WWW.SA.I-PDF.INFO
FREE ELECTRONIC LIBRARY - Abstracts, books, theses
 
<< HOME
CONTACTS



Pages:     | 1 |   ...   | 14 | 15 || 17 | 18 |   ...   | 51 |

«BEHOLD A PALE HORSE Milton William Cooper And I looked, and behold a pale horse: and his name that sat upon him was Death, and Hell followed with him. And ...»

-- [ Page 16 ] --

THE BALANCE OF POWER

When our forefathers wrote the Constitution of these United States they provided safeguards against despotism by providing a balance of power. The Constitution was set up to provide clear divisions of Legislative, Judicial, and Executive powers. It was believed that this system would ensure that if one branch got out of hand the other two would act to keep the one in check. This balance of power was predicated upon the assumption that none of the three branches could or would infringe upon the power of the others.

The Constitution is clear on the functions of each of the branches. The Legislative will make the laws. The Judicial will interpret the law. The Executive will decide policy and enforce the law. This, of course, is the simplest of explanations, but this is not a textbook on government. My intent is to acquaint you with simple basics of the balance of power so that you can then understand how it has been subverted.

The Legislature (Congress in the form of the House and Senate) is required to publish the laws that are made, and this is done in the Congres sional Record and the Federal Register. Pending or passed legislation can be obtained by citizens through their Congressmen or from the Government Printing Office. Citizens cannot be held responsible for the law if it is not made available to them.

It is paradoxical that the government body most representative of the American citizen is the one that has been the most easily subverted.

Through PACs, payoffs, pork-barrel politics, professional politicians, Congressmen who are members of secret societies and through greed and fear, our Representatives and Senators quit representing us long ago.

Congress has tremendous powers but fails in most cases to exercise even a token amount. How is it that our Legislature has allowed and at times encouraged the Executive branch to write law? You probably did not know that the President and others in the Executive branch of the government can and do write law. This is done in the form of Presidential Executive orders, National Security Council memos, National Security Decision directives, and National Security directives.

NSC memos were broad policy papers in the days after passage of the National Security Act. NSC memos became narrower and more specific over the years, and the name has varied. Under Kennedy they were called National Security Action Memorandums. President Bush has changed the name to National Security Directives.

There is a tremendous difference between Presidential Executive orders, NSC memos, and National Security Decision directives. Presidential Chapter Five Good-bye USA, Hello New World Order • 111 Executive orders are listed in the Federal Register or Presidential Findings, which are made known to the House and Senate Intelligence Committees.

The most important difference between the Presidential Executive orders and all of the others, no matter what they are called, is that the others do not have to be reported, reviewed, made available to anyone, or even acknowledged that they exist.

There is no oversight whatsoever that could maintain a check on the legality of these National Security directives. The President and others within the Executive branch have used these supersecret directives to skirt the balance of power and write law without anyone's knowledge. Justification of the President's power to write law through Executive orders stems from the failure of the Government to rescind the declaration of martial law during the Civil War. In effect, the United States has been under martial law ever since Lincoln's administration.

These NSDs are powerful, hidden, and dangerous tools. They were prolific during the Reagan administration: over 300 were written, with no more than 50 ever leaking out to undergo public scrutiny. Yet most Americans have never heard of these subversive weapons. They are being used to destroy our Constitution. I believe that everyone should know about this corruption of government.

Congress has turned a blind eye to these abuses of executive power.

At 3:30 a.m. Saturday, August 4,1990, the Senate made it even easier for the Executive branch to subvert the Constitution and may have made George Bush the first American king. At that time on that day, a minority of United States senators, maybe ten at the most, passed Senate Intelligence Authorization Act for Fiscal Year 1991 (S.B. 2834). This bill will fundamentally change our constitutional system and threatens to destroy the very foundations of our great nation. Since attention has been focused upon the Middle East crisis, the public and most Congressmen know absolutely nothing about this bill.

