Below is a widely-circulated list of attendees at the secret 2010 Koch strategy meeting. According to reports, organized strategic planning began in the early 1980’s and continued through the annual Koch strategy meetings. The rumored purpose of these meetings: to fight what the ultra-rich perceived to be the coming-of-age of liberal policies and agendas and to plan for public acceptance of their goals.
Government corruption and greed.
Nearly 100% of the global Internet traffic is dependent upon deep-sea networks of fiber-optic cables that cover the ocean floor. As much as Â¾ of the international communications between the Middle East and Europe are carried by two undersea cables: SeaMeWe-4 (which stands for South East Asia Middle East West Europe) and FLAG Telecom’s FLAG Europe-Asia cable. On January 30, 2008, both of these cables were cut, severely disrupting Internet and telephone traffic from India to Egypt. A few days later, on February 1, 2008, another undersea cable was cut in the Persian Gulf and two days after that, on February 3, 2008, another Middle East cable was cut. On February 4, 2008, a report was issued indicating two more cables had been cut. Five high-speed submarine communication cables had been cut which caused disruptions and slowdowns for users in the Middle East and India. And nobody was sure how or why the cables were cut.
ACTA, short for Anti-Counterfeiting Trade Agreement, is a treaty for the purpose of defining the standards for the enforcement of intellectual property rights. Its intent is to establish a legal framework within which all countries can operate to enforce intellectual property rights.
According to counterterrorism expert Gartenstein-Ross, Osama bin Laden had a strategy that we never bothered to understand, and thus that we never bothered to defend against. What he really wanted to do â€” and, more to the point, what he thought he could do â€” was bankrupt the United States of America.
In the view of the US government, many of the WikiLeaks documents are still classified, and even though the documents have been published for all the world to see, reading the classified documents without clearance is illegal. Some US government warnings issued to several governmental groups have suggested that a federal employee would be breaking the law by reading the leaked cables of classified State Department documents published on the WikiLeaks website.
Twenty nine U.S. based BitTorrent tracker and peer-to-peer file sharing sites disappeared in the blink of an eye. Dutch anti-P2P group â€œBREINâ€, with assistance from the MPAA, set their sights on domain names of 29 United States based BitTorrent sites that allegedly make copyrighted material available to citizens of the Netherlands.
As citizens increase their scrutiny of law enforcement officials through technologies such as cell phones and miniature cameras, the police are increasingly fighting back with arrests and even jail time. Police across the country are using decades-old wiretapping statutes that predate portable multimedia devices, combined with broadly written laws against obstructing or interfering with law enforcement, to arrest people who point microphones or video cameras at them.
If you do not delve too deeply into the logistics of its execution, the idea is quite simple. Many believe that new Presidents and high level government officials are introduced to the doctrine shortly after they are inaugurated into office. It is a little know tenet that drives many of the decisions made by the United States government – the Doctrine of Double Effect or Principle of Double Effect.