SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
:First rren .9Lmenaments to tfie Constitl!tion
.9Lmentfment 1.

Congress snaff ma/(r IW (au) respecting an
esta6fisnmtnt of refigion, or prolii6itillg tnc free ei{!rc.ise tliereof; or
a6riaging tne frw{om of speun, or of tfle pre..<s; or tne rignt of tne
peopft peacI!a6fy to a.ssem6{.:, am! to petition tn.c goven/ment for a
rWrs.< ofgrievances.

.9lmenament 11. .51 weff.regl.lfaua mifitia 6eing necessary to
tnt securi1y of a.ftu state, Iii.: rignt (If tnt pcopfe to k!ep ant! 6ear
sliaf[ not 6e infriJrgetf.

arm.~

.9lmenament JI J.

'J{g soWer sna{f, illtimt of pwa, he
quartered in anyliouse, witMut tnt c,l7l$ent of Ille owner, liar ill
time of 111ar, 6uI ill a nlll7111er to be presc.ri[m( 6y (aw.

.9lmenament 10/. 'lfre rignt of tf/C peop(e t.o De secure in tli.l!ir
perSOll$, fwuses, paper.>, and ~ffects against ullrea.<()1raf,(e searc.fies
and seizures shaff not De vio{atetl, alia 110 111arratl Is snaf{ issue,
611 I UpOIl pr06a6{e cau..<e, supportetf b!1 oath or affirmatioll, all/l
partiel/larfy aescri6ing tfie pface to De searc.fietl, ana tnt persoll$ or
tnillgs 10 6e .<eiz.e<f.

rife, {werty, or property, 1l1it(Wllt aue process of {aw; Iwr .-na(t private.
property De taK!1l for pubric use, 7vitliout just compellSatioll.

.9lmentfrnent 0/1. h I af( criminal prosecuti(llls the acc.user!
sha(l enjoy Iii.: rigfu to a SpU.dy alit! puMic I rial, hy au impartin{
jury of tIle stale and ,{i..<triC.1 ulfr~rein tlie crime slia[{ nave Geell
commit uri" whicli aistriel shafl liave 6ml previolls{y a.'eer/air/cd 6y
{aul, MId to 6e ilrfonnu{ of tne lIatun: ani cause of tfit accusation;
to 6e confrolltetf with tile Ivitne..<.<~ 'tqaill$t nim; to (ta.tle complllsory
process for 06taill-ing uJitnesse..< in fri..; fav,) r, ant! to nave tlie
assi..,talrce of counse(for (lis rkjulSe.
J1.menarnent 0/11.

In stlits at comllwn raw, wllere tfre
vafue irr colltroversy sftaf£ ex..ced t711tllty a,,(far.', tne right of trial hy
jury .>/ia!( he prtsenJed, alld 110 fact trW{ v!J ajury sfta!! 6e otlieruJise
re-e.tamiuea ill allY court of the Vnitd StlItes, Iftall acconWltJ /0 tfie
of Ifte common (mil.

mres

.9Lmencfment 0/1II. 'U:!:i..»"i.w bail shalf /lot he required, lIor
e:(j:u.<ive fines imposer£, 1I0r cruel and ulluSUal pWIi.~lIltrertt.< illJfictea.

.9Lmenament 0/. 'J.& pmo" sfrafl Vf nefd to atlSWtr f or a

.9Lmenament1X.

rnpita{, or otfrerwise irifamoll..< crime, IlII{tSS on a presentmtnt or
illdictllWlt of a grand jllry, e-tupl ill cases arising iu tlie (ana or
rlf/Va{forces, or ill tlie militia, Uifwl ill actual semee ill time of 111ar
or pl/f,fic aangm nor .i!ia({ any persoll 6e .>u6ject for tfle sa7ltt offense
to b~ twia put in jwpartftJ (If tife or fim6i /Wf Shaff he compef(ea ilr
(/fry crimina( <'rue to a witness agaillSt nimsefj; 1I0r he deprivea of

J1.mendment X. 'l1ie powers /Wt rfelegaterf to tile 'llttit-d
Staus 6y tlie. COII.,titutUm, nor profti6iterf by it 1 t(Ul Slates, are
0
reservea /0 tfte statts lYspecrivefy, or to tlit peopk.

ve

'l1ie enumuatum in tfre COII..<tlturiOIl, of
urtaih riglits, sfrafl /WI 6, COIIStmeri to aellY or rf.i.<parage olner.<
retaillerf by tli.: peop(e.
•

r

Vol. 29, No. 19

October 7, 2013

COVER STORY
SURVEILLANCE

10 The New Age of Surveillance
b)'joe Wohlerlon J/.j.D. - Mille some Americans have claimed
U.S. government surveillance of Americans is innocuous, others have
equaled it i~l the i.n!anlOus Easl Gennan Stasi. Actually, irs worse.

17 The NSA Domestic Surveillance Lie
1lcn accusations of $p),wg on Americans
were firs! leveled al the NSA, (he government claimed there was no
illicit spying. l1letl it had 10 backtrack again and again.

b)' Tbomos R. Eddle7IJ -

FEATURES
CULTURE

21 The Slippery Slope to Pedophilia
by Selwyn Duke - It is unlikely Illal many Americans now believe
Ihat pedophilia will soon be accepted in this counllY bm it is riding
Ihe S<lme lmck 10 respectability as did homosexual "marriage."
EXTENDED BOOK REVIEW

27 Levin's Risky Proposal:
A Constitutional Convention
by l£my Gre.enley - Mark LC1n's Ilew book, Tile Liber~v
Amendments, whjch calls for an Article Vconstitutional convention,

ignores Ibe very real risks of harmful changes 0 the Constilution.
HISTORY - PAST AND PERSPECTIVE

35 NSA Spying: It Didn't Start With 9/11
b)1
Jack Kem~)I -

The N an enornJOUS agency created 10 coUecl
SA,
and analyze intelligence on foreign threats, {ailed 10 SlOp 91 [I and
now spies on Americ:Uls. Has it oUllived its usefulness?

THE LAST WORD

44 Syria, Obama, Putin, and the UN
~"

lVillimn F. jasper

DEPARTMENTS
5 Letters to the Editor

33 The Goodness of America

7 Inside Track

40 Exercising the Right

9 QuickQuotes

41 Correction, Please!
COVER Design by Joseph w. Kelly
LEITERS TO THE EDITOR

Why Attack Syria?
How is it (hat the death of 400 children in
Damascus, caused by parties yet undetermined. is being used as a justification to
further devastate war-torn Syria. yet the
death of 500.000, yes a half-million. Iraqi
children , owi ng to malnutrition caused by
the U.S.-enforced embargo aild economic
sanctions of their country during President Clinton's administration. has raised
hardly an eyebrow? (When asked about
the death of the 500.000. Madeleine Albright, Clinton's secretary of ~tate, said,
"It was worth 11.")
Mightn't we bener do un to oursel ves, firs!,
what we intend to do (or have done) unto
others. perhaps starting by carpet-bombing
our military installations in Arizona, South
Carolina, and suburban D.C .. so tbat their
residenls might fully enjoy that which their
elected congressmen advocate?
Simultaneously. along with that destruction, wouldn't it be poetic for our chief executive to publicly recite Mark Twain's "War
Prayer" to accompany "the bombs bursting
in air"?
tn tbe eyes of our president. his circle of
advi sors, and their supporting talk-show
hosts. how many ton s of bombs must be
dropped on a foreign country to re-establish
so-called American credibility?
Would cluster. whjte phosphorous, and napalm bombs count for extra points?
RUSSELL W. HAAS

Golden Colorado
The problem regarding the Syrian debate
stems from the fact that offici al America
has had an Empire mentality for over 200
years. Ever sillce the beginning of the "War
of 1812," where it goal was to annex Canada.
our Republic has tloundered in dreams of
conquest and expansion of influence. They
called it "Manifest Destiny." We should not
be surplised that this megalomania continues
to this day.
Empires alway have more " interests"
than protecting the people of their own
countries, Wby should Americans then cry
because U.S. presidents behave like emperors - that 's what 3Jl empire can expect!
Unaccoulltable tyran ts start illegal and unjust wars to conquer and control. always
using some excuse such as "national security; ' even creating "false flag" operations
if necessary, to frighten their citizens into
submission.

CaI/1-800-727- TRUE to subscribe today!

Tyrants also abuse their own people
by meddling ill pers onal affairs s uch a
" health care," plundering the populace
to pay for their arrogance. Claiming to
know what is best for everyone, down to
the most minul~ detail. they impose rules,
regulations, and unju st hindrances to free
enterprise. (Why, it takes I I government
permit to operale a Taco Bell store). The
underl ying ro ot causes for seeking Empire
are lus t, greed, inordinate ambition, and
blood lust.
Things I 'ill not change unlil American~
from all 50 overeign republics wake up
and reali ze the USA has been the aggressor around the world for mnny, many years,
either directl y or by provoking attacks in
order to st.art war. The only truly just war
we ever fought was for our independence
from England_
The current , ilUalion in Syria i~ a perfect exam.ple o f our meddli ng. Whe n VillI
we learn to mind our own bu siness, protect our 0 n people and borders, aod make
policie and law. that e ncourage trul y free
enterpri e and the possibility that all who
wi sh to work and produce value are left to
dec ide what i best for their own dearest
intere t o?
DtCK MILLS

Houston. Texas

Superstate Victims
fn addition to the Snowden and M anning
ca es, the ongoing persecution of Michael
N CI must be publicized. He is the soldier
who refused to pledge allegiance to the United Nations and to wear UN insignia in 1993,
ioasmuch as it would con.tlict with his sworn
allegiance to the United Slates. One cannot

serve two masters.
The U.S. Constitution does not allow the
president to delegate allegi ance of armed
force s to another entity such as the UN ,
which is itse.lf nO( even a govern menl.
New was jailed. and his case continues.
See www.mikeynew.com for details. Appeal was recently filed.
CARL OLSO,

Woodland Hills, California
Send your letters to: THE NEW ~"IERlC N. P.O.
Box 8040. Appleton, WI 54912. Or e-mail:
editorial@thenel"·alllericall.com. Due to volume received, not all lellers call be an, wered.
Letters may be edited for space and clarity.

5
--~

-

INSIDE TRACK
Chinese State-owned Company Purchases Smithfield Foods
On September 6, the U.S. Committee on Foreign [nvestment approved a deal valued at approximately $7.1 billion allowing China's Shuanghui International Holdings Ltd. (Shuanghui Group)
to officially take ownership of Smithfield, Virginia-based Smithfield Foods Inc., the world's largest pork producer. Shuanghui
had already purchased all of Smithfield's stock back in May for
approximately $4.72 billion. "The deal, which would be the biggest purchase of a U.S. company by a Chinese firm. still needs
shareholder approval at a special meeting scheduled for September 24," according to Reuters. Shuanghui announced that Smithfield would be listed on the Hong Kong Stock Exchange after the
takeover was complete.
One thing that Reuters and other Western media fail 10 mentJOn is that Shuanghui International Holdings is controlled by the
Communist Pany of China.
In various English-language sources geared to readers in the
West, Shuanghui International Holdings is presented as a private
corporation. For example, the English version of the Wikipedia
page for Shuangbui list the company as "private with public subsidiary:' However. the Chinese-language version of Shuanghui's
Wikipedia page says the opposite, identifying the company as a
"state-owned enterprise."
Translated into English , the official Mandarin website for
Shuanghui provides a biography of Shuanghui Chairman Wan
Long that identifies hjm as a member of tbe Communist Party

of China. a former soldier in the People's Liberation Anny, and
representative to the Ninth and Tenth National People's Congress.
which is the unicameral legislative body of the People's Republic
of China. In the official international' version of the company website,.Wan Long's biography conveniently omitS any mention of his
membership in the Communist Parry, service in the military. and
terms as a representative to the National People's Congress.
As the United States and Cbina proceed to work out a bilateral
investment treaty that would enable more Chinese state-owned
enterprises to openly purchase American companies, this acquisition of Smithfield Foods by Shuaughui serves as a preview of
what could eventually be the norm.

Australia Reining In Climate Schemes After Voters Reject Carbon Tax
rn tbe wake of a crushing defeat September 7 for the climate
alarmism-promoting Australian Labor Party, which imposed the
deeply unpopular and expensive "carbon tax" credited by analysts for the conservative coalition's victory. authorities in Australia are preparing to dismantle and consolidate the· myriad globalwarming scheme-s spawned under the previous government.
Ac ording to Australian news reports. the government' vast
anti-carbon climate apparatus currently consists of more than 30
programs under seven departments and eight agencies. Under the
newly elected center-right coalition, the sprawling machine is set
to b reined in significantly, saving taxpayers over $40 million
in four years by collapsing the various schemes into just three
entilies run by two departments, The restructuring of the federal
climate regime was announced to government employees before

the election - widely viewed as a referendum on the carbon
tax - and a spokesman for the new coalition confi.rmed that the
plan was still on track,
Cjmate realists say that the entire global-warming behemoth
ought to be axe.d entirely - especially considering recent developments that experts say bave thoroughly debunked the United Nation" warming theories and wildly il13ccurate computer
models. However. as THE NEW AJ'..IERICAN repol1ed September 9
after the Australian election, there are a number of obstacles to
shulling down the costly climate schemes, including incoming
Prime Minister Tony Abbott s waffling on "cl imate is ues" and
resistance to scmpping the carbon tax in the Senate. Still, even
though the costly climate-alarmism schemes will not be entirely
abolished, Abbott and his coalition appear determined [0 scrap
!Jle carbon tax at least.
Of course, countless bureaucrats and self-styled "expens" whose jobs depend on perpetuating climate alarmism
are fighting back against the will of voters. Despite the wdlknown fact that human emis ions of carbon dioxide make up
just a fraction of one percent of the greenhouse gasses present
naturally in the atmosphere. supporters of man-made globalwam1ing theories insist that humanity must. under UN guidance, destroy the economy to reduce emissions and stave off
alleged disaster. Whether Australia wi II comply remains to
be seen , but it is looking less likely after the latest election.
-------------- TRACK
INSIDE
Wisconsin Law Restricting Government Unions Upheld Again

A popular Wisconsin law aimed at ending the stranglehold of
goverlllTIent-employee unions over taxpayers and workers was
upheld September II by a federal judge. who ruled that the 2011
"Act I 0" reform measures championed by Republican Governor
Scon Walker did not violate the First Amendment or equal-protection rights of Big Labor. It wa the second major victory for
the law in federal courts so far.
In his September II ruling. U.S. District Judge William Conley
explained that the First Amendment does indeed protect the right

to free speech and associ at jon of government worker. Wisconsin's law, however, did not violate those rights, and the Constitution does not purport to grant any so-called collec(jve bargaining
privileges. "'Whatever rights public c'1lployees have to associate
and p~ti-,ion their public employers on wage and conditions of
employment. this right ceminl), does not corupe l the employer
to Iisren." he wrote in his decision to reject the law uit filed by
two public-sector unions.
Big Labor and its attomeys. predictably, were outraged by the
latest court decision. Kat)' Lounsbury, one of the lawyers representing government-employee unions in (he case. slammed the
rulUlg as "just wrong." According to media reports. the attorneys
will be consulting with union bosses before deciding whether or
not to appeal the court's finding that the law is contitutional.
The national implications of the ongoing baUle are one of the
key reasons that analysts say unions across America have been
frantically fighting the Wisconsin law. After it  a approved,
for example, Big Labor and its allies sought to recall Governor
Walker and .~ome fellow Republicans in the legi slature, prompting huge spending sprees by organizations and unions nationwide. In the end, (he GOP governor survived the  ell-funded
challenge. setting the stage for other leaders to pur~ ue desperately
need.ed reforms. However, as the lawsuits continue. the baule is
far from finished.

Federal Judge Dismisses Atheists' Lawsuit Against "In God We Trust"
A federal judge in New York State has di smissed a lawsuit filed
by a group of atheists demanding that '1n God We Trust" be
removed from America's currency. In his September 9 decision,
Judge Harold Baer, Jr. ruled that the presence of the national
mono on coins and paper money had not created a "substan(ial burden" on the athei sts and humanist involved in the suit.
which was filed by members of the New York City Atheists and
the Freedom From Religion Foundation.
"While Plaintiffs may be inconvenienced or offended by the

appearance of the motto on currency." wrote Baer. "these burdens are a far cry from the coercion, penalty. or denial of benefits required under the ' substantial burden' standard."
BaeT Doted that in the federal judiciary 's extensive history
of hearing cases on the con stitutionality of the. national motto,
judges have considered whether ils presence on cunency tends
to advance religion and whether it represent ' an excessive government entanglement with religion. He added tbat every circuit
comt "that bas considered the issue found no EstabLi shment
Clause violation in the motto's placement on currency. finding ceremonial or ecular purposes and
no religious effect or endorsement."
The American Center for La and Justice (ACLJ)
provided an amicus brief in the case in defense of the
national motto, pointing out that the wording "simply echoes the principle found in the Declaration
of Independence that our freedom s come from God
and not the state. The nationa l mono was adopted
for the express purpose of reaffirming America's
unique understanding of thi s truth .... The Establishment Clause was never intended as a guarantee that
a per on will not be exposed to religion or religious
symbols on public property, and the Supreme Court
has rejected previous attempts to eradicate all symbols of this country ' s religious heritage from the
public's view," •
The Path to a "Big War"
"Once we hit, this is an act of war. Little wars start big wars, and
we have to remember that.'·
Interviewed on Meet the Press, Congressman Michael McCaul (RTexas) is the c/l(lirmon of the HOllse Homeland Secllrity Committee.

Ft. Hood Killer Not a Martyr
"Don't be fooled. He is not giving his life. We are taking his life.
This is not his gift to God. This is his debt to society."'
Lead prosecutor Colonel Michael Milligan loldju/"Ors nol to consider Nidal Malik Hasan's death for
the 2009 crime of killing 13 unanned people nn ael afmartyrdom. Thejury look little time to sentence
him 10 death by lethal injection.

Egypt's Government Seeking to Cripple Power of Muslim Brotherhood
··[The move to prosecute former president Mohamed Morsi] is an attempl to paralyze the Brorberhood
and affect its lIctivism. ll·s very symbulic, a pulitic<ll muve by the state against the Brotherhuud."
All expert 011 Middle Easl l slamisl movemellts, Khalil al-Anani of the Washington-based Middle East
Instilllte commented after Egypt's chief prosecutor ordered Marsi 10 stand trialfor inciting murder.

Not the i'World's Policeman"
"We are not !.he world's policeman, nor its judge and jury. Our
own needs in America are great, and they should come tiTSt.'·
Resisting the cry 10 arrack Syria, Congressman Alan Grayson
(D-Fla.). a progressive Democrat, expressed the view of malI}
colleagues.

Food stamps Cost Soaring
"Spending on food stamps has mushroomed from $35 billion in
2007 to $63 billion. Tn an average mon·th, nearly 48 million people
- one in seven U.S. residents - receive [this type of] benefits."
In her Washington POSt Colllllln about this mushrooming a·elfare
program, columnist Ruth Marcos complained about GOP efforTS 10 cut the program.

Syrian Refugee Total Continues to Grow
"The number of Syrian refugees passed the threshold of two million. with no sign of this tragic outflow
ending."
A Sl'.plemher 3 rp.pnrt fmm Th e United Nations' Refugee Agency I7Dtp.d that mort' than a millioll oftha!:t>
fleeing rh e civil war are children under 17 years of age.

One Man's Perspective About the Syrian Crisis
"In one of tho e curious turns of history, an ugly bloody. litde conflict in an always fragile, volatile,
artificial nahon-state crea(ed in the last gasps of European colonialism is now determining the world's
immediate fOr1mes."
Writingfor the American Cellterfor Democracy, Sol Sanders believes That the Syrian conflict has good
potential for escalation inTO a world conflict.

President Obama Urged to be
More Outspoken About Racial incidents
" I think that [the Zimmerman acquittal] will be
seen as a questionable judgment on the pan of the
judicial system down (here, but I don't know if it
witl have staying power."
Claiming Ihat the president should "·speak OUl,' ·
former Secretary of Stare Colin Powell said that
Obama should be '·more pa ssionate " aboUT the
mat/a.
- COMPILED BY JOHN F. McMANUS
Call J-800- 727- TRUE to subscribe today!
While some Americans have claimed U.S. government surveillance of Americans is innocuous,
others have equated it with the infamous East German Stasi. Actually, it's worse.
by Joe Wolverton
n an interview in June with a German
television tation, German President
Joachim Gauck said the surveillance
conducted by the National Security Agency ( SA) was nOI comparable to that conducted by the Stasi - the infamous East
German Ministry for State Security - be-

I
10

6 6 16 10

•

.
'

cau e "it is not like it was with the Stasi
and the KGB - that there exist big filing
cabinets in which aJl the content of our
conversations are written down and nicely
filed. This is not the case."
Gauck is right. The NSA is nothing like
the Stasi because the East German secret
police relied on uch lhing. a typewriters.
carbon copies. handwritten transcriptions

of phone conversations, agents listening
through doors and rudimentary bugging
devices. and the aforementioned fi ling
cabinets. The SA. on the other hand, can
apparently monitor electronically - in
real lime - every word of every phone
call. every text me sage, every social
media post. every website visited, and
every form of electronic communication.
THE NEW AMERICAN • OCTOBER 7,2013

••

•
'2' .Ot

How much data is being collected by
the NSA? William Binney, a former NSA
technical director turned whistleblower,
estimates that the newly completed NSA
Utah Data Center "will be able to handle
and process five zettabytes of data," In a
story quoting Binney's claim. National
Public Radio repons that a zettabytc is
equal to "the amount of data that would
fill 250 billion DVDs:'
Back to those bulging Stasi filing cabinets. Imagine that a typical fi ling cabinet
with 60 files of 30 pages per file takes up
about 4,3 square feet of space, Each 30page tile would equal roughly 120 MB of
data, Given the amount of storage available to the NSA in its Utah location, if
all the data stored there were printed and
stored in traditional filing cabinets, those
cabinets would occupy nearly 6,6 million
square miles!
Nothing like the Sla~i, indeed,

Secret Police Minus
the Police Powers
Is there any clearer lens through which to
vicw the future than the past? Is not the
United States of2013 eerily and tragically
traveling along a similar trajectory to that
followed by the formerly free Germans
and the communi st Stasi that ultimately
deprived them of their libenies?
In de cribing the growth and survival of
the East German surveillance state and the
Stasi' activities that undergirded it. Scott
Horton wrote that Eas t Germany was a
country "in whicb the power and authority
of the intelligence services to spy on their
own citizens rested on an elaborate network of laws that empowered surveillance
and eroded the rights of citizens specified
in the country 's constitution,"
Again, the Stasi and lhe Cold War communi t East German regime had nothing
on the NSA and 21 t-century America,
From the enactment of tile Patriot Act
to the renewal of Ule Foreign Intelligence
Surveillance Act amendments. Congre s
after Congress and consecutive presidents

have usurped powers the scope of
which are unknown i.n the written
record of government.
Before launching into a report
on the myriad methods being
used by our own federal government to keep us under the
constant vigilance of its neVerblinking eye. the reader needs
to have in the front of hi mind
the standard to which the federal
government mUSt be held,
The Fourth Amendment to the Constitution mandates:
The right of the people to be ecure in
their persons, houses. papers, and effects , against llnreasonable earches
and seizures, shall not be violated.
and no warrants shall issue. but upon
probable cause, supponed b_ oath or
affmnarion. and part icularly de cribing the place to be searched. and the
persons or things to be seized ,
Recent events demonstrate that for over a
decade. ollr elected reprc· cntativ (and
the courts, for that matter) have di regarded the Constitution and built a domestic
spy apparat.us that bears no re emblance
whatsoever to the blueprint provided by
our Founding Fathers in the Con tlfUlion.

Throwing a Wrench Into the Works
On August I. fonner low-level networking
subcontractor Edward Snowden entered
Russian territory.

