Lobby To Have Theresa May Excommunicated

Theresa May,

Your behavior patterns are shameful and corrupt.

Your decision to be ignorant concerning Nigeria and her issues with an anti education terrorist screams louder than you are able to muffle the sound. The Julia Clark Organization and the Culling Corruption Campaign finds you abhorrent.

A lobby to have you removed from the Church of England is in order.


Julia Clark

Research information and lobby actions will be updated to this page:

First contact:


Sent letter see above

Thank you for your message, which has been received. It will be read very soon.
Home Office enquiries

If your enquiry is regarding the Home Office then please write to:

Rt Hon Theresa May MP
Home Secretary
2 Marsham Street


Telephone number: 020 7035 4848

Telephone number for immigration enquiries: 0870 606 7766


Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit ‘Radicalizers’

Thanks Pip!

Wait a second, how is this a bad thing? Exposing people who are hypocrits is wrong now? Especially if they\’re violent religious fanatics?

The \”spying on citizens without a warrant\” is bad. The \”spying on allies\” isn\’t very nice, but that\’s something civilizations have done since forever. But \”discrediting crazies by showing they engage in the same behavior they claim to despise\”? That\’s uhm, called journalism when the mainstream press does it, isn\’t it?

And before you go, well, how\’d you like it if YOUR porn habits were exposed, I\’d say, I\’d be a little embarrassed, probably, but I don\’t view anything that I couldn\’t defend, nor do I do so with anything I publically denounce. Trying to keep this from becoming TMI, but I don\’t secretly look at stuff I say I\’m disgusted with. Nor am I a violent threat to the lives of others.

All this disclosure has done is damaged another tool against maniacs, with no real benefit beyond that. Disclosing something like this is what makes people brand Snowden as a traitor instead of a savior. Nice Job Breaking It Hero.

(Running out of words here so my own thoughts on him are a bit mixed. Him revealing that the NSA was breaking laws and morals? Good. This? Stupid.)

via Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit ‘Radicalizers’.

Chelsea Manning | Thanksgiving Gratitude With Michelle Obama, Rick Warren and More | TIME.com

dare to ask probing, even dangerous, questions.

Such people are often nameless and humble, yet no less courageous. Whether carpenters of welders; retail clerks or bank managers; artists or lawyers, they dare to ask tough questions, and seek out the truth, even when the answers they find might not be easy to live with.

I’m also grateful for having social and human justice pioneers who lead through action, and by example, as opposed to directing or commanding other people to take action. Often, the achievements of such people transcend political, cultural, and generational boundaries. Unfortunately, such remarkable people often risk their reputations, their livelihood, and, all too often, even their lives.

via Chelsea Manning | Thanksgiving Gratitude With Michelle Obama, Rick Warren and More | TIME.com.

Backdoor Breach –

November 22, 2013

Report: Backdoor evidence observed:

I received an email yesterday from Team [redacted]:

We are currently investigating a security breach whereby some user’s login details may have been compromised. We currently have no indication that there has been any unauthorised activity on your account. Protecting our customer’s accounts is important to us.

The current investigation relates to an event that occurred in January 2013, upon which we advised you to change your password. Our records indicate that your password was reset based upon our prior notification to you.

I replied:

I did not receive any notice in Jan 2013 to change my password. 

They replied:

Thank you for contacting us.

We are sorry to hear about this problem. There are 2 possible reasons why
you may not be receiving some of our emails:

I did double check and responded. The incident ticket is still open and under investigation.

I had been suspecting breach of my box for a week or so. However, the above correspondence suggests I have had a backdoor on this box since January 2013. Reasons being I did not receive the security breach mail in January 2013. I use different passwords for all sites. None of them are recorded in digital form other than at the site itself. I do occasionally check the records of what Ips have connected to under my passwords and user names. I had not noted any unusual traffic. I have experienced low level events that caused me to check IP usage out of normal sequence. I did not note anything out of place.

I have been noticing unusual behavior from certain programs, such as [redacted] [redacted] and my spell check program connected to browser as if the dictionaries had been altered.

Maybe, a month or so ago I did have to wipe/reset my phone because it had become almost unusable. It would take a screen-shot when I pressed the right hand side button instead of coming out of sleep. It had gotten so bad I could not answer calls. – Note yesterday I experienced the screen-shot malfunction again. The only application I have installed other than what was issued with the phone is from June Fabrics. They will be notified of this security anomaly.

Last night I discussed the [redacted] breach, the anomalies on my box and phone, and other events that were disruptive financially and physically.

I pointed out that the backdoor I suspected and anomalies I am experiencing is related to a profile that sent a friend request to my facebook where by as I made an announcement to my contact list and specifically to friends and family that.

Important note: I went to find the post on my facebook profile to include it in this report. I could not locate it. I have requested my niece to review her time line for it. I recall she liked the post.

However, at this writing the post warning my friends and family that a known stalker of mine had made contact is missing from my timeline on facebook. The known stalker profile mentioned in the missing post is the same profile that I mentioned to [redacted] noting that the known stalker’s MO was backdooring box(es).

