Constitutional Patriotism

Flight 370 Passenger Philip Wood Allegedly Sends Message from U.S. Military Base in Indian Ocean

SHOCK CLAIM: GPS Data Reveals Possible Location Of Flight 370

(by Kris Zane, WCJ) — Either it is the biggest conspiracy in U.S. history since the JFK assassination, or an elaborate hoax has been perpetrated on the world.

Intellihub investigative reporter Shepard Ambella discovered that Phillip Wood, an American high-level executive at IBM, who was on Malaysian Flight 370, sent a text message and a pitch black photo from his iPhone on March 18 at 6:22 p.m., posted to a internet message board—ten days after the plane disappeared—with the following message:

I have been held hostage by unknown military personnel after my flight was hijacked…I work for IBM and I have managed to hide my cellphone… I have been separated from the rest of the passengers and I am in a cell. My name is Philip Wood. I think I have been drugged as well and cannot think clearly.

This could be a hoax, except for the accompanying photo that was sent with the text. While the photo is simply a darkened image, as most people know, iPhones embed a staggering amount of metadata when a photo is taken, that include the exact GPS longitude and latitude coordinates of the phone. The coordinates indicate that Wood, according to Google Maps, is inside a large building on the Diego Garcia Naval Base.  That the U.S. military hijacked Malaysian Flight MH370, diverted it to Diego Garcia and has imprisoned and/or killed the 239 passengers.



The story below is NOW CONFIRMED 100 PERCENT TRUE.



The blindfold:

Philip claimed to be blindfolded when he sent the message. When the American military blindfolds someone, it is accomplished by putting a bag over the head that is locked so you can’t get it off. This left the engineers hands free. This would have made it possible for him to pull his Iphone 5 (a fact confirmed by the Exif data) out of his butt as stated, and use the voice command ability of the Iphone to just talk to it to log in and post the message. This explains why he sent a black photo, he could not see what he was sending, he just knew he snapped a photo and sent whatever got taken.  The photo was shot on 3/18/2014.

The coordinates:When the coordinates are added to the fact that the photo’s exif data does not match the Google coordinates or any other coordinates for Diego Garcia that are posted online, but is still within the boundaries of Diego Garcia, it proves that no one just pulled those coordinates off the web. It helps confirm that this was not just a hoax because the coordinates are exact to wherever on Diego Garcia the Iphone was when it took the photo.

Flight 370 Passenger Philip Wood Allegedly Sends Message from U.S. Military Base in Indian Ocean

There are rumblings that the passengers of Malaysian Flight 370 may be alive and incarcerated at Diego Garcia in the Indian Ocean. If this proves to be true then a likely scenario is that this was a false flag pulled off by the U.S. Government.

Please keep in mind that there are those out there who create conspiracy theories and accompanying evidence as a hobby. With modern technology, it is getting easier and easier to do. This may or may not be one of those times.

The story is that missing Flight 370 passenger Philip Wood, an IBM employee and Texas native, was able to send a picture and message to an internet message board. Below is an excerpt from

This image, which appears black was posted as taken in a dark cell by IBM engineer Philip Wood. SAVE IT TO YOUR DESKTOP. RIGHT CLICK IT. SELECT PROPERTIES. CLICK DETAILS, THAT REVEALS THE EXIF. Shills are saying I did not post the Exif. Shills pray for people to be stupid. NOTHING PROVES IT BETTER THAN THE ACTUAL IMAGE. THAT IS WHY I POSTED THE ACTUAL IMAGE. The picture is black because the cell was too dark, but a critical piece of information was embedded in the Exif data, the coordinates to Diego Garcia, where the picture was taken. And it’s real; this is NOT a hoax. The coordinates in the picture indicate that the photo was taken within 3 miles of what Google officially gives for Diego Garcia. It is NOT EXACTLY what comes up on Google. It is off a couple miles, so NO ONE GOOGLED THIS, thus helping to confirm its authenticity. I don’t know how big the island is, but if it has a runway, that certainly fits.

The picture posted with the following text: “I have been held hostage by unknown military personal after my flight was hijacked (blindfolded). I work for IBM and I have managed to hide my cellphone in my ass during the hijack. I have been separated from the rest of the passengers and I am in a cell. My name is Philip Wood. I think I have been drugged as well and cannot think clearly.”


UPDATE: If Philip Wood´s Linkedin is not embedded below exactly as stated HERE IS THE LINK.

Image Exif data: THE SMOKING GUN

The Exif is intact. Exif data gets embedded in every image by every camera and includes the circumstances under which the photo was taken. It can be viewed by saving the image to your desktop, and then right clicking it and selecting image properties. Hit the details tab. You can see that the image was taken on March 18 with an Iphone 5, with the ISO at 3200 and a shutter of 1/15. The coordinates are included in the exif data because the Iphone knows where it is, and the coordinates are for Diego Garcia. THE FIRST TIME A BLANK PHOTO SAID IT ALL.

Exif can’t be rewritten with common software, it can only be added to in fields such as image credits with some advanced applications applications. It can be erased as well but NOT CHANGED. Photos with the exif intact will hold up in court. If the Exif is hacked and this is not real, the CIA or a really good hacker did this, which I doubt, I’d say it’s probably real.

Another smoking gun is that the voice recognition software put the word personal instead of personnel. This is completely consistent with a blind software assisted dial out.