.M~nAH: OOH

WH

a I,

Russian President Vladimir Putin permitted Snowden to take up temporary
residence in Russia, At home, President
Obama charged the young man with espionage. a curiou ' charge given that even the
president admits there is no evidence that
Snowden transferred any sensitive information to a foreign government. an essential element of the crime he is accused of
cOllunitling. No maner. President Obama
is not known for hewing to the Constitution or the law,
The cache of document Snowden
hold, was leaked to the Washingtoll POSI
and to The Guardian (U ,K.) and contai ns
compell ing evidence of the SA's wholeaJe violation of the Fourth Amendment
through the dragnet surveillance of phone
records and monitoring of Internet traffic.
With tbe as istance of Glen Greenwald
of The Guardia/!, Snowden has leaked
one constitutional violation after another
committed by the NSA, All of wbich, it
must be understood, was done with the
cooperation of the pre ident , the Con-

Edward Snowden, an employee of an
NSA subcontractor, leaked a cache of
documents containing compelling evidence
of the NSA's wholesale violation of the
Fou rth Amendment through the dragnet
surveillance of phone records of millions of
innocent Americans .
W'A/W, TheNewAmerican.com

..

,.

11

6 6 16 10
00 1ol9orroq M

_COVER

IUO r .i~)/ f2

f}ltO ro I"

~:::J ,~A;,O

(((1n111"1"
SI!JRVC:I~~ANCE

~STORY

records on an "ongoing daily
basis" and to hand over to (he
Accoriting to,~~a;courtorder labeled
domestic spy agency "an elec-)'-/':'~I:";
"iTOP. SECRElf.':rederal judge Roger
tronic copy" of "all call detail
records created by Verizon for
Vinson order~'~iVeriZDn to turn over the
communications (i) between the
of its U.S.
United States and abroad; or (ii)
wholly within Ine United States,
~~t~(.'_.';.._';:.
including local telephone calls."
This information includes the
gress, and the courts. The strength of the phone numbers involved. the electronic
evidence of collusion among the three identity of the device. the calling card numbranches of the federal government in the bers (if any) used in making the calls, and
de facto repeal of the Fourth Amendment the time and duration of the call.
In other words. millions of innocent
is overwhelming.
A mericans have had their call records
Tyranny Erected in Cyberspace
shared with a federal spy agency in open
Among the most disturbing disclo- and hostile defiance of the Founh Amendsures found within the reams of Edward ment"s guarantee of the right of the people
Snowden 's revelations was the surrender to be free from sllch unreasonable searchby major telecommunications companies es and seizures.
What is reasonable? Legally speaking_
of the otherwise private phone records of
millions of Americans - none of whom "the term reasonable is a generic and relawas, as required by the Constitution, sus- tive one and applies to !hat which is appropriate for a particular situation."
pected of committing any sort of crime.
According to a court order labeled
Even if the reasonableness threshold is
"TOP SECRET:' federal judge RogerVin- crossed, though. there must be a warrant
son ordered Veri zon to tum over the phone and suspicion of commjssion of or intent
records of millions of its U.S. customers to commit a crime. Neither the NSA nor
Veri zon ha. asserted that even one of the
to the NSA.
The order, iss ued in April by the U.S. miUions wbose phone records were seized
Foreign Intelligence Surveillance Court fits that description.
When contacted by THE NEW AMERIand leaked on the Internet by The Guardian , compels Verizon to provide these CAN , a spokesman for Verizon declined to
i~"

~h· ne re· or~
olll· c· d~s,;/of'millions
cu" oilll er· to 1tfe': N'SA.
st· m· sf.j,~

An order from the Foreign Intelligence Surveillance Court compelled telecommunication
giant Verizon to provide the NSA with customer phone records on an "ongoing daily basis"
and to hand over "an electronic copy" of "all call detail records created by Verizon for
communications at home and abroad. "
12

comment on bis company 's compliance
with tbe order.
Such a demur is expected in light of the
provision of the order that prohibits Verizon, the FBI, or the SA from revealing
to the publ.ic - including the Verizon customers whose phone record now belong
to the Obama admini stration - that lhe
data is being given to the government.
Glen Greenwald of Th e Guardian details the data being seized by the NSA:
The information i classed a "metadata," or transactional information.
rather than commun icati on , and
so does not require individual warrants to access_ The document also
specifies that such " metadata" is not
limited to the aforementioned items.
A 2005 court ruling judged tbat cell
site location data - the neare t cell
tower a phone was connected to
- was also transactional data and
so could potentiall y fall under the
scope of the order.
While the order it.self does not in<.; Iude ei ther the conten Is of messages
or the persona) informat ion of tbe
subscriber of any par{jcular cell number. its collection would allow the
NSA to build easily a comprehensive
picture of who any indi vidual contacted, how and when. and possibly
from where, retrospectively.
Perhaps the most disturbing take-away
from the leak of this secret court document ordering Verizon to hand over customer call logs and other data to a federal surveillance agency is the fact that
the government considers the protections
of the Fourth Amendment to be nothing
more than a " parchment barrier" that is
easily tom through. The Obama administration regards tbe Constitution - as did
the Bush administration before it - as
advisory at best.
Of course, being a subcontractor in
the construction of the surveillance state
pays handsomel y. As reponed by THE
NEW A/o.·IERICAN. on August 16. Verizon
announced that it was awarded a 10-year.
$10 billion contract "to provide cloud and
hosting ervices" to Ihe U.S. Department
of the Interior.
Apparently. crimes against the Constitution pay. and they pay very well.

THE NEW AMERICAN •

6 6 16 10 Rh 5
..,......

~~r ooc . ~r

e

~f" nnnr I'>r 0<:'

de TOBER 7. 2013
~""'PIo'OU(oni'loilc;PId"'","""'"
m.~n."f'OUI' fi'tI ..

.L

.L

L.L
1

U.S. governmental e ntities (includ ing
local , state and federal).

.I. .L
.L L
.L
.L

.1.

According to tbe information Snowden
released, both companies that disclosed
govenU11ent surveillance requests - Facebook and Microsoft - were giving the
government access to the private information of millions of users .
They were not alone, however. Yahoo,
Google, PalTalk, AOL, Skype, YouTube.
and Apple all allowed the agents of the
federal surveillaJ1ce slate to secretly snoop
on their u ers.

Every Keystroke Recorded

Under a program code-named PRISM, the NSA and the FBI are "tapping directly into the central
servers of nine leading U.S. Internet companies, extracting alldio, video, photographs, e-mails.
documents and connection logs that enable analysts to track a person's movements and contacts
over time " reported the Washington Post.

Social Media Surveillance
Have you updated your Facebook or Twitter accounts lately? If so, the government
likely knows what you posted, when you
posted it. and who read what you wrote.
According to a statement posted on Facebook' website June 14, government agencies - including federal, stale, and local authorities - requested user data on between
18.000 and 19,000 account holders.
The remarkable disclosure of government requests for users' private information fo llows successful negotiations between Facebook and other tech giants and
the federal government.
Over the pas t few weeks, Facebook
Google, and other technology compani es
who were impl icated in the revelation s
of the covert NSA s urveillance program
known as PRISM have petitioned Lhe reds
to allow them to disclose their level of participation in surveillance· requests received
from govemment entitie .
Under PRISM. the NSA and the FBI are
" tapping directl y into the central server
of nine leading U. S. Internet companies.
extracting audio. video, photographs . emails. documents and connection logs that
enable analyst to track a person 's movement and contacts over time," as reported
by the Wa shington Post.
One document in the Snowden rev elations indicated that PRISM was " the

number one source of raw intelligence
used for NSA analytic repons." Snowden
claimed that the program was so invasive
that the NSA and the FBI "quite literally
can watch your ideas fonn as you type."
Most of these requests by the government are m,ade under (he authority of the
Forei gn Inte lligence Surveillance Act
(F1SA). Nor surpri singly, when Lhe govemment asks the pecial urveillance coun
to approve their s nooping. judges give
them the go-ahead .
iJl fact, in April , Lhe Department of Justice revealed to Congress the number of applications for eavesdropping received and
rejected by the FISA court: In 2012, of the
1,789 requests made by Lhe government to
monitor the electronic communications of
citizens, not a single one was rejected.
Followin g the negotiations that opened
the way for Facebook to report its coopera tion with requests to hand over user
information, Microsoft made a similar
surveillance di closure. A blog post on the
Redmond, Washington-based company 's
website declared:
For the six months e nded December

31 , 201 2. Microsoft received between 6,000 and 7.000 criminal and
national securi ty warrants, subpoenas
and orders affecting between 31.000
and 32,000 consumer accounts from

On July 31 Glen Greenwald publis hed another drip in the ocean of Snowden leaks.
Under a program known as "XKeyscore,"
the NSA monitors and records every email written by eve ry Ameri ca)) , again
without a warran t and -vilhoul probable
cause, in direct defiance of the Fourrh
Amendment.
Greenwald, after examining a PowerPoint presentation included in the information he received from Snowden. explained
the scope of XKeyscore: "One presentation ciajms the [XKey core) program coyers 'nearly everything a typical u er does
on the internet,' including the content of
emails. websitesv iitedandsearche . as
well as their metadata ." "Ana.lysL can al so
use XKeyscore and other ISA systems to
obtajn ongoing 'real-ti me ' interception of
an individual ' i.nternet activity:' he added.
How does it work? Greenwald expla ined that too: "An NSA tool called
DNI Presenter. used to read the content
of stored emails, a.l so enables an analyst
using X Keyscore to read the content of
Facebook chats or private messages. Analysts can also search by name, telephone
nu m ber. lP address, keywords. the language in which the internet activity wa..~
conducted or the type of browser used ."
It is important to note that XKey core
doesn'( record phone conversati ons. There
is evidence, however, that the NSA records
every one of those, as well , and stores the
coment in one of its many data warehou. es, such as the one in Utah that goes online
within weeks.
Of course, there is no doubt that mobile
phone conversations are being recorded.
The federal government i remot Iyactivating the microphones and cameras in

Call /-800· 72 i -TRUE /0 subscribe today!

13

••

6 6 16 10
COVER

~ STORY

001 O(9gtf{n(pf~ rotot

,Ioor .. 1:)/ 12
A"" 1" 1 1 1 "1"
:J J .~/: /-C1
SURVEI ~l.!ANCE·

Android smartphones and Windows laptops, according to a report published by
the Wall Street Journal on August 3.
Citing a "former US official," the Journal says court documents reveal that the
FBI is using a variety of "hacking" tools
to ramp up the scope of the surveillance
of millions of Americans, keeping many
unwittingly under the watchful eye of
Washington.
One of the lou mal's anonymous sources
described a pan of the FB I called the "Remote Operations Unit." Agents in this specialized ullit prefer. if possible, to install the
remote control software by uploading to the
target's computer using a USB flasb drive.
When the g-men-come-hackers can't get
access to the target's computer, they install
the surveillance soft.w3J:e over the Interne!

"usi ng a document or link that
loads software when the person clicks or views it."
It is not only possible for
the federal government to
listen to your conversations
using the microphone in
your Android' smartphone
and watch you while you sit
in your own home on your own computer,
but they do so regularly and can do so very
easily.
Purportedly, the FBI has been using
these methods of surveillance "for over a
decade." but their use has come to light
only recently by way of "court documents
and interviews" with people familiar with
the programs.

Is the NSA Policing Itself?
In what likely amounts to another middling
misdirection. on August 15 the Washington
reponed tba( aD internal audit of the
NSA revealed lhat the agency violated its
own privacy protection rule 2,776 times.
NSA Compliance Director John DeLong tried putting a positive spin on the
report. During a press conference on AuPOSI

ge

_0

gust 16, DeLong assured the media that
the NSA is not involved in " willful violations" of the law.
"People need to unders tand there's no
willful violations here," he ·aid. "We really
do look for them, detect them and correct
them." "No one at NSA, not me or anyone
else. thinks they are okay:' he added.
He additionally claimed that (he number of incidenlal violation s of privacy
laws is "minuscule ... a couple over the
past decade."
Minuscule or no!, why is such a disclosure irrelevam? Consider the following analysis published by Ron Paul on his
Ron Paul Institute for Peace and Prosperity website:
Though it made for sensational headlines last week. the 2,776 SA violations of its own intercept guidelines
over the course of one year are irrelevant. The millions and millions of
"authorized" intercepts of our communications are all illegal - except
for the very few earned out in pursuit
of a validly-i~sued search warrant in
accordance with the Fourth Amendment. That is the real story, Drawing
our attention to the violations unfortunately sends the message that the
"authorized"' spying on us is nothing
to be concerned about.

E-mail and Snail Mail

In a program known as XKeysc'ore, NSA agents use a 1001 called DNI Presenter to read in real
time the private Facebook chats and messages, and stored e-mail of users. Using this application.
agents can search these electronic records by name, IP address, keywords. etc.

The U.S. government is not content. to monitor your phone calls and your Internet activity; it's now reading your snail mail, too.
A story in the New York Times published
Wednesday. July 3, tells the story of Buffalo , New York , resident Leslie James
Pickering. Pickering repons that last September he noticed "something odd in his
mail": a "handwrirten card, apparently delivered by mistake. with instructions for
postal workers to pay special attention to
the lett ers and packages sent to his home,"
the Times story claims.
'rhe card - a picmre or which appears in
the Times story - appears to read: "Show
all mail to supv L
supervisorJ for copying
prior to going oUI on the street." Pickering's
name was written on the card, as well as the
word "'Confidential," written in green ink.
Apparently, Pickering was (he unwitting
target of a "longtime surveillance system"
the Times calls "mail covers."'
THE N£lN AMERICAN· OCTOBER 7. 2013

/4

6 6 1 6 10
..

5

~=t r POe e: r e
3£ Duor M o s

e,I.Qllr iil
lOt
;111

.,

~ '.

,:

'~'!!lB"
'. ,. ,.
,, ' ~
1T'

c

,! ..~ .
'.'

-
JOI,)t8tO' .()tOI

Jr

MOV OX' ~~1iHW
'V8

0010001010
nnn1n111n1

It doesn't stop there. however. While
snail mail surveillance has been a (001 of
law enforcement for over 11 cenrury. (he program that targeted Pickeri.ng is called Mail
Isolation Control and Tracking. As pan of
this Slrveillance tactic. the "Postal Service
computers photograph the exterior of every
piece of paper maillha! is processed in the
United States - about 160 billion pieces
last year. It is not known how long the government saves the images."
When combined. the NSA and the
U.S. Postal Service can keep every fonn
of communication - electronic and conventional - under constant surveillance.
without probable cause.
A mail carrier's mistake led Buffalo, New York. resident Leslie James Pickering to discover the
U,S. Postal Service's long-running program of targeting people for monitoring and recording of
their surface mail. Details of the surveillance program reveal that the exterior of every piece of
mail is photographed by the Postal Service.

All Movements Are Monitored
Beyond the government 's ability to watch
and record every activity carried on in cyberspace. its capacity for keeping an eye
on (he real world comings and goings of
citizens is immensely more jarring and
less publicized.
The U.S. government exercises control
over a massive and technologically advanced camera-based surveillance system
that has the capacity to keep the urban population of this country under the watchful
eye of government 24 hours a day.
TrapWire is the name of this network of
camera, and other surveillance tools . Unlike other elements of the central government's cybersurveillance program. word
about TrapWire was not leaked by Obama
administration in ider . The detall of this
nearly unbelievable urveill ance scheme
were made public by WikiLeaks, the antisecrecy group founded by Julian Assange.
Exactly what is TrapWirc? According to
one de cription of the program. from the
online Ru ssia Today:

closed location to be aggregated
with other intelligence.
As with so ma ny of the federal government's unconstitutional efforts at placing
each and every citizen of the United States
under the never-blinking eye of those who
consider themselves our·caretakers. TrapWire is sold as being a necessary weapon
in the War on Terror.

Taxes as a Political Tool
Other departme n in the executive branch
have done
much to keep an e e on p<r
tential enemie of the stale as the _ SA.
albeit in their own di tinct manner.
Earlier thi s summer. it wa rep0l1ed by
many ouuets (including THE E, AMERICAN) that the IRS was persecuting Tea
Party and other conservative groups by
conducting intrusive and illegal investigations of these groups' applications for
501 (c)(4) tax-exempt status.
Although according to the White House
the discrimination ended in May 2012. on
August 9.2013. the Washington Examiner
reported that an unnamed IRS official testitIed in a closed-door hearing of the House
Way s and Means Committee that " the
agency is still targeting Tea Party groups ."
The implications of tlus abu e are incalculable. In a statement to THE NEW fuv[ERlCA • Senator Rand Paul (R-Ky.) said. "The
power to audj t ha become a poLitical weapon. Nobody wants a government where the
taxing authoriry is used politicaJly."

Former enior intelligence ofIicials
have created a detailed surveillance
ystem more accurate thao modern
facial recognition technology - and
have in. tailed it across the US under
the radar of most Americans. according to mails hacked by Anonymous.
Every few second . data picked
up at surveillance points in major
citie and landmarks across the
United States are recorded digitally
on the spot. t.hen encrypted and instantaneously delivered to a fortified
central database center at an undis-

The use oftaxjng authority as a political
weapon was not confined to conflicts with
non-profit petitions.
In January. Christine O· Donnell. former
candidate for Joe Biden's fonner Senate
seat in Delaware. was informed that Delaware -tate officials had on everaJ occaion acee sed her fed eral tax records to
obtain potentially embarra ing information on a tax lien lhat wa first reported in
a new paper article.
The lien. it was di covered. w erroneou Iy filed. and lhe nooping was di covered.

During congres ional hearing on the
maner and on IRS cormption in general. a
spokesman for the IRS told Senator Chuck
Grassley (R-Iowa) that a Delaware state
investigator was given penni :ion to open
O'Donnell's IRS records.
Based on nothing more than a newspaper story. O'DonneH's political foes were
able to gain access to her very private tax.
information. Most Americans. it would
eem, would prefer that the infonnation
contained in their rRS tile would remain
private. The fact is. however. if an agent
of the government (state or federal) wan
to rifle through that file. rhe IRS require
very little in the way of probable cau e of
wrongdoing. Being a member of a group
whose politics don't jibe with the establishment is apparently sufficient ground
for this very invasive, illegaJ. and UDcon slitutional surveillance.
Despite the government' intrusion

VIWW: TheNewAmerican.com
.;"
-

1

7
5

-m!!iO~C.-l"

f~~,",:.

'

Ir

"OJt cloc~
h~1
fClD oonr-.ce5'
Y'(l~tv

AH , 09

....~. .,

6 6 16 10 .
into Americans' private business, many
Americans dismiss its activities, saying.
"I've Done Nothing Wrong. Why Should
I Worry?" This is the question often put
to opponents of the federal government's
surveillance activity. Furthermore, many
Americans accept the surveillance state
with rationalizations such as: "The government is protecting us from terrorism.
so J think it's fine that they keep an eye
oUI for extremists. If they happen to listen
to my phone calls or read my email, that's
just the price we pay for ~afety:'
In lighT of the protection~ afforded by the
Fourth Amendment, these mentalities look
at the surveillance from the wrong angle.
Americans are endowed by their Creator with Ihe right to be free from unwarranted searches and seizures. When
the government takes away Ihe!;e rights,
then there is no liberty. regardles~ of pretexts and purposes put forth by the fedewl
government.
While it's O1le that most Americans have
"done nothing wrong" criminally spealUng,
it is equally true that most of us have done
many embarrassing things that we would
prefer not to have put in a tile for future use
by political enemies - inside or outside the
government. What are these pO$sible peccadilloes? Think bad credit. poor scholastic
performance, Web surfing habits. sensitive
medical diagnoses, etc.
h is most important to remember that
there is no evidence that the government's
rna ive surveillance and deprivations of
rights has made us any safer. What. then. is
the tnle purpose of the surveillance?
It isn't security. Demanding freedom in
excbange for safety is the economy of tyrants. When the federal govemment - or
any government - robs citizens of their
basic civil rights. then that government has
become despotic by definition.
Benjamin Franklin said., "Any society
that  ould give up a lillIe liberty to gain
a little security will deserve neither and
lose bOlh:' President Oban1a, on the otber
hand, told Americans that we cannot have
a nation that is 100 percent safe and 100
percent private. To be safe. he say. ve
have to make hard choices.
He's right: We must choo e whether to
aJlow our constitutional rights to be subjected to daily diminution or to stand up
ruld demand that the totalitarianism end and
liberty be restored. The question is: How'?
16

6 6 16 10
..,

Christine O'Donnell, former candidate for Joe Biden's former Senate seat in Delaware, was
informed that Delaware state officials had on several occasions accessed her federal tax
records to obtain potentially embarrassing information on a ta)( lien that was first reported in a
newspaper article.

Federalism Protects
Fundamental Freedom
One unwarranted wiretap. one unwarranted seizure of a phone record, one
search of records of an individual's digital communications is too many. If we
are a republic of laws, then the supreme
constitutional law of the land must be adhered to. The standard i not whether or
nOlthe spies or their bo ses think the deprivations are "okay." The standard is t.he
Constitution - for every issue, on every
occasion, with no exceptions. Anything
les than that is a step towru'd tyranny.
Taken together. the roster of snooping programs in use by the federal government places every American under
the threat of constant urveillance. The
courts. Congress. and the pre.sident have
formed an unholy alliance bent on obliterating the Constitution and establishing
a country where every citizen is a suspect
and is perpetually under the never-blinking eye of the government.
The establishment will likely continue construction of the surveillance umil
the entire country is being watched
around tbe clock and every monitored
activity is recorded
and made retrievable by agents who
will have a dossier
on every American .
The fight can yet
be won, tbough.
Americans can attack the sprav.ling

• • .,.••

•

surveillance stale on several fronts. First.
we must elect men and women to federal
office who will honor their oaths of office (0 preserve, protec!. and defend the
Constitution . Then , once in office. each
of them must be held immediately nccoulllable for each and every violation of
that oath.
Next. we must fill our state legislatures
with men and women who will refuse to
enforce any act of Ihe federal government
that exceeds the boundaries of its constitutionally granred powers. These lawmakers
must force the federal beast back inside its
constitutional cage and never accept even
a degree of deviation from the blueprint
drawn in Philadelphia in 1787.
Though the hour is late. there is still
hope , Beginning today, Americans can
refuse to re-elect any lawmaker who has
voted to fund the NSA or any olher federal agency wbose exislence is not specifically permitted by the Constitution.
We can unite, as our forefathers, in the
ennobling cause of the end of tyranny and
the promotion of those unalienable rights
granted to us - and revocable only - by
our Creator. •
')OI ,H~!lO'

MOV DX: ~~~HW

.OflJ I :) r

•

SURVEI I!l!'ANCE

COVER
STORy .......

The NSA Domestic Surveil ance Lie
When accusations of spying on Americans were first leveled at the ~SA, the government
claimed there was no illicit spying. Then it had to backtrack again and again.
try was strictly limited to likely terrorists
- people that couns ruled to be dangerous
based on the available evidence. Presidell!
Busb stated on April 20,2004:
There are such things as roving wirelaps. J ow, by the way. any time you
bear the lh ited States government
talking abo ut wiretap, it requires - a
wiretap requires a court order. Nothing ha changed, by the way. When
we' re talking about chasing down
terrori sts, we're talking about getting a court order before we do ~o.
Ii's important for our fellow citizens
to understand, when yo u think Patriol
Act. constitutional guarantees are in
place when it comes to doing what
is necessary to protect our homeland.
because we value the Constitution.