This morning when checking [redacted] [redacted] admin page I noticed that the some of the notifications had been marked as read. My computer would not let me take a screen shot.

I made a post on facebook about the backdoor. The [redacted] I use, which is [redacted] to the computer, vibrated, switched screens, and brought up the settings bar from the bottom. In other words, it appeared to be disengaging from remote after I had made my post about the backdoor.

When I could not take a screen shot, I used my camera phone. When using the camera on the phone twice the camera on the phone shut down. Nevertheless, I got the photos of the screen showing notification being one hour old and already read when I had just woken from over a four hour sleep.

Other anomalies I have noticed is with the spell check feature it appears as if it selectively works or in other words in real time words that I am not spelling correctly are not being allowed to be corrected. I can click on the corrected word but the incorrect word will not correct. This appears to be around words that are common and I should know, and if the word is uncommon or very difficult it will correct, then the next word would not. This has been going on for over two weeks. It is not consistent, suggesting that it is real time manipulation. This occurs in [redacted] and the browser spellcheck.

Also, in the [redacted] I have noticed that at times spell check and grammar check will not work at all. Though not witnessed as often, it does appear to happen when I am working on controversial documents.

I checked facebooks machines that are logged in under me. There was an extra one that appeared to be from the same location as me. I do not know if this is unusual because such has been usual for me in the past.

Also, when updating adobe recently it tried to update my box as a Linux OS box. I do not use, nor have downloaded, nor to my knowledge have Linux OS.

End Report.

Julia Clark

This slideshow requires JavaScript.


Update Nov 23 2013

I have an obscure blog at blogger.com  Generally it is poems, free audio ebooks, and stichomancy. Nonsensical stuff at best. Emotive stuff. I put it at blogger.com to make it difficult to lose. As can be noted, my emotive blogs have repeatedly been subject to harassment, hostile takeover, and the likes.

I went to write stichomancy this morning and noted that a linux box had an interest in one journal entry. http://01001010s.blogspot.com/2013/06/todays-stichomancy_24.html

This slideshow requires JavaScript.

I am fortunate they were the only visitors. Usually I have somewhat high traffic there.

Which brings me to another issue that needs documentation.  Dominic Morris noted that JuliaClark.org was was coming up as internl server error, which would be kind of strange because all the server does is a redirect wordpress.com .

Fullscreen capture 11232013 64637 AM.bmp






The screen capture above is for the month of November 2013

Twilight of the Phreaks: The Fates of the 10 Best Early Hackers | Motherboard

Before Anonymous and LulzSec, before warez bulletin boards, before logins and passwords, before everything, there was phreaking.

The first waves of proto-hackers emerged in the 1960s, figuring out how to scam and surf the only truly massive electronic network in existence at the time: the telephone system.

For decades, pranksters, nerds, and anarchists shared the latest ways to fool AT&T’s automated systems into giving them free calls and unapproved access. They gave themselves weird nicknames and rarely met in person. Until well into the 1980s, waves of system-crackers built little DIY devices (“blue boxes”) that could emulate phone-company signaling tones. It was all incredibly illegal and didn’t come with any video tutorials.

via Twilight of the Phreaks: The Fates of the 10 Best Early Hackers | Motherboard.

Yahoo et the baba!

Deutsch: Logo von Yahoo

Deutsch: Logo von Yahoo (Photo credit: Wikipedia)






Editor’s note from the founder , Julia Clark.


I was a power user on Yahoo! I had the Power User awards and a full robust 360 yahoo site. . . Until I could not lie in the face of facts. Yahoo’s data bases were as wide open for executive exploitation as Sony’s were. And they were extremely exploited.


The abuse I and The JC Organization suffered while at 360, flicker, and ymail was extensive and dangerous.  That left irreparable deep scars on the Organization.


During one particularly bad event the person involved said to me,”You are so very polite.” as I was using 5 computer to thwart his attack. My politeness was lost at the hands of Yahoo goons. That young Libyan man though did  join the culling Corruption Campaign that day. He shared with me a lot of information about how money and operations were working at that time in Libya.


It took over 2 years to get fully away from Yahoo, not including the attempt to keep the domain name JuliaClark.org by a technical glitch that was not reportable to ICANN.


I had little faith in Marrissa when she took helm at Yahoo. She seemed all they typical high level f’loon with glitter in her eyes. I think she was . But she has attempted repair of Yahoo’s security, however, I think she is still trying to deal with the the vile underboss and boss that has systematically exploited Yahoo’s user data base.












MI6 spy Gareth Williams death ‘probably an accident’, police say

body was found in a padlocked sports bag, was probably an accident, police have said.

via BBC News – MI6 spy Gareth Williams death ‘probably an accident’, police say.

A grim story of lies, corruption, and deceit in the death of a potential whistleblower.


No, Mr. President I Cannot.

I respectfully decline your invitations. I have been declining them for a few months. I cannot comfortably associate with someone who is not addressing corruption in a vigorous way.