Surrounding this story is the fact that the man who managed to get this information to Farganne (forum member Glitch) was harassed and received many threatening voice mails over it, which is another piece of evidence pointing to this as being real. One thing is certain, once it’s posted here on this site the genie is OUT OF THE BOTTLE. I cannot stress how important it is that the GPS coordinates in the photo do not perfectly match what Google says and are not posted anywhere on the web, because it proves that the source of those coordinates did not come from google or Wikipedia, they really did come from the imaging device and it HAD TO be at Diego Garcia when it took the photo.


Could it be possible that our military and/or CIA was involved in a hijacking and false flag cover up?

I think we all know the answer to that.

That does not make this information automatically accurate, but it does make for a very interesting possibility.

I think it should be noted that there is also a Malaysian pilot who is claiming that the Flight 370 story is a cover up. Norman Byrd reports:

An Air Asia pilot has been suspended after posting on Facebook an accusation that the government of Malaysia was “hiding facts” about missing Malaysia Airlines Flight MH370. While many pilots were defending the character of the missing men, a senior pilot demanded that the Malaysian government stop making definitive statements without actually having physical confirmation that the Boeing 777 has crashed.

The Sydney Morning Herald reported March 27 that an Air Asia executive, Tony Fernandes, confirmed through a Twitter post that a senior first officer had been suspended after effectively accusing the Malaysia government of a cover-up.

“The supposed debris…isn’t even confirmed to be from the plane yet! Show us the proof and then tell us MH370 has crashed,” wrote the pilot on Facebook.

He went on: “Till then stop hiding the facts! It’s obvious even to a blind man that there are tons of info the government definitely knows and isn’t sharing yet!”

Fernandes noted that the pilot, whose name was not revealed, was suspended pending an investigation.

Below is a video that details the alleged Philip Wood message. How bizarre would it be if America was directly responsible for the hijacking of MH370?

And what would be the purpose?

I am unsure of what to take from this report, other than that I believe it’s possible. My entire opinion on Flight 370 has been that it was never missing. They simply haven’t told us the truth about what happened.

What do you think?


Constitutional Patriotism


March 29, 2014 / / No comments

Dear Conservative,

We all know that Barack Obama hates your Second Amendment rights. He absolutely despises anyone who “clings to their guns or religion” and has made it his mission to disarm as many Americans as possible.

Just last week, Sen. Dianne Feinstein began urging Barack Obama to ban the import of semi-automatic firearms. Well, President Obama has gone even farther. Banning guns is a testy subject. The Supreme Court has stated in its DC vs. Heller ruling that the government needs a pretty good reason to ban any firearm that is “in common use at the time.” The case remained silent, however, on the constitutionality of banning ammunition. Without ammunition, a firearm is worthless… And Obama knows this.

The ATF has just banned the import of one specific caliber of military surplus and commercial ammunition on a damn technicality! More bans are likely to come!

Tell Congress to STOP King Barack Obama’s Backdoor War on Ammunition!

It is now illegal to import Russian surplus 5.45×39 ammunition. Why? Because it has a steel-core and even though it is specifically a rifle caliber, the Bureau of Alcohol, Tobacco, Firearms, and Explosives has unilaterally determined that it could be used in a pistol as well.

Currently, it is illegal to import “armor piercing” ammunition into the United States. The law in question is 18 USC sec. 921(a)(17). In order for ammunition to be classified as armor piercing, it needs to meet at least one of following classifications:


  1. a projectile or projectile core which may be used in a handgun and which is constructed entirely (excluding the presence of traces of other substances) from one or a combination of tungsten alloys, steel, iron, brass, bronze, beryllium copper, or depleted uranium; or


  1. a full jacketed projectile larger than .22 caliber designed and intended for use in a handgun and whose jacket has a weight of more than 25 percent of the total weight of the projectile.

Rifle ammunition was deliberately left out of this law because any high-powered hunting rifle could easily cut through body armor. However, all it took was for one gun manufacturer to advertise a pistol in this 5.45×39 caliber and the ATF dropped the hammer. Since the ammunition has a steel-core, it is now being arbitrarily prohibited from importation. This won’t stop crime. It won’t dissuade gangsters from shooting cops. No, this ban is directly targeted at law-abiding American gun owners!

The ammunition in question is Russian surplus used for the increasingly popular AK-74 rifles. These rifles have grown in popularity recently as gun owners sought to find a cheaper way to target shoot. Before the Obama administration banned this ammo, it was, without a doubt, one of the cheapest calibers on the market.

Now, I know what you are saying… Yes, there are commercial alternatives to the cheap and plentiful surplus rounds. Unfortunately, the Obama administration is targeting those ammunition manufacturers as well!

On March 17, 2014, Barack Obama issued Executive Order 13611 targeted at Russia for its invasion of the Crimean Peninsula. The executive order was immediately ridiculed by the Russians because it was clear that it didn’t really do anything to them. Well, that’s because the Executive Order was actually directed at American gun owners!

Obama’s Executive Order targets all persons and entities that work in the “arms or related materiel sector in the Russian Federation.” As long as this Executive Order is in place, the Federal Government can unilaterally ban the importation of all Russian ammunition!
So not only has the Obama administration banned the import of military surplus ammunition, but now it has levied sanctions and import bans against the companies that make the commercial alternatives!

Tell Congress to STOP King Barack Obama’s Backdoor War on Ammunition!

Now again, I know what you’re probably saying: “Who cares if Obama bans foreign ammunition imports? Don’t you care about American industry?”

We get these kinds of responses every time we warn about Obama’s war on guns and ammunition.

I love American industry and make an effort to buy American whenever I can. But in this particular instance, there is not a single American manufacturer that is currently making 5.45×39 ammunition. Not ONE!