IEdwardS'nowden: The former NSA contractor and whis!leblower has stopped an ong oing snowjob by federal off1cials about NSA decimation of the Fourth Amendment.
by Thomas R. fddlem
".A Ild so ill light oj the chll/lged environment lvhere {/ whole set oj questions have
been miser/, some in the most sensatiollalized manner possible, where these leaks
(JTe released drip by drip, one a week,
/() kind of rnaximize attellliOIl {Ind see {(
they can catch us a l so/)/e imprecision 011

ollie /iring. "

- President Obama, August 9, 20J 3
press conjerence

P

resident Obama' s unprecedented
press conference on NSA surveillance August 9 ~omplained about
'the journalistlleaker team of Glenn Greenwald from the Brirj .. h new. paper The
Guardian and former SA contractorturned-w hi stleblower EdwaJ'd Snowden.
implying that the two were merely trying
to draw attentjon to themselves and bait the
administration into admitting something
inconsistent with what it said previously,
hence giving the pair something else to use

to draw even more attention to tJJemselves.
However, in chast ising the pair' news release, on the NSA , it was ve apparent that
Obama's press conference was a desperate
attempt at political damage control. with
Obama try'ing to con. truct a new. credible
lie upon which he could claim that the NSA
had never violated the Fourth Amendment
or the pl;vacy of American .
Widespread surveillance of Americalls
began shortly after the September 11 , 200 1
attacks uJJder the Bush adminisU'ation, and
received some attention with rep0l1ing by
the New York Times from 2004-2006. Despite the reporting on SA surveillance.
Bush - and later. Obama - administration personnel is ued official denials that
the NSA was lis tening to AmericaJJ citizen ' electronic communications.

We're not collecting data
on American citizens.
The Bu. h administration. which initiated
the denials of spying on Americans. implied
that any U.S. urveillance within the coun-

On March 20 of this year. the director
of national intelligence, Admiral James
Clapper, also denied that there has been
wholesale monitoring of Americans· communications, when he was asked by Oregon Senator Ron Wyden, "Does the NSA
collect any type of data at all OIJ million
or hundreds of millions of AmeriCaJls?"
Director of National Intelligence and
Admiral James Clapper: "No, sir."
Wyden: " It does not?"
Clapper: "Not witlingly. There are
cases where they could inadvertently
perhaps collect, but not winingl y,'·

Oops. We meant to say we are
collecting metadata on Americans.
Both administrations engaged in flat out lies to the American people, but the
Obama administration has been caught in
lie after lie as it continually re treaLS from
iu; offic ial story.
The official story changed dramatically
with Snowden's whistleblowing. Snowden
told Greenwald back on June 9. 2013 that
the NSA - once devoted to foreign intelligence - was increasingly foeu ed upon

Calf 1
-800-727-TRUE to sLibscribe today l
-

,:
'.

--t -....'
~

-InliAti Itlic..'
r I

~.-

17
lie

,.

•

t•

• •

•

•
I .

I

'0010(99rmQ(YHfHOtOt

.

,Ioor

,IJAT2
.J ].~A;- AD

nnn1 n111 n1 n

Sl!JRVEI~l!'ANCE ·

On

USA 2013 conference. NSA
Director General Keith Alexander laid OUI the e ntirety of
what the NS A was supposedly collecting:

~----' ,:1
July.. 8,2D13,

NSA Director General
Alexa~nder : admitted that the NSA does
collecMhe'·'content" of Americans'
~';H':".
p-ersonatcommunications but, he
.•
insisted~thegovernment is not listening
r...c
to or., si!~ji1g . through the collection of data
on Am.e'jcans;
'

~-.

,-!!~

~ft.

surveill ing Americans. ''The NSA speciticaUy targets the communications of everyone. It ingests them by default. It collects
them in its system and it filters them and
it analyzes them and it measures them and
il stores them for a period of lime." It had
gone so far. the former Booz-Allen-Hamilton employee claimed. "I. sitting at my
desk . certainly had the authority to wiretap anyone. from you or your accountant.
to a federal judge or even the president. if
I had a personal email." Though Obama
admini stration officials denied Snowden's
sweeping charges (Snowden was later validated), they had to backtrack after Greenwald publi shed information on the NSA's
collection of Americans' Internet " metadata" under the agency's PRISM program.
James Clapper retracted his statement
10 Wyden Oll June 9 during NBC's Sunday
Today show:

[ thought it would be imponant [0 give you a picture of what our analysts
actually see. There it is ...
as you can see. what you
have is the dale and ti me of
the call, the calling number
and the call- the duration of the call.
And we also put in the origi n of the
metadata data .... Tllis does not. include
(he content of the communications.
TIllSdoes no! include yo ur phone caJls
or mine. your ell1ails. nor mine, your
SMS messages. There is no content.

By the time Alexander said those words.
they were already out of date . That same
day Greenwald publi sbed in The GUa/dian infomlation on the SA' XKeyscore
program, a program thm collects. miJlions
of e-mails from American cifizens w ithout
a warrant. along with '''nearl y everything
a user does on the I.nternet." La ter. other
NSA programs were also revealed to have
collected Americans' e-mail me sages on a
massive scale. In response to being busted
on this lie, the Obama admillistration bad
another fallback upon which to rest their
damage-control program: Even though

they are collecting all Americans' Internet
data, including the full content of e-mail
messages, the data had never been mi. used
and are subject to multiple _afeguards. Of
course. the Founh Amendment to t}le U.S.
Constit*ion prohibiL~ not only wanantless
"searches" by the government , it ban government "seizllres" of records without both
a warrant and probable cau e as well.

We're not misusing the
personal data that we do collect.
In a televised interview on July 18, 2013,
NSA Direc(or General Alexander admitted
thaI the NSA does collect the "content" of
Americans' personal communications but.
he insisted. the government is not listenjng
to or sifting t.hrough the colleaion of data
on Americans. The NSA ha safeguards
again t actual1y searching Americans' da ta.
NBC Reporter Pete Williams: " Let's
talk about the phone program. You
gather all tbis data from the phone
companie and it sits in YoUt' big tank.
What can you do? Can you muoch on
it and chew on It and do data mining,
or does it just sit there until you have
some specific question?"
Gen. Alexande r: " Yea h. it sits
there. And that's a great ques tion because the coun restricts wbat we can
do with that data. We can only look
at that data if we have a nexus to alQaida or other terrorist groups."

I re.sponded in what I thought was
the mosl truthful, or least untruthful
manner by say ing no. And again. ·10
go back to my metaphor. What I was
thinking of is looking at the Dewey
Decimal number - of those books
in that metaphorical library ~ to
me, collection of U.S. persons' data
would mean taking the book off the
shelf and opening it up and reading it.

We're not collecting e-mail and
other private Internet messages
from Americans.
This firsl of several backtracks was followed by the next fallback line in NSA
denial soon thereafter: The NSA admitted collecting data on American , but only
metadat3 - information aboUl Inte rnet
traffic - not private e-mails and other priate Internet-based mes ages.
On Jul y 3 !, 2013. at the Black Hat

Should have read the morning paper: NSA Director Keith Alexander claimed at the July 31
"Black Hat" conference that NSA surveillance "does not include your phone calls or mine, your
emails, nor mine," the same day that Snowden/Greenwald revealed in the U_K. Guardian that the
XKeyscore program did include contents of e-mails.

1
8

THE NEW AMERICAN • OC TOBER 7. 201 3
,Q
,.

..

, ,,...

"co.
•

~

.. " . ..:

'.~
tL~

I

•

~j ..

1.

'._
~

-
I

)ll')f~r(~



) I

I'll

I

Ulel)t

MOVDX' ~~ HW
1;
,

001000
000101

This was the fallback position of the
Obama administration throughout the
month of July. They essentially claimed
thar the NSA was collecting all types of
data on Americans. but that this collection is put into a Iype of legal lockbox
that is not touched without a warrant and
a coun order from a FlSA court. But by
August 15, the Washingtoll Post had reponed that the NSA had violated the privacy of Americans' data - and had violated its own rules - thousands of times
per year. Thus. !.he Obama admjnistration
was forced to fall back to the next tie. th at
the NSA had never intelltiollally violated
Americaos' privacy by searching their pri vate e-mails aod phone records.

Okay, our collection of data on
Americans has been abused
accidentally, but never deliberately.
Obarna then wen'! on hi national public
relations tour for the NSA"s unconstitutional wiretapping program. again assuring Americans lhat !.heiJ private information was safe in his admini stration's hands.
He said in an interview with Jay Leno on
the Tonight Sho w on August 7. 2013:
We put in some additional safeguards
to make ure that there 's federal
court oversigl1( as well as congressional oversight. that there is no spying on Americans. We don ' t have a
domestic spying program. What we
do have are some mechanisms where
we can track a phone number or an
email address that we know is connected to some sort of terrorist threat.
And that information is useful. But
what I've aid before I want to make
. ure I re peat. and that is we should
be skeptical about the potential en croachment.. on privacy. None of the
revelation s s how that governmem
has aCLUally abused these powers.
but they're pretty s ignificant powers.
He reiterated his administration' s Iilywhite hands agaiJl at a press conference
on Augu st 9, 2013:
If you look at the report s - even the
di sclo tires that MI. Snowden has put
forw ard - all the stories tbat have
been written, what you ' re not reading about is the government actually
www.TheNewAmerican.com

Believable? Federal officials claim that this behemoth storage facility in the Utah desert is needed
to store only five columns of data on Americans' telephone traffic.
abusing these programs and listening
in on people's phone calls or inappropriately reading people's emails.
What you 're hearing about is the
prospect that these could be abused.
Now, part of the reason they're not
abused is becau se these checks are
in place , and those abuses would be
against the law and would be again t
the orders of the FISC.
Two wee ks after Obama's national public
relations tour for the NSA. the Wall Street
JOl.lmo[ revealed on August 23 that NSA
staffers had used the databa es to spy on
romantic imerests frequently enough to
create the label "LOVE[NT' for Jove intelligence:" lationa] SecurilY Agency officers
on several occasions have channeled their
agency's enormOliS eavesdropping power to
spy on love interests. U.S. officials said."
The privac. of Americans has been abu ed,
the Obarna administration has been forced
to admit. but faced with the evidence. it
claimed in statements for the Wall Street
JOllrnal "lOry that it took place only rarely.
The Waif Street Journal reported that "the
practice isn' t frequent - one official estimated a handful of cases in the last decade
- but it's common enough to garner its
own spycraft label: LOVEINT"

We're not collecting the phone
audio of Americans' phone calls.
While it 's too early to say whether the
NSA is collecting audio of Americans'
telephone calls, it does remain the last el-

ement of eleclTODic data tbat the NSA still
officially denies collecting ellll1{fsse. Most
intelligence analyst seem to believe that
Americans ' phone call ' are not recorded
and stored for later u e. or at least most
of American . phone ca.ll . But lh i may
be largely all i sue of technologi.cal limitafion rather !.han williDgne~ of the SA
to engage in that kind of ncon titutional
monitoring. As tbe SA open a huge data
center in Utah tlli year. technologjcal limiralions rna become a moOt point .
Obama pointedly did not deny lhat the
federal government wa collecting the
audio of Ame rican' telephon e call - in
his August 9 pre. s conference. though a
denial would have: perhaps been a  a te
of time. With a long history of publ ic lies
Oil the issue of warrantless ur ei llance
that explicitly violates the Fourth Amendment: to the U.S. Con litution, Pre ident
Obama's denial would not bave been
believable anyway. Obama has obviou I
bought into the idea that intelligence officials need to collect every bit of informarion about Americans, stari ng in hi August 9 press conference: "W e need new
thinking for a new era. We now have to
unravel terrorist plots by fi nd ing a needle
in the haystack of g lobal telecom munications. And meanwhile. technology has
given government - including our 0  n
~ unprecedented capabilit)' to mo nitor
communications."
Is another lie about to be e xposed by
lhe Greenwald/Snowden whistleblowing
[earn? Only time will tell . •
19

6 6 16
CULTURE

The Slippery Slope to Pedophilia
It is unlikely that many Americans now believe that pedophilia will soon be accepted in
this country, but it is riding the same track to respectability as did homosexual "marriage."
by Selwyn Duke

f you had told someone in the 1950s
that, in about two generations, homosexuality would largely be nomlalized
and faux (. ame-sex) marriage would be
gaining widespread approval, they'd have
called you crazy. Never, ever under the
stars and stripes. Why, pugnacious pundit
Bill O ' Reilly himself opined as recently
as 10 to 15 years ago that faux marriage
would never be accepted in America. Ah,
what a difference a decade makes in tbe
(mis?)information age where ideas can be
transmitted worldwide at a button's touch.
I can't tell you exactly when I knew
faux marriage would gain traction - not
in term of date and time, anyway - but
suffice it to ay it was at least as soon as
1 heard the idea uttered by some obscure
academic or activist 00 society's fringes.
A for homosexuality, there were some
agaciou souls who realized decades
ago Ihat it would even,uall y be accepted.
How? The same way a few of us knew in
high school, almost instinctively, that our
education paled in comparison to that of
previou generations: trajectory. If you
know an a teroid ' trajectory, you can predict not only where it was years ago, but
where it will be in the future, And so it is
Wilh cultural trajectory.

I

Terrible Trajectory
Yet if l , ay chat our current cultural trajectory - a bizarre trek that has caused us
to boldly go where no American had gooe
before - has as a point on its arc the acceptance of pedophilia, I'm sure I'll hear
"never, ever under the stars and stripes!"
This is a normal human reactlon. But the
pa t is a picture of futures man inevitably
will paint again. and history hollers its
wamings for those with ears to hear.
Fir. t consider a simple fact: There is
virtually no historical precedent - if any
at al1- for faux marriage, yet we're accepting it. But tbere is gre.at hi storical
Call 1-800-121·TRUE to su bscribe today!

From unthinkable to palatable: While faux (same-sex) marriage now enjoys 'lidespread
approval, two generations ago it was as much reviled as pedophilia is today - something thai
"could never happen" in America.
precedent for pe.dophilia that lhing most
would currently say we could never accept.
And the obvious place to start here is with
ancient Greece. The civilizat ion is wellknown for its acceptance of homosexuality, yet what actually was most common
in this arena was pederasty, sexual relationships between men and boys. It is said
that in the mid and late periods of ancient
Sparta, the practice was inst itutionalized
in the city-state's military camp, with a
12-year-old boy being attached to a mature
man wbo would become the child's me .
tor and, apparently, molester, And homoerotic ancient Greek art and, more signjficantly, the casual way prominent Greeks
spoke of pederasty attest to its widespread
acceptance. As to the laller, historian Plutarch addresses Theban pederasty in Life
of Pelopidas and explains that it was an
educational device for boys that was dc:signed to 'soften , while they were young.
their natural fierceness" and 'temper tbe
manners and characters of the youth."
The poet Solon gushed about pederasty in
his poem 'Boys and Sport," and tradition
tells us thaI the warrior group the Sacred

Band of Thebe compri ed pederastic
man-youth pairing ". In fa t. the Greeks
even had words de ribing the players in
man-boy relatjon 'bip~ : An eraSfes was an
adult man who courted or was ill a sexual
relationship with a boy (Ihis accounts for
part of the deri ation of "pederast"), who
himself was l"llown as an eroll1enos.
Yet it wasn'tju_1the "advanced" Greeks.
History i littered with examples of primilive peoples that practiced institutionalized pedophilia: the Sambia tribe of Papua
e Guinea doe so to this day, and many
mjlitary per onne! will attest to how the
abu e of "dancing boys" is widespread in
Afghani tan. The reali ty? When it wa. n' t
acrually prescribing it as a good that created a bond between brotllers in arms or
er ed some other end, pagan morality
often had little negative to say about pedophilia (and Islamic culrures may tolerate
it). Perhaps now we see why philo opher
C.S. Lewis once said, "Sex is not rne. sed
up because it was put in the clo et; it was
put in the closet because it was messed up,"
And since that closet was made with Chri tian morality, and the faith is no ridiculed
21
and attacked and its closet is being thrown
wide open, isn't it logical to suspect that
anything and everything within it could,
quite possibly, emerge? Yet how would
we get from where we are now - perhaps
point G - to a pederastic point X? Well.
it's instructive to explore how we got to G
in the first place, and this brings us to the
ABCs of social manipulation via the lise of
media. entertainment, academia, specious
science. and philoso-babble.
A book was published in 1989 entitled

After fhe Ball: How America Will Conquer
ITs Fear and Hatred of Gays in the 90 's.
Tn it. authors Marshall Kirk and Hunter
Madsen - a marketing man by trade who,
take note, once used the pen name "Erastes PiJl" - called for a desensitization of
Americans to homosexuality through a
"continuous flood of gay-related advertising," a "conversion of the average American's emotions, mind, and will, through
a planned psychological attack, in the
form of propaganda fed to the nation via
the media." Of course. Kirk and Madsen
weren 't puppeteers or prophets as much as
good trajectory readers, as the movement
they encouraged was well under way by
the time they penned their book.
III 1977 already, we had the sitcom
Soap witb its openly homosexual character Jodie, played by comedian Billy Crystal. And while some would argue that lhe
character Va created to make the show
cutting edge rather than to manipulate
hearts (and. of course, both could have
been motivations), it certainly made for
ingeniou: propaganda. Take a funny and
sympathetic character - and Crystal was
most comedic - but make him a homosexual on an entertairlillg show that is tbe
"tbing to watch." TIus is effective because
whether it s Soap, La Cage aux Folies, or
another work, if you laugh at something
enough, you're no longer outraged by
it. AJso be sure to have that homosexual
character say things such as "I m a perSOll. just like you." which Jodie did (or a
paraphrase of it), but. most significantly.
just show him acting. and interacting with
other, just as you would. For a big part of
normalizing something is showing those
who embody it acting normally.
The next step after normalization alld
tolerance is engendering sympathy and affection, and elltenaimnent's role in this is
simple to understand. Just as people may

-

zeitgeist

news
north ameritan mon/boy love association

_
......
w-.,~~

......... 'IIQ
""" 11 WMI8o)' ~1

--,,-

-_
-_
--.-

_on

Cwid I>y~ l'lIf moler. $cuIP ..... by 8o!lel TlIoMoIdsen (0.
CIdt ... " ' - _ . , golOenw

Whal'sNew

177~ltW.)

Wlldme.s. eo.m-on.

-....

...

..,."

-....

Resurrecting a dark Hellenism: The notorious pedophile organization NAMbLA seems to
draw inspiration from ancient Greece, where pederasty was rife and well represented in the
civilization's art and literature.
condemn the sin but no! the sinner. they
also have trouble loving the sinner but
not the sin. Tlus is why a mother may accept even a son's heinous crimes and why
people will justify the scandaJous behavior of a favorite politician or pons figure.
Likewise, when people come to like a show
- and, more specifically, a character on it
- they generally start to accept what that
character represents. And just think bow
successful this entertainment campaign
has been. Homosexual characters are now
a staple ofTY and film and, as ill the movie
Sling Blade, are sometimes the work's only
compassionate voice of reason.

Enter Entertainment
But the·1l tJlere are the agencies vorking in
concert with entenaimuent. There is specious science reponed - and often twisted
- by special-interest media and academia;
thus do we hear about things such as the
"gay gene," which not only doesn 't concern the heritability of happiness bu! also
ha never been found. Nonetheless, it is
used to give weight to the argument that
homosexuality is inborn and, well, haven't
you heard, "God doesn't make nustakes" ?
The media and academia are also careful to
frame the homosexual agenda as a matter
of "rights," '·equality." and " minority" victimhood while avoiding talk of "morality"
(tbey will, however, apply their feelingsderived preferences and call opponents
"haters," "bigots," and " intolerant"). This

is easy to do. too, since they've discredited
moral reaJity with the phi!oso-babble of
moral relativism and its refrains, "Who is
to judge?"' and "All values are equal." Of
course. this credo could be used 0 justify
killing homosexuals as easily as acceptill,g
them, but this realization involves understanding an ;l!feileclt/(J/ argument, and manipulating emotion is tJle name of the game
here. And as long as entenainment - an
arena so powerful that Plato warned how
even ju tmusic had the capacity 0 reshape
civilization - pushes people's emotions in
the desired direction, the field wi II be yours.
But will a day really come that marks
the first time entertainment is placed in pedophilia' s service? And when would this
be? I can predic.t this with some precision:
in about 20 years ago.
There ha long been the "Pedobear' Internet meme, a little comedic cartoon character Web users often associate with news
stories about pedophilia. And remember
what happens when people start to laugh
at something? Then there was the "Chester
the Molester" cartoon character in Hustler
magazine (the creator of which, Dwaine
Tinsley, was once convicted of molesting
his 13-year-old daughter). Far more significant than a porno-mag offering, however,
was a fum made in 1993 called For a Lost
Soldier. Based on a trlle Story, the movie
somewhat vividly portrays a WWII-era
sexual relationship between a Canadian
wldier and a 13-year-old European boy.
What I'd like to focus on here, however, is
a New York Times review of the Ii 1m wrinen
by someone named Stephen Holden. Entitled 'Treating a Delicate Story of a Soldier
lUld II Boy Tenderly." you'd think the paper
was reviewing Romeo alld Juliet. Holden
writes that the story "takes up ... a romantic reLationship between a grown-up and a
child, and invests it with an aching tenderness"; that it is "more than a love story";
that "Walt [the molester) seems almost as
innocent as Jeroen [(he child]": and describes the "affection" between the two as
"touching." Moreover. the Times not only
takes no issue with the film's non-judgmental treatment of pederasty, it writes, "One of
the strengths of the fi Im is its refusal to load
the story with contemporary psychological
and sCicial baggage. There is no mention of
homosexuality. Nor is there any implied accusation of child abuse .... The film assign
no blame and assesses no damages," In facl_
the paper says the movie's only failure "i
in findin g a coherent dramatic frame for
the story." And then there is the kicker: The
review describes the "affection" between
Wah and Jeroen as "the love that dare not
speak its name." My, where have we heard
that one before? And what is the implication here? Should a man-boy sexual relationship be able to speak its name? NA1 1
BLA cenai.nly thinks so.

First salvo in the movement to legitimize
pedophilia: The film For a Lost Soldier portrays a
man/boy sexual relationship in a non-judgmental
- and perhaps even positive - light.

www.TheNewAmeric8fJ.com

A more recent film in the same
vein is L.I.E. (2001). II portrays
Authors Marshall Kirk and Hunter
pederast Big John, an ex-marine
Madsen - a marketing man by trade
with a penchant for young male
prostitutes but who also, you see,
who, take note, once llsed the pen
has a human side. As Ed Gonzaname "Erastes Pill" - called for
lez wrote at SlantMagazine.colJI.,
the film "suggests that a pederast
a desensitization of Americans to
could actually have something
homosexuality through a "continuous
useful [to] contribute (0 society."
Alld as A.O . Scan of the Ne w
flood of gay-related advertising. "
York Times put it. compared " with
Howie's L
the 15-year-old main
ch aracter's1 well-meaning but clueless Scientific Stamp
guidance coun selor, Big John seems like a Actually. they're already behind us.
beuign, common-sensical uncle."
On January 14 of this year, the Los AnOf course, neither Big John nor For a gel e Time ran an anjcle entitled. "Many
Lost Soldier 's Walt is portrayed as par- researche laking a different view of pedoticularly sympathetic. But they're not por- philia: Pedophilia once was f/roughffo Sfelll
trayed as particularly villainous, either. from psychological influel1ces earh' in life,
And lhis non·judgmentalisl11 is in faCl a NOI~ ', mal1Y e.xperts view iT as (I deep-rooted
judgment, in that it serves to place. via predi position lhar does nOl change." (Emembodiment representation , morally evil phasi in original.) The pi ce starts out with
behavior in the morally Il elllral category. a story about one Paul Christiano, who, as
Except for their habit of indulging the an- a young child, was fascinated by girls and
cient Greeks' "unspeakable vice," Walt loved "bow lheiJ' pindly bodies tumbled
and John are presented as acting . and in g. mnastic ." wrote the paper. We 're
interacting with others, normally - and then told tbat while Chri tiano grel,l.' up.
often even charitably. After all; they are his eXll31 t Ie didn ': He remained tor"people just like you," right?
mented bj an attraction to pre-pube C
eDt
That is how it starts .
girl s. Christiano i tbe " ympathetic charWith enten:ainment having already bro- acter:' mind. ou, the haple olll me.:1nt 10
ken the ice in whitewashing pedophiles, put a human face on pedophil ia. But now
can lhe ti.rst clai ms that their desires are just consider -hal he said about un ucce sf1.l1
court-ordered the rap_ he Vas forced to
another inborn olientation be far behind?
undergo after being caught wilh child pornography in 1999. A the Times reponed,
"'These people felt they could snuff out the
desire. or hame me into denying it exi sted:
he said .. But it" as intrinsic as tbe next person' helero exualirj'... '
"A imrin ic as ule next person 's heterosexuality .. , " Where have we heard that
befor '. And the paper then does something el-e th at hould sOllnd famili ar. It
gi e Christiano'S claim the imprimatur
of s ience, writing:

When laughter is the worst medicine: Will
things such as the "Pedobear" Internet meme
eliminate outrage over pedophilia by treating
it not as a jarring perversion, but as a joke?

