KAA: Know As Arc


Kaa is a fictional character from The Jungle Book stories written by Rudyard Kipling. Kaa is one of Mowgli‘s mentors and friends.


Kipling’s Mowgli Stories

First introduced in the story “Kaa’s Hunting” in The Jungle Book, Kaa is a huge and powerful snake, more than 100 years old and still in his prime. Kipling describes him as an exceptionally long, yellowish Indian rock python. Despite his polite, unhurried demeanor, animals seem to have a fearful respect for Kaa.

In “Kaa’s Hunting“, Bagheera and Baloo enlist Kaa’s help to rescue Mowgli when the man-cub is captured by the Bandar-log (monkeys) and taken to an abandoned human city. Kaa breaks down the wall of the building in which Mowgli is imprisoned in and uses his serpentine hypnosis to draw the monkeys toward his waiting jaws. Bagheera and Baloo are also hypnotized, but Mowgli is immune because he is human and breaks the spell on his friends.

In The Second Jungle Book, Kaa appears in the first half of the story “The King’s Ankus“. After he and Mowgli spend some time relaxing, bathing and wrestling, Kaa persuades Mowgli to visit a treasure chamber guarded by an old cobra beneath an ancient city. The cobra tries to kill Mowgli but its poison has dried up. Mowgli takes a jeweled item away as a souvenir, not realizing the trouble it will cause them, and Kaa departs.

In “Red Dog“, Mowgli asks Kaa for help when his wolf pack is threatened by rampaging dholes (the red dogs of the title). Kaa goes into a trance so that he can search his century-long memory for a stratagem to defeat the dogs:

For a long hour Mowgli lay back among the coils, while Kaa, his head motionless on the ground, thought of all that he had seen and known since the day he came from the egg.The light seemed to go out of his eyes and leave them like stale opals, and now and again he made little stiff passes with his head, right and left, as though he were hunting in his sleep. Mowgli dozed quietly, for he knew that there is nothing like sleep before hunting, and he was trained to take it at any hour of the day or night. Then he felt Kaa’s back grow bigger and broader below him as the huge python puffed himself out, hissing with the noise of a sword drawn from a steel scabbard;

“I have seen all the dead seasons,” Kaa said at last, “and the great trees and the old elephants, and the rocks that were bare and sharp-pointed ere the moss grew. Art thou still alive, Manling?”

With Kaa’s help Mowgli tricks the dholes into attacking prematurely. Kaa takes no part in the resulting battle (obliquely citing his loyalty to the boy rather than to the wolves, who often caused Mowgli grief) but Mowgli and the wolves finally kill all the dholes, though not without grievous losses.

In “The Spring Running”, as the teenage Mowgli reluctantly prepares to leave the jungle for the last time, Kaa tells Mowgli that “it is hard to cast the skin,” but Mowgli knows he must cast the skin of his old life in order to grow a new one. Kaa, Baloo and Bagheera sing for Mowgli in “The Outsong”, a poem and the ending of “The Spring Running”.

Disney films

Disney animated films

In the 1967 Disney film, Kaa is markedly different from the Kipling character. Rather than being a mentor, he appears as a slightly ridiculous predator who twice manages to trap Mowgli in his coils in order to eat him. He does this through the use of hypnotic eyes as opposed to the original version, in which he uses a serpentine dance to control his preys. His attempts to eat both end in comical failure because he is interrupted right before he can swallow his prey. He is also quite cowardly, attempting to curry favor with Shere Khan whenever he is around.

Voice actor Sterling Holloway decided to give Kaa a lisp, a condition that composers the Sherman Brothers brought into the character’s song in The Jungle Book, “Trust in Me“.[1]

This particular version of the character drew inspiration from previous Disney characters that followed a similar trope, such as Tick-Tock the crocodile from “Peter Pan” and the wolf from “The Sword in the Stone.” Both are fixated on a specific character (Captain Hook; Wart) as food and comically attempt to eat them throughout the film, without success.

In The Jungle Book 2, Kaa now voiced by Jim Cummings re-appears in a smaller role. He first appears as Baloo and Mowgli sing a reprise of “The Bare Necessities“, attempting to eat Mowgli, but being thwarted every time, eventually gives up, swearing he’ll “never again associate with man-cubs”. He then comes across Shanti, who is lost in the jungle searching for Mowgli. He successfully hypnotizes her and attempts to eat her as well before being thwarted by Ranjan. He is last seen being interrogated by Shere Khan about Mowgli’s whereabouts.

1994 live-action film

A far more menacing incarnation of the character appeared in the 1994 live-action adaptation. He was brought to life using an actual anaconda, but the bulk of his appearances were made using a mixture of CGI and animatronics. In the film, Kaa seems to serve King Louie, killing any intruders to the city when Louie summons him. Kaa attacks Mowgli inside the monkey city by tackling him into the moat and attempting to drown him, but Mowgli wounds him with a bejewelled dagger, forcing the python to flee in a pool of his own blood.

By the time Mowgli returns to the city with Captain William Boone (the main villain of the film) and Kitty, Kaa has fully healed from their prior confrontation. After defeating Boone, Mowgli flees with Kitty when he hears King Louie summoning the python. Boone starts gathering as much treasure as he can, but notices that the monkeys have gone silent; Kaa suddenly appears, then scares the injured Boone into the moat, where the heavy load of treasure he is carrying weighs him straight to the bottom. Desperately trying to struggle free, Boone sees the skeletal remains of Kaa’s past victims just seconds before the villain finally meets his death by the python.

2016 live-action film

Kaa appeared in Walt Disney Pictures’ live-action adaptation of the animated film, directed by Jon Favreau. This version of Kaa is female and is voiced by Scarlett Johansson. This film’s Kaa (like the previous Disney incarnations voiced by Sterling Holloway, Hal Smith, and Jim Cummings) desires to eat Mowgli. Luring him in by promising to keep him safe, she hypnotizes him and reveals that the boy came to live in the jungle when Shere Khan killed his father as they were travelling between villages and Bagheera found him. She also reveals to him the power of the “Red Flower” (fire) and its dangers in her vision. During her storytelling, she attempts to devour him, but Baloo spots and rescues Mowgli, denying her of her meal. She is not seen again for the rest of the film, though during the end credits, she is heard singing “Trust in Me“.

In an interview, Johansson elaborated on Kaa, saying that she uses both her voice and hypnotic gaze to entrance Mowgli so that he cannot resist her embrace. She also says Kaa uses her story-telling to seduce and entrap Mowgli and describes Kaa as a “window into Mowgli’s past”. She notes that the way Kaa moves is “very alluring”, describing it as “almost coquettish”.[2] Johansson also sings the song “Trust in Me” in the film; she described her thoughts on the song: “It’s a strange melody. We wanted it to be a lullaby, but it has a very mysterious sound.”[3]


David Icke – Two Hour Special Royal/Political Paedophilia How the Global Pieces Fit
From <https://www.youtube.com/watch?v=l9XzsKLnrAI&t=36s>

NWO 4th Reich

“There were no dates in this history, but scrawled this way and that across every page were the words
Benevolence Righteousness and Morality
… finally I began to make out what was written between the lines.
The whole volume was but a single phrase,
Eat People”

 “Study the past if you would divine the future”
“Fine words and an insinuating appearance are seldom associated with true virtue”
“The people may be made to follow a course of action, but they may not be made to understand IT”




The poem borrows occasionally from Carroll’s short poem “Jabberwocky” in Through the Looking-Glass (especially the poem’s creatures and portmanteau words), but it is a stand-alone work, first published in 1876 by Macmillan. The illustrations were by Henry Holiday.

In common with other Carroll works, the meaning of his poems has been queried and analysed in depth. One of the most comprehensive [3]gatherings of information about the poem and its meaning is The Annotated Snark by Martin Gardner.

The crew consists of ten members, whose descriptions all begin with the letter B: a Bellman (the leader), a Boots, a Bonnet-maker, a Barrister, a Broker, a Billiard-marker, a Banker, a Butcher, a Baker, and a Beaver. The Boots is the only character who is not shown in any illustration in the original, a fact that has led to much speculation (see below).

Bellman Bonnet Maker Barrister Broker Billiard-Marker Banker Butcher Baker Beaver

After crossing the sea guided by the Bellman’s map of the Ocean—a blank sheet of paper—the hunting party arrive in a strange land. The Baker recalls that his uncle once warned him that, though catching Snarks is all well and good, you must be careful; for, if your Snark is a Boojum, then you will softly and suddenly vanish away, and never be met with again. With this in mind, they split up to hunt. Along the way, the Butcher and Beaver -previously mutually wary for the Butcher’s specialty in preparing beavers- become fast friends, the Barrister falls asleep and dreams of a court trial defended by the Snark, and the Banker loses his sanity after being attacked by a frumious Bandersnatch. At the end, the Baker calls out that he has found a Snark; but when the others arrive he has mysteriously disappeared,[4]

‘For the Snark was a Boojum, you see’.