There are literally MILLIONS of law-abiding Americans who own these types of rifles, and with the stroke of a pen, Barack Obama has banned or restricted the vast majority of available ammunition!

This is how President Obama has decided to go after YOUR gun rights! He knows that he cannot defeat you up front. He tried that last year and utterly failed. So, he has decided to fight you in the shadows, using his executive orders and Federal bureaucracies to disarm you however possible!

Congress must act! I urge you to Fax Congress and tell them to STOP Barack Obama’s war on ammunition before it is too late! Whether this ban affects you directly or not, the fact that the Obama Administration can prohibit an entire ammunition caliber is unacceptable and a dangerous precedent to set!

Don’t make the mistake and think that King Obama is done trying to take away our Second Amendment rights! He is just starting…

Tell Congress to STOP King Barack Obama’s Backdoor War on Ammunition!


Joe Otto

Constitutional Patriotism

Questions Over Absence of Cellphone Calls

Questions Over Absence of Cellphone Calls From Missing Flight’s Passengers



Relatives of passengers who were traveling on Malaysia Airlines Flight 370 watched a news conference at a hotel in Beijing on Monday. Credit Feng Li/Getty Images

SEPANG, Malaysia — When hijackers took control of four airplanes on Sept. 11, 2001, and sent them hurtling low across the countryside toward New York and Washington, frantic passengers and flight attendants turned on cellphones and air phones and began making calls to loved ones, airline managers and the authorities.

But when Malaysia Airlines Flight 370 did a wide U-turn in the middle of the night over the Gulf of Thailand and then spent nearly half an hour swooping over two large Malaysian cities and various towns and villages, there was apparently silence. As far as investigators have been able to determine, there have been no phone calls, Twitter or Weibo postings, Instagram photos or any other communication from anyone aboard the aircraft since it was diverted.

There has been no evidence “of any number they’re trying to contact, but anyway they are still checking and there are millions of records for them to process,” said Ahmad Jauhari Yahya, the chief executive of Malaysia Airlines, at a news conference on Monday.


The apparent absence of any word from the aircraft in an era of nearly ubiquitous mobile communications has prompted considerable debate among pilots, telecommunications specialists and others. Most of the people aboard the plane were from Malaysia or China, two countries where mobile phone use is extremely prevalent, especially among affluent citizens who take international flights.

Some theorize the silence signifies that the plane was flying too high for personal electronic devices to be used. Others wonder whether people aboard the flight even tried to make calls or send messages.

According to military radar, the aircraft was flying extremely high shortly after its turn — as much as 45,000 feet, above the certified maximum altitude of 43,100 feet for the Boeing 777-200. It then descended as it crossed Peninsular Malaysia, flying as low as 23,000 feet before moving up to 29,500 feet and cruising there.

Vincent Lau, an electronics professor specializing in wireless communications at Hong Kong University of Science and Technology, said that the altitude might have prevented passengers’ cellphones from connecting to base stations on the ground even if the phones were turned on during the flight or had been left on since departure.

The hijacked planes on Sept. 11 were flying very low toward urban targets when passengers and flight attendants made calls from those aircraft, he said.

Base station signals spread out considerably over distance. So cellphones in a plane a few miles up, like Flight 370, would receive little if any signal, he said.

Base station design has improved since the Sept. 11 attacks to provide better, more focused coverage of specific areas on the ground. But that also means somewhat less signal intensity is wasted in directions where callers are unlikely to be located, such as directly overhead, Mr. Lau added.

Lam Wong-hing, a wireless communications specialist at the University of Hong Kong, said that cellphones transmit at one watt or less, while base stations typically transmit at 20 watts and sometimes much more. So even if a cellphone showed that it was receiving a signal while aloft, it might not be able to transmit a signal that was strong enough to make a connection, he said.

The metal in an aircraft reduces cellphone signals somewhat. If a passenger had pressed a cellphone against a plastic window with a line of sight to a cellphone tower then it is possible a connection might have been made even at a fairly high altitude, because plastic barely blocks a cellphone signal at all, Dr. Lam said.


Many aircraft carry air phones using radio or satellite technology, and the Malaysia Airlines jet was equipped with them in business class. The plane continued to send satellite pings for nearly seven hours after it was apparently diverted.

But air phones these days tend to be part of an aircraft’s in-flight entertainment system. If someone deliberately diverted a plane and turned off its transponder and other communications equipment, that person is likely to have disabled the in-flight entertainment system so that passengers could not figure out from the map that they were flying in the wrong direction, said a telecommunications expert who insisted on anonymity because he was not authorized to talk to the news media.

If the entertainment system was turned off, the air phones also would not work, the expert said.

The Chinese news media have reported that there have been some instances of people calling cellphones of passengers of the missing flight and hearing ring tones, sometimes days after the plane disappeared. Telecom experts have dismissed that as evidence that the cellphones are still in use, saying that a ring tone may be heard while the international phone system is searching for a phone and trying to connect a call.

There have been no reports of anyone answering calls to the cellphones of passengers or flight attendants aboard the plane.

Investigators do not know if anyone aboard the plane even tried to make a call. Passengers would have quickly become unconscious if the plane depressurized as it soared to an unusually high altitude right after the turnaround, pilots said. Whoever diverted the plane could have disabled the release of oxygen masks.

Dr. James Ho, an associate professor of medicine at Hong Kong University, said that death could come within minutes if someone were the equivalent of outdoors at 45,000 feet. But without information on the speed of depressurization, it is hard to predict the medical consequences, he said.