I do understand you must choose your battles.

In addition, if I had to choose between whistleblowers and health care for a nation. I would choose health care. I realize that unless health care becomes detached from corporate employment that people, including potential whistleblowers of corporate crimes, are strongly motivated to tow the corporate line. I also understand the human toll of not having heath care as a nation.

Nevertheless,  I have health care. I had to choose between health and wealth in 2002. And with such, I am less desperate for heath care. And thus I am dedicated to the cause of addressing corruption in government, contractors, conglomerates, and the likes.

Thus I respectfully decline associations with you due to my position and your unfortunate position of choice. I do not stand against you, but I cannot stand with you.

Thank you for selecting me as one of the first groups to be added to your G+ circles. Thank you for the opportunity to serve as part of the Rural Obama team. Thank you for your alliance. Thank you for your service.

I wish you well and I hope I can be of service to you again one day.

Until that day, God spede.


Julia Clark

Screen Capture from the laptop of Julia Clark. Founder of the Julia Clark Organization

Screen Capture from the laptop of Julia Clark. Founder of the Julia Clark Organization



Good morning. Thank you for this opportunity. My name is Jeremy Hammond and I’m here to be sentenced for hacking activities carried out during my involvement with Anonymous. I have been locked up at MCC for the past 20 months and have had a lot of time to think about how I would explain my actions.

Before I begin, I want to take a moment to recognize the work of the people who have supported me. I want to thank all the lawyers and others who worked on my case: Elizabeth Fink, Susan Kellman, Sarah Kunstler, Emily Kunstler, Margaret Kunstler, and Grainne O’Neill. I also want to thank the National Lawyers Guild, the Jeremy Hammond Defense Committee and Support Network, Free Anons, the Anonymous Solidarity Network, Anarchist Black Cross, and all others who have helped me by writing a letter of support, sending me letters, attending my court dates, and spreading the word about my case. I also want to shout out my brothers and sisters behind bars and those who are still out there fighting the power.

The acts of civil disobedience and direct action that I am being sentenced for today are in line with the principles of community and equality that have guided my life. I hacked into dozens of high profile corporations and government institutions, understanding very clearly that what I was doing was against the law, and that my actions could land me back in federal prison. But I felt that I had an obligation to use my skills to expose and confront injustice—and to bring the truth to light.

Could I have achieved the same goals through legal means? I have tried everything from voting petitions to peaceful protest and have found that those in power do not want the truth to be exposed. When we speak truth to power we are ignored at best and brutally suppressed at worst. We are confronting a power structure that does not respect its own system of checks and balances, never mind the rights of it’s own citizens or the international community.

My introduction to politics was when George W. Bush stole the Presidential election in 2000, then took advantage of the waves of racism and patriotism after 9/11 to launch unprovoked imperialist wars against Iraq and Afghanistan. I took to the streets in protest naively believing our voices would be heard in Washington and we could stop the war. Instead, we were labeled as traitors, beaten, and arrested.

I have been arrested for numerous acts of civil disobedience on the streets of Chicago, but it wasn’t until 2005 that I used my computer skills to break the law in political protest. I was arrested by the FBI for hacking into the computer systems of a right-wing, pro-war group called Protest Warrior, an organization that sold racist t-shirts on their website and harassed anti-war groups. I was charged under the Computer Fraud and Abuse Act, and the “intended loss” in my case was arbitrarily calculated by multiplying the 5000 credit cards in Protest Warrior’s database by $500, resulting in a total of $2.5 million.My sentencing guidelines were calculated on the basis of this “loss,” even though not a single credit card was used or distributed – by me or anyone else. I was sentenced to two years in prison.

While in prison I have seen for myself the ugly reality of how the criminal justice system destroys the lives of the millions of people held captive behind bars. The experience solidified my opposition to repressive forms of power and the importance of standing up for what you believe.

When I was released, I was eager to continue my involvement in struggles for social change. I didn’t want to go back to prison, so I focused on above-ground community organizing. But over time, I became frustrated with the limitations, of peaceful protest, seeing it as reformist and ineffective. The Obama administration continued the wars in Iraq and Afghanistan, escalated the use of drones, and failed to close Guantanamo Bay.

Around this time, I was following the work of groups like Wikileaks and Anonymous. It was very inspiring to see the ideas of hactivism coming to fruition. I was particularly moved by the heroic actions of Chelsea Manning, who had exposed the atrocities committed by U.S. forces in Iraq and Afghanistan. She took an enormous personal risk to leak this information – believing that the public had a right to know and hoping that her disclosures would be a positive step to end these abuses. It is heart-wrenching to hear about her cruel treatment in military lockup.

I thought long and hard about choosing this path again. I had to ask myself, if Chelsea Manning fell into the abysmal nightmare of prison fighting for the truth, could I in good conscience do any less, if I was able? I thought the best way to demonstrate solidarity was to continue the work of exposing and confronting corruption.