Even more than in most nonsense poetry, inadequacy of language, meaning, and symbol is a recurring theme in Snark. Examples include the blank map, the Bellman’s contradictory navigational orders, the Baker’s name-loss and failure to settle on one replacement-name, his failing to mention his luggage, his attempt to communicate in the wrong languages, the Banker’s absurd offer to protect the Beaver from being butchered by insuring it against fire and hail, the Butcher’s self-nullifying arithmetical manipulations, the Court officers’ unwillingness to fulfil their lawful obligations, the Banker’s ridiculous attempt to bribe a predatory beast with money, and his subsequent aphasia.[5]

It is disputed whether Carroll had a young audience in mind when he wrote the Snark. The ballad, like almost all of the poems in the Alice books, has no young protagonists, is rather dark, and does not end happily. In addition to the disappearance of the Baker, the Banker’s loss of sanity is described in detail. Similarly, Henry Holiday‘s illustrations for the original edition are caricatures with disproportionate heads and unpleasant features, very different from Tenniel‘s illustrations of Alice.

hup-fwd1God’s Universe
Of 13
One Family

CJ >>> JC
Concrete Jungle >>> Jesus Christ

Blimey … front 8
Ball Stimy


8ballWar Is Forever Eh!!!
Perpetual Motion Scheme

Circle Of Life Death
turkeybs3Breaker Breaker

Gay Paree
sealsI Want to Break Free
sealDelirium Tremens
Edison vs Tesla
America Genius Eh!!!
Theft Others Inherent Labor
Austria Tesla Exploitation
For Lucifer Insidious Purpose

Capitalist Defame
Tesla Integrity Essence
Heads Up – Avoid the FU2

Don’t Be Daffy!!!
daffy1-law-of-3Triple Think
despair8Holy Ultimate Heist

Electromagnetic Transformer

Top Secrets about Nikola Tesla – Full Documentary

From <https://www.youtube.com/watch?v=5qqYuM8HC5k>

giEnd the “FU2”

u-turnWhat’s Going On!!!

pigs-when-flygiEcho 4 Birds
528 Hz



2B or not 2B

This Title Has Been Removed Because Otherwise Youtube Would Block This Video! Edward Snowden
From <https://www.youtube.com/watch?v=JEufeyvpahU>

From <https://www.youtube.com/watch?v=eYOKxyYepIg>

Julian Assange Could Be Going Out With A Bang!
From <https://www.youtube.com/watch?v=n_GrM_5rh8Q>


bee1No War Order
beehive5Stung to pieces peace acquiesced!!!

1th Monkey

aping-5aping-6Pen mightier than sword … Scissors cuts Paper
casper-lot-13God’s Universe
Of 13

One Family

Great Infinite Gramps
old-goat-1Cuts Wind that Cuts Mustard

When the people got wind of

orbit-rop-7Monkey Business
organ-grinderThe organ grinder wound down

The Prisoners of Dulce Base





2B or not 2B
Room 101

Brave New World

Heads Up – Avoid the FU2

Andrew N. Rubin argues, “Orwell claimed that we should be attentive to how the use of language has limited our capacity for critical thought just as we should be equally concerned with the ways in which dominant modes of thinking have reshaped the very language that we use.”[119]

The adjective Orwellian connotes an attitude and a policy of control by propaganda, surveillance, misinformation, denial of truth, and manipulation of the past. In Nineteen Eighty-Four Orwell described a totalitarian government that controlled thought by controlling language, making certain ideas literally unthinkable. Several words and phrases from Nineteen Eighty-Four have entered popular language.
Newspeak is a simplified and obfuscatory language designed to make independent thought impossible.
Doublethink means holding two contradictory beliefs simultaneously. The Thought Police are those who suppress all dissenting opinion.
Prolefeed is homogenised, manufactured superficial literature, film and music, used to control and indoctrinate the populace through docility.
Big Brother
is a supreme dictator who watches everyone.

CNN Caught In Biggest Lies Yet Against The American People
From <https://www.youtube.com/watch?v=qGaEwoHLe7Q>

Full Show – CNN Unleashes Massive Waves Of Fake News – 11/30/2016
From <https://www.youtube.com/watch?v=KfIWzuppKJY>

NATO Now in Declared War With Russia!
From <https://www.youtube.com/watch?v=7XfZm0jwr0M>


Orwell may have been the first to use the term cold war, in his essay, “You and the Atom Bomb”, published in Tribune, 19 October 1945. He wrote:

We may be heading not for general breakdown but for an epoch as horribly stable as the slave empires of antiquity. James Burnham‘s theory has been much discussed, but few people have yet considered its ideological implications;— this is, the kind of world-view, the kind of beliefs, and the social structure that would probably prevail in a State which was at once unconquerable and in a permanent state of ‘cold war’ with its neighbours.[120]

Humpty Dumpty sat on a wall,
Humpty Dumpty had a great fall.
All the king’s horses and all the king’s men
Couldn’t put Humpty together again.[1]

Humpty appears in Lewis Carroll‘s Through the Looking-Glass (1872), where he discusses semantics and pragmatics with Alice.

 “I don’t know what you mean by ‘glory,’ ” Alice said.
Humpty Dumpty smiled contemptuously. “Of course you don’t—till I tell you. I meant ‘there’s a nice knock-down argument for you!’ ”
“But ‘glory’ doesn’t mean ‘a nice knock-down argument’,” Alice objected.
“When I use a word,” Humpty Dumpty said, in rather a scornful tone, “it means just what I choose it to mean—neither more nor less.”
“The question is,” said Alice, “whether you can make words mean so many different things.”
“The question is,” said Humpty Dumpty, “which is to be master      that’s all.”
Alice was too much puzzled to say anything, so after a minute Humpty Dumpty began again. “They’ve a temper, some of them—particularly verbs, they’re the proudest—adjectives you can do anything with, but not verbs—however, I can manage the whole lot! Impenetrability! That’s what I say!”[15]


Retired HEAD OF FBI Tells ALL “Illuminati, Satanism, Pedophile Rings”
From <https://www.youtube.com/watch?v=BplUD6kQYuU>

This passage was used in Britain by Lord Atkin and in his dissenting judgement in the seminal case Liversidge v. Anderson (1942), where he protested about the distortion of a statute by the majority of the House of Lords.[16] It also became a popular citation in United States legal opinions, appearing in 250 judicial decisions in the Westlaw database as of April 19, 2008, including two Supreme Court cases (TVA v. Hill and Zschernig v. Miller).[17]

1-law-of-3a4th Wall


To United Nations
Mongrel 1
Don’t be Daffy!!!
Don’t let Obama declare war!!!
Retaining Presidency
Calling 4 United
Marshall Law


u-turnWhat’s Going On!!!






NWO 4th Reich

Hillary Clinton Body Count Documentary – Serial Killer for President!From <https://www.youtube.com/watch?v=UoE73WNoCXo>
Elitist Justice Exemplary Critical Think
Pizza Gate – DNC Pedophile Ring exposed by Podesta’s Emails – Obama, Clintons, Andrew Kline

From <https://www.youtube.com/watch?v=D8YdSvyp89E>

Satanic Induced Neurosis
Ambiguous Contagious Tact

Appears Related To

State Church Order Out Of Chaos War Out Of Religion
NCF: Roman Empire Rules Today Pt 1,2,3 (Full Length)
4th Reich

Truths Holistic Interactive Retrospect Transcendental Electromagnetism Enslavers Nemesis
Omen 13

Old Money Evolves Nefariously
Old serpents never die … they just shed their skins … and fly as we die


Hillary And Trump
Black Ops BOOB Obama Back
grapevineGrapevine 13

Germanic law
was overwhelmingly concerned with the protection of individuals

and less concerned with protecting the interests of the state. According to Michel Rouche,
“Frankish judges
devoted as much care to a case involving the theft of a dog

puppyFacts must have root 2 take root God Coherency
“Catch 22”
must have semblance 2 catch doG chase tail

 as Roman judges
did to cases involving the fiscal responsibility of curiales, or municipal councilors”.[47]
Richard A Fine Example

1. Member of Roman Catholic religious order
A member of the Society of Jesus, a Roman Catholic religious order engaged in missionary and educational work worldwide. The order was founded by Saint Ignatius Loyola in 1534 with the objective of defending Catholicism against the Reformation.
2. Offensive Term
An offensive term for somebody regarded as crafty or scheming, especially somebody who uses deliberately ambiguous or confusing words to deceive others

Shadow Government
God proclaimed de jure Moses front SG administer antithesis de facto doG
White Pope                                         Black Pope
Classified Redact Evidence Essential Destruct Success
Immunity Impunity
Plead the 5th or glug 1
Obstruct Justice Truth and Source Kill


Conflict of Interest To Uncover Self


Wikileaks -Julian Assange


BREAKING The FBI just took down OBAMA! Look what they found in Hillary’s Emails !!!