In the laboratory, researcher are
coming to tJle same conclusion.
Like many fonns of sexual devi ance, pedophilia once was thought to
lem from psychological in fluences
early in life. Now. many experts view
it as a sexual orientation as immutable
as heterosexual i ty or homo e:'Ualit},. It
is a deep-rooted predi po irion - )jrn23
attractions were removed from the APA's
list of disorders. Eventually, the legalization of 'gay marriage.' the mandatory homosexuality lessons in public schools and
the brand new policy of allowing open homosexuality. in the U.S. military resulted:'
writes WND. Reponing fu rther on the positions taken at the conference. WND wrote:

Out of raincoats and into the mainstream: Child-sex advocates now include accomplished
professionals. Or. Fred Berlin (pictured) of Johns Hopkins Hospitat. for instance. has argued for
the "acceptance" of pedophiles.

iled almost entirely to men - that become clear during puberty and does
not change ....
Scientists at the Toronto center
[Center for Mental Health and Addiction in Toronto J have uncovered a
series of associations that suggest pedophilia has biologicaJ roots.
The paper then tells us that pedophile are
generally an inch honer than nonna! people, have I.Q.s IO points lower on average
and less white matter in their brains. and that
the first two of these factors are '·consistent
with developmental problems, whether before birth or in childhood.'· They sure areand their interpretation is consistent with a
cultural problem. The operative phrase here
is "whether before birth or in childhood"
because. if the latter, it iJldicate a nunureoriented cause of pedophilia. not a natureoriented one (as to nurture's significance,
research has indicated that environment can
influence even, amazingly, gene expre sion). Yet the limes article glosses over the
nurture p sibility - it doesn I match the
agenda the paper is trying to advance.
There i another fact the Times has
LO ma sagc. Continuing with the inborn
theme. it tells us. "Among the 1U0 t compelling fiJldings is that 30% of pedophiles
are left-handed or ambidextrous. triple the
general rate. Because hand dominance is
establi hed through some combination
of genetic~ and the environment of the
womb. cieotists see that association as a
powerful indicator that something is different about pedophile.s at birth. 'The only
24

explanation i~ a phy iological one: said
James Cantor, a leader of the Toronto] research." Yet the lillie had written earlier
in its piece that. researcher have basically
dispensed with the "popular belier' that
childhood sexual abuse i a significant
factor in pedopbllia becau_e "only about a
third of offenders say the were molested"
as children. So let 's get thi sUllight: When
30 percent of pedophile hare ome sort
of inborn characteristic, it's compelling
evidence for the nature the i . But when
(only?) 33 percent share a traumatic life
experience, it's compelling evidence discrediting the nurture one? This clearly is
the spinning of data to fit an agenda.
And who are the "experts" cited in the
Tillles article? Many of them, it seems.
crawled out of lhe woodwork to allend a
2011 symposium in Baltimore, Maryland
- an event whose focu. was the nonna!ization of adult-child sexual relationships.
WND.com reponed at the time that it was
"held by the 'minor-attracted people ' advocacy group B4U-ACT 10 di seminate
'accurate information' on the position that
pedophilia is just one more alternative
sexual orientation." As such. the confercncc speakers contended, the American
Psychiatric Association should no longer
list pedophilia as a psychological condition
in its Diagnostic and Statistical Manual of
Mental Disorders (DSM). Drawing an imponant parallel. Dr. Judith Reisman, a longtime crusader against child sexual abuse
who attended the symposium. "explained
that the same . trategy was used by homoexual aClivis~ in the 19705 when same-sex

Dr. John Sadler (University of Texas)
argued that diagno tic criteria for
mental disorders hould not be based
on concepts of vice iDce uch concepts are subject 10 shifting social al'
titudes and doing so diverts ll1entalhe<llth professions from their role as
healers ....
Fred Berlin of Johns Hopkins ...
argued in favor of "acceptance of
and compassion for people who are
attracted to minors ......
... Richard Kramer. who represented B4U-ACT at the event, contended listing pedophilia as a disorder stigmatizes the "victims" of the
lifestyle choice.
... Conference speakers said the
Diagnostic Manual should "focus
on the needs" of the pedophile and
~hould have "a minimal focus on social control" rather than a focus on
the "need to protect children."
. .. Self-described "gay activist"
and speaker Jacob Breslow said it is
proper for children to be "the object
of our auraction." Breslow said pedophiles shouldn 't need to get consent
from a child to have sex any more
Ihan (hey would get consent from a
shoe to wear it.
.. , Andrew Hinderliter of the University of WillOis said the boundary
between the helping profe - ions and
the criminal justice system can be
blurred .
Note that B4U-ACT lakes pains to reb rand
pedophiles as "minor-attracted people" in
the same way acti i, t once strove 10 ensure the euphemism "gay" would supplant
"homosexual."
Liberty Counsel Action vice president J.
Man Barber.  bo also attended the conference, summed up its themes thus (quotation are Barber's, as reponed by WND):
Adult lu ( for children is "normative."
people indulging i[ are unfairly "de01onTHE NEW AMERICAN • OCTOBER

7. 20 13
ized ," children are capable of consenting
to sex, "wrong" as a concept isn '( applicable to "minor-a((racted people," and
the OSM "ignores that pedophiles 'have
feelings of love and romanc-e for eh i ldr<;,n'
the same way adult heterosexuals have for
each other."

logically Defending Illicit lust
Just as significantly, these are far from
the only times such views have been expressed. In a 2002 article entitJed "Raising
Sexually Healthy Youth: Rights. Respect.
Responsibility & Parent-Child Communication," the group Advocates for Youth
stressed that chilureJl are "sexual f!'OIIl
birth." Ann-Katrin Muller in Der Spiegel
reported that GenTIan homo exuaJ "rights"
organizations and even a sizable number
of Green Party politiciaos have a long hi story of sllpponing pro-pedophilia causes.
Author Judith Levine penned a 2003 book
in which she " suggests the threat of pedophilia and molestation by strangers is
exaggerated by adults who want to den,
young people the opportunity for positi ve
sexu al experiences " wrote Fox ews.
An ti-fracki ng activist Vera Scrogg in s
has advocated that parents initiate young
children into sex, writing. " Who better 10 do it , than the parent s first ?" And,
of cour e, (here is bug researcher turned

self-proclaimed sex expert Alfred Kinsey, who we now k.now
was a pedophile using science
as a cover for the indulging of
his perversion. As 1 reported in
"According to Kinsey, Deviancy Is the New Normal," in THE
NEW AMERICAN. all the afore~entioned
ideas - that children are sexual from
birth. that relations with adults don't hann
them, etc. - can be traced back to him
and his associates. And these ideas are lent
credibili ty even though it has been establi shed that Kjnsey was a scielllific fraud
who misrepresented data for the purposes
of legiLi llllzillg perve r~iull.
And when you combine tills specialiotere t "science" with specious rea oning, you have a very dangerous one-two
pu nch of prevaric ation. For example .
consider again the Los Angeles Times
article. It does contain a grain of truth.
Th at is to say, people generaJly don ' t ask
for the fee li ngs they have, and. as C.S.
Lew is noted ages ago, sex.ual problems
can be quite intractable. Yet it's silly and often just agenda-gre.asing spin - 10
confuse intractability with innateness . We
all know that inlluences and e vents during form ative years can have far-reaching
consequences and can almost imprint behav ior (that is why they're called Jonna-

The pseudoscience used to justify pedophilia - such as the notion that "children are sexual from
birtl1" - can be traced back to "sex researcher." scientific fraud , and pedophile Alfred Kinsey (left).
Call 1-800-727- TRUE to subscribe today!

live years); raise a boy in an abusive and
criminal ghetto home, for instance, and
he may ex hjbit change-resistant negative
behavior patterns the rest of his days. This
also place in perspective a claim made
by many a homosexual: 'I've had these
feelj ng for my whole life." This is either
sloppy thinIJng or a rationalization. Since
most everyone ha. recoUeclioos reaching
back to onl three. four or even fi ve years
of age, all virtually anyone can say with
assurance is, " I've had these feelings for
as lOllg as I can remember." And those
lost-in-memory first few years of life are
the most ignificant of aIL

Without Morals, Everything Is Normal
The fo lly of the int ractab ility-equ alsirmatene the is is further illustrated by
applying it con istentl .. For example, it's
applied to homosexu ali ty and "gender
dys phoria" feeling you're a member of
one ex rUl:k in the body of the other) , but
what about "Body Integrity Identity Disorder" (BnO .  hich in·. oh persistent and
eemingly irremediabl feelings that a body
part doe n't belong on yo ur body? Would
it justi fy amputation? Acnmlly. two BIID
"patients" found a Scotli'h doctor will ing
to do ju I lhat and had two healthy legs
rernoved, a teslirnonial to what can happen when We e.levate feelings to uliimatearbiter latus. When be et by anomalous.
eU·-de. tru th e. or perverse impulses. the
default ill umption should be tbat the issue
is a p_ychological problem , not a phy icaJ
or genericaJJy induced one.
But rhi, counsel is now viewed as heresy because the "experts" have transitioned
bac k to the nature side in the narw-e/ nurlure debate (at least wben poli rical correctne_ allows it: They certainly won 'r
attribute different achievement among the
races to genetics - yet). It was in fa hion
during the early 1900s as well, then in the
form of the eugenics mo'ement. until the
a sociation with Nazi horror- di credited
it. We then saw nurture dogma' a cendancy and heard pap such as. "The sexe
will be the same if we rai se them iden25
The gene theme: The claim that a behavior cannot be wrong if it has a genetic basis is
philosophically unsound, in that it replaces morality with biological determinism. Also, other
genetic flaws, such as Down syndrome, aren'l deemed normal.
tically:' as these pendulum-and-pabulum
practitioners swung from one extreme to
the other and proved that G.K. Chesterton
was right when he called common sense
"that forgotten branch of psychology."
But of more concern right now is what is
quickly becoming a forgotten branch of
philosophy: morality.
Vhile the nature-oriented eugenics
movement ought to eliminate what it
deemed defects . our nature-oriented movement often bold that if something is natural, it cannot be a defect. This is the "God
doe n't make mistakes" argument, the implication being that if omething is inborn,
it cannot be wrong. And the greatest danger
here isn't that this i- lI~ed to justify homosexuality - or even that it could be u ed to
justify pedophilia - but that it could literaUy ju tjfy anything branded "innate."
Fir t note that whether we believe our
world i naturally flawed or demonically
faUen, it' plain we aren't born perfect.
Spina bifida. cleft palates, and Down syndrome attest 10 this in the physical realm.
and the only reason there hasn't been a
powerful movement to normalize such
things i that people generally don't find
b~ing deformed or mentally compromi 'ed
a turn-on. But few thi ngs feel better than
,IIi fying ~exual desire, and you can't easily sali fy what i stigmatized - ergo the
innatene s-equals-Iegitimacy argument.
Con ider, however, that the same social
scienti ts claiming that homosexuality,
26

and now pedophilia. i inborn, also tell us
sociopaths are born and not made. Now,
question: If in addition it' determined that
homicidal feelings are innate, would it be
moral for a persoll of uch nature to kill?
The lesson here?
Genetics doesn't determine moral ity.
Wherher or not feeling are disordered
- and whether their com~ ponding behaviors are moral - h /lothing at all
to do with whether 1110 e feelings were
bred not by despotic abuse but the dark
workings of D A. Saying otherwise is to
discard morality and replace it with biological determillism . And no idea is more
destructive to civilization. No idea should
be more quickly rejected by civilized men.
Unfortunately, civilized men are in increasingly shoJ1 supply, especially among
the Left. which seems remarkably untroubled by pedophilia. How can I say this?
Well, just observe leftists' telling contradictions - and what they refuse to tell. If
pedophilia were anything but a convenient
hammer they use when reporting incesantly on hated targets such as the Catholic Church, the New York Times and Los
Angeles Times would not have run articles
legitimizing it. The 61 biggest California
newspapers would not have published
nearly 2,000 articles on the church scandal during the first half of 2002 but, duri.ng
the. ame period, ollly four on the pubLicschool sex scandal. which a govemmentsponsored Hofstra University study found

is 100 times the magnitude of the church
scandal and i till ongoing. And the Left
would hold pedophile Alfred Kinsey in
contempt and reject hi fraudulent work:
instead. they generally defend him to this
day. Holly",:,ood even gave u the film Kil/sey (2004). which heroici.zed rhe deviant
as a maverick pushing back the frontiers
of a "repressed" society's ignorance.
Most significant, however, is the philosophical corruption. Whenever the Left
seeks to justify homosexuality or anything
else. it invariably peddles moral relativism,
the notion that right and wrong are determined by man and therefore change based
on time and place. But what tlus really implies is that right. and wrong, morality, don't
exist; only human preference does. Thus.
when leftists say "You can't judge this or
that because everything is a matter of perspective:' "trus or that" nuly fit · because
you can JUSt fill in the blank. Relativism is
a package dea I with the Devi I: Once accepting that moral boundaries are illusory, the
sky - or. I should say. Hades - is the limit.
All we are then left with is occultist Aleister
Crowley'S fonnulation, "Do what thou wilt
shaH be the whole of the law."
So how will the Left further legllimize
pedophilia? As the ancient Greeks proved,
relativism isn't even necessary. The idea
tbat sexuality has a specific and limited
conjugal context is a Judeo-Christian one.
And post-Christian America is gradually
accepting the notion that consensual sex.
whatever the stripe, hurts no one. It's just
pleasure like eating ice cream, you see, except that exual exploration is far more important. And children have a right to it. to
sexual self-detennination, to not be placed
in a stifling straitjacket woven of outdated
Puritan morality. Why. Barack Obama
himself has said that having sex education
in kindergarten is the "right thing to do."
The past is a picture of futures man
inevitably will paint again, and ancient
Greece, and perhaps beyond, is where our
cultural trajectory take us. But there is
good news - that i also bad news. Cultural trajeclorie can change via the explosion of civilizational realignment, and. to
parapbra e economjst Herben Stein, "[f
something can'l go on. it won·t."' Until
then, however, the planet of man wi II continue hurtling away fTOm morality and
sanity at light speed, on ils journey toward
that black hole of civilizations past. •

THE NEW AMERICAN • OCTOBER 7. 2013
Levin's Ris .Proposal:

A Constitutional Convention
Mark Levin's new book, The Liberty Amendments, which
calls for an Article V constitutional convention, ignores the
very real risks of harmful changes to the Constitution.
by Larry Greenley

The Liber,y Amendments: Restoring 'he
American Republic, by Mark R. Levin.
Nevi York . N.Y.: Threshold Ed ition,
20) 3, 272 pages. bardcover.

W

hen talk-show host Mark Levin'
latest book, The Liberty AmendlIIellfS , was released to the public
i11 mid-August, its rapidly spreading impact
among the despairing conservative throngs
resembled the effect of dropping a lighted
match on great quantities of dry tinder.
The rapidly developing impact wa_ greatly
enhanced by the endorsement of Levin' proposal for an Article V constitutional
convent jon by three of lhe most popular
con ervative talk-show hOSIS, Ru sh Limbaugh, Sean HruJllity, <lIld Levin him elf.
It i. very apparent that this national phenomenon is due to the book's provision of
a program of action that promjses to rein
in tbe federal government. In a nutshell.
Levin' solution to our out-of-colltml federal government involves: (I ) gettjng an
Article V convenOon for proposing amendments (popularly k.nown as a "consti tutional convention") convened, as di scussed in
chapter one; and (2) getting some amendment. proposed (and sent to the states
for ratification) at such a convention to
addres the problem of an out-of-contTol
federal government, such as his 11 amendment proposals as di scussed in chapters
two through 11_ Since we di sagree with
his proposal for an Anicle V convention,
we won't be spending mnch lime on the 11
www_TheNewAmerican.com

amendments: however, we definitely agree
with him that repealing the 17th Amendment would be a good idea.
During a whirlwind review in chapter
one of the seemingly endless ways in which
lhe federal government is departing from
the Constitution, Levin accurately observe. :
Having delegate-cl broad lawmakin~
power to executive branch depart ments and agencies of its own creation, contravening the separationof-powers doctrine, Congress now
watches as lhe president inflates the
congressional delegations [of power
to the executive brancb] even further
and proclaims repeatedly the authority to rule by executive fiat in defiance
of. or over the top of, the same Congres that sanctioned a domineering
executive branch in the lirst place.

A Constitutional Convention?
A few pages later, Levin reveals that his
solution to thi s problem of an ont-of-control federal government is to amend the
Constitution by utiJizing the provision in
Article V for cOllvening "a Convention for
proposing Amendments" ba ed on the direct application to Congress of two-thirds
of the stale legislature '.
At tbis point he takes a little preemptive shot across the bow of the numerous
constitutionalist who have been opposing
such a convention over the past 30 years
by quoting Article V with its two methods for amending the Cons tillltion (via
Congress or via a convenlion called by

the state legislatures), then stating : ··Importantly in neither case does the Article
V amendment process provide for a constitutional convention:'
This type of COIlUllent has become a tafldru'd semrultic weapon in the ar e na] of the
pro Article V convention forces. Howe er.
both conservatives and liberals have routinely referred to an Article V "Convention
for proposing Amendments" a - a "con titutional convention" for well over 30 years.
and Ukely much longer. And they ha en' t
done this because they mjstaken]} believe
that the words "constitutional convention"
are to be found in Article V.
For example when the Senale Subcommittee on the Constitution of the Com27
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013
The New Age of Surveillance - The New American Magazine - Nov 7 2013

Contenu connexe

Tendances

CAMBRIDGE AS HISTORY: HISTORY OF THE USA. REVISION QUESTIONS AND ANSWERS
CAMBRIDGE AS HISTORY: HISTORY OF THE USA. REVISION QUESTIONS AND ANSWERSCAMBRIDGE AS HISTORY: HISTORY OF THE USA. REVISION QUESTIONS AND ANSWERS
CAMBRIDGE AS HISTORY: HISTORY OF THE USA. REVISION QUESTIONS AND ANSWERSGeorge Dumitrache
 
The lost cause 101
The lost cause 101The lost cause 101
The lost cause 101Larry Cebula
 
Road To Civil War
Road To Civil WarRoad To Civil War
Road To Civil WarHavenT
 
Causes of civil war smith
Causes of civil war smithCauses of civil war smith
Causes of civil war smithTerry History
 
Civil War PPT
Civil War PPTCivil War PPT
Civil War PPTsmh0203
 
CAMBRIDGE AS HISTORY: HISTORY OF THE USA. PAST PAPERS EXPLAINED. 2014 WINTER ...
CAMBRIDGE AS HISTORY: HISTORY OF THE USA. PAST PAPERS EXPLAINED. 2014 WINTER ...CAMBRIDGE AS HISTORY: HISTORY OF THE USA. PAST PAPERS EXPLAINED. 2014 WINTER ...
CAMBRIDGE AS HISTORY: HISTORY OF THE USA. PAST PAPERS EXPLAINED. 2014 WINTER ...George Dumitrache
 
Declaration of independence
Declaration of independenceDeclaration of independence
Declaration of independenceETRC
 
Goal 9 Show 1
Goal 9 Show 1 Goal 9 Show 1
Goal 9 Show 1 mrgupton1
 
FindLaw | al-Marri Terror Indictment
FindLaw | al-Marri Terror IndictmentFindLaw | al-Marri Terror Indictment
FindLaw | al-Marri Terror IndictmentLegalDocs
 
DOUBLE JEOPARDY - ProsecutionFollowing A FRAUDULENTLY-OBTAINED ACQUITTAL
DOUBLE JEOPARDY - ProsecutionFollowing A FRAUDULENTLY-OBTAINED ACQUITTALDOUBLE JEOPARDY - ProsecutionFollowing A FRAUDULENTLY-OBTAINED ACQUITTAL
DOUBLE JEOPARDY - ProsecutionFollowing A FRAUDULENTLY-OBTAINED ACQUITTALVogelDenise
 
Should us encourage_un_development-bulletin-1986-6pgs-pol
Should us encourage_un_development-bulletin-1986-6pgs-polShould us encourage_un_development-bulletin-1986-6pgs-pol
Should us encourage_un_development-bulletin-1986-6pgs-polRareBooksnRecords
 
Politics from 1945 1985
Politics from 1945 1985Politics from 1945 1985
Politics from 1945 1985tessa0130
 
Imperialism Document Activity
Imperialism Document ActivityImperialism Document Activity
Imperialism Document ActivityEd McGovern
 
Causes of civil war 1 detailed
Causes of  civil war 1 detailedCauses of  civil war 1 detailed
Causes of civil war 1 detailedvirtualcampus
 
Causes of the Civil War power point worksheet
Causes of the Civil War power point worksheetCauses of the Civil War power point worksheet
Causes of the Civil War power point worksheetyoungie26
 
Civil War
Civil WarCivil War
Civil WarLuis
 

Tendances (18)

CAMBRIDGE AS HISTORY: HISTORY OF THE USA. REVISION QUESTIONS AND ANSWERS
CAMBRIDGE AS HISTORY: HISTORY OF THE USA. REVISION QUESTIONS AND ANSWERSCAMBRIDGE AS HISTORY: HISTORY OF THE USA. REVISION QUESTIONS AND ANSWERS
CAMBRIDGE AS HISTORY: HISTORY OF THE USA. REVISION QUESTIONS AND ANSWERS
 
The lost cause 101
The lost cause 101The lost cause 101
The lost cause 101
 
Road To Civil War
Road To Civil WarRoad To Civil War
Road To Civil War
 
Causes of civil war smith
Causes of civil war smithCauses of civil war smith
Causes of civil war smith
 
Civil War PPT
Civil War PPTCivil War PPT
Civil War PPT
 
CAMBRIDGE AS HISTORY: HISTORY OF THE USA. PAST PAPERS EXPLAINED. 2014 WINTER ...
CAMBRIDGE AS HISTORY: HISTORY OF THE USA. PAST PAPERS EXPLAINED. 2014 WINTER ...CAMBRIDGE AS HISTORY: HISTORY OF THE USA. PAST PAPERS EXPLAINED. 2014 WINTER ...
CAMBRIDGE AS HISTORY: HISTORY OF THE USA. PAST PAPERS EXPLAINED. 2014 WINTER ...
 