The bill was fraudulently introduced as a reform to prevent future incidents of the abuses brought to light during the Iran-Contra scandal.

Instead of preventing future abuses, however, it virtually authorizes essentially every abuse. The bill was carefully brought to a vote by Senator Sam Nunn in the dead of night when the opposition was gone. It effectively transfers most authority over the United States government directly into the hands of George Bush and thus directly into the hands of the Secret Government.

The President (presently George Bush) was given the power to initiate war, appropriate public funds, define foreign policy goals, and decide what is important to our national security. In "Oversight of Intelligence Ac BEHOLD A PALE HORSE William Cooper





tivities," Tide VII, S.B. 2834 authorizes the following:

Gives the president power to initiate covert actions (this has never before been given to the President); prevents Congress from stopping the President's initiation of covert actions; allows the President to use any federal ''departments, agencies, or entities'' to operate or finance a covert operation; empowers the President to use any other nation or private contractor or person to fund or operate a covert action; redefines covert actions as operations "necessary to support foreign policy objectives of the United States," a definition that is so vague and broad as to be essentially unlimited; for the first time officially claims the right of the United States to secretly interfere in the internal "political, economic, or military affairs" of other countries in direct and flagrant violation of international law; requires that the President prepare and deliver a written finding to the Intelligence committees of the Congress but allows the President to omit "extremely sensitive matters" and authorizes the President to claim executive privilege if Congress asks too many questions.

There are no penalties in the bill for violating any of its provisions, including the provision requiring a finding. Why should there be? This bill has literally handed the power of all the branches of government to the President on a silver platter. President Bush is now truly American King George the First. S.B. 2834 gives Bush the power to use any agency or branch of the government and any appropriated funds from any agency or branch of the government for covert action even if they were never appropriated for that purpose. The bill effectively prevents any oversight by anyone and allows the Executive branch to skirt the law and to escape accountability. This will be done using National Security directives. A few examples of past NSD directives that have come to light will help you

understand the seriousness of the matter. They will be listed in the following paragraphs under the heading of the subject matter of the NSDDs:

NSDD 84: SAFEGUARDING NATIONAL SECURITY INFORMATION [SECRECY], 3/11/83 (Declassified in full). SUBJECT: This directive drastically expands restrictions on government employees' freedom of speech. Those with access to classified information were required to sign a nondisclosure agreement; those with access to a special category of classified information were made to agree to prepublication review of any future writings. The use of polygraphs was authorized. PURPOSE: Prevent disclosure of information that could damage national security. CONSEQUENCES: The polygraph requirement was rescinded due to Congressional opposition. Secrecy restrictions were imposed on more than 4 million government employees and CONTRACTORS for more than fifty executive agencies. Many reporters' contacts were shut down. GovernChapter Five Good-bye USA, Hello New World Order • 113 ment employees' unions and members of Congress sued to protect the rights of whistleblowers, and the Supreme Court recently sent the case back to the district level for review.

Author's Note: NSDD 84 indicates that John Lear, Robert Lazar, Bruce Macabbee, Stanton Friedman, Clifford Stone, and many others may be active government agents. They were all working in government jobs or for government contractors and all of them were subject to this executive order. NSDD 84 was not used to silence them, which seems to indicate that they had executive approval in each and every instance.

NSDD 17: DETERRING CUBAN MODELS/COVERT ACTION IN

NICARAGUA, 11/23/81 (Classified). SUBJECT: The Central Intelligence Agency was given authority to create the contras and "work with foreign governments as appropriate" to undermine the Sandinista government of Nicaragua. PURPOSE: To stop the flow of arms from Cuban and Nicaraguan sources to the Salvadoran rebels. CONSEQUENCES: The C.I.A. was given $19 million to assemble and arm a force of 500 contras to join with 1000 exiles already being trained by Argentina. Scores of operatives arrived in Honduras; arms shipments from Miami began. The contra war was set in motion.