From <https://www.youtube.com/watch?v=i8C55chCewY>

Diversionary Tactic Sidewinder

Nuff Said
Preemptive Extinguishing Eh!!!

From <https://www.youtube.com/watch?v=WEBK0gsP5wc>
Gee … their God seems to be on same page with me eh!!

Obama steps In
All must come together for an
International Demise
No Fowl … No Witnesses … No Foul!!!

I hope I’m right … wouldn’t want to go down as an
Conspiracy Theorist
Dumb Fuck Eh!!!
I could try a redirect to God … mysterious ways
Plausible Denial
Perhaps A Redact


From <https://www.youtube.com/watch?v=PbCX1vZVuMo#t=15.282916>
Hillary Arms ISIS


Secret World of US Election: Julian Assange talks to John Pilger (FULL INTERVIEW)

From <https://www.youtube.com/watch?v=_sbT3_9dJY4>


This 14 Minute video should undoubtedly End Hillary CLINTON’s Campaign for PRESIDENT !

From <https://www.youtube.com/watch?v=0Q_ius2yPWk>
Backroom Settlements
Haiti gets 2% 14.3 Billion
Clinton Interests Assessment
Gets Worse Promising Worser Worsest …. Frantic Ultimate …


WikiLeaks Julian Assange Is Alive and Well. Chelsea Manning Petition Growing in Popularity

From <https://www.youtube.com/watch?v=9VNn4Fi85IA>

5 Signs Julian Assange is Dead or Missing

From <https://www.youtube.com/watch?v=rDyGzkJBN6I>


WIKILEAKS DATA: PizzaGate Real, Hillary Clinton Is Deplorable!

From <https://www.youtube.com/watch?v=DACEqDHJqkE>


WOW! Alex Jones BIG EMERGENCY! Julian Assange Missing, May be Dead

From <https://www.youtube.com/watch?v=VUDM2YEg5tk>


Wikileaks Julian Assange Is BACK! Speaks About Hillary Clinton & John Podesta on
October 26th, 2016

From <https://www.youtube.com/watch?v=9QwmdWVzdc4>

WIKILEAKS BREAKING NEWS: Julian Assange is Alive. Fidel Castro on WikiLeaks. Wapo Fake News

From <https://www.youtube.com/watch?v=IBr-hyPHku0>


NEW BREAKING NEWS Wikileaks MURDER ! Julian ASSANGE Disappears The government Alien UFO Co

From <https://www.youtube.com/watch?v=iPZnA9dxFr0>


From <https://www.youtube.com/watch?v=22VoC4Cmc_A>

Anonymous CIA Took Over Wikileaks? Where Is Julian Assange?

From <https://www.youtube.com/watch?v=PiBMy7G4b4U>


Julian Assange safe but journalists dealing with him at interview !

From <https://www.youtube.com/watch?v=ugCrjb7ak34>

God or Assange others akin putting Life on Line
Sane Purpose

Ambiguity Divider

Not 4 Amateurs
rabit-hole-1Freedom Of Belief
A Satanic Ploy

Bias Conundrum

Pro pagan da
Christianity Ancient Times
cheshireHoly Crusades
God And Guv
Never Ending War Story
Black Righteous And White Loons

Brought Us Here
Lemming Syndrome
Edge Of

Dark Abyss Yoke
All That
Jesus Abraham Zebra Zoo
Black And White Pope
A Way Of Life

End Time
Activist Reporting To
Who …

United Front Obligatory
Public Activist Connect Together
Plan End Time
Pirate Elite Extinction Validating Existence

Failed Fiduciary Finance Fraud

Scattered Non-profit Profit
Blow By Blow
2B or not 2B
End Time
Closing In Astronomically


Just in! 36 people shot and 4 fatal Rahm Emanuel’s sanctuary

From <https://www.youtube.com/watch?v=DCtxojTu9KM>



From <https://www.youtube.com/watch?v=5XLsvB5LSu0>


Hillary Clinton’s Child Torture Cult & COMET-PIZZAGATE

From <https://www.youtube.com/watch?v=jF8LgvjVEjc>

Beware the God Blessers
Bless Sanity
Available via God given immaculate user friendly brains
whether or not He exists or one believes He exists
Neither a God or Human certainty
Not N/A Achieved
to date

Common Knowledge fundamental to Common Sense
Practiced Religiously
Spirit Of Universal Law
Bless Assange Akin

Focus United
Root Of Evil
Ascertainable Truth Launders Appropriating Sanctimonious

Grapevine 13
Drain The Swamp
Hillary And Bill Insidious Tap
Waterboard To The Top
Bankster Syndicate
Armament Sales Squash
Facing Annihilation Truths
Warmongers Apathetic Righteous Tyrannical Sanctimonious
Serpentine Induced Neurosis

WIKILEAKS DATA: Pizza Gate Real, Hillary Clinton Is Deplorable!

From <https://www.youtube.com/watch?v=DACEqDHJqkE>
That Is To Say
Stop Arming Tyrannical
Pat Hand Demonstrably
White House
Critical Think CT Child Traffic


William Ramsey on the Podesta Emails and Pizzagate

From <https://www.youtube.com/watch?v=TrvXFNJfmPI>
Backroom Settlements
Tax Vacuum
Proletariat Sucking
Assimilated Justice Abstaining Xray

Something in the H2O or just plain O
They who object to United States Of America Aggression are obviously terrorists!!!
“It is only the wisest and the stupidest that cannot change”
confucius51-law-of-3Well Being of All
God’s Universe
Whether He exists or one believes He exists
No Borders

Triple – Think

God Is Waking People Up In the Middle of the Night To Warn Them of What’s Coming!
From <https://www.youtube.com/watch?v=i6he7FrAT1E>
With a feather sneeze no tar back to sleep
Met a woman also fast asleep
Let Us Pray!!!
The Lord said don’t leave your station
Wet the
Bed And Drowned
In Debt
Awaiting God who informed Would take care of IT
Bible Is Clear!!!
A wee bit more to catch up eh!!!
Dream Nightmare Dream
Obedience Of God Aspired
Stay At Station Run
Something Is Happening
I don’t know what
Gonna check IT out with akin!!!
If could run as swift of mind!!!
laughtersmallGod holds out on dreamers!!!

Live Breaking News Nuclear Confrontation between Russia and NATO fiction

From <https://www.youtube.com/watch?v=ANaIlCqOiQE>

God watches Mainstream eh!!!

FBI Exposes CLINTON Pedophile Satanic Network !!

From <https://www.youtube.com/watch?v=eODUAGH_azc>


Mark Taylor God is Exposing Corruption Everywhere Including The Church

From <https://www.youtube.com/watch?v=wjvtHIQ9L6U>
God is gonna purge the corruption
Enticing Russia/US to pull finger

Prove me wrong eh!!!

Grapevine 13

Fairy Tales to Fairy Tails
A frog prince a miss a kiss Amiss
Boy too afraid to cry Wolf TURNS to a Weird One Eh!!!
Judge Advocate General
Edge Domocracy
Law Society
Lemming Syndrome
grapevinesealsI Want To Break Free!!!
sealNew World Order
Declares Illegal Essence
Colonization And War
No War Order
Is Chaste

Fine thank ye … and U!!!
Tell a Lie Often Enough And It Becomes The Truth

Economic Hitman
Confirms that which Putin Alleges Re: US interferes with the East
While claiming Russia interferes with US
Mainstay making 3rd world countries
Of Successful Risers
(He known as an early riser can sleep till noon)


HI – Hollywood Illuminati
Media Lies Forever

wizards-of-outAmerica 1st!!
Look Out World
Husha Husha
We Must Fall

Flag Burning A Material Thing
Own Property Sacrifice
Of Course There’s the
Poll-ution Thing PT TP Turning Point

killed-kennyMikey Too!!!

If Say
Aye Aye
A few Good Men!!!

