(TEXAS) Texas state Sen. Wendy Davis (D) is almost ready to announce her gubernatorial bid — but first she will expand her social network just a little bit more.

In an e-mail sent to her supporters Wednesday morning, Davis — who garnered national attention this summer for fighting a sweeping antiabortion bill in her state — wrote she will be “answering the question” of what’s next for her career on Oct. 3. But before making her formal announcement, she posed a question of her own: “Do you have any friends or family who would like to be among the first to know? (more…)
…. the aspect no-one in politics really want to talk about.
Less freedom < 0 ——————— 10 ——————— 20 > More Freedom
Communism < 0 ———— Democracy ———— 20 > Anarchy
.
I’m debating other issues to share. But I can GUARANDAMNTEE YOU this trial is being put on a schedule by the Federal Dept of Justice. (Civil Rights Division Dept of Community Relations Service) If I prove it – we could lose this website.
Forward this video to 6:30 to really get the flavor of judicial bias which is NEEDED in order to accomplish a goal driven by outside the FLORIDA court influences.
The argument, not by the State, but by Judge Nelson herself, regarding authentication, is so weak and insufferably devoid of legal analysis it is absurd on its face. Then again this is the same judge who said a few days ago, flippantly in open court, that evidence should be “shredded” (Dr. Bao notes).
Essentially she’s arguing that the phone records (texts and pics) cannot be authenticated to have originated by Trayvon Martin (despite two security codes) because anyone could have sent them. Whiskey*Tango*Foxtrot !! How can an email be used in a sex offender case? How can phone records be used in RICO cases? How can GPS evidence be used in Insurance Cases? Think about it.
You can’t argue that evidence cannot be admitted because someone else might have made the phone call; Someone else might have sent the email; Someone else accessed the website; Someone else might have driven the car etc.
Not to exclude evidence.
Sure it can be argued by the other side, as a counter point to the jury, but it can’t be a reasonable consideration for exclusion.
I’m evaluating how much we can reasonably share and cite without compromising people and structures which could be placed at risk.

