence of concertina wire perimeter fences. Parenthetically, I’d be curious to know if FEMA has ever put out Requests for Quotation (RFQs) for the manufacturers of concertina wire or razor wire, as measured in miles. However, here, I’m straying into speculation. So let’s get back to the facts at hand.
The J. Edgar Days
In the late 1930s, the FBI developed lists of individuals on cardstock index cards. One of these was the Custodial Detention Index (CDI), also known as the Custodial Detention List. This list was compiled between 1939 and 1941 under the “Alien Enemy Control” program. According to one published report:
“The Custodial Detention Index was a list of suspects and potential subversives, classified as ‘A’, ‘B’ and ‘C’; the ones classified as ‘A’ were destined to be immediately arrested and interned at the outbreak of war. Category A were leaders of Axis-related organizations, category B were members deemed ‘less dangerous’ and category C were ‘sympathizers’.”
After the United States entered World War 2 in 1941, these card file lists were put into operation. Large numbers of German, Italian, and Japanese nationals were rounded up and questioned. However, a disproportionately large number of Japanese were actually put in long-term detention—including thousands who were U.S. citizens living in coastal areas, ostensibly because the government “didn’t want to break up families.” This was a gross violation of civil rights, but given wartime exigencies it was hardly even questioned by most Americans until after the war was over.
According to research by the Federation of American Scientists (FAS), the FBI’s habit of building card catalogs of people did not end with World War 2. In the 1950s they moved on to building lists of Communist agents, subversives, and their fellow travelers. After the shocking revelations about Julius and Ethel Rosenberg, Claus Fuchs, and other nuclear weapons technology spies, this recordkeeping seemed well-justified.
By the late 1960s, when anti-draft protesters were a big concern for the executive branch, the FBI moved on to develop yet another list (actually a group of lists) called the Administrative Index (ADEX). This was before the FBI computerized their operations, so this was still a paper list on index cards. (It was perhaps later supplemented by Hollerith computer punched cards.) Additions to the ADEX were reportedly suspended in early 1978. But before it was discontinued and moved to their inactive files storage, the ADEX cards had merged several sublists, including the “Agitator Index” and the “Reserve Index”.
Automating The Lists
In the 1980s, following the lead of the early-adopting NSA and Atomic Energy Commission (AEC), the FBI moved into the computing age. Other than a few revelations about REX-84, very little has been revealed about any enemies lists that were developed in the 1980s and 1990s. Even REX-84 itself would have been nothing more than a obscure codename, if it were not for the much publicized Iran-Contra hearings that captivated the American public through what would have otherwise been a boring summer.
The following appears in Wikipedia’s entry on REX-84:
Transcripts from the Iran-Contra Hearings in 1987 record the following dialogue between Congressman Jack Brooks, Oliver North‘s attorney Brendan Sullivanand Senator Daniel Inouye, the Democratic Chair of the joint Senate-House Committee:
[Congressman Jack] Brooks: Colonel North, in your work at the N.S.C. were you not assigned, at one time, to work on plans for the continuity of government in the event of a major disaster?
Brendan Sullivan [North’s counsel, agitatedly]: Mr. Chairman?
[Senator Daniel] Inouye: I believe that question touches upon a highly sensitive and classified area so may I request that you not touch upon that?
Brooks: I was particularly concerned, Mr. Chairman, because I read in Miami papers, and several others, that there had been a plan developed, by that same agency, a contingency plan in the event of emergency, that would suspend the American Constitution. And I was deeply concerned about it and wondered if that was an area in which he had worked. I believe that it was and I wanted to get his confirmation.
Inouye: May I most respectfully request that that matter not be touched upon at this stage. If we wish to get into this, I’m certain arrangements can be made for an executive session.
Closely associated with REX-84 was Inslaw’s Prosecutor’s Management Information System (PROMIS) people-tracking software. For the sake of brevity, I won’t delve into that. But suffice it to say, PROMIS was fairly simplistic old technology that has been supplanted by much more sophisticated database search software.
According to an article written for Salon magazine by Tim Shorrock in 2008, the NSA was the lead agency in developing a comprehensive personalities database called Main Core. This is the code name of a database containing personal and financial data of millions of U.S. citizens who are believed to be “threats to national security”. The Main Core data is compiled from the NSA, FBI, CIA, and other agencies. It is believed that this database (or we can safely assume its successor, under a different name) is still active and growing.
The latest conjecture is that in recent years the Main Core successor program has moved into social media sites, such as Facebook, using them as veritable vacuum cleaners that sweep up personal information. By applying some sophisticated algorithms, the Main Core apparatus determines threat levels and builds extensive “contacts webs” of familial ties and social relationships in an attempt to piece together organizational structures—both formal and informal.