Untold Story of the Iraq War ~ Commandos, Dirty Wars and Col. James Steele
From <https://www.youtube.com/watch?v=BxHEI603bF4>


Part 3: Hawaii vs. U.S. Imperialism
From <https://www.youtube.com/watch?v=9nqDkCzwXeY&list=PL500245292BB2284A>

The Iraq War: Legal or Illegal?
From <https://www.youtube.com/watch?v=1Khut8xbXK8>

WikiLeaks Iraq Shooting Video Analysis

US soldiers War Crimes

war crimes in Iraq [Part 1]

US. war crimes in Iraq [Part 2]

US. war crimes in Iraq [Part 3]

US. war crimes in Iraq [Part 4]

The whole truth about the Iraq war

The War on Iraq, filmmaker Robert Greenwald chronicles the Bush Administration’s determined quest to invade Iraq following the events of September 11, 2001. The film deconstructs the administration’s case for war through interviews with U.S intelligence and defense officials, foreign service experts, and U.N. weapons inspectors — including a former CIA director, a former ambassador to Saudi Arabia and even President Bush’s Secretary of the Army. Their analyses and conclusions are sobering, and often disturbing, regardless of one’s political affiliations.

A Must Watch!! Dirty Wars!! US War Masters!!

Propaganda Terms in the Media and What They Mean – Noam Chomsky

Noam Chomsky on Ron Paul’s 9/11 Theories:
“What He Said Is Completely Uncontroversial”

Noam Chomsky on WikiLeaks,
Obama’s Targeted Assassinations and Latin America’s Break From US

Chomsky explains who U.S. leaders work for and what they have done.

The Julian Assange Show: Noam Chomsky & Tariq Ali (E10)

chickensOf the Royals why I found KGB Kate Great By … Black Beauty
catherine-the-greatThey shoot horses don’t they!!!

4th Wall



The Star of David in the Leningrad Codex, 1008 CE

 Upon independence in 1948, the new Jewish state was formally named Medinat Yisrael, or the State of Israel, after other proposed historical and religious names including Eretz Israel (“the Land of Israel“), Zion, and Judea, were considered and rejected.[25] In the early weeks of independence, the government chose the term “Israeli” to denote a citizen of Israel, with the formal announcement made by Minister of Foreign Affairs Moshe Sharett.[26]

 The name Israel has historically been used, in common and religious usage, to refer to the biblical Kingdom of Israel or the entire Jewish nation.[27] According to the Hebrew Bible the name “Israel” was given to the patriarch Jacob (Standard YisraʾelIsrāʾīlSeptuagint Greek: ἸσραήλIsraēl;
“struggle with God”[28])
after he successfully wrestled with the angel of the Lord.[29]
Jacob’s twelve sons became the ancestors of the Israelites, also known as the Twelve Tribes of Israel or Children of Israel. Jacob and his sons had lived in Canaan but were forced by famine to go into Egypt for four generations until Moses, a great-great grandson of Jacob,[30] led the Israelites back into Canaan during the “Exodus“. The earliest archaeological artifact to mention the word “Israel” is the Merneptah Stele of ancient Egypt (dated to the late 13th century BCE).[31]

 The area is also known as the 
Holy Land,
 being holy for all Abrahamic religions including
 Judaism, Christianity, Islam
and the Bahá’í Faith. 

The other Israel
Pharisees killed Jesus … Talmud …OK to kill indirectly
Zionists will have no other Gods before them caused Romans to carry out their deeds keeping hands filthy clean

witches-culdron-1 Twisted Sisters

Patheticaly Twisted PT TP Turning Point

TIP of RIP >>> LIP
ripHeads Up – Avoid the FU2

Golden Rule
Gay Rule

De Populate
Displaced Persons

In robotic mind state soon replaced
Robot State

Serving Elite Eh


Playing Through
fore1Of 13

u-turnWhat’s Going On!!!





Beliefs Smorgasbord
Build Your Own Beliefs BYOB Bring Your Own Booze
Holistic Kaleidoscopic Ricochet On Inevitable Collision Course
Conjuring Our Demise
Suckers born a minute bias conundrum led to believe superior fish
Schooled for anglers sport

Unreal Real
Pathetic Sanity
Tongue In Cheek
Tyrannical Operand Cocked

Should Mention Arrogant Righteous Tranquility Subterfuge
Delirium Tremens
Divine Simplicity
Identify Difference
Reality Hell On Earth


pick-your-knows2Why the Hell …excuse me … why the fuck … Hell!!!
Root Of Evil
Root Of Equity

Common Knowledge
Common Sense

A mass among us of the deception
Can speak hence think assessing mind emptiness
Never Ending War Story

Awaiting devine Intervention
God given immaculate user friendly brains
“State Of the Art”
Impossible to defeat
Set Out To Defeat Self
God says … or was IT Confucius … perhaps I
Politically Correct
Ultimate Stupid Fucks
Go Ahead … Back Up
Pragmatic Semantics
Wizards Of Odds
Humongously Outnumbered Eh!!!
Con Text
Heaven On Earth
Listen to this crap!!!
Out What Numbering
Nobody owns me eH!!!
Been there done that!!!

ufo-13“The people may be made to follow a course of action, but they may not be made to understand IT”


I fear for the
Half Wit

Only the wisest and the Stupidest Cannot Change

Truths Equity Lies
Premeditated Rhetoric Opulence Mastication Plan Transmits

If that’s what God wants
though I ….
Where The Fuck
Knows Street Talk
Am I

Glad U Asked

Yours to discover!!!
Dawn Of Aquarious

Water Everywhere



Fall Of Roman Empire
NCF: Roman Empire Rules Today Pt 1,2,3 (Full Length)

Law Germane

Germanic law
was overwhelmingly concerned with the protection of individuals

and less concerned with protecting the interests of the state. According to Michel Rouche,
“Frankish judges
devoted as much care to a case involving the theft of a dog
puppyI’ll bet ya gonna cry foul
Conflict of Interest Eh!!!

Facts must have root 2 take root God Coherency
“Catch 22”
must have semblance 2 catch doG chase tail

 as Roman judges
did to cases involving the fiscal responsibility of curiales, or municipal councilors”.[47]

Richard A Fine Example
Pen Mightier Than The Sword
Please provide the authority signed by God!!!
romans-13Got Nuthin!!!
That’s what we thought eh!!!
How about a
Consent Of People

God de jure as is Legal antithesis de facto doG as is
Self Evident Eh!!!


Popular sovereignty or the sovereignty of the people
the belief
that the legitimacy of the
created by the will or
consent of its people,
who are the source of all
political power.
It is closely associated to the social contract philosophers, among whom are Thomas Hobbes, John Locke and Jean-Jacques Rousseau.
Popular sovereignty expresses a concept and does not necessarily reflect or describe a political reality.[1]
It is often contrasted with the concept of
parliamentary sovereignty, and with individual sovereignty.

Fair Trial?
Rule Of Law Legal Certainty?
mule-2Entrapment Eh!!!

bull20Back Up!!!
grapevineGrapevine 13
Declares Illegal Essence
Colonization And War


There comes a time when the people who finance these goons rise to inform them of
Fiduciary Inalienable Rights Equilibrium
Until then loony tunes … obviously … not informed
as a wholes
War Economics Treasury Opulence Profiting Sanitarium
Drowning Excremental Abyss
Wizardry Ascertaining Sustainable Treasured Entities
Not Available
4 P
Psycho Psychiatry Prominent Precedence

The Most SHOCKING Psychiatry Documentary EVER

American charities using kids for profits

Cancer cured and covered up
Sum thin about failure to provide the necessaries of life

SUE Comey & IMPEACH Hillary: Full Investigation Of Clinton Foundation Corruption & Email Server
From <https://www.youtube.com/watch?v=Wgy32RbQ9eg>

Clinton’s Life Full Documentary: MURDER, Scandals, Corruption And Lies Exposed!
From <https://www.youtube.com/watch?v=nmqPJvIRIoo>

Fires Every US Attorney In the Country
Independent Judiciary Legal Certainty???

What happens in US concerns us all as a Hippo in China Shop!!!

Interdependent Co-op
Whose got your back!!!

Reoccurring “Lost Civilization” due process
Due the lack of civil action

The world needs an on line
Legal Certainty Justice System

Intent to deter Criminal Element CE Common Element
Not Encourage!!!