NSDD 77: MANAGEMENT OF PUBLIC DIPLOMACY RELATIVE

TO NATIONAL SECURITY, 1/14/83 (Declassified in full). SUBJECT: This directive set up several planning groups to conduct "public diplomacy activities." It ordered "organizational support for foreign governments and private groups to encourage the growth of democratic political institutions and practices." PURPOSE: To mobilize international and domestic

support for "our national security objectives." CONSEQUENCES:

Created propaganda ministries in the National Security Council, the State Department and the White House that concentrated on, in the words of the NSC staff member in charge of the program, "gluing black hats on the Sandinistas and white hats on UNO" (the contras' United Nicaraguan Opposition). Stories were planted in the press; journalists were pressured.

The General Accounting Office later found that these activities violated the law banning "covert propaganda" inside the United States. How many other covert propaganda programs do you think are operating against the American Citizens? I can assure you that there are many more than you would ever believe.

NSDD 138: INTERNATIONAL TERRORISM, 4/3/84 (Classified).

SUBJECT: This directive endorsed the principle of preemptive strikes and retaliatory raids against terrorists and called on 26 Federal agencies to recommend specific measures to combat terrorism. PURPOSE: To lessen 114 • BEHOLD A PALE HORSE William Cooper international terrorism and free U.S. hostages in Lebanon. While this NSD directive pretends to be concerned about international terrorism, it is really a thinly disguised authorization of preemptive strikes and retaliatory raids against patriots in this country. When FEMA is activated, patriots will be rounded up in the dead of night, most likely on a national holiday such as Thanksgiving. Government agents and law-enforcement officers in every city across the nation have received antiterrorist training under this NSDD

directive, and I can assure you the target is patriots. CONSEQUENCES:

Set up the Terrorist Incident Working Group under North in the NSC. Its first major action was the interception and capture of the Achille Lauro hijackers, which gave North's career an important boost.

Either NSDD 138 or a subsequent NSD directive on terrorism authorized the training of three Lebanese units for preemptive strikes.

When problems arose, Director of Central Intelligence William Casey took that operation off the books and enlisted Saudi Arabian help in an attempt to assassinate the head of Hezbollah. A resulting car bombing killed about eighty in Beirut; Sheik Fadlallah, the target was unhurt. The U.S. military, along with civilian law-enforcement teams, conducted joint antiterrorist training across America. To allay public fears the participants wore civilian clothing.

NSD directives have become the de facto legislative vehicle of the national security state. It has become known through the research of Susan Fitzgerald, a research consultant at the Fund for Constitutional Government in Washington who has collected declassified NSD directives, that many were released without the White House letterhead at the top of the page and without the President's signature at the bottom. This, she speculates, is to conceal the fact that the signatures on some of them would reveal that they had been made by autopen, not by Ronald Reagan's own hand.

That should give you a taste of what we are up against. Please understand that virtually all but a very few NSD directives still remain classified, and unless the public forces disclosure their effect will probably never be known.

Somewhere within the volumes of secret NSD directives there is a plan to suspend the Constitution of the United States of America. The existence of this plan surfaced during the Iran-Contra hearings. Congressman Jack Brooks (D), Texas, attempted to bring it into the open. When he asked Col.

North directly if North had ever helped draft a plan to suspend the Constitution, Brooks was silenced by the committee chairman Senator Daniel K. Inouye (D), Hawaii. Senator Inouye stated that the subject dealt with national security, and any questions regarding the matter could be brought up during a closed-door session. We never learned the outcome. I would Chapter Five Good-bye USA, Hello New World Order • 115 like to know who gave anyone, in any branch of government, with any title, the right to suspend the Constitution at any time, for any reason, under any conditions?