Declaration of independence
Declaration of independenceDeclaration of independence
Declaration of independence
 
Goal 9 Show 1
Goal 9 Show 1 Goal 9 Show 1
Goal 9 Show 1
 
FindLaw | al-Marri Terror Indictment
FindLaw | al-Marri Terror IndictmentFindLaw | al-Marri Terror Indictment
FindLaw | al-Marri Terror Indictment
 
DOUBLE JEOPARDY - ProsecutionFollowing A FRAUDULENTLY-OBTAINED ACQUITTAL
DOUBLE JEOPARDY - ProsecutionFollowing A FRAUDULENTLY-OBTAINED ACQUITTALDOUBLE JEOPARDY - ProsecutionFollowing A FRAUDULENTLY-OBTAINED ACQUITTAL
DOUBLE JEOPARDY - ProsecutionFollowing A FRAUDULENTLY-OBTAINED ACQUITTAL
 
Should us encourage_un_development-bulletin-1986-6pgs-pol
Should us encourage_un_development-bulletin-1986-6pgs-polShould us encourage_un_development-bulletin-1986-6pgs-pol
Should us encourage_un_development-bulletin-1986-6pgs-pol
 
Politics from 1945 1985
Politics from 1945 1985Politics from 1945 1985
Politics from 1945 1985
 
Imperialism Document Activity
Imperialism Document ActivityImperialism Document Activity
Imperialism Document Activity
 
Causes of civil war 1 detailed
Causes of  civil war 1 detailedCauses of  civil war 1 detailed
Causes of civil war 1 detailed
 
Causes Of The Civil War
Causes Of The Civil WarCauses Of The Civil War
Causes Of The Civil War
 
Causes of the Civil War power point worksheet
Causes of the Civil War power point worksheetCauses of the Civil War power point worksheet
Causes of the Civil War power point worksheet
 
200
200200
200
 
Civil War
Civil WarCivil War
Civil War
 

En vedette

En vedette (15)

Database Tools and Developer Software Licence Management
Database Tools and Developer Software Licence ManagementDatabase Tools and Developer Software Licence Management
Database Tools and Developer Software Licence Management
 
2013.12.08 uoc open seminar eve lamberg
2013.12.08 uoc open seminar eve lamberg2013.12.08 uoc open seminar eve lamberg
2013.12.08 uoc open seminar eve lamberg
 
Middle East Cyber Security Conference & Exhibition 2015
Middle East Cyber Security Conference & Exhibition 2015Middle East Cyber Security Conference & Exhibition 2015
Middle East Cyber Security Conference & Exhibition 2015
 
Guia para Leitores Datalogic
Guia para Leitores DatalogicGuia para Leitores Datalogic
Guia para Leitores Datalogic
 
Encouraging words
Encouraging wordsEncouraging words
Encouraging words
 
Copy of new employee attendance template
Copy of new employee attendance templateCopy of new employee attendance template
Copy of new employee attendance template
 
Careers with Decorating Den
Careers with Decorating DenCareers with Decorating Den
Careers with Decorating Den
 
Contagious x
Contagious xContagious x
Contagious x
 
pulte homes business practice updated
pulte homes business practice updatedpulte homes business practice updated
pulte homes business practice updated
 
The light fantastic audio visual in the age of nanotechnology
The light fantastic   audio visual in the age of nanotechnologyThe light fantastic   audio visual in the age of nanotechnology
The light fantastic audio visual in the age of nanotechnology
 
NRZ owed $6 million in inter-parastatal debt
NRZ owed $6 million in inter-parastatal debtNRZ owed $6 million in inter-parastatal debt
NRZ owed $6 million in inter-parastatal debt
 
MA Overview (P)
MA Overview (P)MA Overview (P)
MA Overview (P)
 
Electric power
Electric powerElectric power
Electric power
 
A crise no BES e o futuro incerto do BESA
A crise no BES e o futuro incerto do BESAA crise no BES e o futuro incerto do BESA
A crise no BES e o futuro incerto do BESA
 
Open Data & Policy in Canada
Open Data & Policy in CanadaOpen Data & Policy in Canada
Open Data & Policy in Canada
 

Similaire à The New Age of Surveillance - The New American Magazine - Nov 7 2013

National Anti-Slavery Standard, Year 1862, Dec 20
National Anti-Slavery Standard, Year 1862, Dec 20National Anti-Slavery Standard, Year 1862, Dec 20
National Anti-Slavery Standard, Year 1862, Dec 20S7w5Xb
 
National Anti-Slavery Standard, Year 1860, Aug 25
National Anti-Slavery Standard, Year 1860, Aug 25National Anti-Slavery Standard, Year 1860, Aug 25
National Anti-Slavery Standard, Year 1860, Aug 25S7w5Xb
 
National Anti-Slavery Standard, Year 1862, Oct 25
National Anti-Slavery Standard, Year 1862, Oct 25National Anti-Slavery Standard, Year 1862, Oct 25
National Anti-Slavery Standard, Year 1862, Oct 25S7w5Xb
 
National Anti-Slavery Standard, Year 1862, Nov 1
National Anti-Slavery Standard, Year 1862, Nov 1National Anti-Slavery Standard, Year 1862, Nov 1
National Anti-Slavery Standard, Year 1862, Nov 1S7w5Xb
 
Wake Up, Americans!
Wake Up, Americans!Wake Up, Americans!
Wake Up, Americans!guest37dfa8
 
We Must Abolish the United States
We Must Abolish the United StatesWe Must Abolish the United States
We Must Abolish the United StatesICJ-ICC
 
National Anti-Slavery Standard, Year 1862, Mar 14
National Anti-Slavery Standard, Year 1862, Mar 14National Anti-Slavery Standard, Year 1862, Mar 14
National Anti-Slavery Standard, Year 1862, Mar 14S7w5Xb
 
003 Why Boston University Sample Essay Example
003 Why Boston University Sample Essay Example003 Why Boston University Sample Essay Example
003 Why Boston University Sample Essay ExampleKathryn Patel
 
Application of-missouri-for-a-change-highlighted
Application of-missouri-for-a-change-highlightedApplication of-missouri-for-a-change-highlighted
Application of-missouri-for-a-change-highlightedAmerican Lands Council
 
MANTICORE 10112017 - On Licenses, Laws, Authoritarianism, the Package Deal an...
MANTICORE 10112017 - On Licenses, Laws, Authoritarianism, the Package Deal an...MANTICORE 10112017 - On Licenses, Laws, Authoritarianism, the Package Deal an...
MANTICORE 10112017 - On Licenses, Laws, Authoritarianism, the Package Deal an...Cyrellys Geibhendach
 
11/11/19 International Criminal Court-Notice of Amicus Curiae Written Submiss...
11/11/19 International Criminal Court-Notice of Amicus Curiae Written Submiss...11/11/19 International Criminal Court-Notice of Amicus Curiae Written Submiss...
11/11/19 International Criminal Court-Notice of Amicus Curiae Written Submiss...VogelDenise
 
National Anti-Slavery Standard, Year 1863, Mar 28
National Anti-Slavery Standard, Year 1863, Mar 28National Anti-Slavery Standard, Year 1863, Mar 28
National Anti-Slavery Standard, Year 1863, Mar 28S7w5Xb
 
About Me Essay For College. Essays That Worked. 2022-
About Me Essay For College. Essays That Worked. 2022-About Me Essay For College. Essays That Worked. 2022-
About Me Essay For College. Essays That Worked. 2022-Ivani Rosado
 
Ch 13.2 roosevelt in office
Ch 13.2 roosevelt in officeCh 13.2 roosevelt in office
Ch 13.2 roosevelt in officelesah2o
 
Declaring independence
Declaring independenceDeclaring independence
Declaring independencednm_mccoy
 
Willis a. carto toward history - journal of historical review volume 5 no. 1
Willis a. carto   toward history - journal of historical review volume 5 no. 1Willis a. carto   toward history - journal of historical review volume 5 no. 1
Willis a. carto toward history - journal of historical review volume 5 no. 1RareBooksnRecords
 

Similaire à The New Age of Surveillance - The New American Magazine - Nov 7 2013 (20)

National Anti-Slavery Standard, Year 1862, Dec 20
National Anti-Slavery Standard, Year 1862, Dec 20National Anti-Slavery Standard, Year 1862, Dec 20
National Anti-Slavery Standard, Year 1862, Dec 20
 
National Anti-Slavery Standard, Year 1860, Aug 25
National Anti-Slavery Standard, Year 1860, Aug 25National Anti-Slavery Standard, Year 1860, Aug 25
National Anti-Slavery Standard, Year 1860, Aug 25
 
National Anti-Slavery Standard, Year 1862, Oct 25
National Anti-Slavery Standard, Year 1862, Oct 25National Anti-Slavery Standard, Year 1862, Oct 25
National Anti-Slavery Standard, Year 1862, Oct 25
 
National Anti-Slavery Standard, Year 1862, Nov 1
National Anti-Slavery Standard, Year 1862, Nov 1National Anti-Slavery Standard, Year 1862, Nov 1
National Anti-Slavery Standard, Year 1862, Nov 1
 
Wake Up, Americans!
Wake Up, Americans!Wake Up, Americans!
Wake Up, Americans!
 
We Must Abolish the United States
We Must Abolish the United StatesWe Must Abolish the United States
We Must Abolish the United States
 
National Anti-Slavery Standard, Year 1862, Mar 14
National Anti-Slavery Standard, Year 1862, Mar 14National Anti-Slavery Standard, Year 1862, Mar 14
National Anti-Slavery Standard, Year 1862, Mar 14
 
Auditing Cases
Auditing CasesAuditing Cases
Auditing Cases
 
003 Why Boston University Sample Essay Example
003 Why Boston University Sample Essay Example003 Why Boston University Sample Essay Example
003 Why Boston University Sample Essay Example
 
Application of-missouri-for-a-change-highlighted
Application of-missouri-for-a-change-highlightedApplication of-missouri-for-a-change-highlighted
Application of-missouri-for-a-change-highlighted
 
MANTICORE 10112017 - On Licenses, Laws, Authoritarianism, the Package Deal an...
MANTICORE 10112017 - On Licenses, Laws, Authoritarianism, the Package Deal an...MANTICORE 10112017 - On Licenses, Laws, Authoritarianism, the Package Deal an...
MANTICORE 10112017 - On Licenses, Laws, Authoritarianism, the Package Deal an...
 
Ghsgt jeopardy
Ghsgt jeopardyGhsgt jeopardy
Ghsgt jeopardy
 
Ghsgt jeopardy
Ghsgt jeopardyGhsgt jeopardy
Ghsgt jeopardy
 
11/11/19 International Criminal Court-Notice of Amicus Curiae Written Submiss...
11/11/19 International Criminal Court-Notice of Amicus Curiae Written Submiss...11/11/19 International Criminal Court-Notice of Amicus Curiae Written Submiss...
11/11/19 International Criminal Court-Notice of Amicus Curiae Written Submiss...
 
National Anti-Slavery Standard, Year 1863, Mar 28
National Anti-Slavery Standard, Year 1863, Mar 28National Anti-Slavery Standard, Year 1863, Mar 28
National Anti-Slavery Standard, Year 1863, Mar 28
 
About Me Essay For College. Essays That Worked. 2022-
About Me Essay For College. Essays That Worked. 2022-About Me Essay For College. Essays That Worked. 2022-
About Me Essay For College. Essays That Worked. 2022-
 
Ch 13.2 roosevelt in office
Ch 13.2 roosevelt in officeCh 13.2 roosevelt in office
Ch 13.2 roosevelt in office
 
Application of-illinois-highlighted
Application of-illinois-highlightedApplication of-illinois-highlighted
Application of-illinois-highlighted
 
Declaring independence
Declaring independenceDeclaring independence
Declaring independence
 
Willis a. carto toward history - journal of historical review volume 5 no. 1
Willis a. carto   toward history - journal of historical review volume 5 no. 1Willis a. carto   toward history - journal of historical review volume 5 no. 1
Willis a. carto toward history - journal of historical review volume 5 no. 1
 

Dernier

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 

Dernier (20)