 Take care of the sense consensus and the cents will take care of self

Common Knowledge fundamental to Common Sense
Common Element
Cents Equity

Can’t Act Until Truths Essentials Realized Incinerating Zionist Essence

Zionist Jew converts to Catholicism and exposes Jewish Conspiracy
From <https://www.youtube.com/watch?v=lEDPOPr7qiY>

What About
Jesuit Conspiracy
Catholic Jews
Jew Converted
Yamaka Connect

A Conspiracy History of the World, Andy Thomas
From <https://www.youtube.com/watch?v=-kFmZFgGJug>

How the Jews infiltrated the Vatican & changed the Catholic Church
From <https://www.youtube.com/watch?v=McWXHyICQ1M>

Power Struggle

Francis of Assisi
Meager Universal Laboring Equals
1181/1182 – 1226

St. Francis of Assisi (Italian: San Francesco d’Assisi, baptized Giovanni, born Francesco di Pietro di Bernardone;[2]
1181/1182 – October 3, 1226)[3] was an Italian Catholic friar and preacher. He founded the men’s Franciscan Order, the women’s Order of St. Clare, and the Third Order of Saint Francis for men and women not able to live the lives of itinerant preachers followed by the early members of the Order of Friars Minor or the monastic lives of the Poor Clares.[4] Though he was never ordained to the Catholic priesthood, Francis is one of the most venerated religious figures in history.[4]

In 1219, he went to Egypt in an attempt to convert the Sultan to put an end to the conflict of the Crusades.[6]
By this point, the Franciscan Order had grown to such an extent that
its primitive organizational structure was no longer sufficient.
He returned to Italy to organize the Order.
Once his community was authorized by the Pope,
he withdrew increasingly from external affairs.
In 1223, Francis arranged for the first Christmas manger scene.[5]
In 1224, he received the stigmata,[5] making him the first recorded person to bear the wounds of Christ’s Passion.[7]
He died during the evening hours of October 3, 1226, while listening to a reading he had requested of Psalm 140.

In order to organize the Order must have the Pope’s blessing
Never Ending War Story
Hellion order continues to this very
Dark Abyss Yoke

Backroom Settlements
Offer Can’t Be Refused

On 13 March 2013, upon his election as Pope, Cardinal Jorge Mario Bergoglio of Argentina chose Francis as his papal name
in honor of Saint Francis, becoming Pope Francis.[40]


Pope Francis
Pope Francis has set the example of meager living preparing the populace for the

in last stages of impoverishing the people frantic to be saved reach out for
Francis the talking Mule

First (Black) Jesuit to Surface in (White)
1. Member of Roman Catholic religious order
A member of the Society of Jesus, a Roman Catholic religious order engaged in missionary and educational work worldwide.
The order was founded by Saint Ignatius Loyola in 1534 with the objective of defending Catholicism against the Reformation.
2. Offensive Term
An offensive term for somebody regarded as crafty or scheming, especially somebody who uses deliberately ambiguous or confusing words to deceive others

Psalm 140 is the 140th Psalm from the Book of Psalms. It describes putting one’s trust in God while threatened with evil.

Domine, clamavi. A prayer against sinful words, and deceitful flatterers. A psalm of David.

[1] I have cried to the, O Lord, hear me: hearken to my voice, when I cry to thee. [2] Let my prayer be directed as incense in thy sight; the lifting up of my hands, as evening sacrifice. [3] Set a watch, O Lord, before my mouth: and a door round about my lips. [4] Incline not my heart to evil words; to make excuses in sins. With men that work iniquity: and I will not communicate with the choicest of them. [5] The just shall correct me in mercy, and shall reprove me: but let not the oil of the sinner fatten my head. For my prayer also shall still be against the things with which they are well pleased:

[5] Let not the oil of the sinner: That is, the flattery, or deceitful praise.– Ibid.

[5] For my prayer: So far from coveting their praises, who are never well pleased but with things that are evil; I shall continually pray to be preserved from such things as they are delighted with.

[6] Their judges falling upon the rock have been swallowed up. They shall hear my words, for they have prevailed: [7] As when the thickness of the earth is broken up upon the ground: Our bones are scattered by the side of hell. [8] But o to thee, O Lord, Lord, are my eyes: in thee have I put my trust, take not away my soul. [9] Keep me from the snare, which they have laid for me, and from the stumbling blocks of them that work iniquity. [10] The wicked shall fall in his net: I am alone until I pass.

[6] Their judges: Their rulers, or chiefs, quickly vanish and perish, like ships dashed against the rocks, and swallowed up by the waves. Let them then hear my words, for they are powerful and will prevail; or, as it is in the Hebrew, for they are sweet.

[10] I am alone: Singularly protected by the Almighty, until I pass all their nets and snares.

Douay-Rheims Bible

Underground Pharisees Subterfuge
Get Over It

Pharisees killed Jesus … Talmud …OK to kill indirectly
Zionists will have no other Gods before them caused Romans to carry out their deeds keeping hands filthy clean

It’s the Romans … It’s the Jews … It’s the Muslims
Invincible Triad
Humanity (Spirit Force Law) Rule of Law


Ignorant Of Issues
Fair Game

We’ve all been duped

It’s the
Power Hungry
Greedy Seedy Weedy

Compart Mental
Depart Mental

Infiltrated Everywhere
Pitting Everyone Against Each Other

United Nations Alien Zionist Insidious Puppets

The Star of David in the Leningrad Codex, 1008 CE

Upon independence in 1948, the new Jewish state was formally named Medinat Yisrael, or the State of Israel, after other proposed historical and religious names including Eretz Israel (“the Land of Israel“), Zion, and Judea, were considered and rejected.[25] In the early weeks of independence, the government chose the term “Israeli” to denote a citizen of Israel, with the formal announcement made by Minister of Foreign Affairs Moshe Sharett.[26]

 The name Israel has historically been used, in common and religious usage, to refer to the biblical Kingdom of Israel or the entire Jewish nation.[27] According to the Hebrew Bible the name “Israel” was given to the patriarch Jacob (Standard YisraʾelIsrāʾīlSeptuagint Greek: ἸσραήλIsraēl;
“struggle with God”[28])
after he successfully wrestled with the angel of the Lord.[29]
Jacob’s twelve sons became the ancestors of the Israelites, also known as the Twelve Tribes of Israel or Children of Israel. Jacob and his sons had lived in Canaan but were forced by famine to go into Egypt for four generations until Moses, a great-great grandson of Jacob,[30] led the Israelites back into Canaan during the “Exodus“. The earliest archaeological artifact to mention the word “Israel” is the Merneptah Stele of ancient Egypt (dated to the late 13th century BCE).[31]

 The area is also known as the 
Holy Land,
 being holy for all Abrahamic religions including
 Judaism, Christianity, Islam
and the Bahá’í Faith. 

Dark Truth of Religion
Bias Conundrum

Religions Segregate
State Church Order Out Of Chaos War Out Of Religion
Problem Reaction Solution

wigs-1PRICK mi FIBIB
Political Religious Illusion Charlatan Kayfabe
media inciting
Fickle Inherent Bias Ignorant Bliss

Placebo Gazebo

Not 4 Amateurs
rabit-hole-1armFinanced by us all due their owned media
Intel Quell

Pro pagan Da!!!

MASK racoon  Shadow Government

On the bright side we have infiltrated them having in Reality Surround
Many have found them selves
Once In There Is No Getting Out

When they observe us rising informed they will jump fence
End Time
Elite Terminal

Many already jumping

Reality is the truth impervious to perception yet precisely due perception
Truth that which God would observe whether He exists or one believes He exists
Simply Reality Sanely Dealt With

United Perception Solidarity
Ultimate Potential Society

Alien Search Knowledge

Holistic Interactive Vibes Essential Spirit

Practiced Religiously
Interdependent Co-op Essence

Spirit Of Universal Law

Common Knowledge fundamental to Common Sense


State Secret – Aint!!!

State Secret Privilege Freedom Info Privacy and Transparency Act
Conflict of Interest administered by self eh?

Some say or was it Confucius … He who is responsibly accountable to investigate self is BS – Bloody Stupid if find self guilty!!!

State Secret Privilege
Bush 9/11 Cover – up

The state secrets privilege is an evidentiary rule created by United States legal precedent. Application of the privilege results in exclusion of evidence from a legal case based solely on affidavits submitted by the government stating that court proceedings might disclose sensitive information which might endanger national security.[1][2][3][4][5][6] United States v. Reynolds,[7] which involved military secrets, was the first case that saw formal recognition of the privilege.