A table used by pilots for “time of useful consciousness” without an oxygen supplement at various altitudes shows only nine to 15 seconds at 45,000 feet, compared with five to 10 minutes at 22,000 feet.

Mobile phone service is widely available in sizable areas of western China and eastern Kazakhstan, raising the question of why nobody from the plane has tried to make a call if it did fly north and land safely, instead of flying out into the Indian Ocean until it ran out of fuel.

If the flight did land safely with the passengers and flight crew still healthy, whoever was in charge of the aircraft would also face a formidable task in any attempt to provide food, water and shelter for more than 200 people.

Chris Buckley contributed reporting from Sepang, and Nicola Clark from Paris.

Constitutional Patriotism

Putin Has Nuclear Economic Bomb-Jim Sinclair

By Greg Hunter On March 16, 2014


By Greg Hunter’s   (Early Sunday Release)

World renowned gold expert Jim Sinclair is worried about the crisis in Ukraine.  Sinclair says, “Welcome back to the cold war that can get hot overnight.”  It appears President Obama has brought back the Cold War, and Sinclair contends, “He’s brought it back by changing to a new normal diplomacy, making outrageous threats on a continuing basis rather than seeking a solution.”  The referendum vote in Crimea that is overwhelmingly in favor of joining Russia, and yet, officials in the West say it is illegal or illegitimate.  Sinclair says, “To say that is to deny the reality the government in the Ukraine is a government created by a coup.  To say that is to bring us to the brink of war. . . . Mistakes can happen.  War can start anytime you have two entities together with weapons of war looking at each other with lots of hate.  I am concerned about the mistake of aggressive machinery and aggressive people looking right at each other.”

On possible U.S. sanctions on Russia, such as excluding them out of the international payment system called the SWIFT system, Sinclair says, “The use of the SWIFT system (Society for Worldwide Interbank Financial Telecommunication) to create a difficulty, almost a prohibitive difficulty in doing business by preventing bank wires, that would be one of the possibilities.  Already, the BRICS nations are developing their own SWIFT system.  So, the mistake of using the SWIFT system, short of absolute war, is that it has created a competitor that all the BRICS will be using.”  Sinclair also thinks, “To sanction Russia is to forget that Russia supplies Europe with its gas supplies.  To sanction Russia is to forget there are many U.S. and European corporations operating within Russia right now.  I honestly believe sanctioning Russia is the same as shooting yourself in the foot.” Sinclair goes on to say, “When you think you can push an ex-colonel of the KGB, you are not making a proper analysis of the personality of the person.  The whole idea that Russia is only a regional power–where in the world did that come from?  Anybody that is nuclear capable to the degree that Russia is with its delivery systems is a world power.  We hear constantly Russia is only a regional power.  We hear lies.  We hear untruths.  We don’t have a clear picture to what is taking place.”  

On Russia countering Western sanctions, Sinclair says watch the “struggling dollar” and Russia accepting any currency for oil and natural gas.  Sinclair explains, “It’s struggling . . . because it smells the real teeth of retaliation for sanctions being in the simple acceptance of any currency whatsoever for payment for gas to Europe.  Believe me, they will settle in other currencies. . . . It makes energy cheaper.  Why in the world would anyone want to pay in dollars if they can pay in their own currency?  Russia could retaliate in a way that would have phenomenal impact on the U.S. dollar. . . . Russia has the upper hand.  They have it in their ability to turn the U.S. economy upside down and into collapse.  There is no question whatsoever.  Putin doesn’t need a nuclear bomb. He has a nuclear economic bomb that he can set off at any time.”

What would the price of gold be this year?  Sinclair predicts, “Gold has $2,000 an ounce in its sites in 2014.”  On silver, Sinclair says, “Silver is gold on steroids.  When gold takes off, silver goes up faster. . . . So, the idea you are going to get an old high on silver or better is a given.”

Last year, Sinclair, predicted gold will hit $50,000 an ounce sometime in the next several years. Is he still sticking with that prediction?  Sinclair says, “I am still sticking by that, and the $50,000 per ounce is predicated on a shift in the mechanism on determining gold’s value from the paper markets to the physical markets.  Should that emancipation take place, it is a possibility and could become a reality.”  Sinclair goes on to explain, “Something has to happen.  Emancipation of gold from the paper market will be a product of the drawdown of the inventories of the warehouses.  I don’t believe for a moment that the COMEX is going to default, but I believe quite certainly that the COMEX will go from settling in gold to settling in cash.”  So, how can the gold market be manipulated up or down in price?  Sinclair says, “I can tell you exactly how it’s done.  You just offer or demand supply . . . that is beyond any capacity that can be met.  We’ve already had one day where two and a half years production was offered for sale.  It couldn’t be in a physical market that has to deliver within three days.  It can only be in a paper market that doesn’t have to deliver.”

Join Greg Hunter as he goes One-on-One with Jim Sinclair of 

(There is much more in the video interview)

After the interview: 

Sinclair added, “We’re in a hell of a mess.  If the world drops the ‘Petrodollar,’ we’ll have a hot war in a week.  We will go to war over the Petrodollar.”   To visit Mr. Sinclair’s site click here for

Constitutional Patriotism

Dr. Ben Carson: America ‘Very Much Like Nazi Germany’

March 15, 2014 by | News

download (2)

The famous former Johns Hopkins neurosurgeon Dr. Ben Carson believes America is going the way of “Nazi Germany”.

Dr. Carson made this bold statement Monday on Breitbart TV after speaking at the annual New York meeting. During his speech he mentioned, “we live in a Gestapo age”, moderator Mallory Factor asked to elaborate.