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 

The New Age of Surveillance - The New American Magazine - Nov 7 2013

  • 1.
  • 2. :First rren .9Lmenaments to tfie Constitl!tion .9Lmentfment 1. Congress snaff ma/(r IW (au) respecting an esta6fisnmtnt of refigion, or prolii6itillg tnc free ei{!rc.ise tliereof; or a6riaging tne frw{om of speun, or of tfle pre..<s; or tne rignt of tne peopft peacI!a6fy to a.ssem6{.:, am! to petition tn.c goven/ment for a rWrs.< ofgrievances. .9lmenament 11. .51 weff.regl.lfaua mifitia 6eing necessary to tnt securi1y of a.ftu state, Iii.: rignt (If tnt pcopfe to k!ep ant! 6ear sliaf[ not 6e infriJrgetf. arm.~ .9lmenament JI J. 'J{g soWer sna{f, illtimt of pwa, he quartered in anyliouse, witMut tnt c,l7l$ent of Ille owner, liar ill time of 111ar, 6uI ill a nlll7111er to be presc.ri[m( 6y (aw. .9lmenament 10/. 'lfre rignt of tf/C peop(e t.o De secure in tli.l!ir perSOll$, fwuses, paper.>, and ~ffects against ullrea.<()1raf,(e searc.fies and seizures shaff not De vio{atetl, alia 110 111arratl Is snaf{ issue, 611 I UpOIl pr06a6{e cau..<e, supportetf b!1 oath or affirmatioll, all/l partiel/larfy aescri6ing tfie pface to De searc.fietl, ana tnt persoll$ or tnillgs 10 6e .<eiz.e<f. rife, {werty, or property, 1l1it(Wllt aue process of {aw; Iwr .-na(t private. property De taK!1l for pubric use, 7vitliout just compellSatioll. .9lmentfrnent 0/1. h I af( criminal prosecuti(llls the acc.user! sha(l enjoy Iii.: rigfu to a SpU.dy alit! puMic I rial, hy au impartin{ jury of tIle stale and ,{i..<triC.1 ulfr~rein tlie crime slia[{ nave Geell commit uri" whicli aistriel shafl liave 6ml previolls{y a.'eer/air/cd 6y {aul, MId to 6e ilrfonnu{ of tne lIatun: ani cause of tfit accusation; to 6e confrolltetf with tile Ivitne..<.<~ 'tqaill$t nim; to (ta.tle complllsory process for 06taill-ing uJitnesse..< in fri..; fav,) r, ant! to nave tlie assi..,talrce of counse(for (lis rkjulSe. J1.menarnent 0/11. In stlits at comllwn raw, wllere tfre vafue irr colltroversy sftaf£ ex..ced t711tllty a,,(far.', tne right of trial hy jury .>/ia!( he prtsenJed, alld 110 fact trW{ v!J ajury sfta!! 6e otlieruJise re-e.tamiuea ill allY court of the Vnitd StlItes, Iftall acconWltJ /0 tfie of Ifte common (mil. mres .9Lmencfment 0/1II. 'U:!:i..»"i.w bail shalf /lot he required, lIor e:(j:u.<ive fines imposer£, 1I0r cruel and ulluSUal pWIi.~lIltrertt.< illJfictea. .9Lmenament 0/. 'J.& pmo" sfrafl Vf nefd to atlSWtr f or a .9Lmenament1X. rnpita{, or otfrerwise irifamoll..< crime, IlII{tSS on a presentmtnt or illdictllWlt of a grand jllry, e-tupl ill cases arising iu tlie (ana or rlf/Va{forces, or ill tlie militia, Uifwl ill actual semee ill time of 111ar or pl/f,fic aangm nor .i!ia({ any persoll 6e .>u6ject for tfle sa7ltt offense to b~ twia put in jwpartftJ (If tife or fim6i /Wf Shaff he compef(ea ilr (/fry crimina( <'rue to a witness agaillSt nimsefj; 1I0r he deprivea of J1.mendment X. 'l1ie powers /Wt rfelegaterf to tile 'llttit-d Staus 6y tlie. COII.,titutUm, nor profti6iterf by it 1 t(Ul Slates, are 0 reservea /0 tfte statts lYspecrivefy, or to tlit peopk. ve 'l1ie enumuatum in tfre COII..<tlturiOIl, of urtaih riglits, sfrafl /WI 6, COIIStmeri to aellY or rf.i.<parage olner.< retaillerf by tli.: peop(e.
  • 3. • r Vol. 29, No. 19 October 7, 2013 COVER STORY SURVEILLANCE 10 The New Age of Surveillance b)'joe Wohlerlon J/.j.D. - Mille some Americans have claimed U.S. government surveillance of Americans is innocuous, others have equaled it i~l the i.n!anlOus Easl Gennan Stasi. Actually, irs worse. 17 The NSA Domestic Surveillance Lie 1lcn accusations of $p),wg on Americans were firs! leveled al the NSA, (he government claimed there was no illicit spying. l1letl it had 10 backtrack again and again. b)' Tbomos R. Eddle7IJ - FEATURES CULTURE 21 The Slippery Slope to Pedophilia by Selwyn Duke - It is unlikely Illal many Americans now believe Ihat pedophilia will soon be accepted in this counllY bm it is riding Ihe S<lme lmck 10 respectability as did homosexual "marriage." EXTENDED BOOK REVIEW 27 Levin's Risky Proposal: A Constitutional Convention by l£my Gre.enley - Mark LC1n's Ilew book, Tile Liber~v Amendments, whjch calls for an Article Vconstitutional convention, ignores Ibe very real risks of harmful changes 0 the Constilution. HISTORY - PAST AND PERSPECTIVE 35 NSA Spying: It Didn't Start With 9/11 b)1 Jack Kem~)I - The N an enornJOUS agency created 10 coUecl SA, and analyze intelligence on foreign threats, {ailed 10 SlOp 91 [I and now spies on Americ:Uls. Has it oUllived its usefulness? THE LAST WORD 44 Syria, Obama, Putin, and the UN ~" lVillimn F. jasper DEPARTMENTS 5 Letters to the Editor 33 The Goodness of America 7 Inside Track 40 Exercising the Right 9 QuickQuotes 41 Correction, Please! COVER Design by Joseph w. Kelly
  • 4. LEITERS TO THE EDITOR Why Attack Syria? How is it (hat the death of 400 children in Damascus, caused by parties yet undetermined. is being used as a justification to further devastate war-torn Syria. yet the death of 500.000, yes a half-million. Iraqi children , owi ng to malnutrition caused by the U.S.-enforced embargo aild economic sanctions of their country during President Clinton's administration. has raised hardly an eyebrow? (When asked about the death of the 500.000. Madeleine Albright, Clinton's secretary of ~tate, said, "It was worth 11.") Mightn't we bener do un to oursel ves, firs!, what we intend to do (or have done) unto others. perhaps starting by carpet-bombing our military installations in Arizona, South Carolina, and suburban D.C .. so tbat their residenls might fully enjoy that which their elected congressmen advocate? Simultaneously. along with that destruction, wouldn't it be poetic for our chief executive to publicly recite Mark Twain's "War Prayer" to accompany "the bombs bursting in air"? tn tbe eyes of our president. his circle of advi sors, and their supporting talk-show hosts. how many ton s of bombs must be dropped on a foreign country to re-establish so-called American credibility? Would cluster. whjte phosphorous, and napalm bombs count for extra points? RUSSELL W. HAAS Golden Colorado The problem regarding the Syrian debate stems from the fact that offici al America has had an Empire mentality for over 200 years. Ever sillce the beginning of the "War of 1812," where it goal was to annex Canada. our Republic has tloundered in dreams of conquest and expansion of influence. They called it "Manifest Destiny." We should not be surplised that this megalomania continues to this day. Empires alway have more " interests" than protecting the people of their own countries, Wby should Americans then cry because U.S. presidents behave like emperors - that 's what 3Jl empire can expect! Unaccoulltable tyran ts start illegal and unjust wars to conquer and control. always using some excuse such as "national security; ' even creating "false flag" operations if necessary, to frighten their citizens into submission. CaI/1-800-727- TRUE to subscribe today! Tyrants also abuse their own people by meddling ill pers onal affairs s uch a " health care," plundering the populace to pay for their arrogance. Claiming to know what is best for everyone, down to the most minul~ detail. they impose rules, regulations, and unju st hindrances to free enterprise. (Why, it takes I I government permit to operale a Taco Bell store). The underl ying ro ot causes for seeking Empire are lus t, greed, inordinate ambition, and blood lust. Things I 'ill not change unlil American~ from all 50 overeign republics wake up and reali ze the USA has been the aggressor around the world for mnny, many years, either directl y or by provoking attacks in order to st.art war. The only truly just war we ever fought was for our independence from England_ The current , ilUalion in Syria i~ a perfect exam.ple o f our meddli ng. Whe n VillI we learn to mind our own bu siness, protect our 0 n people and borders, aod make policie and law. that e ncourage trul y free enterpri e and the possibility that all who wi sh to work and produce value are left to dec ide what i best for their own dearest intere t o? DtCK MILLS Houston. Texas Superstate Victims fn addition to the Snowden and M anning ca es, the ongoing persecution of Michael N CI must be publicized. He is the soldier who refused to pledge allegiance to the United Nations and to wear UN insignia in 1993, ioasmuch as it would con.tlict with his sworn allegiance to the United Slates. One cannot serve two masters. The U.S. Constitution does not allow the president to delegate allegi ance of armed force s to another entity such as the UN , which is itse.lf nO( even a govern menl. New was jailed. and his case continues. See www.mikeynew.com for details. Appeal was recently filed. CARL OLSO, Woodland Hills, California Send your letters to: THE NEW ~"IERlC N. P.O. Box 8040. Appleton, WI 54912. Or e-mail: editorial@thenel"·alllericall.com. Due to volume received, not all lellers call be an, wered. Letters may be edited for space and clarity. 5
  • 5. --~ - INSIDE TRACK Chinese State-owned Company Purchases Smithfield Foods On September 6, the U.S. Committee on Foreign [nvestment approved a deal valued at approximately $7.1 billion allowing China's Shuanghui International Holdings Ltd. (Shuanghui Group) to officially take ownership of Smithfield, Virginia-based Smithfield Foods Inc., the world's largest pork producer. Shuanghui had already purchased all of Smithfield's stock back in May for approximately $4.72 billion. "The deal, which would be the biggest purchase of a U.S. company by a Chinese firm. still needs shareholder approval at a special meeting scheduled for September 24," according to Reuters. Shuanghui announced that Smithfield would be listed on the Hong Kong Stock Exchange after the takeover was complete. One thing that Reuters and other Western media fail 10 mentJOn is that Shuanghui International Holdings is controlled by the Communist Pany of China. In various English-language sources geared to readers in the West, Shuanghui International Holdings is presented as a private corporation. For example, the English version of the Wikipedia page for Shuangbui list the company as "private with public subsidiary:' However. the Chinese-language version of Shuanghui's Wikipedia page says the opposite, identifying the company as a "state-owned enterprise." Translated into English , the official Mandarin website for Shuanghui provides a biography of Shuanghui Chairman Wan Long that identifies hjm as a member of tbe Communist Party of China. a former soldier in the People's Liberation Anny, and representative to the Ninth and Tenth National People's Congress. which is the unicameral legislative body of the People's Republic of China. In the official international' version of the company website,.Wan Long's biography conveniently omitS any mention of his membership in the Communist Parry, service in the military. and terms as a representative to the National People's Congress. As the United States and Cbina proceed to work out a bilateral investment treaty that would enable more Chinese state-owned enterprises to openly purchase American companies, this acquisition of Smithfield Foods by Shuaughui serves as a preview of what could eventually be the norm. Australia Reining In Climate Schemes After Voters Reject Carbon Tax rn tbe wake of a crushing defeat September 7 for the climate alarmism-promoting Australian Labor Party, which imposed the deeply unpopular and expensive "carbon tax" credited by analysts for the conservative coalition's victory. authorities in Australia are preparing to dismantle and consolidate the· myriad globalwarming scheme-s spawned under the previous government. Ac ording to Australian news reports. the government' vast anti-carbon climate apparatus currently consists of more than 30 programs under seven departments and eight agencies. Under the newly elected center-right coalition, the sprawling machine is set to b reined in significantly, saving taxpayers over $40 million in four years by collapsing the various schemes into just three entilies run by two departments, The restructuring of the federal climate regime was announced to government employees before the election - widely viewed as a referendum on the carbon tax - and a spokesman for the new coalition confi.rmed that the plan was still on track, Cjmate realists say that the entire global-warming behemoth ought to be axe.d entirely - especially considering recent developments that experts say bave thoroughly debunked the United Nation" warming theories and wildly il13ccurate computer models. However. as THE NEW AJ'..IERICAN repol1ed September 9 after the Australian election, there are a number of obstacles to shulling down the costly climate schemes, including incoming Prime Minister Tony Abbott s waffling on "cl imate is ues" and resistance to scmpping the carbon tax in the Senate. Still, even though the costly climate-alarmism schemes will not be entirely abolished, Abbott and his coalition appear determined [0 scrap !Jle carbon tax at least. Of course, countless bureaucrats and self-styled "expens" whose jobs depend on perpetuating climate alarmism are fighting back against the will of voters. Despite the wdlknown fact that human emis ions of carbon dioxide make up just a fraction of one percent of the greenhouse gasses present naturally in the atmosphere. supporters of man-made globalwam1ing theories insist that humanity must. under UN guidance, destroy the economy to reduce emissions and stave off alleged disaster. Whether Australia wi II comply remains to be seen , but it is looking less likely after the latest election.
  • 6. -------------- TRACK INSIDE Wisconsin Law Restricting Government Unions Upheld Again A popular Wisconsin law aimed at ending the stranglehold of goverlllTIent-employee unions over taxpayers and workers was upheld September II by a federal judge. who ruled that the 2011 "Act I 0" reform measures championed by Republican Governor Scon Walker did not violate the First Amendment or equal-protection rights of Big Labor. It wa the second major victory for the law in federal courts so far. In his September II ruling. U.S. District Judge William Conley explained that the First Amendment does indeed protect the right to free speech and associ at jon of government worker. Wisconsin's law, however, did not violate those rights, and the Constitution does not purport to grant any so-called collec(jve bargaining privileges. "'Whatever rights public c'1lployees have to associate and p~ti-,ion their public employers on wage and conditions of employment. this right ceminl), does not corupe l the employer to Iisren." he wrote in his decision to reject the law uit filed by two public-sector unions. Big Labor and its attomeys. predictably, were outraged by the latest court decision. Kat)' Lounsbury, one of the lawyers representing government-employee unions in (he case. slammed the rulUlg as "just wrong." According to media reports. the attorneys will be consulting with union bosses before deciding whether or not to appeal the court's finding that the law is contitutional. The national implications of the ongoing baUle are one of the key reasons that analysts say unions across America have been frantically fighting the Wisconsin law. After it a approved, for example, Big Labor and its allies sought to recall Governor Walker and .~ome fellow Republicans in the legi slature, prompting huge spending sprees by organizations and unions nationwide. In the end, (he GOP governor survived the ell-funded challenge. setting the stage for other leaders to pur~ ue desperately need.ed reforms. However, as the lawsuits continue. the baule is far from finished. Federal Judge Dismisses Atheists' Lawsuit Against "In God We Trust" A federal judge in New York State has di smissed a lawsuit filed by a group of atheists demanding that '1n God We Trust" be removed from America's currency. In his September 9 decision, Judge Harold Baer, Jr. ruled that the presence of the national mono on coins and paper money had not created a "substan(ial burden" on the athei sts and humanist involved in the suit. which was filed by members of the New York City Atheists and the Freedom From Religion Foundation. "While Plaintiffs may be inconvenienced or offended by the appearance of the motto on currency." wrote Baer. "these burdens are a far cry from the coercion, penalty. or denial of benefits required under the ' substantial burden' standard." BaeT Doted that in the federal judiciary 's extensive history of hearing cases on the con stitutionality of the. national motto, judges have considered whether ils presence on cunency tends to advance religion and whether it represent ' an excessive government entanglement with religion. He added tbat every circuit comt "that bas considered the issue found no EstabLi shment Clause violation in the motto's placement on currency. finding ceremonial or ecular purposes and no religious effect or endorsement." The American Center for La and Justice (ACLJ) provided an amicus brief in the case in defense of the national motto, pointing out that the wording "simply echoes the principle found in the Declaration of Independence that our freedom s come from God and not the state. The nationa l mono was adopted for the express purpose of reaffirming America's unique understanding of thi s truth .... The Establishment Clause was never intended as a guarantee that a per on will not be exposed to religion or religious symbols on public property, and the Supreme Court has rejected previous attempts to eradicate all symbols of this country ' s religious heritage from the public's view," •
  • 7. The Path to a "Big War" "Once we hit, this is an act of war. Little wars start big wars, and we have to remember that.'· Interviewed on Meet the Press, Congressman Michael McCaul (RTexas) is the c/l(lirmon of the HOllse Homeland Secllrity Committee. Ft. Hood Killer Not a Martyr "Don't be fooled. He is not giving his life. We are taking his life. This is not his gift to God. This is his debt to society."' Lead prosecutor Colonel Michael Milligan loldju/"Ors nol to consider Nidal Malik Hasan's death for the 2009 crime of killing 13 unanned people nn ael afmartyrdom. Thejury look little time to sentence him 10 death by lethal injection. Egypt's Government Seeking to Cripple Power of Muslim Brotherhood ··[The move to prosecute former president Mohamed Morsi] is an attempl to paralyze the Brorberhood and affect its lIctivism. ll·s very symbulic, a pulitic<ll muve by the state against the Brotherhuud." All expert 011 Middle Easl l slamisl movemellts, Khalil al-Anani of the Washington-based Middle East Instilllte commented after Egypt's chief prosecutor ordered Marsi 10 stand trialfor inciting murder. Not the i'World's Policeman" "We are not !.he world's policeman, nor its judge and jury. Our own needs in America are great, and they should come tiTSt.'· Resisting the cry 10 arrack Syria, Congressman Alan Grayson (D-Fla.). a progressive Democrat, expressed the view of malI} colleagues. Food stamps Cost Soaring "Spending on food stamps has mushroomed from $35 billion in 2007 to $63 billion. Tn an average mon·th, nearly 48 million people - one in seven U.S. residents - receive [this type of] benefits." In her Washington POSt Colllllln about this mushrooming a·elfare program, columnist Ruth Marcos complained about GOP efforTS 10 cut the program. Syrian Refugee Total Continues to Grow "The number of Syrian refugees passed the threshold of two million. with no sign of this tragic outflow ending." A Sl'.plemher 3 rp.pnrt fmm Th e United Nations' Refugee Agency I7Dtp.d that mort' than a millioll oftha!:t> fleeing rh e civil war are children under 17 years of age. One Man's Perspective About the Syrian Crisis "In one of tho e curious turns of history, an ugly bloody. litde conflict in an always fragile, volatile, artificial nahon-state crea(ed in the last gasps of European colonialism is now determining the world's immediate fOr1mes." Writingfor the American Cellterfor Democracy, Sol Sanders believes That the Syrian conflict has good potential for escalation inTO a world conflict. President Obama Urged to be More Outspoken About Racial incidents " I think that [the Zimmerman acquittal] will be seen as a questionable judgment on the pan of the judicial system down (here, but I don't know if it witl have staying power." Claiming Ihat the president should "·speak OUl,' · former Secretary of Stare Colin Powell said that Obama should be '·more pa ssionate " aboUT the mat/a. - COMPILED BY JOHN F. McMANUS Call J-800- 727- TRUE to subscribe today!
  • 8. While some Americans have claimed U.S. government surveillance of Americans is innocuous, others have equated it with the infamous East German Stasi. Actually, it's worse. by Joe Wolverton n an interview in June with a German television tation, German President Joachim Gauck said the surveillance conducted by the National Security Agency ( SA) was nOI comparable to that conducted by the Stasi - the infamous East German Ministry for State Security - be- I 10 6 6 16 10 • . ' cau e "it is not like it was with the Stasi and the KGB - that there exist big filing cabinets in which aJl the content of our conversations are written down and nicely filed. This is not the case." Gauck is right. The NSA is nothing like the Stasi because the East German secret police relied on uch lhing. a typewriters. carbon copies. handwritten transcriptions of phone conversations, agents listening through doors and rudimentary bugging devices. and the aforementioned fi ling cabinets. The SA. on the other hand, can apparently monitor electronically - in real lime - every word of every phone call. every text me sage, every social media post. every website visited, and every form of electronic communication. THE NEW AMERICAN • OCTOBER 7,2013 •• •
  • 9. '2' .Ot How much data is being collected by the NSA? William Binney, a former NSA technical director turned whistleblower, estimates that the newly completed NSA Utah Data Center "will be able to handle and process five zettabytes of data," In a story quoting Binney's claim. National Public Radio repons that a zettabytc is equal to "the amount of data that would fill 250 billion DVDs:' Back to those bulging Stasi filing cabinets. Imagine that a typical fi ling cabinet with 60 files of 30 pages per file takes up about 4,3 square feet of space, Each 30page tile would equal roughly 120 MB of data, Given the amount of storage available to the NSA in its Utah location, if all the data stored there were printed and stored in traditional filing cabinets, those cabinets would occupy nearly 6,6 million square miles! Nothing like the Sla~i, indeed, Secret Police Minus the Police Powers Is there any clearer lens through which to vicw the future than the past? Is not the United States of2013 eerily and tragically traveling along a similar trajectory to that followed by the formerly free Germans and the communi st Stasi that ultimately deprived them of their libenies? In de cribing the growth and survival of the East German surveillance state and the Stasi' activities that undergirded it. Scott Horton wrote that Eas t Germany was a country "in whicb the power and authority of the intelligence services to spy on their own citizens rested on an elaborate network of laws that empowered surveillance and eroded the rights of citizens specified in the country 's constitution," Again, the Stasi and lhe Cold War communi t East German regime had nothing on the NSA and 21 t-century America, From the enactment of tile Patriot Act to the renewal of Ule Foreign Intelligence Surveillance Act amendments. Congre s after Congress and consecutive presidents have usurped powers the scope of which are unknown i.n the written record of government. Before launching into a report on the myriad methods being used by our own federal government to keep us under the constant vigilance of its neVerblinking eye. the reader needs to have in the front of hi mind the standard to which the federal government mUSt be held, The Fourth Amendment to the Constitution mandates: The right of the people to be ecure in their persons, houses. papers, and effects , against llnreasonable earches and seizures, shall not be violated. and no warrants shall issue. but upon probable cause, supponed b_ oath or affmnarion. and part icularly de cribing the place to be searched. and the persons or things to be seized , Recent events demonstrate that for over a decade. ollr elected reprc· cntativ (and the courts, for that matter) have di regarded the Constitution and built a domestic spy apparat.us that bears no re emblance whatsoever to the blueprint provided by our Founding Fathers in the Con tlfUlion. Throwing a Wrench Into the Works On August I. fonner low-level networking subcontractor Edward Snowden entered Russian territory. .M~nAH: OOH WH a I, Russian President Vladimir Putin permitted Snowden to take up temporary residence in Russia, At home, President Obama charged the young man with espionage. a curiou ' charge given that even the president admits there is no evidence that Snowden transferred any sensitive information to a foreign government. an essential element of the crime he is accused of cOllunitling. No maner. President Obama is not known for hewing to the Constitution or the law, The cache of document Snowden hold, was leaked to the Washingtoll POSI and to The Guardian (U ,K.) and contai ns compell ing evidence of the SA's wholeaJe violation of the Fourth Amendment through the dragnet surveillance of phone records and monitoring of Internet traffic. With tbe as istance of Glen Greenwald of The Guardia/!, Snowden has leaked one constitutional violation after another committed by the NSA, All of wbich, it must be understood, was done with the cooperation of the pre ident , the Con- Edward Snowden, an employee of an NSA subcontractor, leaked a cache of documents containing compelling evidence of the NSA's wholesale violation of the Fou rth Amendment through the dragnet surveillance of phone records of millions of innocent Americans . W'A/W, TheNewAmerican.com .. ,. 11 6 6 16 10
  • 10. 00 1ol9orroq M _COVER IUO r .i~)/ f2 f}ltO ro I" ~:::J ,~A;,O (((1n111"1" SI!JRVC:I~~ANCE ~STORY records on an "ongoing daily basis" and to hand over to (he Accoriting to,~~a;courtorder labeled domestic spy agency "an elec-)'-/':'~I:"; "iTOP. SECRElf.':rederal judge Roger tronic copy" of "all call detail records created by Verizon for Vinson order~'~iVeriZDn to turn over the communications (i) between the of its U.S. United States and abroad; or (ii) wholly within Ine United States, ~~t~(.'_.';.._';:. including local telephone calls." This information includes the gress, and the courts. The strength of the phone numbers involved. the electronic evidence of collusion among the three identity of the device. the calling card numbranches of the federal government in the bers (if any) used in making the calls, and de facto repeal of the Fourth Amendment the time and duration of the call. In other words. millions of innocent is overwhelming. A mericans have had their call records Tyranny Erected in Cyberspace shared with a federal spy agency in open Among the most disturbing disclo- and hostile defiance of the Founh Amendsures found within the reams of Edward ment"s guarantee of the right of the people Snowden 's revelations was the surrender to be free from sllch unreasonable searchby major telecommunications companies es and seizures. What is reasonable? Legally speaking_ of the otherwise private phone records of millions of Americans - none of whom "the term reasonable is a generic and relawas, as required by the Constitution, sus- tive one and applies to !hat which is appropriate for a particular situation." pected of committing any sort of crime. According to a court order labeled Even if the reasonableness threshold is "TOP SECRET:' federal judge RogerVin- crossed, though. there must be a warrant son ordered Veri zon to tum over the phone and suspicion of commjssion of or intent records of millions of its U.S. customers to commit a crime. Neither the NSA nor Veri zon ha. asserted that even one of the to the NSA. The order, iss ued in April by the U.S. miUions wbose phone records were seized Foreign Intelligence Surveillance Court fits that description. When contacted by THE NEW AMERIand leaked on the Internet by The Guardian , compels Verizon to provide these CAN , a spokesman for Verizon declined to i~" ~h· ne re· or~ olll· c· d~s,;/of'millions cu" oilll er· to 1tfe': N'SA. st· m· sf.j,~ An order from the Foreign Intelligence Surveillance Court compelled telecommunication giant Verizon to provide the NSA with customer phone records on an "ongoing daily basis" and to hand over "an electronic copy" of "all call detail records created by Verizon for communications at home and abroad. " 12 comment on bis company 's compliance with tbe order. Such a demur is expected in light of the provision of the order that prohibits Verizon, the FBI, or the SA from revealing to the publ.ic - including the Verizon customers whose phone record now belong to the Obama admini stration - that lhe data is being given to the government. Glen Greenwald of Th e Guardian details the data being seized by the NSA: The information i classed a "metadata," or transactional information. rather than commun icati on , and so does not require individual warrants to access_ The document also specifies that such " metadata" is not limited to the aforementioned items. A 2005 court ruling judged tbat cell site location data - the neare t cell tower a phone was connected to - was also transactional data and so could potentiall y fall under the scope of the order. While the order it.self does not in<.; Iude ei ther the conten Is of messages or the persona) informat ion of tbe subscriber of any par{jcular cell number. its collection would allow the NSA to build easily a comprehensive picture of who any indi vidual contacted, how and when. and possibly from where, retrospectively. Perhaps the most disturbing take-away from the leak of this secret court document ordering Verizon to hand over customer call logs and other data to a federal surveillance agency is the fact that the government considers the protections of the Fourth Amendment to be nothing more than a " parchment barrier" that is easily tom through. The Obama administration regards tbe Constitution - as did the Bush administration before it - as advisory at best. Of course, being a subcontractor in the construction of the surveillance state pays handsomel y. As reponed by THE NEW A/o.·IERICAN. on August 16. Verizon announced that it was awarded a 10-year. $10 billion contract "to provide cloud and hosting ervices" to Ihe U.S. Department of the Interior. Apparently. crimes against the Constitution pay. and they pay very well. THE NEW AMERICAN • 6 6 16 10 Rh 5 ..,...... ~~r ooc . ~r e ~f" nnnr I'>r 0<:' de TOBER 7. 2013