I was drawn to Anonymous because I believe in autonomous, decentralized direct action. At the time Anonymous was involved in operations in support of the Arab Spring uprisings, against censorship, and in defense of Wikileaks. I had a lot to contribute, including technical skills, and how to better articulate ideas and goals. It was an exciting time – the birth of a digital dissent movement, where the definitions and capabilities of hacktivism were being shaped.

I was especially interested in the work of the hackers of LulzSec who were breaking into some significant targets and becoming increasingly political. Around this time, I first started talking to Sabu, who was very open about the hacks he supposedly committed, and was encouraging hackers to unite and attack major government and corporate systems under the banner of Anti Security. But very early in my involvement, the other Lulzsec hackers were arrested, leaving me to break into systems and write press releases. Later, I would learn that Sabu had been the first one arrested, and that the entire time I was talking to him he was an FBI informant.

Anonymous was also involved in the early stages of Occupy Wall Street. I was regularly participating on the streets as part of Occupy Chicago and was very excited to see a worldwide mass movement against the injustices of capitalism and racism. In several short months, the “Occupations” came to an end, closed by police crackdowns and mass arrests of protestors who were kicked out of their own public parks. The repression of Anonymous and the Occupy Movement set the tone for Antisec in the following months – the majority of our hacks against police targets were in retaliation for the arrests of our comrades.

I targeted law enforcement systems because of the racism and inequality with which the criminal law is enforced. I targeted the manufacturers and distributors of military and police equipment who profit from weaponry used to advance U.S. political and economic interests abroad and to repress people at home. I targeted information security firms because they work in secret to protect government and corporate interests at the expense of individual rights, undermining and discrediting activists, journalists and other truth seekers, and spreading disinformation.

I had never even heard of Stratfor until Sabu brought it to my attention. Sabu was encouraging people to invade systems, and helping to strategize and facilitate attacks. He even provided me with vulnerabilities of targets passed on by other hackers, so it came as a great surprise when I learned that Sabu had been working with the FBI the entire time.

On December 4, 2011, Sabu was approached by another hacker who had already broken into Stratfor’s credit card database. Sabu, under the watchful eye of his government handlers, then brought the hack to Antisec by inviting this hacker to our private chatroom, where he supplied download links to the full credit card database as well as the initial vulnerability access point to Stratfor’s systems.

I spent some time researching Stratfor and reviewing the information we were given, and decided that their activities and client base made them a deserving target. I did find it ironic that Stratfor’s wealthy and powerful customer base had their credit cards used to donate to humanitarian organizations, but my main role in the attack was to retrieve Stratfor’s private email spools which is where all the dirty secrets are typically found.

It took me more than a week to gain further access into Stratfor’s internal systems, but I eventually broke into their mail server. There was so much information, we needed several servers of our own in order to transfer the emails. Sabu, who was involved with the operation at every step, offered a server, which was provided and monitored by the FBI. Over the next weeks, the emails were transferred, the credit cards were used for donations, and Stratfor’s systems were defaced and destroyed. Why the FBI would introduce us to the hacker who found the initial vulnerability and allow this hack to continue remains a mystery.

As a result of the Stratfor hack, some of the dangers of the unregulated private intelligence industry are now known. It has been revealed through Wikileaks and other journalists around the world that Stratfor maintained a worldwide network of informants that they used to engage in intrusive and possibly illegal surveillance activities on behalf of large multinational corporations.

After Stratfor, I continued to break into other targets, using a powerful “zero day exploit” allowing me administrator access to systems running the popular Plesk webhosting platform. Sabu asked me many times for access to this exploit, which I refused to give him. Without his own independent access, Sabu continued to supply me with lists of vulnerable targets. I broke into numerous websites he supplied, uploaded the stolen email accounts and databases onto Sabu’s FBI server, and handed over passwords and backdoors that enabled Sabu (and, by extension, his FBI handlers) to control these targets.

These intrusions, all of which were suggested by Sabu while cooperating with the FBI, affected thousands of domain names and consisted largely of foreign government websites, including those of XXXXXXX, XXXXXXXX, XXXX, XXXXXX, XXXXX, XXXXXXXX, XXXXXXX and theXXXXXX XXXXXXX. In one instance, Sabu and I provided access information to hackers who went on to deface and destroy many government websites in XXXXXX. I don’t know how other information I provided to him may have been used, but I think the government’s collection and use of this data needs to be investigated.

jeremy hammond hearing
Sketch from inside Judge Preska’s courtroom by Molly Crabapple

The government celebrates my conviction and imprisonment, hoping that it will close the door on the full story. I took responsibility for my actions, by pleading guilty, but when will the government be made to answer for its crimes?

The U.S. hypes the threat of hackers in order to justify the multi billion dollar cyber security industrial complex, but it is also responsible for the same conduct it aggressively prosecutes and claims to work to prevent. The hypocrisy of “law and order” and the injustices caused by capitalism cannot be cured by institutional reform but through civil disobedience and direct action. Yes I broke the law, but I believe that sometimes laws must be broken in order to make room for change.