Following a claim of “state secrets privilege”, the court rarely conducts an in camera examination of the evidence to evaluate whether there is sufficient cause to support the use of this doctrine. This results in court rulings in which even the judge has not verified the veracity of the assertion.[1] The privileged material is completely removed from the litigation, and the court must determine how the unavailability of the privileged information affects the case.[3][5]

[edit] Function

The purpose of the state secrets privilege is to prevent courts from revealing state secrets in the course of civil litigation (in criminal cases, the Classified Information Procedures Act serves the same purpose). The government may intervene in any civil suit, including when it is not a party to the litigation, to ask the court to exclude state secrets evidence. While the courts may examine such evidence closely, in practice they generally defer to the Executive Branch. Once the court has agreed that evidence is subject to the state secrets privilege, it is excluded from the litigation. Often, as a practical matter, the plaintiff cannot continue the suit without the privileged information, and drops the case. Recently, courts have been more inclined to dismiss cases outright, if the subject matter of the case is a state secret.

[edit] Distinguished from other legal doctrines

The state secrets privilege is related to, but distinct from, several other legal doctrines: the principle of non-justiciability in certain cases involving state secrets (the so-called “Totten Rule“);[8] certain prohibitions on the publication of classified information (as in New York Times Co. v. United States, the Pentagon Papers case); and the use of classified information in criminal cases (governed by the Classified Information Procedures Act).

[edit] History

[edit] Origins

The doctrine was effectively imported from British law which has a similar privilege.[1][2] It is debatable whether the state secrets privilege is based upon the President’s powers as commander-in-chief and leader of foreign affairs (as suggested in United States v. Nixon) or derived from the idea of separation of powers (as suggested in United States v. Reynolds)[1] It seems that the US privilege “has its initial roots in Aaron Burr’s trial for treason.” In this case, it was alleged that a letter from General James Wilkinson to President Thomas Jefferson might contain state secrets and could therefore not be divulged without risk to national security.[1]

[edit] Supreme Court recognition in United States v. Reynolds

The privilege was first officially recognized by the Supreme Court of the United States in the 1953 decision United States v. Reynolds (345 U.S. 1). A military airplane, a B-29 Superfortress bomber, crashed. The widows of three civilian crew members sought accident reports on the crash but were told that to release such details would threaten national security by revealing the bomber’s top-secret mission.[1][2][3][4][5][6][9][10] The court held that only the government can claim or waive the privilege, and it “is not to be lightly invoked”, and last there “must be a formal claim of privilege, lodged by the head of the department which has control over the matter, after actual personal consideration by that officer.”[1] The court stressed that the decision to withhold evidence is to be made by the presiding judge and not the executive.[1]

In 2000, the accident reports were declassified and released, and it was found that the assertion that they contained secret information was fraudulent. The reports did, however, contain information about the poor condition of the aircraft itself, which would have been very compromising to the Air Force’s case. Many commentators have alleged government misuse of secrecy in this landmark case.[11]

Despite this ruling, a case might still be subject to judicial review since the privilege was intended to prevent certain, but not all, information to be precluded.[1]

[edit] Recent use

According to former White House Counsel, John Dean:

While precise numbers are hard to come by (because not all cases are reported), a recent study reports that the “Bush administration has invoked the state secrets privilege in 23 cases since 2001.” By way of comparison, “between 1953 and 1976, the government invoked the privilege in only four cases.”[9]

While Henry Lanman reports in Slate:

“… the Reporters Committee for Freedom of the Press reported that while the government asserted the privilege approximately 55 times in total between 1954 (the privilege was first recognized in 1953) and 2001, it’s asserted it 23 times in the four years after Sept. 11.”[10][12]

However, at least one article has retracted these figures, finding they were based on erroneous information:

“Correction: In this article, we incorrectly reported that the government invoked the state secrets privilege in 23 cases since 2001. The figure came from the 2005 Secrecy Report Card published by OpenTheGovernment.org. The privilege was actually invoked seven times from 2001 to 2005, according to the corrected 2005 report card, which is not an increase from previous decades”[13]

Lanman continues to cite two political science professors at the University of Texas-El Paso who concluded that

“courts have examined the documents’ underlying claims of state secrecy fewer than one-third of the times it has been invoked. And, …, courts have only actually rejected the assertion of the privilege four times since 1953.”[10]

Following the September 11, 2001 attacks, the privilege is increasingly used to dismiss entire court cases, instead of only withholding the sensitive information from a case.[1] Also in 2001, George W. Bush issued Executive Order 13233 extending the accessibility of the state secrets privilege to also allow former presidents, their designated representatives, or representatives designated by their families, to invoke it to bar records from their tenure.[5]

An article in the NYT, in August 2007, on a lawsuit involving Society for Worldwide Interbank Financial Telecommunication concludes that it would seem that the unprecedented frequency with which the Bush administration invoked and invokes this principle has made judges more skeptical and willing to ask the government to validate its claims. In the words of Tom Blanton, director of the National Security Archive at George Washington University

“What seems clear is that until a year or two ago, the judges rarely even questioned it when the government raised the ‘state secrets’ claim. It was a neutron bomb – no plaintiffs left standing. But we’re now seeing that judges are starting to actually look behind the government’s secrecy claims and see what’s really there.”[14]

[edit] Criticism

Since 2001, there has been mounting criticism of the state secrets privilege. Such criticism generally falls into four categories:

[edit] Weak external validation of executive assertion of privilege

Many commentators have expressed concern that the courts never effectively scrutinize executive claims of privilege.[1] Lacking independent national security expertise, judges frequently defer to the judgment of the executive and never subject executive claims to meaningful scrutiny.

[edit] Executive abuse of the privilege to conceal embarrassing facts

Commentators have suggested that the state secrets privilege might be used as often to prevent disclosure of embarrassing facts as to protect legitimate secrets.[1][2][3][4][5][10][15][16] Or, in the words of Professors William G. Weaver and Robert M. Pallitto in an article in the Political Science Quarterly:

“[T]he incentive on the part of administrators is to use the privilege to avoid embarrassment, handicap political enemies, and to prevent criminal investigation of administrative action.”[13][17]

In several prominent cases, the evidence that the government successfully excluded was later revealed to contain no state secrets. i.e. United States v. Reynolds, Sterling v. Tenet, Edmonds v. Department of Justice and the Pentagon Papers.

[edit] Expansion into a justiciability doctrine

Some academics and practitioners have criticized the expansion of the state secrets privilege from an evidentiary privilege (designed to exclude certain pieces of evidence) to a justiciability doctrine (designed to exclude entire lawsuits). Under its original formulation, the state secrets privilege was meant only to exclude a very narrow class of evidence whose revelation would harm national security. However, in a large percentage of recent cases, courts have gone a step further, dismissing entire cases in which the government asserts the privilege, in essence converting an evidentiary rule into a justiciability rule. The government response has been that in certain cases, the subject of the case is itself privileged. In these cases, the government argues, there is no plausible way to respond to a complaint without revealing state secrets.

[edit] Elimination of judicial check on executive power

Glenn Greenwald alleges that the Bush administration attempted to expand executive power, as evidenced by the unitary executive theory propagated by John Yoo. The theory suggests that the President, as Commander-in-Chief, cannot be bound by Congress or any law, national or international. By invoking the state secrets privilege in cases involving actions taken in the war on terror (i.e. extraordinary rendition, allegations of torture, allegedly violating the Foreign Intelligence Surveillance Act)[18] Greenwald opines the administration tried to evade judicial review of these claims of exceptional war powers. In effect, this is preventing a judicial ruling determining whether there is a legal basis for such expansive executive power.[12][19] With that in mind, applying this privilege makes impeachment the only possible means left for Congress to exercise their duty to uphold the checks and balances constitutionally intended to prevent abuse of power.[2][13][16]

[edit] Calls for reform

See also: State Secrets Protection Act

In recent years, a number of commentators have called for legislative reforms to the state secrets privilege.[20][21][22] These reforms center around several ideas:

1.     Requiring judges to review each piece of evidence that the executive claims is subject to the privilege.[20][23][24]
2.     Requiring the executive to craft alternative evidence that is not subject to the privilege, for the opposing party to use in place of the original, privileged evidence.[23] Such substitute evidence should only be required when it is possible to do so without harming national security.
3.     Prohibiting courts from dismissing claims on the basis of the state secrets privilege until after they have reviewed all available evidence.
4.     Permitting the court to appoint an outside expert to scrutinize the evidence for national security content.[21]
5.     Excluding illegal government action from the definition of “state secrets,” or otherwise allowing the court to address the legality (instead of just the secrecy) of government conduct. This would prevent the government from using the state secrets privilege to conceal its illegal conduct.[21]

On January 22, 2008, Senators Edward Kennedy and Arlen Specter introduced S. 2533, the State Secrets Protection Act.[25]

[edit] Court cases

[edit] United States v. Reynolds

Main article: United States v. Reynolds

In United States v. Reynolds (1953), the widows of three crew members of a B-29 Superfortress bomber that had crashed in 1948 sought accident reports on the crash, but were told the release such details would threaten national security by revealing the nature of the bomber’s top-secret mission. The Supreme Court ruled that the executive branch could bar evidence from the court if it deemed that its release would impair national security. In 1996, the accident reports in question were declassified and released, and when discovered in 2000 were found to contain no secret information. They did, however, contain information about the poor condition of the aircraft itself, which would have been very compromising to the Air Force’s case. Many legal experts have alleged government abuse of secrecy in this landmark case.[2][3][5][9][10]

[edit] Richard Horn

Main articles: Richard Horn and Horn v. Albright

Former DEA agent Richard Horn brought a suit against the CIA for bugging his home. The case was dismissed because of the privilege.[1][6]

Richard Horn’s case was reinstated on July 20, 2009 by USDC Judge Royce C. Lambreth on the basis that the CIA had engaged in fraud on the court.