“[We’re] very much like Nazi Germany,” he responded. “And I know you’re not supposed to say ‘Nazi Germany,’ but I don’t care about political correctness. You know, you had a government using its tools to intimidate the population.”

When you have the IRS, EPA and countless other agencies targeting conservative groups and business’ it’s not hard to see the strong-arm of the Government come to light.

“We now live in a society where people are afraid to say what they actually believe,” he continued. “And it’s because of the PC police, it’s because of politicians, it’s because of news. All of these things are combining to stifle people’s conversation.”

“The reason that is so horrible is because the only way you have harmony and reach a consensus is by talking,” he explained. “But if, in fact, people are afraid to talk, you never reach consensus. And instead you grow further and further apart.”

“And that’s exactly what’s happening,” he concluded, “creating a horrible schism that will destroy our nation if we don’t fix it.” – The Federalist Paper


Constitutional Patriotism

Manhunt leads to massive roadblock, warrantless car-to-car searches

The bank’s money was ultimately safe and sound, although the same could not be said of the rights of many innocent commuters.

Posted on March 15, 2014 by in News

Police sweep through traffic looking for the suspects. (Source: Washington Post)

Police “systematically checking the trunks and rear hatches” of cars in traffic.  (Source: Washington Post)

ROCKVILLE, MD — Thousands of motorists were brought to a standstill when police conducted a massive roadblock to find three crime suspects.  Twelve lanes of traffic were shut down and swarms of armed government agents combed through a giant traffic jam performing warrantless vehicle-to-vehicle searches.

The busy Tuesday morning commute was abruptly halted just after 10:00 a.m. on March 11th.  One driver told ABC News that traffic stopped and he witnessed 30 police cars pass on the shoulders of I-270 near Rockville.  “Then, when I saw a wall of police officers with automatic weapons approaching our cars, it was apparent that something serious was taking place.”

Police roadblocked 12 lanes of I-270 in Rockville, MD.  (Source: Sky9)

Police roadblocked 12 lanes of I-270 in Rockville, MD. (Source: Sky9)

Police had received intelligence that a local bank had been robbed that morning and the vehicle carrying the 3 suspects had turned onto the interstate highway.  A throng of officers from the Rockville, Montgomery County, and Maryland State Police Departments blockaded all lanes of traffic in both directions and began conducting an intense manhunt.

There was “a lot of yelling, a lot of orders being given, helicopters, dogs barking, sirens, police cars driving by,” said eyewitness Carlton Higdon to WJLA.

Miles of cars were stranded and motorists were confined to their vehicles, with no explanation, for over an hour.  Confused people exiting their vehicles were met with hostility from the police.   WTOP reported that one woman leaned out her door to vomit, she was shouted at by cops to close her door.

“It’s just awful,” motorist Carmel Desroche to WJLA, describing the traffic jam.  “I’ve never seen both directions of 270 like this before.  It was painful.”

While stuck in traffic, motorists were approached by armed agents and ordered at gunpoint to submit to warrantless searches of the interior of their vehicles.  The Washington Post interviewed an innocent driver named Don Troop who experienced the ordeal.

A group of officers made its way to his car and other cars around him. “They were just walking along saying: ‘Pop the trunk! Pop the trunk!’”

He overheard a man in a truck next to him call out to another motorist: The police are looking for bank robbers. A short time later, about nine officers approached his car — including state police in tan uniforms, county police in dark uniforms and at least one plainclothes officer wearing a yellow tie.

Among their commands to motorists that Troop heard:

“Stay in your car.”

“Pop the trunk.”

“Get your hands on the steering wheel. Get you hands up where we can see them.”

(Source: Scott Ferrebee)

(Source: Scott Ferrebee)

As described, these searches were in no way consensual and were performed with the motorists under duress.   Nothing ordered at gunpoint can ever be considered voluntary.  Not surprisingly, we have not seen a report of anyone brave enough to refuse the hostile violation of the 4th amendment.

The police ultimately located and arrested the suspects and took them into custody.   They did not resist, and they were not located in anyone’s trunk.

Traffic was jammed for miles in both directions as police performed car-to-car searches. (Source: Sky9)

Traffic was jammed for miles in both directions as police performed car-to-car searches. (Source: Sky9)

The search was described later by Montgomery County Police Captain Paul Starks as an operation of “systematically checking the trunks and rear hatches” of the detained vehicles.

The bank’s $7,000 was ultimately safe and sound, although the same could not be said of the rights of many innocent commuters.  The authorities simply explained that their oath to uphold the Constitution does not apply during “exigent circumstances.”  Rockville Police Chief Tom Manger remained unapologetic even after getting angry emails about the tactics.

“For those folks that wondered how is that the police can just walk through traffic like that and get folks to show their hands, get folks to pop their trunks, between the exigency of the circumstances and the information that we had, it gave us the legal foundation to do what we did,” the chief said, according to WTOP.

Apologists argue that the ends justify the means in law enforcement; that as long as the bad guys were caught one way or another, the operation was a success.   This position easily suits the purposes of the police state. The erosion of liberty is simple when the people applaud as their rights are violated.

The reality is that crisis situations are exactly the times when individual liberties are most vulnerable and needing to be defended.   These are also the most challenging and unpopular times to defend civil rights, as swathes of fearful people clamor for the government to keep them safe.  The folly of letting the government pick and choose when it must may follow the constitution should be obvious, however.  To keep our rights intact we must refuse to accept these mass suspensions of the constitution for an increasingly wide variety of excuses.