In the immortal word of Frederick Douglas, “Power concedes nothing without a demand. It never did and it never will. Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them, and these will continue till they are resisted with either words or blows, or both. The limits of tyrants are prescribed by the endurance of those whom they oppress.”

This is not to say that I do not have any regrets. I realize that I released the personal information of innocent people who had nothing to do with the operations of the institutions I targeted. I apologize for the release of data that was harmful to individuals and irrelevant to my goals. I believe in the individual right to privacy – from government surveillance, and from actors like myself, and I appreciate the irony of my own involvement in the trampling of these rights. I am committed to working to make this world a better place for all of us. I still believe in the importance of hactivism as a form of civil disobedience, but it is time for me to move on to other ways of seeking change. My time in prison has taken a toll on my family, friends, and community. I know I am needed at home. I recognize that 7 years ago I stood before a different federal judge, facing similar charges, but this does not lessen the sincerity of what I say to you today.

It has taken a lot for me to write this, to explain my actions, knowing that doing so — honestly — could cost me more years of my life in prison. I am aware that I could get as many as 10 years, but I hope that I do not, as I believe there is so much work to be done

VIA http://www.sparrowmedia.net/2013/11/jeremy-hammond-sentence/

Secret TPP treaty IP Chapter: Advanced text with negotiation positions for all 12 nations

Today, 13 November 2013, WikiLeaks released the secret negotiated draft text for the entire TPP (Trans-Pacific Partnership) Intellectual Property Rights Chapter. The TPP is the largest-ever economic treaty, encompassing nations representing more than 40 per cent of the world’s GDP. The WikiLeaks release of the text comes ahead of the decisive TPP Chief Negotiators summit in Salt Lake City, Utah, on 19-24 November 2013. The chapter published by WikiLeaks is perhaps the most controversial chapter of the TPP due to its wide-ranging effects on medicines, publishers, internet services, civil liberties and biological patents. Significantly, the released text includes the negotiation positions and disagreements between all 12 prospective member states.

The TPP is the forerunner to the equally secret US-EU pact TTIP (Transatlantic Trade and Investment Partnership), for which President Obama initiated US-EU negotiations in January 2013. Together, the TPP and TTIP will cover more than 60 per cent of global GDP. Both pacts exclude China.

Since the beginning of the TPP negotiations, the process of drafting and negotiating the treaty’s chapters has been shrouded in an unprecedented level of secrecy. Access to drafts of the TPP chapters is shielded from the general public. Members of the US Congress are only able to view selected portions of treaty-related documents in highly restrictive conditions and under strict supervision. It has been previously revealed that only three individuals in each TPP nation have access to the full text of the agreement, while 600 ’trade advisers’ – lobbyists guarding the interests of large US corporations such as Chevron, Halliburton, Monsanto and Walmart – are granted privileged access to crucial sections of the treaty text.

The TPP negotiations are currently at a critical stage. The Obama administration is preparing to fast-track the TPP treaty in a manner that will prevent the US Congress from discussing or amending any parts of the treaty. Numerous TPP heads of state and senior government figures, including President Obama, have declared their intention to sign and ratify the TPP before the end of 2013.

WikiLeaks’ Editor-in-Chief Julian Assange stated: “The US administration is aggressively pushing the TPP through the US legislative process on the sly.” The advanced draft of the Intellectual Property Rights Chapter, published by WikiLeaks on 13 November 2013, provides the public with the fullest opportunity so far to familiarise themselves with the details and implications of the TPP.

The 95-page, 30,000-word IP Chapter lays out provisions for instituting a far-reaching, transnational legal and enforcement regime, modifying or replacing existing laws in TPP member states. The Chapter’s subsections include agreements relating to patents (who may produce goods or drugs), copyright (who may transmit information), trademarks (who may describe information or goods as authentic) and industrial design.

The longest section of the Chapter – ’Enforcement’ – is devoted to detailing new policing measures, with far-reaching implications for individual rights, civil liberties, publishers, internet service providers and internet privacy, as well as for the creative, intellectual, biological and environmental commons. Particular measures proposed include supranational litigation tribunals to which sovereign national courts are expected to defer, but which have no human rights safeguards. The TPP IP Chapter states that these courts can conduct hearings with secret evidence. The IP Chapter also replicates many of the surveillance and enforcement provisions from the shelved SOPA and ACTA treaties.

The consolidated text obtained by WikiLeaks after the 26-30 August 2013 TPP meeting in Brunei – unlike any other TPP-related documents previously released to the public – contains annotations detailing each country’s positions on the issues under negotiation. Julian Assange emphasises that a “cringingly obsequious” Australia is the nation most likely to support the hardline position of US negotiators against other countries, while states including Vietnam, Chile and Malaysia are more likely to be in opposition. Numerous key Pacific Rim and nearby nations – including Argentina, Ecuador, Colombia, South Korea, Indonesia, the Philippines and, most significantly, Russia and China – have not been involved in the drafting of the treaty.