I believe the plan to suspend the Constitution is directly tied to the underground facility called Mount Weather and to the Federal Emergency Management Agency (FEMA). Mount Weather is so shrouded in secrecy that 99.9% of Americans have never heard of it. FEMA, however, is another story. Remember Hurricane Hugo? Remember the federal agency (FEMA) that was sent to handle the emergency and was thrown out by the citizens because of gross incompetence? FEMA was incompetent, because "emergency management" is just a guise for its real purpose, which is to take over local, state, and federal government in case of a national emergency. The only way FEMA could do such a thing is if the Constitution Were suspended and martial law were to be declared. Therefore its very existence is proof positive that a plan to suspend the Constitution does in fact exist.

MOUNT WEATHER

Just outside of a sleepy little town called Bluemont, Virginia, about 46 miles west of Washington D.C., is an area of wilderness covering what has been called the toughest granite rock in the eastern United States. The area is surrounded by signs marked "Restricted Area" and "This installation has been declared a restricted area....Unauthorized entry is prohibited."

Other signs state: "All persons and vehicles entering hereon are liable to search. Photographing, making notes, drawings, maps or graphic representations of this area or its activities is prohibited. Such material found in the possession of unauthorized persons will be confiscated. Internal Security Act of 1950." The installation is beneath a mountain and its name is the Western Virginia Office of Controlled Conflict Operations. Its nickname is Mount Weather. It was ordered to be built by the Federal Civil Defense Administration, which is now the Federal Preparedness Agency.

Mount Weather was designed in the early '50s as part of a civil defense program to house and protect the Executive branch of the Federal government. The official name was "The Continuity of Government Program."



Pages:     | 1 |   ...   | 14 | 15 || 17 | 18 |   ...   | 51 |


Similar works:

«Fragmentation of Authority and Privatization of the State: From Gorbachev to Yeltsin VLADIMIR BROVKIN I n 1991, when the Soviet Union collapsed, state authority in Russia collapsed with it. State authority was associated with violence, the KGB, and party privileges. Discredited and despised, it was cast out and replaced not by the rule of law but by liberation from restraint. As happens in most revolutions, fear of the state evaporated. Instead of harmony and democracy, what ensued was a...»

«SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 275 [Release Nos. 3458264; IC-28345; IA-2763 File No. S7-22-08] RIN 3235-AJ45 Commission Guidance Regarding the Duties and Responsibilities of Investment Company Boards of Directors with Respect to Investment Adviser Portfolio Trading Practices AGENCY: Securities and Exchange Commission. ACTION: Proposed guidance; request for comment. SUMMARY: The Securities and Exchange Commission is publishing for comment this proposed guidance to boards of...»

«37 CHAPTER MARCH, 2012 Plea Bargaining and Guilty Pleas Written by William Robinson (First Edition) and Arthur Leavens (this revision) * Table of Contents: PART I: PLEA BARGAINING §37.1 Constitutionality of Plea Bargaining §37.2 Appropriate Subjects for Plea Bargaining §37.3 Discussions with and Authorization by the Client §37.4 Discussions with the Prosecutor A. One Prosecutor Binds Another B. Discussions Are Privileged C. Coercive Tactics by the Prosecutor D. Strategic Considerations...»

«Testimony of Norman C. Bay Director, Office of Enforcement Federal Energy Regulatory Commission Before the Committee on Banking Financial Institutions and Consumer Protection Subcommittee United States Senate January 15, 2014 Mr. Chairman, Ranking Member Toomey, and members of the Subcommittee: Thank you for inviting me to testify today. My name is Norman Bay. I am the Director of the Office of Enforcement of the Federal Energy Regulatory Commission (FERC or the Commission). I appear before you...»

«Research in Action: Ethnohistory of Puna: Davianna Pōmaikaʻi McGregor Praxis: exercise or practice of an art, science or skill. Praxis distinguishes Ethnic Studies from the long-established disciplines of the social sciences. Ethnic Studies faculty are committed to placing research at the service of the community and challenging students to examine and analyze contemporary issues of concern to Hawaiʻi’s ethnic communities from diverse perspectives. The clash between the beliefs, customs,...»