  • 11. ~""'PIo'OU(oni'loilc;PId"'","""'" m.~n."f'OUI' fi'tI .. .L .L L.L 1 U.S. governmental e ntities (includ ing local , state and federal). .I. .L .L L .L .L .1. According to tbe information Snowden released, both companies that disclosed govenU11ent surveillance requests - Facebook and Microsoft - were giving the government access to the private information of millions of users . They were not alone, however. Yahoo, Google, PalTalk, AOL, Skype, YouTube. and Apple all allowed the agents of the federal surveillaJ1ce slate to secretly snoop on their u ers. Every Keystroke Recorded Under a program code-named PRISM, the NSA and the FBI are "tapping directly into the central servers of nine leading U.S. Internet companies, extracting alldio, video, photographs, e-mails. documents and connection logs that enable analysts to track a person's movements and contacts over time " reported the Washington Post. Social Media Surveillance Have you updated your Facebook or Twitter accounts lately? If so, the government likely knows what you posted, when you posted it. and who read what you wrote. According to a statement posted on Facebook' website June 14, government agencies - including federal, stale, and local authorities - requested user data on between 18.000 and 19,000 account holders. The remarkable disclosure of government requests for users' private information fo llows successful negotiations between Facebook and other tech giants and the federal government. Over the pas t few weeks, Facebook Google, and other technology compani es who were impl icated in the revelation s of the covert NSA s urveillance program known as PRISM have petitioned Lhe reds to allow them to disclose their level of participation in surveillance· requests received from govemment entitie . Under PRISM. the NSA and the FBI are " tapping directl y into the central server of nine leading U. S. Internet companies. extracting audio. video, photographs . emails. documents and connection logs that enable analyst to track a person 's movement and contacts over time," as reported by the Wa shington Post. One document in the Snowden rev elations indicated that PRISM was " the number one source of raw intelligence used for NSA analytic repons." Snowden claimed that the program was so invasive that the NSA and the FBI "quite literally can watch your ideas fonn as you type." Most of these requests by the government are m,ade under (he authority of the Forei gn Inte lligence Surveillance Act (F1SA). Nor surpri singly, when Lhe govemment asks the pecial urveillance coun to approve their s nooping. judges give them the go-ahead . iJl fact, in April , Lhe Department of Justice revealed to Congress the number of applications for eavesdropping received and rejected by the FISA court: In 2012, of the 1,789 requests made by Lhe government to monitor the electronic communications of citizens, not a single one was rejected. Followin g the negotiations that opened the way for Facebook to report its coopera tion with requests to hand over user information, Microsoft made a similar surveillance di closure. A blog post on the Redmond, Washington-based company 's website declared: For the six months e nded December 31 , 201 2. Microsoft received between 6,000 and 7.000 criminal and national securi ty warrants, subpoenas and orders affecting between 31.000 and 32,000 consumer accounts from On July 31 Glen Greenwald publis hed another drip in the ocean of Snowden leaks. Under a program known as "XKeyscore," the NSA monitors and records every email written by eve ry Ameri ca)) , again without a warran t and -vilhoul probable cause, in direct defiance of the Fourrh Amendment. Greenwald, after examining a PowerPoint presentation included in the information he received from Snowden. explained the scope of XKeyscore: "One presentation ciajms the [XKey core) program coyers 'nearly everything a typical u er does on the internet,' including the content of emails. websitesv iitedandsearche . as well as their metadata ." "Ana.lysL can al so use XKeyscore and other ISA systems to obtajn ongoing 'real-ti me ' interception of an individual ' i.nternet activity:' he added. How does it work? Greenwald expla ined that too: "An NSA tool called DNI Presenter. used to read the content of stored emails, a.l so enables an analyst using X Keyscore to read the content of Facebook chats or private messages. Analysts can also search by name, telephone nu m ber. lP address, keywords. the language in which the internet activity wa..~ conducted or the type of browser used ." It is important to note that XKey core doesn'( record phone conversati ons. There is evidence, however, that the NSA records every one of those, as well , and stores the coment in one of its many data warehou. es, such as the one in Utah that goes online within weeks. Of course, there is no doubt that mobile phone conversations are being recorded. The federal government i remot Iyactivating the microphones and cameras in Call /-800· 72 i -TRUE /0 subscribe today! 13 •• 6 6 16 10
  • 12. COVER ~ STORY 001 O(9gtf{n(pf~ rotot ,Ioor .. 1:)/ 12 A"" 1" 1 1 1 "1" :J J .~/: /-C1 SURVEI ~l.!ANCE· Android smartphones and Windows laptops, according to a report published by the Wall Street Journal on August 3. Citing a "former US official," the Journal says court documents reveal that the FBI is using a variety of "hacking" tools to ramp up the scope of the surveillance of millions of Americans, keeping many unwittingly under the watchful eye of Washington. One of the lou mal's anonymous sources described a pan of the FB I called the "Remote Operations Unit." Agents in this specialized ullit prefer. if possible, to install the remote control software by uploading to the target's computer using a USB flasb drive. When the g-men-come-hackers can't get access to the target's computer, they install the surveillance soft.w3J:e over the Interne! "usi ng a document or link that loads software when the person clicks or views it." It is not only possible for the federal government to listen to your conversations using the microphone in your Android' smartphone and watch you while you sit in your own home on your own computer, but they do so regularly and can do so very easily. Purportedly, the FBI has been using these methods of surveillance "for over a decade." but their use has come to light only recently by way of "court documents and interviews" with people familiar with the programs. Is the NSA Policing Itself? In what likely amounts to another middling misdirection. on August 15 the Washington reponed tba( aD internal audit of the NSA revealed lhat the agency violated its own privacy protection rule 2,776 times. NSA Compliance Director John DeLong tried putting a positive spin on the report. During a press conference on AuPOSI ge _0 gust 16, DeLong assured the media that the NSA is not involved in " willful violations" of the law. "People need to unders tand there's no willful violations here," he ·aid. "We really do look for them, detect them and correct them." "No one at NSA, not me or anyone else. thinks they are okay:' he added. He additionally claimed that (he number of incidenlal violation s of privacy laws is "minuscule ... a couple over the past decade." Minuscule or no!, why is such a disclosure irrelevam? Consider the following analysis published by Ron Paul on his Ron Paul Institute for Peace and Prosperity website: Though it made for sensational headlines last week. the 2,776 SA violations of its own intercept guidelines over the course of one year are irrelevant. The millions and millions of "authorized" intercepts of our communications are all illegal - except for the very few earned out in pursuit of a validly-i~sued search warrant in accordance with the Fourth Amendment. That is the real story, Drawing our attention to the violations unfortunately sends the message that the "authorized"' spying on us is nothing to be concerned about. E-mail and Snail Mail In a program known as XKeysc'ore, NSA agents use a 1001 called DNI Presenter to read in real time the private Facebook chats and messages, and stored e-mail of users. Using this application. agents can search these electronic records by name, IP address, keywords. etc. The U.S. government is not content. to monitor your phone calls and your Internet activity; it's now reading your snail mail, too. A story in the New York Times published Wednesday. July 3, tells the story of Buffalo , New York , resident Leslie James Pickering. Pickering repons that last September he noticed "something odd in his mail": a "handwrirten card, apparently delivered by mistake. with instructions for postal workers to pay special attention to the lett ers and packages sent to his home," the Times story claims. 'rhe card - a picmre or which appears in the Times story - appears to read: "Show all mail to supv L supervisorJ for copying prior to going oUI on the street." Pickering's name was written on the card, as well as the word "'Confidential," written in green ink. Apparently, Pickering was (he unwitting target of a "longtime surveillance system" the Times calls "mail covers."' THE N£lN AMERICAN· OCTOBER 7. 2013 /4 6 6 1 6 10 .. 5 ~=t r POe e: r e 3£ Duor M o s e,I.Qllr iil lOt ;111 ., ~ '. ,: '~'!!lB" '. ,. ,. ,, ' ~ 1T' c ,! ..~ . '.' -
  • 13. JOI,)t8tO' .()tOI Jr MOV OX' ~~1iHW 'V8 0010001010 nnn1n111n1 It doesn't stop there. however. While snail mail surveillance has been a (001 of law enforcement for over 11 cenrury. (he program that targeted Pickeri.ng is called Mail Isolation Control and Tracking. As pan of this Slrveillance tactic. the "Postal Service computers photograph the exterior of every piece of paper maillha! is processed in the United States - about 160 billion pieces last year. It is not known how long the government saves the images." When combined. the NSA and the U.S. Postal Service can keep every fonn of communication - electronic and conventional - under constant surveillance. without probable cause. A mail carrier's mistake led Buffalo, New York. resident Leslie James Pickering to discover the U,S. Postal Service's long-running program of targeting people for monitoring and recording of their surface mail. Details of the surveillance program reveal that the exterior of every piece of mail is photographed by the Postal Service. All Movements Are Monitored Beyond the government 's ability to watch and record every activity carried on in cyberspace. its capacity for keeping an eye on (he real world comings and goings of citizens is immensely more jarring and less publicized. The U.S. government exercises control over a massive and technologically advanced camera-based surveillance system that has the capacity to keep the urban population of this country under the watchful eye of government 24 hours a day. TrapWire is the name of this network of camera, and other surveillance tools . Unlike other elements of the central government's cybersurveillance program. word about TrapWire was not leaked by Obama administration in ider . The detall of this nearly unbelievable urveill ance scheme were made public by WikiLeaks, the antisecrecy group founded by Julian Assange. Exactly what is TrapWirc? According to one de cription of the program. from the online Ru ssia Today: closed location to be aggregated with other intelligence. As with so ma ny of the federal government's unconstitutional efforts at placing each and every citizen of the United States under the never-blinking eye of those who consider themselves our·caretakers. TrapWire is sold as being a necessary weapon in the War on Terror. Taxes as a Political Tool Other departme n in the executive branch have done much to keep an e e on p<r tential enemie of the stale as the _ SA. albeit in their own di tinct manner. Earlier thi s summer. it wa rep0l1ed by many ouuets (including THE E, AMERICAN) that the IRS was persecuting Tea Party and other conservative groups by conducting intrusive and illegal investigations of these groups' applications for 501 (c)(4) tax-exempt status. Although according to the White House the discrimination ended in May 2012. on August 9.2013. the Washington Examiner reported that an unnamed IRS official testitIed in a closed-door hearing of the House Way s and Means Committee that " the agency is still targeting Tea Party groups ." The implications of tlus abu e are incalculable. In a statement to THE NEW fuv[ERlCA • Senator Rand Paul (R-Ky.) said. "The power to audj t ha become a poLitical weapon. Nobody wants a government where the taxing authoriry is used politicaJly." Former enior intelligence ofIicials have created a detailed surveillance ystem more accurate thao modern facial recognition technology - and have in. tailed it across the US under the radar of most Americans. according to mails hacked by Anonymous. Every few second . data picked up at surveillance points in major citie and landmarks across the United States are recorded digitally on the spot. t.hen encrypted and instantaneously delivered to a fortified central database center at an undis- The use oftaxjng authority as a political weapon was not confined to conflicts with non-profit petitions. In January. Christine O· Donnell. former candidate for Joe Biden's fonner Senate seat in Delaware. was informed that Delaware -tate officials had on everaJ occaion acee sed her fed eral tax records to obtain potentially embarra ing information on a tax lien lhat wa first reported in a new paper article. The lien. it was di covered. w erroneou Iy filed. and lhe nooping was di covered. During congres ional hearing on the maner and on IRS cormption in general. a spokesman for the IRS told Senator Chuck Grassley (R-Iowa) that a Delaware state investigator was given penni :ion to open O'Donnell's IRS records. Based on nothing more than a newspaper story. O'DonneH's political foes were able to gain access to her very private tax. information. Most Americans. it would eem, would prefer that the infonnation contained in their rRS tile would remain private. The fact is. however. if an agent of the government (state or federal) wan to rifle through that file. rhe IRS require very little in the way of probable cau e of wrongdoing. Being a member of a group whose politics don't jibe with the establishment is apparently sufficient ground for this very invasive, illegaJ. and UDcon slitutional surveillance. Despite the government' intrusion VIWW: TheNewAmerican.com .;" - 1 7 5 -m!!iO~C.-l" f~~,",:. ' Ir "OJt cloc~ h~1 fClD oonr-.ce5' Y'(l~tv AH , 09 ....~. ., 6 6 16 10 .
  • 14. into Americans' private business, many Americans dismiss its activities, saying. "I've Done Nothing Wrong. Why Should I Worry?" This is the question often put to opponents of the federal government's surveillance activity. Furthermore, many Americans accept the surveillance state with rationalizations such as: "The government is protecting us from terrorism. so J think it's fine that they keep an eye oUI for extremists. If they happen to listen to my phone calls or read my email, that's just the price we pay for ~afety:' In lighT of the protection~ afforded by the Fourth Amendment, these mentalities look at the surveillance from the wrong angle. Americans are endowed by their Creator with Ihe right to be free from unwarranted searches and seizures. When the government takes away Ihe!;e rights, then there is no liberty. regardles~ of pretexts and purposes put forth by the fedewl government. While it's O1le that most Americans have "done nothing wrong" criminally spealUng, it is equally true that most of us have done many embarrassing things that we would prefer not to have put in a tile for future use by political enemies - inside or outside the government. What are these pO$sible peccadilloes? Think bad credit. poor scholastic performance, Web surfing habits. sensitive medical diagnoses, etc. h is most important to remember that there is no evidence that the government's rna ive surveillance and deprivations of rights has made us any safer. What. then. is the tnle purpose of the surveillance? It isn't security. Demanding freedom in excbange for safety is the economy of tyrants. When the federal govemment - or any government - robs citizens of their basic civil rights. then that government has become despotic by definition. Benjamin Franklin said., "Any society that ould give up a lillIe liberty to gain a little security will deserve neither and lose bOlh:' President Oban1a, on the otber hand, told Americans that we cannot have a nation that is 100 percent safe and 100 percent private. To be safe. he say. ve have to make hard choices. He's right: We must choo e whether to aJlow our constitutional rights to be subjected to daily diminution or to stand up ruld demand that the totalitarianism end and liberty be restored. The question is: How'? 16 6 6 16 10 .., Christine O'Donnell, former candidate for Joe Biden's former Senate seat in Delaware, was informed that Delaware state officials had on several occasions accessed her federal tax records to obtain potentially embarrassing information on a ta)( lien that was first reported in a newspaper article. Federalism Protects Fundamental Freedom One unwarranted wiretap. one unwarranted seizure of a phone record, one search of records of an individual's digital communications is too many. If we are a republic of laws, then the supreme constitutional law of the land must be adhered to. The standard i not whether or nOlthe spies or their bo ses think the deprivations are "okay." The standard is t.he Constitution - for every issue, on every occasion, with no exceptions. Anything les than that is a step towru'd tyranny. Taken together. the roster of snooping programs in use by the federal government places every American under the threat of constant urveillance. The courts. Congress. and the pre.sident have formed an unholy alliance bent on obliterating the Constitution and establishing a country where every citizen is a suspect and is perpetually under the never-blinking eye of the government. The establishment will likely continue construction of the surveillance umil the entire country is being watched around tbe clock and every monitored activity is recorded and made retrievable by agents who will have a dossier on every American . The fight can yet be won, tbough. Americans can attack the sprav.ling • • .,.•• • surveillance stale on several fronts. First. we must elect men and women to federal office who will honor their oaths of office (0 preserve, protec!. and defend the Constitution . Then , once in office. each of them must be held immediately nccoulllable for each and every violation of that oath. Next. we must fill our state legislatures with men and women who will refuse to enforce any act of Ihe federal government that exceeds the boundaries of its constitutionally granred powers. These lawmakers must force the federal beast back inside its constitutional cage and never accept even a degree of deviation from the blueprint drawn in Philadelphia in 1787. Though the hour is late. there is still hope , Beginning today, Americans can refuse to re-elect any lawmaker who has voted to fund the NSA or any olher federal agency wbose exislence is not specifically permitted by the Constitution. We can unite, as our forefathers, in the ennobling cause of the end of tyranny and the promotion of those unalienable rights granted to us - and revocable only - by our Creator. •
  • 15. ')OI ,H~!lO' MOV DX: ~~~HW .OflJ I :) r • SURVEI I!l!'ANCE COVER STORy ....... The NSA Domestic Surveil ance Lie When accusations of spying on Americans were first leveled at the ~SA, the government claimed there was no illicit spying. Then it had to backtrack again and again. try was strictly limited to likely terrorists - people that couns ruled to be dangerous based on the available evidence. Presidell! Busb stated on April 20,2004: There are such things as roving wirelaps. J ow, by the way. any time you bear the lh ited States government talking abo ut wiretap, it requires - a wiretap requires a court order. Nothing ha changed, by the way. When we' re talking about chasing down terrori sts, we're talking about getting a court order before we do ~o. Ii's important for our fellow citizens to understand, when yo u think Patriol Act. constitutional guarantees are in place when it comes to doing what is necessary to protect our homeland. because we value the Constitution. IEdwardS'nowden: The former NSA contractor and whis!leblower has stopped an ong oing snowjob by federal off1cials about NSA decimation of the Fourth Amendment. by Thomas R. fddlem ".A Ild so ill light oj the chll/lged environment lvhere {/ whole set oj questions have been miser/, some in the most sensatiollalized manner possible, where these leaks (JTe released drip by drip, one a week, /() kind of rnaximize attellliOIl {Ind see {( they can catch us a l so/)/e imprecision 011 ollie /iring. " - President Obama, August 9, 20J 3 press conjerence P resident Obama' s unprecedented press conference on NSA surveillance August 9 ~omplained about 'the journalistlleaker team of Glenn Greenwald from the Brirj .. h new. paper The Guardian and former SA contractorturned-w hi stleblower EdwaJ'd Snowden. implying that the two were merely trying to draw attentjon to themselves and bait the administration into admitting something inconsistent with what it said previously, hence giving the pair something else to use to draw even more attention to tJJemselves. However, in chast ising the pair' news release, on the NSA , it was ve apparent that Obama's press conference was a desperate attempt at political damage control. with Obama try'ing to con. truct a new. credible lie upon which he could claim that the NSA had never violated the Fourth Amendment or the pl;vacy of American . Widespread surveillance of Americalls began shortly after the September 11 , 200 1 attacks uJJder the Bush adminisU'ation, and received some attention with rep0l1ing by the New York Times from 2004-2006. Despite the reporting on SA surveillance. Bush - and later. Obama - administration personnel is ued official denials that the NSA was lis tening to AmericaJJ citizen ' electronic communications. We're not collecting data on American citizens. The Bu. h administration. which initiated the denials of spying on Americans. implied that any U.S. urveillance within the coun- On March 20 of this year. the director of national intelligence, Admiral James Clapper, also denied that there has been wholesale monitoring of Americans· communications, when he was asked by Oregon Senator Ron Wyden, "Does the NSA collect any type of data at all OIJ million or hundreds of millions of AmeriCaJls?" Director of National Intelligence and Admiral James Clapper: "No, sir." Wyden: " It does not?" Clapper: "Not witlingly. There are cases where they could inadvertently perhaps collect, but not winingl y,'· Oops. We meant to say we are collecting metadata on Americans. Both administrations engaged in flat out lies to the American people, but the Obama administration has been caught in lie after lie as it continually re treaLS from iu; offic ial story. The official story changed dramatically with Snowden's whistleblowing. Snowden told Greenwald back on June 9. 2013 that the NSA - once devoted to foreign intelligence - was increasingly foeu ed upon Calf 1 -800-727-TRUE to sLibscribe today l - ,: '. --t -....' ~ -InliAti Itlic..' r I ~.- 17 lie ,. • t• • • • •
  • 16. I . I '0010(99rmQ(YHfHOtOt . ,Ioor ,IJAT2 .J ].~A;- AD nnn1 n111 n1 n Sl!JRVEI~l!'ANCE · On USA 2013 conference. NSA Director General Keith Alexander laid OUI the e ntirety of what the NS A was supposedly collecting: ~----' ,:1 July.. 8,2D13, NSA Director General Alexa~nder : admitted that the NSA does collecMhe'·'content" of Americans' ~';H':". p-ersonatcommunications but, he .• insisted~thegovernment is not listening r...c to or., si!~ji1g . through the collection of data on Am.e'jcans; ' ~-. ,-!!~ ~ft. surveill ing Americans. ''The NSA speciticaUy targets the communications of everyone. It ingests them by default. It collects them in its system and it filters them and it analyzes them and it measures them and il stores them for a period of lime." It had gone so far. the former Booz-Allen-Hamilton employee claimed. "I. sitting at my desk . certainly had the authority to wiretap anyone. from you or your accountant. to a federal judge or even the president. if I had a personal email." Though Obama admini stration officials denied Snowden's sweeping charges (Snowden was later validated), they had to backtrack after Greenwald publi shed information on the NSA's collection of Americans' Internet " metadata" under the agency's PRISM program. James Clapper retracted his statement 10 Wyden Oll June 9 during NBC's Sunday Today show: [ thought it would be imponant [0 give you a picture of what our analysts actually see. There it is ... as you can see. what you have is the dale and ti me of the call, the calling number and the call- the duration of the call. And we also put in the origi n of the metadata data .... Tllis does not. include (he content of the communications. TIllSdoes no! include yo ur phone caJls or mine. your ell1ails. nor mine, your SMS messages. There is no content. By the time Alexander said those words. they were already out of date . That same day Greenwald publi sbed in The GUa/dian infomlation on the SA' XKeyscore program, a program thm collects. miJlions of e-mails from American cifizens w ithout a warrant. along with '''nearl y everything a user does on the I.nternet." La ter. other NSA programs were also revealed to have collected Americans' e-mail me sages on a massive scale. In response to being busted on this lie, the Obama admillistration bad another fallback upon which to rest their damage-control program: Even though they are collecting all Americans' Internet data, including the full content of e-mail messages, the data had never been mi. used and are subject to multiple _afeguards. Of course. the Founh Amendment to t}le U.S. Constit*ion prohibiL~ not only wanantless "searches" by the government , it ban government "seizllres" of records without both a warrant and probable cau e as well. We're not misusing the personal data that we do collect. In a televised interview on July 18, 2013, NSA Direc(or General Alexander admitted thaI the NSA does collect the "content" of Americans' personal communications but. he insisted. the government is not listenjng to or sifting t.hrough the colleaion of data on Americans. The NSA ha safeguards again t actual1y searching Americans' da ta. NBC Reporter Pete Williams: " Let's talk about the phone program. You gather all tbis data from the phone companie and it sits in YoUt' big tank. What can you do? Can you muoch on it and chew on It and do data mining, or does it just sit there until you have some specific question?" Gen. Alexande r: " Yea h. it sits there. And that's a great ques tion because the coun restricts wbat we can do with that data. We can only look at that data if we have a nexus to alQaida or other terrorist groups." I re.sponded in what I thought was the mosl truthful, or least untruthful manner by say ing no. And again. ·10 go back to my metaphor. What I was thinking of is looking at the Dewey Decimal number - of those books in that metaphorical library ~ to me, collection of U.S. persons' data would mean taking the book off the shelf and opening it up and reading it. We're not collecting e-mail and other private Internet messages from Americans. This firsl of several backtracks was followed by the next fallback line in NSA denial soon thereafter: The NSA admitted collecting data on American , but only metadat3 - information aboUl Inte rnet traffic - not private e-mails and other priate Internet-based mes ages. On Jul y 3 !, 2013. at the Black Hat Should have read the morning paper: NSA Director Keith Alexander claimed at the July 31 "Black Hat" conference that NSA surveillance "does not include your phone calls or mine, your emails, nor mine," the same day that Snowden/Greenwald revealed in the U_K. Guardian that the XKeyscore program did include contents of e-mails. 1 8 THE NEW AMERICAN • OC TOBER 7. 201 3 ,Q ,. .. , ,,... "co. • ~ .. " . ..: '.~ tL~ I • ~j .. 1. '._ ~ -
  • 17. I )ll')f~r(~ ) I I'll I Ulel)t MOVDX' ~~ HW 1; , 001000 000101 This was the fallback position of the Obama administration throughout the month of July. They essentially claimed thar the NSA was collecting all types of data on Americans. but that this collection is put into a Iype of legal lockbox that is not touched without a warrant and a coun order from a FlSA court. But by August 15, the Washingtoll Post had reponed that the NSA had violated the privacy of Americans' data - and had violated its own rules - thousands of times per year. Thus. !.he Obama admjnistration was forced to fall back to the next tie. th at the NSA had never intelltiollally violated Americaos' privacy by searching their pri vate e-mails aod phone records. Okay, our collection of data on Americans has been abused accidentally, but never deliberately. Obarna then wen'! on hi national public relations tour for the NSA"s unconstitutional wiretapping program. again assuring Americans lhat !.heiJ private information was safe in his admini stration's hands. He said in an interview with Jay Leno on the Tonight Sho w on August 7. 2013: We put in some additional safeguards to make ure that there 's federal court oversigl1( as well as congressional oversight. that there is no spying on Americans. We don ' t have a domestic spying program. What we do have are some mechanisms where we can track a phone number or an email address that we know is connected to some sort of terrorist threat. And that information is useful. But what I've aid before I want to make . ure I re peat. and that is we should be skeptical about the potential en croachment.. on privacy. None of the revelation s s how that governmem has aCLUally abused these powers. but they're pretty s ignificant powers. He reiterated his administration' s Iilywhite hands agaiJl at a press conference on Augu st 9, 2013: If you look at the report s - even the di sclo tires that MI. Snowden has put forw ard - all the stories tbat have been written, what you ' re not reading about is the government actually www.TheNewAmerican.com Believable? Federal officials claim that this behemoth storage facility in the Utah desert is needed to store only five columns of data on Americans' telephone traffic. abusing these programs and listening in on people's phone calls or inappropriately reading people's emails. What you 're hearing about is the prospect that these could be abused. Now, part of the reason they're not abused is becau se these checks are in place , and those abuses would be against the law and would be again t the orders of the FISC. Two wee ks after Obama's national public relations tour for the NSA. the Wall Street JOl.lmo[ revealed on August 23 that NSA staffers had used the databa es to spy on romantic imerests frequently enough to create the label "LOVE[NT' for Jove intelligence:" lationa] SecurilY Agency officers on several occasions have channeled their agency's enormOliS eavesdropping power to spy on love interests. U.S. officials said." The privac. of Americans has been abu ed, the Obarna administration has been forced to admit. but faced with the evidence. it claimed in statements for the Wall Street JOllrnal "lOry that it took place only rarely. The Waif Street Journal reported that "the practice isn' t frequent - one official estimated a handful of cases in the last decade - but it's common enough to garner its own spycraft label: LOVEINT" We're not collecting the phone audio of Americans' phone calls. While it 's too early to say whether the NSA is collecting audio of Americans' telephone calls, it does remain the last el- ement of eleclTODic data tbat the NSA still officially denies collecting ellll1{fsse. Most intelligence analyst seem to believe that Americans ' phone call ' are not recorded and stored for later u e. or at least most of American . phone ca.ll . But lh i may be largely all i sue of technologi.cal limitafion rather !.han williDgne~ of the SA to engage in that kind of ncon titutional monitoring. As tbe SA open a huge data center in Utah tlli year. technologjcal limiralions rna become a moOt point . Obama pointedly did not deny lhat the federal government wa collecting the audio of Ame rican' telephon e call - in his August 9 pre. s conference. though a denial would have: perhaps been a a te of time. With a long history of publ ic lies Oil the issue of warrantless ur ei llance that explicitly violates the Fourth Amendment: to the U.S. Con litution, Pre ident Obama's denial would not bave been believable anyway. Obama has obviou I bought into the idea that intelligence officials need to collect every bit of informarion about Americans, stari ng in hi August 9 press conference: "W e need new thinking for a new era. We now have to unravel terrorist plots by fi nd ing a needle in the haystack of g lobal telecom munications. And meanwhile. technology has given government - including our 0 n ~ unprecedented capabilit)' to mo nitor communications." Is another lie about to be e xposed by lhe Greenwald/Snowden whistleblowing [earn? Only time will tell . • 19 6 6 16