In the words of WikiLeaks’ Editor-in-Chief Julian Assange, “If instituted, the TPP’s IP regime would trample over individual rights and free expression, as well as ride roughshod over the intellectual and creative commons. If you read, write, publish, think, listen, dance, sing or invent; if you farm or consume food; if you’re ill now or might one day be ill, the TPP has you in its crosshairs.”

Current TPP negotiation member states are the United States, Japan, Mexico, Canada, Australia, Malaysia, Chile, Singapore, Peru, Vietnam, New Zealand and Brunei.

Read the full secret TPP treaty IP chapter here

via Secret TPP treaty IP Chapter: Advanced text with negotiation positions for all 12 nations.

Navy Benches Intel Chiefs in Bribery Scandal … And Promises That More Heads Will Roll 2 of 2

Francis allegedly purchased the concert tickets and paid for prostitutes for the men who attended, according to Misiewicz\’s complaint.

\”Don\’t chicken out bro we need u with us on the front lines 🙂 … Who can we trust in the Office for Lady Ga Ga?\” Francis said in a May 2012 email to Misiewicz, prosecutors allege, noting the playful use of emoticons in the message. \”Tickets are not the issue who will keep silent :)\”

Beliveau is accused of passing information about NCIS\’s investigation into Glenn Defense to Francis in exchange for prostitutes, airfare, posh hotel rooms, and a laptop computer for Beliveau\’s girlfriend. In particular, it outlines one trip Francis allegedly arranged for Beliveau in March 2011 to Bangkok, Thailand.

\”According to one email, Francis asked: ‘Joyce your kinda Babe\’? Beliveau replied ‘Nice. You bet. Hopefully I\’m her kinda guy, hehe,\’\” the criminal complaint against him says. A photograph of the woman was allegedly attached to the email.

The complaint against Sanchez includes similar allegations. Prosecutors say he received $100,000 cash from Francis\’s company in January 2009, and continued to share sensitive Navy information with him until earlier this year. It included internal information that Glenn Defense used to its advantage while servicing U.S. ships. The company has locations in Japan, Singapore, Thailand, Malaysia, Korea, India, Hong Kong, Indonesia, Australia, Sri Lanka, the Philippines, and the United States, and deliberately overcharged the Navy while \”husbanding\” the ships, providing food, fuel, water, waste removal, and other tasks, prosecutors say.

Sanchez\’s complaint also has a variety of specific allegations regarding the officer accepting prostitution. Francis is accused of emailing a woman in Indonesia early in March 2011 to arrange prostitutes to meet Sanchez, another unidentified Navy commander, and two other men in Singapore.

One of the emails described one of the \”girls\” as \”Alda 167 cm [height] 36b [bra size] very young n still study, 17 yr,\” the complaint says. Francis later sent an email cancelling the planned meeting due to a tsunami in the region that allegedly kept Sanchez and his friends away from Singapore, prosecutors say.

Later that month, however, Francis sent Sanchez an email containing a picture of one of the prostitutes that had planned to meet the Navy officers in Singapore, court documents say. A brief message was attached: \”I miss you BABE :).\” Sanchez allegedly emailed the Glenn Defense CEO back the same day, saying \”Nice pictures…..Brings back good memories :).\”

via Navy Benches Intel Chiefs in Bribery Scandal … And Promises That More Heads Will Roll | Killer Apps.

Navy Benches Intel Chiefs in Bribery Scandal … And Promises That More Heads Will Roll 1 of 2

The U.S. Navy\’s widening scandal involving prostitutes, cash bribes and the fat-cat defense contractor who allegedly supplied them for sensitive military information just expanded to colossal proportions. The Navy announced Friday night that it has suspended access to classified information for two senior intelligence officers, effectively relieving them from duty. It\’s all part of the ongoing investigation into global defense Glenn Defense Marine Asia.

And the Pentagon is warning that more officers are likely to be implicated in this scandal, the Navy\’s biggest in decades.

Vice Adm. Ted Branch, pictured above, and Rear Adm. Bruce Loveless — the service\’s director of naval intelligence and director of intelligence operations, respectively — have not been charged with any crimes. But the suspension \”was deemed prudent given the sensitive nature [of] their current duties and to protect and support the integrity of the investigative process,\” said Rear Adm. John Kirby, the Navy\’s top spokesman, in a statement.

The allegations against Admirals Branch and Loveless \”involve inappropriate conduct prior to their current assignments and flag officer rank,\” Kirby said. Intelligence officers need to maintain high standards in their personal lives because they\’re such tempting targets for blackmail by a hostile spy service. The military frequently pulls personnel from vital intelligence jobs if it believes their credibility could be compromised. Any association with a scandal involving prostitutes and bribery would certainly count as a reputational threat. At the moment, however, \”there is no indication, nor do the allegations suggest, that in either case there was any breach of classified information,\” Kirby added.

The announcement takes a growing scandal and expands it to the most senior levels of the U.S. military. The Navy has not seen a scandal this large since dozens of naval officers were accused of sexually assaulting about 80 women and a handful of men at the Tailhook Association Symposium in Las Vegas in 1991. That incident ultimately ruined or harmed the careers of more than a dozen admirals.