{ Support Police State USA }

Earnest thanks goes to all those who have contributed to the operation of this website. We are committed to covering
stories that remain conspicuously ignored by the national mainstream media, and your generous support is essential
to effectively distributing this message. Many victims of government-sanctioned violence offer their gratitude.

Accountability CheckAlert_HandBlinking

Demand that the 4th Amendment be upheld at all times, even when it is inconvenient.

Rockville Police Department (Maryland)
Phone:  (240) 314-8900
Facebook: Link

Montgomery County Police Department  (Maryland)
Phone: (240) 777-7066
Facebook: Link

Maryland State Police Department
Phone:  (410) 653-4200
Email:  Contact Us
Facebook: Link

Constitutional Patriotism

NSA Plan to Infect Millions of Computers with ‘Malware Implant’

Even Dirtier: NSA Plan to Infect Millions of Computers with ‘Malware Implant’

March 13, 2014 By

21st Century Wire says…

The NSA leaks coming out of the Snowden camp are getting worse and sounding more pernicious by the week.

When we saw the GCHQ training guide to professional trolling, honey-potting online, targeting businesses and running slander campaigns online – we thought that was the apex of criminality, until now…

This is perhaps the dirtiest and most offensive government-sanctioned crime emporium yet, although we won’t close the betting window just yet.

What some might refer to as ‘groundbreaking surveillance technology’, we’ll simply call it what it is – another thing coming out of the NSA that has nothing to do with the ‘national security’ of the USA, and everything to do with intentionally ruining this present version of the internet.

These revelations from Ed Snowden were not conjured up out of thin air – because all of these shady programs were put in play for a reason, and it’s a safe bet that it has nothing to do with catching Islamic terrorists. This is about the nature and structure of the internet as we know it. There are many corporate firms who stand to benefit should the confidence and the functionality of the current Internet become compromised beyond repair – and one can only guess how many current NSA corporate contractors stand to gain from such redundancies, and transitions to new platforms. Such a crisis or ‘transition’ could net hundreds of billions of dollars. Out of chaos… comes order, and in that order is where you can make a serious buck.

Their objective here couldn’t be anymore insidious: to infect potentially millions of computers worldwide with specially designed malware “implants.”

“The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.”

The public should really be under no illusions as to what we are looking at here – an agency out of control, with no meaningful oversight – acting as a law onto itself.

The agency should be disbanded, and all of its lucrative corporate contractors it uses to circumvent fundamental US laws and violate Americans and others’ rights – should be put out to pasture…

By Ryan Gallagher and Glenn Greenwald
First Look/ The Intercept

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.

The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”

In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the “Expert System,” which is designed to operate “like the brain.” The system manages the applications and functions of the implants and “decides” what tools they need to best extract data from infected machines.

Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.

“When they deploy malware on systems,” Hypponen says, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.”

Hypponen believes that governments could arguably justify using malware in a small number of targeted cases against adversaries. But millions of malware implants being deployed by the NSA as part of an automated process, he says, would be “out of control.”

“That would definitely not be proportionate,” Hypponen says. “It couldn’t possibly be targeted and named. It sounds like wholesale infection and wholesale surveillance.”

The NSA declined to answer questions about its deployment of implants, pointing to a new presidential policy directive announced by President Obama. “As the president made clear on 17 January,” the agency said in a statement, “signals intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose to support national and departmental missions, and not for any other purposes.”

“Owning the Net”

The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.

To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices.

In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations.

But the NSA recognized that managing a massive network of implants is too big a job for humans alone.

“One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).”

The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”

TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.”

In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations.

The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)

Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations.

Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers.

The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.”

The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”

Circumventing Encryption

The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes.

One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer.

An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.

The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption…

Constitutional Patriotism

RPT: Small-Scale Attack on U.S. Power Grid Could Cause Nationwide Blackout

We submitted a report to congress in 1998 from the Agora in Seattle that exposed this…here we are 15 yrs later it’s only now being taken seriously.  Folks, we’ve known this for a long time, but it’s critical you realize that it’s making the news now for a good reason.  They aren’t telling you there’s a viable threat to take down the grid and we stand to have that happen in the next 6 to 9 months.
If you’re not a Prepper, get on it…time is short.

by Fox News Insider //

Attackers could bring down the entire power grid of the United States in just a few moves, according to a report from The Wall Street Journal.

Report: Alarms Being Raised About Sniper Attack on CA Power Station

The report, citing an unreleased federal study, says a blackout could last more than a year.

The United States is divided into three major power networks: Texas, the western half of the U.S. and the eastern half.

Coordinated attacks in those three grids, pictured above, would knock out power to nine of the nation’s 55,000 electric substations. That would be enough to achieve a nationwide blackout.

The substations take in electricity from power plants and send it out to homes and businesses. The map below shows the flow of power out of those plants.

Shepard Smith spoke to former New York Homeland Security Director Mike Balboni about the frightening report.

He said the information and threat has always been out there, but a recent sniper attack at a California power station last April revealed the vulnerability of the network.

‘Our Death Toll Would Be Staggering’: Judge Jeanine on Power Grid Threats

The Federal Energy Regulatory Commission is requiring the industry to come up with plans by June 1st to protect these assets. Critics argue that it could be costly.

Balboni said there needs to be interlocking capabilities that can back up each other if one goes down. “You don’t want to have the cascade affect which is what we had in 2003.”

Smith reported that 90 percent or more of the power grid system was installed before computers existed.

Now that computers have been added to the system, Balboni said that creates a cyber-security threat as well.