I had to stay up to watch the dawn break in Egypt – The sheer excitement of THIS MOMENT is beyond incredible for us to see in our lifetime. So many thoughts, and I just have to put some onto typeset. First – against the backdrop of our challenge:
Borrowing from Mike Vanderboegh – This is no small thing, to restore a republic after it has fallen into corruption. I have studied history for years and I cannot recall it ever happening. It may be that our task is impossible. Yet, if we do not try then how will we know it can’t be done? And if we do not try, it most certainly won’t be done. The Founders’ Republic, and the larger war for western civilization, will be lost.
But I tell you this: We will not go gently into that bloody collectivist good night. Indeed, we will make with our defiance such a sound as ALL history from that day forward will be forced to note, even if they despise us in the writing of it.
And when we are gone, the scattered, free survivors hiding in the ruins of our once-great republic will sing of our deeds in forbidden songs, tending the flickering flame of individual liberty until it bursts forth again, as it must, generations later. We will live forever, like the Spartans at Thermopylae, in sacred memory.
The U.S. media has infected the electorate with a Kardashian mindset for so long they will have no appropriate constitution to be able to explain what is happening in Egypt right now.
This day is a natural fulfillment of humanities highest aspiration: FREEDOM.
The greatest and most significant lie every perpetually sold upon the American body electorate is the premise the freedom continuum is based on a lack of freedom on the right side of the political spectrum – “right-wing extremists” – This is so false, and it is abundantly and joyously evident at this very moment in what you are bearing witness to in Egypt. (more…)
Senators: John McCain (AZ), Jeff Flake (AZ), Lindsey Graham (SC) and Marco Rubio (FL) voted against a border fence and structure of a biometric visa system prior to obtaining legal status.
Let that sink in…..
…. All four “supposed conservative” members voted against the fence and visa amendments. This, despite the vast majority of Americans wanting a secure border, and improved immigration visa security, before continuing with amnesty.
WASHINGTON DC – The Senate Tuesday defeated two amendments aimed at strengthening border security in the Gang of Eight immigration reform bill, including a provision that would have required a double-layer fence on the U.S.-Mexico border.
The back-to-back defeat of the two provisions was a blow to critics of the immigration reform measure who say it lacks meaningful border security provisions. (more…)
I’ve begun using the term usurpation to describe this administration, and the co-dependents/ willfully blind who support it.
The NSA intelligence data mining is clearly unconstitutional under the 4th amendment. The IRS targeting based on political ideology is also illegal and unconstitutional. The Dept of Justice manipulating warrants (lying to judges) to gather phone records on AP reporters and Fox’s James Rosen is a clear usurpation of the 1st amendment.
Now the latest usurpation can be seen in the Obama administration using an Executive Order to create de-facto amnesty (XO-Dream Act); And then to make matters worse – they stop the criminal background checks and ID requirements under such a program. So anyone can enter the U.S. claim to be whoever they want, and no criminal background check will be done.
And the Congresscritters are worried about Terrorists benefitting from the NSA leaker? How about they apply the same consideration (ie worry) about open borders without checks for those who cross them and then apply for Dream Act protections? (more…)
……. [Excerpt From CFP] The present administration is going after leakers, media sources, anyone and everyone who is even suspected of ‘betrayal.’ That’s what they call it, ‘betrayal.’…This administration considers anyone telling the truth about Benghazi, the IRS, hell, you name the issue, ‘betrayal,’” he said.
“We know all this already,” I stated. He looked at me, giving me a look like I’ve never seen, and actually pushed his finger into my chest. “You don’t know jack,” he said, “this is bigger than you can imagine, bigger than anyone can imagine. …. If you are a website owner with a brisk readership and a conservative bent, you’re on that list. It’s a political dissident list, not an enemy threat list,”… (continue reading)
Either they provided the information, OR, the administration is accepting the NSA tapping into the massive computer servers that drive the internet.
GUARDIAN UK – Two different versions of the PRISM scandal were emerging on Thursday with Silicon Valley executives denying all knowledge of the top secret program that gives the National Security Agency direct access to the internet giants’ servers.
The eavesdropping program is detailed in the form of PowerPoint slides in a leaked NSA document, seen and authenticated by the Guardian, which states that it is based on “legally-compelled collection” but operates with the “assistance of communications providers in the US.”
Each of the 41 slides in the document displays prominently the corporate logos of the tech companies claimed to be taking part in PRISM. (more…)
fyi, an insider detail – We can secondarily confirm the information provided within this Wall Street Journal report. Those of you who have been with the Treehouse community since the beginning may remember a conversation thread about the “new age” credit cards that allow capability of RFID transmission. [symbols: ((( ))) and Ξ ] One of our close friends actually quit his job in disgust over the use of his computer program -a central component to the RFID system- being used to embed internally into credit cards with the expressed intent on tracking user id, location, history etc. He knew the potential risk several years ago, and sent a warning – we shared – it appears this is now coming to light.
WASHINGTON (WSJ) —The National Security Agency’s monitoring of Americans includes customer records from the three major phone networks as well as emails and Web searches, and the agency also has cataloged credit-card transactions, said people familiar with the agency’s activities.
The disclosure this week of an order by a secret U.S. court for Verizon Communications Inc.’s phone records set off the latest public discussion of the program. But people familiar with the NSA’s operations said the initiative also encompasses phone-call data from AT&T Inc. and Sprint Nextel Corp., records from Internet-service providers and purchase information from credit-card providers.
…he sees you when your sleeping, he knows when you’re awake; He knows if you’ve been bad or good so be good for goodness sake. You better watch out, you better not cry, you better not pout, I’m telling you why….
WASHINGTON DC – The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time.

The highly classified program, code-named PRISM, has not been disclosed publicly before. Its establishment in 2007 and six years of exponential growth took place beneath the surface of a roiling debate over the boundaries of surveillance and privacy. Even late last year, when critics of the foreign intelligence statute argued for changes, the only members of Congress who know about PRISM were bound by oaths of office to hold their tongues.