Kirby told Foreign Policy on Friday night that he expects the scandal to continue expanding. Branch and Loveless\’s clearances were suspended at the direction of Navy Secretary Ray Mabus, he added.

\”I believe there will be more naval officers and perhaps Navy civilians implicated in this scandal,\” Kirby told Foreign Policy. \”These allegations are personal misconduct.\”

Already, three Navy officials and two Glenn Defense executives have been charged in U.S. federal court in connection with the case. All three other Navy personnel — two active-duty commanders and a senior agent with the Naval Criminal Investigative Service — are accused of sharing sensitive or classified information with Glenn Defense CEO Leonard Glenn Francis in exchange for prostitutes, cash and other favors. Francis allegedly used that information, in turn, to overbill the U.S. military millions of dollars while servicing Navy ships in ports across the Pacific.

The Navy also relieved of command Capt. Daniel Dusek, the captain of the amphibious ship Bonhomme Richard, in connection with the investigation. He has not been charged with any crimes, but officials said that commanders lost confidence in him.

The Navy\’s announcement Friday came as Francis, the Glenn Defense CEO, appeared in court with two others already facing charges: Cmdr. Michael Vannak Khem Misiewicz, the first officer accused, and NCIS agent John Beliveau.

Also charged in the case are Cmdr. Jose Luis Sanchez and Glenn Defense executive Alex Wisidagama of Singapore. Misiewicz, Beliveau and Sanchez allegedly accepted bribes in the forms of prostitutes while traveling in the Pacific and luxury hotels in exchange for a variety of Navy information, including ship schedules. Sanchez is accused of accepting $100,000 in cash and prostitutes. Wisidagama is accused of serving as a lynchpin in his company\’s alleged scheme to overbill the Navy throughout Southeast Asia.

\”According to the allegations in this case, a number of officials were willing to sacrifice their integrity and millions of taxpayer dollars for personal gratification,\” U.S. Attorney Laura Duffy said this week in announcing the charges against Sanchez. \”While the overwhelming majority of the 400,000 active-duty Navy personnel conduct themselves in a manner that is beyond reproach, we and our law enforcement partners at Naval Criminal Investigative Service and Defense Criminal Investigative Service continue to investigate the allegations of fraud and corruption that tarnish the stellar reputation of the U.S. Navy.\”

The scandal has rocked the Navy\’s 7th Fleet, headquartered in Yokosuka, Japan, just as it was set to boost operations in the Pacific. Court documents in the cases of both Misiewicz and Sanchez say that other unidentified Navy personnel were aware of malfeasance, and either did nothing or participated in the schemes. In one example, the criminal complaint against Misiewicz says he attended a Lady Gaga concert on May 25, 2012, with other Navy personnel who visited Laem Chebang, Thailand, during a port stop by the Blue Ridge, the command ship of the Navy\’s 7th Fleet. Several of the officer ensnared in the scandal served on the ship during their careers.

via Navy Benches Intel Chiefs in Bribery Scandal … And Promises That More Heads Will Roll | Killer Apps.

Cato Institute Endorses Ending Drug War

DRUG WAR | The war on drugs wastes a huge amount of resources in our police and justice systems. It also harms civil liberties, foments violence, and does little to curb drug use. Ending the federal drug war and returning drug policy to the states where it belongs would save $110 billion.

via ON SPENDING: NO SACRED COWS | Cato Institute.

Veteran’s Day – 2013 : Via Mike Masterson – From Albert Strickland; “I am a Vietnam Veteran….

From Albert Strickland;

\”I am a Vietnam Veteran. Do not thank me for my service. My service was to oil companies, chemical companies, the makers of guns and weapons, ships and fighter planes. My service was to the wealthy, the powerful and the rich. Today is not Veterans Day but rather the old Armistice Day, a day that the powers that be changed from a day to celebrate the ending of war to a day that commemorates the \’pawns\’ of war and this was done in the mid-50\’s during the cold war and as buildup for the Vietnam War. Millions died, were butchered or maimed, homes and lives destroyed and even we returning veterans did not bring the war home with us, no, we left our souls there, in the rice field and in the faces of the women, men and children we terrorized. There is no glory in war and none should be given. War should never be fought for anything other than the direct protection of homes never so that few and prosper while so many suffer. I ask that we stop making veterans and start building soldiers for peace! Do not thank me for my service.

Today is not an easy day. It is difficult. I remember. I remember the victims. We are all victims! The mothers that send their children to become murderers and the children who murder. Mothers on all sides who lose their family. I remember the fear in the faces of the children we encountered, the fear that everyone wears like a mask that you can not remove. I remember the destruction, the death, the pain, the agony. I remember. It is impossible to forget. While some fat rich person here at home sits in a private club sipping brandy from a crystal sniffer and smoking a cigar, two young people face each other in another world, one having to kill the other to survive. We are not heroes. We were not brave young men. We were victims as are we all. I wish this day we could wake up. All veterans should enter every mansion, every executive office, every boardroom, break the snifters, put the rich and powerful, the politicians on a boat with their children, put rifles in their hands and send them to war and bring our brothers and sisters home! That is my wish! War would cease and men would find ways to solve differences without human sacrifice of the poor!\”


via Mike Masterson – From Albert Strickland; “I am a Vietnam Veteran…..