Ex-Navy SEAL: Power Grid ‘Amazingly Easy to Dismantle’

Constitutional Patriotism

The Real Truth About Sarah Palin — Ouch! (in a good way)

Resurrecting an article from 3 yrs ago…check it out

January 29, 2011@TeaPartyTribune

Truth about Sarah Palin

Very interesting facts on two very different ladies. Sarah Palin
Whether you’re a Democrat, Independent, or Republican….the second half of this email should make all of us very sick,
send this on …..especially the second half……

By Dewie Whetsell, Alaskan Fisherman.

As posted in comments on Greta’s article referencing the MOVEON ad about Sarah Palin.

The last 45 of my 66 years I’ve spent in a commercial fishing town in Alaska . I understand Alaska politics but never understood national politics well until this last year. Here’s the breaking point: Neither side of the Palin controversy gets it. It’s not about persona, style, rhetoric, it’s about doing things. Even Palin supporters never mention the things that I’m about to mention here.

1. Democrats forget when Palin was the Darling of the Democrats, because as soon as Palin took the Governor’s office away from a fellow Republican and tough SOB, Frank Murkowski, she tore into the Republican’s “Corrupt Bastards Club” (CBC) and sent them packing. Many of them are now residing in State housing and wearing orange jump suits The Democrats reacted by skipping around the yard, throwing confetti and singing, “la la la la” (well, you know how they are). Name another governor in this country that has ever done anything similar.

2. Now with the CBC gone, there were fewer Alaskan politicians to protect the huge, giant oil companies here. So she constructed and enacted a new system of splitting the oil profits called “ACES.” Exxon (the biggest corporation in the world) protested and Sarah told them, “don’t let the door hit you in the stern on your way out.” They stayed, and Alaska residents went from being merely wealthy to being filthy rich. Of course, the other huge international oil companies meekly fell in line. Again, give me the name of any other governor in the country that has done anything similar.

3. The other thing she did when she walked into the governor’s office is she got the list of State requests for federal funding for projects, known as “pork.” She went through the list, took 85% of them and placed them in the “when-hell-freezes-over” stack. She let locals know that if we need something built, we’ll pay for it ourselves. Maybe she figured she could use the money she got from selling the previous governor’s jet because it was extravagant. Maybe she could use the money she saved by dismissing the governor’s cook (remarking that she could cook for her own family), giving back the State vehicle issued to her, maintaining that she already had a car, and dismissing her State provided security force (never mentioning – I imagine – that she’s packing heat herself). I’m still waiting to hear the names of those other governors.

4. Now, even with her much-ridiculed “gosh and golly” mannerism, she also managed to put together a totally new approach to getting a natural gas pipeline built which will be the biggest private construction project in the history of North America. No one else could do it although they tried. If that doesn’t impress you, then you’re trying too hard to be unimpressed while watching her do things like this while baking up a batch of brownies with her other hand.

5. For 30 years, Exxon held a lease to do exploratory drilling at a place called Point Thompson. They made excuses the entire time why they couldn’t start drilling. In truth they were holding it like an investment. No governor for 30 years could make them get started. Then, she told them she was revoking their lease and kicking them out. They protested and threatened court action. She shrugged and reminded them that she knew the way to the court house. Alaska won again.

6. President Obama wants the nation to be on 25% renewable resources for electricity by 2025. Sarah went to the legislature and submitted her plan for Alaska to be at 50% renewable by 2025. We are already at 25%. I can give you more specifics about things done, as opposed to style and persona. Everybody wants to be cool, sound cool, look cool. But that’s just a cover-up. I’m still waiting to hear from liberals the names of other governors who can match what mine has done in two and a half years. I won’t be holding my breath.

By the way, she was content to return to Alaska after the national election and go to work, but the haters wouldn’t let her. Now these adolescent screechers are obviously not scuba divers. And no one ever told them what happens when you continually jab and pester a barracuda. Without warning, it will spin around and tear your face off.  Shoulda known better.
You have just read the truth about Sarah Palin that sends the media, along with the Democrat party, into a wild uncontrolled frenzy to discredit her. I guess they are only interested in skirt chasers, dishonesty, immoral people, liars, womanizers, murderers, and bitter ex-presidents’ wives.

So “You go, Girl.” I only wish the men in Washington had your guts, determination, honesty, and morals.
I rest my case. Only FOOLS listen to the biased media.
NOW If you’ve read this far ……………………………………… ,open your eyes……….