On 30 March 2010, as a result of a multi-million dollar settlement agreement between Horn and the government, Lamberth dismissed the underlying case with prejudice. Subsequently, later that same year, in a 22 September order, Lamberth issued a final order vacating his earlier opinions and orders finding that CIA lawyers, Tenet, and Brown had committed fraud on the court. Lamberth also specifically ordered that a sentence be removed from his 30 March 2010 Memorandum. The removed sentence had stated that “allegations of wrongdoing by the government attorneys in this case are not only credible, they are admitted.”

[edit] Notra Trulock

In February 2002 it was invoked in the case of Notra Trulock, who launched a defamation suit against Los Alamos scientist Wen Ho Lee, charged with stealing nuclear secrets; President Bush stated that national security would be compromised if Trulock were allowed to seek damages from Lee; though it resulted in the case being dismissed, another suit was launched directly attacking then-FBI Director Louis Freeh for interfering and falsely invoking the state secrets privilege.

[edit] Sibel Edmonds

Main article: Sibel Edmonds

The privilege was invoked twice against Sibel Edmonds.[1][2][6] The first invocation was to prevent her from testifying that the Federal Government had foreknowledge that Al-Qaeda intended to use airliners to attack the United States on September 11, 2001; the case was a $100 trillion action filed in 2002 by six hundred 9/11 victims’ families against officials of the Saudi government and prominent Saudi citizens. The second invocation was in an attempt to derail her personal lawsuit regarding her dismissal from the FBI, where she had worked as a post-9/11 translator and had been a whistleblower.

[edit] Thomas Burnett

The privilege was invoked in Thomas Burnett vs. Al Barka Investment & Development Corporation (Civil No. 04ms203) a motion to quash a subpoena for the testimony of Sibel Edmonds. The government’s motion to quash based on state secrets privilege was granted in part.

[edit] Sterling v. Tenet

Main articles: Sterling v. Tenet and Jeffrey Alexander Sterling

Jeffrey Sterling was a black CIA agent who started a racial discrimination suit. It was thrown out on account of this privilege.[1][6]

[edit] Nira Schwartz

The privilege was invoked in Schwartz vs. TRW (Civil No. 96-3065, Central District, Cal) a Qui-Tam claim by Schwartz. Intervention and assertion of the state secrets privilege, by the government, resulted in case dismissal.

[edit] Crater Corporation

The privilege was invoked in the United States Court of Appeals for the Federal Circuit case of Crater Corporation vs. Lucent Technologies Inc. and AT&T Company, (Crater Corp. v. Lucent Technologies, September 7, 2005). Crater was prevented from proceeding with discovery in its patent infringement case (U.S. Patent No. 5,286,129) by the United States’ assertion that discovery could cause “extremely grave damage to national security”. The infringement case centered on WetMate underwater fiber optic coupling devices beneath the sea.

[edit] ACLU vs. NSA/CIA

On May 26, 2006, the U.S. Justice Department filed a motion to dismiss ACLU v. NSA, the ACLU’s lawsuit against the NSA by invoking the state secrets privilege. On July 26, 2006, the case was dismissed. In a different case in Michigan, brought by the ACLU against the NSA on behalf of various scholars, journalists, attorneys, and national non-profit organizations, Judge Anna Diggs Taylor ruled on August 17, 2006, that the program was unconstitutional and should be halted. She upheld the doctrine, but ruled that the government’s public statements concerning the operation were admissible and constituted sufficient proof for the case to continue without any privileged evidence or discovery. On July 6, 2007, the Sixth Circuit Court of Appeals threw out Taylor’s decision, ruling 2-1 that the ACLU could not produce evidence to prove that the ACLU had been wrongfully wiretapped by the NSA, and therefore did not have the standing to bring such a case to court, regardless of the legality question. On February 19, 2008, the Supreme Court declined to hear the ACLU’s appeal. See ACLU v. NSA.

[edit] Center for Constitutional Rights et al. v. Bush et al.

On May 27, 2006 the Justice Department moved to preempt the Center for Constitutional Rights (CCR) challenge to warrantless domestic surveillance by invoking the state secrets privilege. The Bush Administration is arguing that CCR’s case could reveal secrets regarding U.S. national security, and thus the presiding judge must dismiss it without reviewing the evidence.

[edit] AT&T and NSA wire-tap case

Main articles: NSA call database, NSA warrantless surveillance controversy, and Hepting v. AT&T

In April 2006, the Bush administration took initial steps to use the state secrets rule to block a lawsuit against AT&T and the National Security Agency brought by the Electronic Frontier Foundation. The EFF alleged that the government has secret computer rooms conducting broad, illegal surveillance of U.S. citizens.[5][10] Testifying at a January 29, 2008 House Judiciary Committee hearing on reform of the state secrets privilege, EFF attorney Kevin Bankston contended that the administration’s interpretation of the privilege was overly broad, and failed to properly consider the evidentiary procedures provided for by Section 1806(f) of the Foreign Intelligence Surveillance Act.[26] However, the case was dismissed on June 3, 2009,[27] citing retroactive legislation (section 802 of FISA) stating that in the case of a covered civil action, the assistance alleged to have been provided by the electronic communication service provider was in connection with an intelligence activity involving communications that was authorized by the President during the period beginning on September 11, 2001, and ending on January 17, 2007; designed to detect or prevent a terrorist attack, or activities in preparation for a terrorist attack, against the United States; and the subject of a written request or directive, or a series of written requests or directives, from the Attorney General or the head of an element of the intelligence community (or the deputy of such person) to the electronic communication service provider indicating that the activity was authorized by the President; and determined to be lawful.


[edit] Khalid El-Masri

Main articles: Khalid El-Masri and Extraordinary rendition


In May 2006, the illegal detention case of Khalid El-Masri was dismissed based on the privilege, which was invoked by the Central Intelligence Agency (CIA). Khalid El-Masri alleged that he was falsely held by the CIA for several months (which the CIA acknowledges) and was beaten, drugged, and subjected to various other inhumane activity while in captivity. He was ultimately released by the CIA with no charge ever being brought against him by the United States government. Judge T.S. Ellis, III of the U.S. District Court dismissed the case because, according to the court, the simple fact of holding proceedings would jeopardize state secrets, as claimed by the CIA.[3] [2]. On March 2, 2007, the United States Court of Appeals for the Fourth Circuit affirmed. [3] On October 9, 2007, the Supreme Court declined to hear an appeal of the Fourth Circuit’s decision, letting the doctrine of state secrets privilege stand.[29]

[edit] Maher Arar

Main articles: Maher Arar and Extraordinary rendition

The privilege was invoked against a case where Maher Arar, a wrongfully-accused and tortured victim, sought to sue Attorney General John Ashcroft for his role in deporting Arar to Syria to face torture and extract false confessions. It was formally invoked by Deputy Attorney General James B. Comey in legal papers filed in the United States District Court for the Eastern District of New York. The invocation read, “Litigating [the] plaintiff’s complaint would necessitate disclosure of classified information”, which it later stated included disclosure of the basis for detaining him in the first place, the basis for refusing to deport him to Canada as he had requested, and the basis for sending him to Syria.

[edit] Jane and John Doe

On January 4, 2007 District Court Judge Laura Taylor Swain ordered the dismissal of Jane Doe et al. v. CIA, 05 Civ. 7939 based on the state secrets privilege. Jane Doe and her children sued the CIA for money damages after her husband’s covert employment with the CIA was “terminated immediately for unspecified reasons”.[4].