“That’s not fair!” Policing and perceptions of fairness

“That’s not fair!”

Policing and perceptions of fairness

Employees of law enforcement agencies—both sworn and civilian—are more likely to view their organizations as legitimate and to comply with workplace policies and procedures when the agency exhibits a culture where transparency, impartiality, fairness, and voice are embraced and modeled through internal decision-making, policy, and overall treatment of personnel. We all want to be valued, we all want to be heard, and we all want to be respected.

via “That’s not fair!” Policing and perceptions of fairness.


The Case for Procedural Justice: Fairness as a Crime Prevention Tool

Procedural justice provides a platform to begin addressing some of these shortcomings. In courts, among other things, this takes the form of rethinking how courtroom rules are posted, explained, and enforced, or how court clerk or court officers provide information while court is in session.

There are countless analogs from the court environment that are applicable to other justice system players, including law enforcement. Below are a few strategies for implementation that can be applied by police departments to enhance procedural justice:

Humanize the experience: Appearing approachable and accessible is a key component of procedural justice. When interviewing suspects or witnesses, make eye contact and use body language to convey respect. Thank citizens for their cooperation with the process as a means of yielding increased cooperation in the future.

Explain what you\’re doing and why: For many individuals, a routine traffic stop or other interaction with law enforcement can be a traumatic event. The legal jargon and procedures (familiar to practitioners in the field) can be confusing and intimidating to the average person. Whenever possible, use simple terms to explain your actions, the legal and/or practical reasons for doing so, and any consequences they may have for the person. For example, when issuing a summons, clearly explain the process for appearing in court to resolve the matter—including providing directions to the courthouse, if and how a lawyer will be provided, and whether there are options to resolve the matter by mail or online. These strategies can help promote compliance.

Create opportunities for individuals to be heard: Giving people an opportunity to speak and have their concerns heard can add a few extra minutes to the average interaction, but it is time well spent. Research shows that having your voice heard increases perceptions of fairness, even when the person is told that his views will not influence the ultimate decision or outcome. Consider how to maximize the citizens\’ voice in contexts where it may be limited, such as traffic and street stops or walk-in inquiries.

Consider environmental factors: Criminal justice facilities—like many government buildings—can be difficult to navigate for those unfamiliar with their halls. As an exercise, try to examine your facility with fresh eyes from the perspective of a new user. In high-traffic areas, ensure that building rules and instructions for getting assistance are clearly posted, easy to read, and provided in commonly spoken languages other than English, if necessary.

Use research to show the value of procedural justice: As with any new approach, there will be skeptics, but the research that supports the concept is compelling. Providing colleagues with the research on the impact of procedural fairness can offer a concrete and focused foundation for trainings and other implementation efforts, helping to counteract knee-jerk skepticism.

Law enforcement professionals are typically the first point of contact for people processed through the justice system. Procedural justice strategies like the ones listed above—when delivered early in the process—can help shape an individual\’s perception of the system

via The Case for Procedural Justice: Fairness as a Crime Prevention Tool.


Julia Clark – Google+ – We don’t run away, we run fearless , to danger to help our…


Inflammatory discourse does not make what you write truthy.

It no longer matters how the Corruption Campaign began in Syria. Mr. Assad\’s reaction to it showed that the original statements from Syria was in fact true. And I will be harsher than the original plea, Mr. Assad is vile.

After the Mr. Assad viciously attacked The Campaign with no interest in the humanity of Syria , only interest in keeping his power, I researched Mr. Assad.

What I did not know was Mr. Assad and much of his family, was a theatrical presentation created by an USA based PR company. His creation of a character for public consumption in itself is not vile, but had that been known all information that showed Mr. Assad in a positive light would have been subject to higher level of scrutiny.

As for your statement of that the manufactoredness of the original protests is conspired, cursing does not make that go way. It is so common knowledge that you point out that it is classed in with conspiracy theories.

The balloons that were seen in the Syrian protests photos showed up again in the Million Mask March. The source of the promotion of balloons for use as \” a bringing together\” in the MMM is from  very questionable PR firm with questionable unethical practices. BTW, the use of balloons does not negate corruption of intent.

It was kismet that Mr. Assad broke character and exhibited his vile nature. His vile nature might not have come to light had the balloon promoting PR company not had an interest in creating an informational gathering campaign. It was unfortunate for that PR company. Read Million Man March – page 4 – The Occupations Statement for more information.  https://oolith.wordpress.com/2013/11/08/million-mask-march-page-4-the-occupations-statement/

The name of your account suggests you are a astroturfer account. Nevertheless, I will give you a platform on my channel for a bit of time.

via Julia Clark – Google+ – We don’t run away, we run fearless , to danger to help our….