Through a PRISM, Darkly
When taken in the light of the public revelations about the PRISM surveillance systemthat correlates private communications on the Internet, the implications of Main Core now go well beyond just “list keeping”. The presumed fusion of intelligence data that is going on has undoubtedly resulted in the creation of nested and prioritized lists of individuals to be tracked, travel-restricted, questioned, or detained, under a variety of crises.
Given the well-documented flaws in the FAA’s No Fly List, the errors that can be assumed to exist in Main Core’s successor databases could very well lead to the false arrest of hundreds or even thousands of people. Furthermore, if these databases were misused and applied to political reasons rather than legitimate counter-terrorism investigations, then it would open Pandora’s Box for tyrannical abuse.
Again, I discount the claims that there are “FEMA Camps” that have already been specially constructed to keep teeming masses behind razor wire. To the best of my knowledge, all that FEMA has done thusfar is to study and designate existing Federal military reservations as potential detention facilities. But there are almost certainly some very lengthy “round-up” lists of immigrants with ties to terrorist organizations. That in itself is perfectly justifiable, given the nature of 21st Century transnational terrorism. However, I fear that the names of tens of thousands of outspoken native born American citizens with high profiles have been listed in one or more databases as “persons of interest” by various agencies.
The fairly safe presumption of well-established Bad Boy lists that include native bornAmerican citizens troubles me, on several levels. Perhaps my biggest concern is that any such lists represent the intent of Federal officials to impose prior restraint, or worse yet their intent to flag “pre-crime” tendencies of law-abiding American citizens. This sort of segregation and prioritization forms the basis of a future “shopping list” for tyrannical bully boys, in the event of a national crisis. This crisis could be triggered by any number of events, including a natural disaster, a foreign terrorist attack, a domestic terrorist attack, an unattributable or misattributed cyber attack, a banking/equities market panic, a rigged/contested election (or a suspension of elections) leading to a constitutional crisis, et cetera.
If anyone reading this is politically active and is an outspoken champion of personal liberty, then it is probably safe to assume that you are already on some sort of list, at least a “watch list”. You might also be on a cyber black list, targeting you for disinformation/discrediting campaigns or perhaps for DDOS ping attack hacking. (It is no coincidence that DDOS ping floods are more frequently directed at politically outspoken blogs and web sites.) The key question is: what is your priority on those lists? If someone is a high priority for travel restrictions or detention, then their passport would be immediately flagged and they might not have the opportunity to leave the country via conventional means– through normal passport controls.
The recent events at the Malheur Wildlife Refuge in Harney County, Oregon illustrated that quickly removing the leadership of any political organization through targeted arrests can render it impotent or at least mute it in the court of public opinion. Think that through: Leaderless groups with redundant secure means of communication are the wave of the future. Activist groups like the Black Panthers were the 20th Century norm. Groups like Anonymous will be the 21st Century norm. But be aware that the use of social media and non-secure communications can be used by governments to build dossiers or even indictments against political organizers. (Facebook was specifically mentioned several times in the recent Malheur indictments.) It is best to avoid social media entirely, but if you must use it, then choose your words wisely!
As I have written before, it is important that all prepared families keep their passports updated. You should also have a Plan B and a Plan C. If you suspect that you are high on a priority list, then you might need a Von Trapp family (The Sound of Music) walk-out escape plan. If you live near a coastline, then making the acquaintance of a deep sea trawler operator or a blue water yachtsman might be something to put near the top of your “to do” list.
I must urge my readers to not feel buffaloed into silence. If we allow ourselves to be frightened into political inactivity and Gray Man obscurity, then the tyrannical statist opponents of liberty will have won. Silence is tacit consent.
An acquaintance of mine who recently retired from blogging is fond of saying: “Never get on the bus.” I consider that sage advice. Just consider the fact that there are as many unregistered firearms in this country as there are adult citizens. We vastly outnumber those who might someday seek to enslave us. No attempt to round up a large segment of society will be successful if enough people refuse to register their guns, they keep their guns loaded, and they have the willingness to use them. We also have to well in advance commit ourselves to living through the angst of hiding any fellow citizens who come under persecution.
Lastly, we must never lose our vigilance about the encroachment of tyrannical new laws and policies. Take a few minutes to consider the Jews in the Attic Test.
This has been a heavy topic to consider, but I felt strongly convicted that it must be raised. Our liberty depends on it! – JWR
Disclaimers: None of the foregoing is based on any of the briefings or files that I had access to, when I held my TS/SBI security clearance and access to SCI, back in the 1980s and 1990s. Everything contained in this article was compiled from published, open sources. Your mileage may vary. Just avoid any mileage on The Bus.