First Lady Michelle Obama’s Servant List and Pay Scale

The First Lady Requires More Than Twenty Attendants (Thats 22 Attendants to be exact)
1. $172,200 – Sher, Susan (Chief Of Staff)
2. $140,000 – Frye, Jocelyn C. (Deputy Assistant to the President and Director of Policy And Projects For The First Lady)
3. $113,000 – Rogers, Desiree G. (Special Assistant to the President and White House Social Secretary)
4. $102,000 – Johnston, Camille Y. (Special Assistant to the President and Director of Communications for the First Lady)
5. $100,000 – Winter, Melissa E. (Special Assistant to the President and Deputy Chief Of Staff to the First Lady)
6. $90,000 – Medina , David S. (Deputy Chief Of Staff to the First Lady)
7. $84,000 – Lelyveld, Catherine M. (Director and Press Secretary to the First Lady)
8. $75,000 – Starkey, Frances M. (Director of Scheduling and Advance for the First Lady)
9. $70,000 – Sanders, Trooper (Deputy Director of Policy and Projects for the First Lady)
10. $65,000 – Burnough, Erinn J. (Deputy Director and Deputy Social Secretary)
11. $64,000 – Reinstein, Joseph B. (Deputy Director and Deputy Social Secretary)
12. $62,000 – Goodman, Jennifer R. (Deputy Director of Scheduling and Events Coordinator For The First Lady)
13. $60,000 – Fitts, Alan O. (Deputy Director of Advance and Trip Director for the First Lady)
14. $57,500 – Lewis, Dana M. (Special Assistant and Personal Aide to the First Lady)
15. $52,500 – Mustaphi, Semonti M. (Associate Director and Deputy Press Secretary to The First Lady)
16. $50,000 – Jarvis, Kristen E. (Special=2 0Assistant for Scheduling and Traveling Aide to The First Lady)
17. $45,000 – Lechtenberg, Tyler A. (Associate Director of Correspondence For The First Lady)
18. $43,000 – Tubman, Samantha (Deputy Associate Director, Social Office)
19. $40,000 – Boswell, Joseph J. (Executive Assistant to the Chief Of Staff to the First Lady)
20. $36,000 – Armbruster, Sally M. (Staff Assistant to the Social Secretary)
21. $35,000 – Bookey, Natalie (Staff Assistant)
22. $35,000 – Jackson, Deilia A. (Deputy Associate Director of Correspondence for the First Lady)(This is community organizing at it’s finest.)
There has NEVER been anyone in the White House at any time who has created such an army of staffers whose sole duties are the facilitation of the First Lady’s social life. One wonders why she needs so much help,at taxpayer expense, when even Hillary, only had three; Jackie Kennedy one; Laura Bush one; and prior to Mamie Eisenhower social help came from the President’s own pocket.

Note: This does not include makeup artist Ingrid Grimes-Miles, 49, and “First Hairstylist” Johnny Wright, 31, both of whom traveled aboard Air Force One to Europe .


Constitutional Patriotism

Another Suicide – Manhattan Trader Steps in Front of Speeding Train

The New York Post is reporting that Edmund (Eddie) Reilly took his own life on Tuesday Morning by stepping in front of a speeding train near the Syosset station. In doing so he potentially becomes the 11th financial industry suicide of 2014. I say “potentially” because some cases are still unresolved. Here is an excerpt from the report:

A Manhattan trader was killed Tuesday morning by a speeding Long Island Rail Road commuter train, marking at least the seventh suicide of a financial professional this year.

Edmund (Eddie) Reilly, 47, a trader at Midtown’s Vertical Group, jumped in front of an LIRR train at 6 a.m. near the Syosset train station.

He was declared dead at the scene.

Reilly’s identity was confirmed by Salvatore Arena, an LIRR spokesperson, who said an investigation into the incident was continuing.

Passengers on the west-bound express train told MTA investigators they saw a man standing by the tracks before he jumped in front of the train, Arena said.

This is now the 11th suicide and/or suspected suicide in the financial world since the beginning of the year. Here is a list of the previous ten:

There have been a spate of suicides amongst financial services employees since the beginning of 2014. They’ve occurred in London, the U.S. and Hong Kong.  

  1. William Broeksmit, a 58-year-old former senior executive for Deutsche Bank AG, was found dead in at home after apparently taking his own life in South Kensington in central London, on January 26
  2. Karl Slym, the 51 year old Tata Motors managing director was discovered dead on the fourth floor of the Shangri-La hotel in Bangkok on January 27
  3. Gabriel Magee, the 39-year-old JP Morgan employee, who died after plummeting from the roof of the JP Morgan European headquarters in London’s Canary Wharf on January 27
  4. Mike Dueker, the 50-year-old chief economist of US bank Russell Investments was discovered dead near to the Tacoma Narrows Bridge in Washington State on January 31
  5. Richard Talley, the 57 year old founder of American Title Services in Centennial, Colorado, was found dead on February 4 after apparently shooting himself with a nail gun.
  6. Tim Dickenson, who was a U.K.-based communications director at Swiss Re AG, died in late January, in as yet unexplained circumstances
  7. Ryan Henry Crane, the 37 year old executive at JP Morgan died in an alleged suicide just a few weeks ago on February 3 at his home in Connecticut
  8. Li Junjie, 33-year-old banker in Hong Kong jumped from the JP Morgan HQ in Hong Kong on February 19
  9. James Stuart, the former National Bank of Commerce CEO was found dead in Scottsdale, Arizona on the morning of February 19. The cause of death has yet to be announced
  10. Autumn Radtke, the CEO of First Meta, a digital currency exchange firm who was found dead on February 28 outside her Singapore apartment.

Eddie Reilly seemed to be a common stock trader and adding him to this list seems to be a stretch if you are looking to develop conspiracy theories. Though I have a hard time understanding how someone could kill himself with a nail gun in the manner that Richard Talley did, I am not sure that I buy the grand conspiracy of this.

What I believe is that the global economy is crashing and it cannot be stopped. Things will soon change for billions of people who have become accustomed to a certain quality of life. Even for the poorest people that lifestyle is about to take a change for the worse.

I don’t think we should be surprised that some financial workers and executives are killing themselves. They know what is coming and simply do not want to live a life that is perceived by them as “less than what they are accustomed to.”

Could there also be some grand conspiracy in play? Sure. I never say never.

But for a guy who was simply a trader, I doubt he had any major role. I think that life’s pressures simply got to him and part of that may have been the horrible direction in which the economy is heading. You don’t have to be a financial expert to see that coming.

And just like Reilly, a lot of people are going to be hit by a speeding train in the near future.

Please prepare yourself as best you can by stocking up. If things go as badly as some predict it could mean life or death for you and your loved ones.