«Foundations of Canonical Update Support for Closed Database Views † Stephen J. Hegner Department of Computer Science and Electrical Engineering Votey Building University of Vermont Burlington, VT 05405 U.S.A. Telephone: (802)656-3330 Internet: hegner@uvm.edu UUCP:.{!uunet}!uvm-gen!hegner Abstract A closed view of a database schema is one which is totally encapsulated. Insofar as the user is concerned, the view is the database schema. The rest of the database system is not visible through the...»

«Boys and Girls by Alice Munro My father was a fox farmer. That is, he raised silver foxes, in pens; and in the fall and early winter, when their fur was prime, he killed them and skinned them and sold their pelts to the Hudson's Bay Company or the Montreal Fur Traders. These companies supplied us with heroic calendars to hang, one on each side of the kitchen door. Against a background of cold blue sky and black pine forests and treacherous northern rivers, plumed adventures planted the flags of...»

«A peer-reviewed open-access journal ZooKeys 7: 1-53 (2009) The millipede family Haplodesmidae 1 RESEARCH ARTICLE doi: 10.3897/zookeys.7.117 www.pensoftonline.net/zookeys Launched to accelerate biodiversity research Review of the millipede family Haplodesmidae Cook, 1895, with descriptions of some new or poorly-known species (Diplopoda, Polydesmida) Sergei I. Golovatch 1, †, Jean-Jacques Geoffroy 2, ‡, Jean-Paul Mauriès 3, §, Didier VandenSpiegel 4,| 1 Institute for Problems of Ecology and...»

«CH A PT ER 11 A methodological toolbox for exploring collections of textually annotated georeferenced photographs Ross S. Purves* and William A. Mackaness† *Department of Geography, University of Zurich, Switzerland, ross.purves@geo.uzh.ch School of Geosciences, University of Edinburgh, UK † Abstract This chapter provides a brief overview of some methodologies used to extract meaning from the analysis of geotagged images. Broadly they draw from research in natural language processing and...»

«THE GRICEAN COOPERATIVE PRINCIPLE: FLOUTING AND HEDGING IN THE CONVERSATIONS IN JOSEPH CONRAD’S THE SECRET AGENT By: M.G. Sri Ningsih Abstract The Cooperative Principle (CP) proposed by Grice states that a speaker should be cooperative by making the conversational contribution as required. In CP Grice proposes four conversational maxims : Quantity, Quality, Relation, and Manner. Speakers sometimes flout the conversational maxims, so do characters in The Secret Agent. The flouting and hedging...»

«No. 15-674 In the Supreme Court of the United States UNITED STATES OF AMERICA, ET AL., PETITIONERS v. STATES OF TEXAS, ALABAMA, ARIZONA, ARKANSAS, FLORIDA, GEORGIA, IDAHO, INDIANA, KANSAS, LOUISIANA, MONTANA, NEBRASKA, NEVADA, NORTH DAKOTA, OHIO, OKLAHOMA, SOUTH CAROLINA, SOUTH DAKOTA, TENNESSEE, UTAH, WEST VIRGINIA, WISCONSIN; PAUL R. LEPAGE, GOVERNOR, STATE OF MAINE; PATRICK L. MCCRORY, GOVERNOR, STATE OF NORTH CAROLINA; C.L. “BUTCH” OTTER, GOVERNOR, STATE OF IDAHO; PHIL BRYANT, GOVERNOR,...»

«From the Classroom Moving Poems: Kinesthetic Learning in the Literature Classroom Virginia Zimmerman Stressed and unstressed syllables pounded in my head as I struggled to plan the lesson on meter for my introduction to poetry. Meter is so difficult to teach effectively that many English professors bypass it altogether. Those of us who persist rely on triple-spaced short poems cluttered with dashes and slashes; we might lead our students in a round of exaggerated chanting or measured clapping....»





 
<<  HOME   |    CONTACTS
2017 www.sa.i-pdf.info - Abstracts, books, theses

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.