  • 18. CULTURE The Slippery Slope to Pedophilia It is unlikely that many Americans now believe that pedophilia will soon be accepted in this country, but it is riding the same track to respectability as did homosexual "marriage." by Selwyn Duke f you had told someone in the 1950s that, in about two generations, homosexuality would largely be nomlalized and faux (. ame-sex) marriage would be gaining widespread approval, they'd have called you crazy. Never, ever under the stars and stripes. Why, pugnacious pundit Bill O ' Reilly himself opined as recently as 10 to 15 years ago that faux marriage would never be accepted in America. Ah, what a difference a decade makes in tbe (mis?)information age where ideas can be transmitted worldwide at a button's touch. I can't tell you exactly when I knew faux marriage would gain traction - not in term of date and time, anyway - but suffice it to ay it was at least as soon as 1 heard the idea uttered by some obscure academic or activist 00 society's fringes. A for homosexuality, there were some agaciou souls who realized decades ago Ihat it would even,uall y be accepted. How? The same way a few of us knew in high school, almost instinctively, that our education paled in comparison to that of previou generations: trajectory. If you know an a teroid ' trajectory, you can predict not only where it was years ago, but where it will be in the future, And so it is Wilh cultural trajectory. I Terrible Trajectory Yet if l , ay chat our current cultural trajectory - a bizarre trek that has caused us to boldly go where no American had gooe before - has as a point on its arc the acceptance of pedophilia, I'm sure I'll hear "never, ever under the stars and stripes!" This is a normal human reactlon. But the pa t is a picture of futures man inevitably will paint again. and history hollers its wamings for those with ears to hear. Fir. t consider a simple fact: There is virtually no historical precedent - if any at al1- for faux marriage, yet we're accepting it. But tbere is gre.at hi storical Call 1-800-121·TRUE to su bscribe today! From unthinkable to palatable: While faux (same-sex) marriage now enjoys 'lidespread approval, two generations ago it was as much reviled as pedophilia is today - something thai "could never happen" in America. precedent for pe.dophilia that lhing most would currently say we could never accept. And the obvious place to start here is with ancient Greece. The civilizat ion is wellknown for its acceptance of homosexuality, yet what actually was most common in this arena was pederasty, sexual relationships between men and boys. It is said that in the mid and late periods of ancient Sparta, the practice was inst itutionalized in the city-state's military camp, with a 12-year-old boy being attached to a mature man wbo would become the child's me . tor and, apparently, molester, And homoerotic ancient Greek art and, more signjficantly, the casual way prominent Greeks spoke of pederasty attest to its widespread acceptance. As to the laller, historian Plutarch addresses Theban pederasty in Life of Pelopidas and explains that it was an educational device for boys that was dc:signed to 'soften , while they were young. their natural fierceness" and 'temper tbe manners and characters of the youth." The poet Solon gushed about pederasty in his poem 'Boys and Sport," and tradition tells us thaI the warrior group the Sacred Band of Thebe compri ed pederastic man-youth pairing ". In fa t. the Greeks even had words de ribing the players in man-boy relatjon 'bip~ : An eraSfes was an adult man who courted or was ill a sexual relationship with a boy (Ihis accounts for part of the deri ation of "pederast"), who himself was l"llown as an eroll1enos. Yet it wasn'tju_1the "advanced" Greeks. History i littered with examples of primilive peoples that practiced institutionalized pedophilia: the Sambia tribe of Papua e Guinea doe so to this day, and many mjlitary per onne! will attest to how the abu e of "dancing boys" is widespread in Afghani tan. The reali ty? When it wa. n' t acrually prescribing it as a good that created a bond between brotllers in arms or er ed some other end, pagan morality often had little negative to say about pedophilia (and Islamic culrures may tolerate it). Perhaps now we see why philo opher C.S. Lewis once said, "Sex is not rne. sed up because it was put in the clo et; it was put in the closet because it was messed up," And since that closet was made with Chri tian morality, and the faith is no ridiculed 21
  • 19. and attacked and its closet is being thrown wide open, isn't it logical to suspect that anything and everything within it could, quite possibly, emerge? Yet how would we get from where we are now - perhaps point G - to a pederastic point X? Well. it's instructive to explore how we got to G in the first place, and this brings us to the ABCs of social manipulation via the lise of media. entertainment, academia, specious science. and philoso-babble. A book was published in 1989 entitled After fhe Ball: How America Will Conquer ITs Fear and Hatred of Gays in the 90 's. Tn it. authors Marshall Kirk and Hunter Madsen - a marketing man by trade who, take note, once used the pen name "Erastes PiJl" - called for a desensitization of Americans to homosexuality through a "continuous flood of gay-related advertising," a "conversion of the average American's emotions, mind, and will, through a planned psychological attack, in the form of propaganda fed to the nation via the media." Of course. Kirk and Madsen weren 't puppeteers or prophets as much as good trajectory readers, as the movement they encouraged was well under way by the time they penned their book. III 1977 already, we had the sitcom Soap witb its openly homosexual character Jodie, played by comedian Billy Crystal. And while some would argue that lhe character Va created to make the show cutting edge rather than to manipulate hearts (and. of course, both could have been motivations), it certainly made for ingeniou: propaganda. Take a funny and sympathetic character - and Crystal was most comedic - but make him a homosexual on an entertairlillg show that is tbe "tbing to watch." TIus is effective because whether it s Soap, La Cage aux Folies, or another work, if you laugh at something enough, you're no longer outraged by it. AJso be sure to have that homosexual character say things such as "I m a perSOll. just like you." which Jodie did (or a paraphrase of it), but. most significantly. just show him acting. and interacting with other, just as you would. For a big part of normalizing something is showing those who embody it acting normally. The next step after normalization alld tolerance is engendering sympathy and affection, and elltenaimnent's role in this is simple to understand. Just as people may - zeitgeist news north ameritan mon/boy love association _ ...... w-.,~~ ......... 'IIQ """ 11 WMI8o)' ~1 --,,- -_ -_ --.- _on Cwid I>y~ l'lIf moler. $cuIP ..... by 8o!lel TlIoMoIdsen (0. CIdt ... " ' - _ . , golOenw Whal'sNew 177~ltW.) Wlldme.s. eo.m-on. -.... ... ..,." -.... Resurrecting a dark Hellenism: The notorious pedophile organization NAMbLA seems to draw inspiration from ancient Greece, where pederasty was rife and well represented in the civilization's art and literature. condemn the sin but no! the sinner. they also have trouble loving the sinner but not the sin. Tlus is why a mother may accept even a son's heinous crimes and why people will justify the scandaJous behavior of a favorite politician or pons figure. Likewise, when people come to like a show - and, more specifically, a character on it - they generally start to accept what that character represents. And just think bow successful this entertainment campaign has been. Homosexual characters are now a staple ofTY and film and, as ill the movie Sling Blade, are sometimes the work's only compassionate voice of reason. Enter Entertainment But the·1l tJlere are the agencies vorking in concert with entenaimuent. There is specious science reponed - and often twisted - by special-interest media and academia; thus do we hear about things such as the "gay gene," which not only doesn 't concern the heritability of happiness bu! also ha never been found. Nonetheless, it is used to give weight to the argument that homosexuality is inborn and, well, haven't you heard, "God doesn't make nustakes" ? The media and academia are also careful to frame the homosexual agenda as a matter of "rights," '·equality." and " minority" victimhood while avoiding talk of "morality" (tbey will, however, apply their feelingsderived preferences and call opponents "haters," "bigots," and " intolerant"). This is easy to do. too, since they've discredited moral reaJity with the phi!oso-babble of moral relativism and its refrains, "Who is to judge?"' and "All values are equal." Of course. this credo could be used 0 justify killing homosexuals as easily as acceptill,g them, but this realization involves understanding an ;l!feileclt/(J/ argument, and manipulating emotion is tJle name of the game here. And as long as entenainment - an arena so powerful that Plato warned how even ju tmusic had the capacity 0 reshape civilization - pushes people's emotions in the desired direction, the field wi II be yours. But will a day really come that marks the first time entertainment is placed in pedophilia' s service? And when would this be? I can predic.t this with some precision: in about 20 years ago. There ha long been the "Pedobear' Internet meme, a little comedic cartoon character Web users often associate with news stories about pedophilia. And remember what happens when people start to laugh at something? Then there was the "Chester the Molester" cartoon character in Hustler magazine (the creator of which, Dwaine Tinsley, was once convicted of molesting his 13-year-old daughter). Far more significant than a porno-mag offering, however, was a fum made in 1993 called For a Lost Soldier. Based on a trlle Story, the movie somewhat vividly portrays a WWII-era sexual relationship between a Canadian wldier and a 13-year-old European boy.
  • 20. What I'd like to focus on here, however, is a New York Times review of the Ii 1m wrinen by someone named Stephen Holden. Entitled 'Treating a Delicate Story of a Soldier lUld II Boy Tenderly." you'd think the paper was reviewing Romeo alld Juliet. Holden writes that the story "takes up ... a romantic reLationship between a grown-up and a child, and invests it with an aching tenderness"; that it is "more than a love story"; that "Walt [the molester) seems almost as innocent as Jeroen [(he child]": and describes the "affection" between the two as "touching." Moreover. the Times not only takes no issue with the film's non-judgmental treatment of pederasty, it writes, "One of the strengths of the fi Im is its refusal to load the story with contemporary psychological and sCicial baggage. There is no mention of homosexuality. Nor is there any implied accusation of child abuse .... The film assign no blame and assesses no damages," In facl_ the paper says the movie's only failure "i in findin g a coherent dramatic frame for the story." And then there is the kicker: The review describes the "affection" between Wah and Jeroen as "the love that dare not speak its name." My, where have we heard that one before? And what is the implication here? Should a man-boy sexual relationship be able to speak its name? NA1 1 BLA cenai.nly thinks so. First salvo in the movement to legitimize pedophilia: The film For a Lost Soldier portrays a man/boy sexual relationship in a non-judgmental - and perhaps even positive - light. www.TheNewAmeric8fJ.com A more recent film in the same vein is L.I.E. (2001). II portrays Authors Marshall Kirk and Hunter pederast Big John, an ex-marine Madsen - a marketing man by trade with a penchant for young male prostitutes but who also, you see, who, take note, once llsed the pen has a human side. As Ed Gonzaname "Erastes Pill" - called for lez wrote at SlantMagazine.colJI., the film "suggests that a pederast a desensitization of Americans to could actually have something homosexuality through a "continuous useful [to] contribute (0 society." Alld as A.O . Scan of the Ne w flood of gay-related advertising. " York Times put it. compared " with Howie's L the 15-year-old main ch aracter's1 well-meaning but clueless Scientific Stamp guidance coun selor, Big John seems like a Actually. they're already behind us. beuign, common-sensical uncle." On January 14 of this year, the Los AnOf course, neither Big John nor For a gel e Time ran an anjcle entitled. "Many Lost Soldier 's Walt is portrayed as par- researche laking a different view of pedoticularly sympathetic. But they're not por- philia: Pedophilia once was f/roughffo Sfelll trayed as particularly villainous, either. from psychological influel1ces earh' in life, And lhis non·judgmentalisl11 is in faCl a NOI~ ', mal1Y e.xperts view iT as (I deep-rooted judgment, in that it serves to place. via predi position lhar does nOl change." (Emembodiment representation , morally evil phasi in original.) The pi ce starts out with behavior in the morally Il elllral category. a story about one Paul Christiano, who, as Except for their habit of indulging the an- a young child, was fascinated by girls and cient Greeks' "unspeakable vice," Walt loved "bow lheiJ' pindly bodies tumbled and John are presented as acting . and in g. mnastic ." wrote the paper. We 're interacting with others, normally - and then told tbat while Chri tiano grel,l.' up. often even charitably. After all; they are his eXll31 t Ie didn ': He remained tor"people just like you," right? mented bj an attraction to pre-pube C eDt That is how it starts . girl s. Christiano i tbe " ympathetic charWith enten:ainment having already bro- acter:' mind. ou, the haple olll me.:1nt 10 ken the ice in whitewashing pedophiles, put a human face on pedophil ia. But now can lhe ti.rst clai ms that their desires are just consider -hal he said about un ucce sf1.l1 court-ordered the rap_ he Vas forced to another inborn olientation be far behind? undergo after being caught wilh child pornography in 1999. A the Times reponed, "'These people felt they could snuff out the desire. or hame me into denying it exi sted: he said .. But it" as intrinsic as tbe next person' helero exualirj'... ' "A imrin ic as ule next person 's heterosexuality .. , " Where have we heard that befor '. And the paper then does something el-e th at hould sOllnd famili ar. It gi e Christiano'S claim the imprimatur of s ience, writing: When laughter is the worst medicine: Will things such as the "Pedobear" Internet meme eliminate outrage over pedophilia by treating it not as a jarring perversion, but as a joke? In the laboratory, researcher are coming to tJle same conclusion. Like many fonns of sexual devi ance, pedophilia once was thought to lem from psychological in fluences early in life. Now. many experts view it as a sexual orientation as immutable as heterosexual i ty or homo e:'Ualit},. It is a deep-rooted predi po irion - )jrn23
  • 21. attractions were removed from the APA's list of disorders. Eventually, the legalization of 'gay marriage.' the mandatory homosexuality lessons in public schools and the brand new policy of allowing open homosexuality. in the U.S. military resulted:' writes WND. Reponing fu rther on the positions taken at the conference. WND wrote: Out of raincoats and into the mainstream: Child-sex advocates now include accomplished professionals. Or. Fred Berlin (pictured) of Johns Hopkins Hospitat. for instance. has argued for the "acceptance" of pedophiles. iled almost entirely to men - that become clear during puberty and does not change .... Scientists at the Toronto center [Center for Mental Health and Addiction in Toronto J have uncovered a series of associations that suggest pedophilia has biologicaJ roots. The paper then tells us that pedophile are generally an inch honer than nonna! people, have I.Q.s IO points lower on average and less white matter in their brains. and that the first two of these factors are '·consistent with developmental problems, whether before birth or in childhood.'· They sure areand their interpretation is consistent with a cultural problem. The operative phrase here is "whether before birth or in childhood" because. if the latter, it iJldicate a nunureoriented cause of pedophilia. not a natureoriented one (as to nurture's significance, research has indicated that environment can influence even, amazingly, gene expre sion). Yet the limes article glosses over the nurture p sibility - it doesn I match the agenda the paper is trying to advance. There i another fact the Times has LO ma sagc. Continuing with the inborn theme. it tells us. "Among the 1U0 t compelling fiJldings is that 30% of pedophiles are left-handed or ambidextrous. triple the general rate. Because hand dominance is establi hed through some combination of genetic~ and the environment of the womb. cieotists see that association as a powerful indicator that something is different about pedophile.s at birth. 'The only 24 explanation i~ a phy iological one: said James Cantor, a leader of the Toronto] research." Yet the lillie had written earlier in its piece that. researcher have basically dispensed with the "popular belier' that childhood sexual abuse i a significant factor in pedopbllia becau_e "only about a third of offenders say the were molested" as children. So let 's get thi sUllight: When 30 percent of pedophile hare ome sort of inborn characteristic, it's compelling evidence for the nature the i . But when (only?) 33 percent share a traumatic life experience, it's compelling evidence discrediting the nurture one? This clearly is the spinning of data to fit an agenda. And who are the "experts" cited in the Tillles article? Many of them, it seems. crawled out of lhe woodwork to allend a 2011 symposium in Baltimore, Maryland - an event whose focu. was the nonna!ization of adult-child sexual relationships. WND.com reponed at the time that it was "held by the 'minor-attracted people ' advocacy group B4U-ACT 10 di seminate 'accurate information' on the position that pedophilia is just one more alternative sexual orientation." As such. the confercncc speakers contended, the American Psychiatric Association should no longer list pedophilia as a psychological condition in its Diagnostic and Statistical Manual of Mental Disorders (DSM). Drawing an imponant parallel. Dr. Judith Reisman, a longtime crusader against child sexual abuse who attended the symposium. "explained that the same . trategy was used by homoexual aClivis~ in the 19705 when same-sex Dr. John Sadler (University of Texas) argued that diagno tic criteria for mental disorders hould not be based on concepts of vice iDce uch concepts are subject 10 shifting social al' titudes and doing so diverts ll1entalhe<llth professions from their role as healers .... Fred Berlin of Johns Hopkins ... argued in favor of "acceptance of and compassion for people who are attracted to minors ...... ... Richard Kramer. who represented B4U-ACT at the event, contended listing pedophilia as a disorder stigmatizes the "victims" of the lifestyle choice. ... Conference speakers said the Diagnostic Manual should "focus on the needs" of the pedophile and ~hould have "a minimal focus on social control" rather than a focus on the "need to protect children." . .. Self-described "gay activist" and speaker Jacob Breslow said it is proper for children to be "the object of our auraction." Breslow said pedophiles shouldn 't need to get consent from a child to have sex any more Ihan (hey would get consent from a shoe to wear it. .. , Andrew Hinderliter of the University of WillOis said the boundary between the helping profe - ions and the criminal justice system can be blurred . Note that B4U-ACT lakes pains to reb rand pedophiles as "minor-attracted people" in the same way acti i, t once strove 10 ensure the euphemism "gay" would supplant "homosexual." Liberty Counsel Action vice president J. Man Barber. bo also attended the conference, summed up its themes thus (quotation are Barber's, as reponed by WND): Adult lu ( for children is "normative." people indulging i[ are unfairly "de01onTHE NEW AMERICAN • OCTOBER 7. 20 13
  • 22. ized ," children are capable of consenting to sex, "wrong" as a concept isn '( applicable to "minor-a((racted people," and the OSM "ignores that pedophiles 'have feelings of love and romanc-e for eh i ldr<;,n' the same way adult heterosexuals have for each other." logically Defending Illicit lust Just as significantly, these are far from the only times such views have been expressed. In a 2002 article entitJed "Raising Sexually Healthy Youth: Rights. Respect. Responsibility & Parent-Child Communication," the group Advocates for Youth stressed that chilureJl are "sexual f!'OIIl birth." Ann-Katrin Muller in Der Spiegel reported that GenTIan homo exuaJ "rights" organizations and even a sizable number of Green Party politiciaos have a long hi story of sllpponing pro-pedophilia causes. Author Judith Levine penned a 2003 book in which she " suggests the threat of pedophilia and molestation by strangers is exaggerated by adults who want to den, young people the opportunity for positi ve sexu al experiences " wrote Fox ews. An ti-fracki ng activist Vera Scrogg in s has advocated that parents initiate young children into sex, writing. " Who better 10 do it , than the parent s first ?" And, of cour e, (here is bug researcher turned self-proclaimed sex expert Alfred Kinsey, who we now k.now was a pedophile using science as a cover for the indulging of his perversion. As 1 reported in "According to Kinsey, Deviancy Is the New Normal," in THE NEW AMERICAN. all the afore~entioned ideas - that children are sexual from birth. that relations with adults don't hann them, etc. - can be traced back to him and his associates. And these ideas are lent credibili ty even though it has been establi shed that Kjnsey was a scielllific fraud who misrepresented data for the purposes of legiLi llllzillg perve r~iull. And when you combine tills specialiotere t "science" with specious rea oning, you have a very dangerous one-two pu nch of prevaric ation. For example . consider again the Los Angeles Times article. It does contain a grain of truth. Th at is to say, people generaJly don ' t ask for the fee li ngs they have, and. as C.S. Lew is noted ages ago, sex.ual problems can be quite intractable. Yet it's silly and often just agenda-gre.asing spin - 10 confuse intractability with innateness . We all know that inlluences and e vents during form ative years can have far-reaching consequences and can almost imprint behav ior (that is why they're called Jonna- The pseudoscience used to justify pedophilia - such as the notion that "children are sexual from birtl1" - can be traced back to "sex researcher." scientific fraud , and pedophile Alfred Kinsey (left). Call 1-800-727- TRUE to subscribe today! live years); raise a boy in an abusive and criminal ghetto home, for instance, and he may ex hjbit change-resistant negative behavior patterns the rest of his days. This also place in perspective a claim made by many a homosexual: 'I've had these feelj ng for my whole life." This is either sloppy thinIJng or a rationalization. Since most everyone ha. recoUeclioos reaching back to onl three. four or even fi ve years of age, all virtually anyone can say with assurance is, " I've had these feelings for as lOllg as I can remember." And those lost-in-memory first few years of life are the most ignificant of aIL Without Morals, Everything Is Normal The fo lly of the int ractab ility-equ alsirmatene the is is further illustrated by applying it con istentl .. For example, it's applied to homosexu ali ty and "gender dys phoria" feeling you're a member of one ex rUl:k in the body of the other) , but what about "Body Integrity Identity Disorder" (BnO . hich in·. oh persistent and eemingly irremediabl feelings that a body part doe n't belong on yo ur body? Would it justi fy amputation? Acnmlly. two BIID "patients" found a Scotli'h doctor will ing to do ju I lhat and had two healthy legs rernoved, a teslirnonial to what can happen when We e.levate feelings to uliimatearbiter latus. When be et by anomalous. eU·-de. tru th e. or perverse impulses. the default ill umption should be tbat the issue is a p_ychological problem , not a phy icaJ or genericaJJy induced one. But rhi, counsel is now viewed as heresy because the "experts" have transitioned bac k to the nature side in the narw-e/ nurlure debate (at least wben poli rical correctne_ allows it: They certainly won 'r attribute different achievement among the races to genetics - yet). It was in fa hion during the early 1900s as well, then in the form of the eugenics mo'ement. until the a sociation with Nazi horror- di credited it. We then saw nurture dogma' a cendancy and heard pap such as. "The sexe will be the same if we rai se them iden25
  • 23. The gene theme: The claim that a behavior cannot be wrong if it has a genetic basis is philosophically unsound, in that it replaces morality with biological determinism. Also, other genetic flaws, such as Down syndrome, aren'l deemed normal. tically:' as these pendulum-and-pabulum practitioners swung from one extreme to the other and proved that G.K. Chesterton was right when he called common sense "that forgotten branch of psychology." But of more concern right now is what is quickly becoming a forgotten branch of philosophy: morality. Vhile the nature-oriented eugenics movement ought to eliminate what it deemed defects . our nature-oriented movement often bold that if something is natural, it cannot be a defect. This is the "God doe n't make mistakes" argument, the implication being that if omething is inborn, it cannot be wrong. And the greatest danger here isn't that this i- lI~ed to justify homosexuality - or even that it could be u ed to justify pedophilia - but that it could literaUy ju tjfy anything branded "innate." Fir t note that whether we believe our world i naturally flawed or demonically faUen, it' plain we aren't born perfect. Spina bifida. cleft palates, and Down syndrome attest 10 this in the physical realm. and the only reason there hasn't been a powerful movement to normalize such things i that people generally don't find b~ing deformed or mentally compromi 'ed a turn-on. But few thi ngs feel better than ,IIi fying ~exual desire, and you can't easily sali fy what i stigmatized - ergo the innatene s-equals-Iegitimacy argument. Con ider, however, that the same social scienti ts claiming that homosexuality, 26 and now pedophilia. i inborn, also tell us sociopaths are born and not made. Now, question: If in addition it' determined that homicidal feelings are innate, would it be moral for a persoll of uch nature to kill? The lesson here? Genetics doesn't determine moral ity. Wherher or not feeling are disordered - and whether their com~ ponding behaviors are moral - h /lothing at all to do with whether 1110 e feelings were bred not by despotic abuse but the dark workings of D A. Saying otherwise is to discard morality and replace it with biological determillism . And no idea is more destructive to civilization. No idea should be more quickly rejected by civilized men. Unfortunately, civilized men are in increasingly shoJ1 supply, especially among the Left. which seems remarkably untroubled by pedophilia. How can I say this? Well, just observe leftists' telling contradictions - and what they refuse to tell. If pedophilia were anything but a convenient hammer they use when reporting incesantly on hated targets such as the Catholic Church, the New York Times and Los Angeles Times would not have run articles legitimizing it. The 61 biggest California newspapers would not have published nearly 2,000 articles on the church scandal during the first half of 2002 but, duri.ng the. ame period, ollly four on the pubLicschool sex scandal. which a govemmentsponsored Hofstra University study found is 100 times the magnitude of the church scandal and i till ongoing. And the Left would hold pedophile Alfred Kinsey in contempt and reject hi fraudulent work: instead. they generally defend him to this day. Holly",:,ood even gave u the film Kil/sey (2004). which heroici.zed rhe deviant as a maverick pushing back the frontiers of a "repressed" society's ignorance. Most significant, however, is the philosophical corruption. Whenever the Left seeks to justify homosexuality or anything else. it invariably peddles moral relativism, the notion that right and wrong are determined by man and therefore change based on time and place. But what tlus really implies is that right. and wrong, morality, don't exist; only human preference does. Thus. when leftists say "You can't judge this or that because everything is a matter of perspective:' "trus or that" nuly fit · because you can JUSt fill in the blank. Relativism is a package dea I with the Devi I: Once accepting that moral boundaries are illusory, the sky - or. I should say. Hades - is the limit. All we are then left with is occultist Aleister Crowley'S fonnulation, "Do what thou wilt shaH be the whole of the law." So how will the Left further legllimize pedophilia? As the ancient Greeks proved, relativism isn't even necessary. The idea tbat sexuality has a specific and limited conjugal context is a Judeo-Christian one. And post-Christian America is gradually accepting the notion that consensual sex. whatever the stripe, hurts no one. It's just pleasure like eating ice cream, you see, except that exual exploration is far more important. And children have a right to it. to sexual self-detennination, to not be placed in a stifling straitjacket woven of outdated Puritan morality. Why. Barack Obama himself has said that having sex education in kindergarten is the "right thing to do." The past is a picture of futures man inevitably will paint again, and ancient Greece, and perhaps beyond, is where our cultural trajectory take us. But there is good news - that i also bad news. Cultural trajeclorie can change via the explosion of civilizational realignment, and. to parapbra e economjst Herben Stein, "[f something can'l go on. it won·t."' Until then, however, the planet of man wi II continue hurtling away fTOm morality and sanity at light speed, on ils journey toward that black hole of civilizations past. • THE NEW AMERICAN • OCTOBER 7. 2013
  • 24. Levin's Ris .Proposal: A Constitutional Convention Mark Levin's new book, The Liberty Amendments, which calls for an Article V constitutional convention, ignores the very real risks of harmful changes to the Constitution. by Larry Greenley The Liber,y Amendments: Restoring 'he American Republic, by Mark R. Levin. Nevi York . N.Y.: Threshold Ed ition, 20) 3, 272 pages. bardcover. W hen talk-show host Mark Levin' latest book, The Liberty AmendlIIellfS , was released to the public i11 mid-August, its rapidly spreading impact among the despairing conservative throngs resembled the effect of dropping a lighted match on great quantities of dry tinder. The rapidly developing impact wa_ greatly enhanced by the endorsement of Levin' proposal for an Article V constitutional convent jon by three of lhe most popular con ervative talk-show hOSIS, Ru sh Limbaugh, Sean HruJllity, <lIld Levin him elf. It i. very apparent that this national phenomenon is due to the book's provision of a program of action that promjses to rein in tbe federal government. In a nutshell. Levin' solution to our out-of-colltml federal government involves: (I ) gettjng an Article V convenOon for proposing amendments (popularly k.nown as a "consti tutional convention") convened, as di scussed in chapter one; and (2) getting some amendment. proposed (and sent to the states for ratification) at such a convention to addres the problem of an out-of-contTol federal government, such as his 11 amendment proposals as di scussed in chapters two through 11_ Since we di sagree with his proposal for an Anicle V convention, we won't be spending mnch lime on the 11 www_TheNewAmerican.com amendments: however, we definitely agree with him that repealing the 17th Amendment would be a good idea. During a whirlwind review in chapter one of the seemingly endless ways in which lhe federal government is departing from the Constitution, Levin accurately observe. : Having delegate-cl broad lawmakin~ power to executive branch depart ments and agencies of its own creation, contravening the separationof-powers doctrine, Congress now watches as lhe president inflates the congressional delegations [of power to the executive brancb] even further and proclaims repeatedly the authority to rule by executive fiat in defiance of. or over the top of, the same Congres that sanctioned a domineering executive branch in the lirst place. A Constitutional Convention? A few pages later, Levin reveals that his solution to thi s problem of an ont-of-control federal government is to amend the Constitution by utiJizing the provision in Article V for cOllvening "a Convention for proposing Amendments" ba ed on the direct application to Congress of two-thirds of the stale legislature '. At tbis point he takes a little preemptive shot across the bow of the numerous constitutionalist who have been opposing such a convention over the past 30 years by quoting Article V with its two methods for amending the Cons tillltion (via Congress or via a convenlion called by the state legislatures), then stating : ··Importantly in neither case does the Article V amendment process provide for a constitutional convention:' This type of COIlUllent has become a tafldru'd semrultic weapon in the ar e na] of the pro Article V convention forces. Howe er. both conservatives and liberals have routinely referred to an Article V "Convention for proposing Amendments" a - a "con titutional convention" for well over 30 years. and Ukely much longer. And they ha en' t done this because they mjstaken]} believe that the words "constitutional convention" are to be found in Article V. For example when the Senale Subcommittee on the Constitution of the Com27