[edit] Quotes

  • “Because it is so powerful and can trample legitimate claims against the government, the state secrets privilege is not to be lightly invoked” – (United States v. Reynolds, 345 U.S. 1, 7 (1953)) [5]
  • “The state secrets privilege is a common law evidentiary rule that allows the government to withhold information from discovery when disclosure would be inimical to national security.”Zuckerbraun v. General Dynamics Corp., 935 F.2d 544, 546 (2d Cir. 1991).

[edit] See also

[edit] External links

[edit] References

  1. ^ a b c d e f g h i j k l m n o The state secrets privilege: Expanding Its Scope Through Government Misuse by Carrie Newton Lyons, the Lewis & Clark Law Review, published by Lewis & Clark Law School, Volume 11 / Number 1 / Spring 2007.
  2. ^ a b c d e f g The State Secrets Privilege and executive Misconduct by Shayana Kadidal, one of the lead attorneys on the Center for Constitutional Rights, JURIST, May 30, 2006
  3. ^ a b c d e f Dangerous Discretion: State Secrets and the El-Masri Rendition Case by Aziz Huq, Director of the Liberty and National Security Project at the Brennan Center for Justice at NYU School of Law, JURIST, March 12, 2007
  4. ^ a b c The Suit Challenging the NSA’s Warrantless Wiretapping Can Proceed, Despite the State Secrets Privilege
  5. ^ a b c d e f g Building the Secrecy Wall higher and higher by Glenn Greenwald, Unclaimed Territory, April 29, 2006
  6. ^ a b c d e Bush Wielding Secrecy Privilege to End Suits By Andrew Zajac, The Chicago Tribune, March 3, 2005
  7. ^ United States v. Reynolds, 345 U.S. 1, paragraph 8 (1953) (“the privilege against revealing military secrets, a privilege which is well established in the law of evidence”). Text
  8. ^ Tenet v. Doe, 544 U.S. 1 (2005)
  9. ^ a b c ACLU v. National Security Agency: Why the “State Secrets Privilege” Shouldn’t Stop the Lawsuit Challenging Warrantless Telephone Surveillance of Americans By JOHN W. DEAN, FindLaw, June 16, 2006
  10. ^ a b c d e f Secret GuardingThe new secrecy doctrine so secret you don’t even know about it By Henry Lanman, Slate, May 22, 2006,
  11. ^ Stephens, Hampton. Supreme Court Filing claims Air Force, government fraud in 1953 case: Case could affect ‘state secrets’ privilege Inside the Air Force March 14, 2003. Retrieved May 3, 2007.
  12. ^ a b Rechecking the Balance of Powers The Bush administration has finally been rebuked for its repeated efforts to evade judicial review By Glenn Greenwald, In These Times, July 21, 2006
  13. ^ a b c [1] By Susan Burgess, The News Media and the Law, Fall 2005
  14. ^ Lichtblau, Eric (August 31, 2007). “U.S. Cites ‘Secrets’ Privilege as It Tries to Stop Suit on Banking Records”. The New York Times. http://www.nytimes.com/2007/08/31/us/nationalspecial3/31swift.html?ref=us. Retrieved 2009-07-09.
  15. ^ Congress and Judges Gagged Arlen Specter and a CIA torture victim know – Only the Oval Office decides what the law is by Nat Hentoff, Village Voice, June 19th, 2006
  16. ^ a b Closing Our Courts Crying ‘state secrets,’ the administration seals the courts to avoid scrutiny by Nat Hentoff, Village Voice, June 9th, 2006
  17. ^ House Committee on Oversight and Government Reform Whistleblower Protection Enhancement Act of 2007 Testimony of William G. Weaver, J.D., Ph.D. Senior Advisor, National Security Whistleblowers Coalition and Associate Professor University of Texas at El Paso, Inst. for Policy and Econ. Development and Dept. of Political Science, February 13, 2007
  18. ^ Secrecy and Foreign Policy by Robert Pallitto, Foreign Policy In Focus (FPIF), December 8, 2006
  19. ^ Snapshots of the U.S. under the Bush administration by Glenn Greenwald, Unclaimed Territory, May 23, 2006
  20. ^ a b Florence, Justin and Gerke, Matthew: “State Your Secrets: The smart way around telecom immunity.” http://www.slate.com/id/2177962/
  21. ^ a b c “State Secrets and the Limits of National Security Legislation” by Robert Chesney. George Washington Law Review (2007).
  22. ^ “The State Secrets Privilege: Expanding Its Scope Through Government Misuse” by Carrie Newton Lyons, 11 Lewis & Clark L. Rev. 99 (2007).
  23. ^ a b Report on Reforming the State Secrets Privilege, American Bar Association, 2007.
  24. ^ “State Your Secrets” by Lou Fisher. Legal Times, 2006.
  25. ^ “Introduction of the State Secrets Protection Act”. Federation of American Scientists. 2008-01-22. http://www.fas.org/irp/congress/2008_cr/statesec.html. Retrieved 2008-02-08.
  26. ^ “Statement of Kevin S. Bankston, Senior Staff Attorney Electronic Frontier Foundation” (PDF). Oversight Hearing on Reform of the State Secrets Privilege by the U.S. House of Representatives Committee on the Judiciary, Subcommittee on the Constitution, Civil Rights, and Civil Liberties. 2008-01-29. http://www.eff.org/files/EFF_HJC_SSP_written_testimony_Final.pdf. Retrieved 2008-02-08.
  27. ^ Hepting v. AT&T, U.S. District Court (U.S. District Court for the Northern District of California 3 June 2009). Text
  28. ^ Bazan, Elizabeth B. (7 July 2008). “The Foreign Intelligence Surveillance Act: An Overview of Selected Issues” (PDF). Congressional Research Service. http://www.fas.org/sgp/crs/intel/RL34279.pdf.
  29. ^ Greenhouse, Linda (2007-10-10). “Supreme Court Refuses to Hear Torture Appeal”. The New York Times. http://www.nytimes.com/2007/10/10/washington/10scotus.html?ref=us. Retrieved 2007-10-10.

Retrieved from “http://en.wikipedia.org/wiki/State_secrets_privilege

Categories: United States government secrecy | Evidence law | George W. Bush administration controversies | Executive branch of the United States government | Classified information

This page was last modified on 20 May 2011 at 06:09.

Political Corruption
Political corruption is the use of legislated powers by government officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties.

Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities.

The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually.[1] A state of unrestrained political corruption is known as a kleptocracy, literally meaning “rule by thieves”.

Political corruption
Corruption Perceptions Index, 2010


Electoral fraud Economics of corruption
Nepotism Bribery Cronyism Slush fund

Corruption by country


Angola Armenia Canada
Chile China (PRC) Colombia
Cuba Ghana India Iran Kenya
Ireland Nigeria Pakistan
Paraguay Philippines Russia
South Africa Venezuela United States

This box: viewtalkedit






[edit] Effects

[edit] Effects on politics, administration, and institutions


Detail from Corrupt Legislation (1896) by Elihu Vedder. Library of Congress Thomas Jefferson Building, Washington, D.C.


Corruption poses a serious development challenge. In the political realm, it undermines democracy and good governance by flouting or even subverting formal processes. Corruption in elections and in legislative bodies reduces accountability and distorts representation in policymaking; corruption in the judiciary compromises the rule of law; and corruption in public administration results in the inefficient provision of services. It violates a basic principle of republicanism regarding the centrality of civic virtue. More generally, corruption erodes the institutional capacity of government as procedures are disregarded, resources are siphoned off, and public offices are bought and sold. At the same time, corruption undermines the legitimacy of government and such democratic values as trust and tolerance.

[edit] Economic effects

See also: Corporate crime

Corruption undermines economic development by generating considerable distortions and inefficiency. In the private sector, corruption increases the cost of business through the price of illicit payments themselves, the management cost of negotiating with officials, and the risk of breached agreements or detection. Although some claim corruption reduces costs by cutting bureaucracy, the availability of bribes can also induce officials to contrive new rules and delays. Openly removing costly and lengthy regulations are better than covertly allowing them to be bypassed by using bribes. Where corruption inflates the cost of business, it also distorts the playing field, shielding firms with connections from competition and thereby sustaining inefficient firms.[2]

Corruption also generates economic distortions in the public sector by diverting public investment into capital projects where bribes and kickbacks are more plentiful. Officials may increase the technical complexity of public sector projects to conceal or pave the way for such dealings, thus further distorting investment. Corruption also lowers compliance with construction, environmental, or other regulations, reduces the quality of government services and infrastructure, and increases budgetary pressures on government.

Economists argue that one of the factors behind the differing economic development in Africa and Asia is that in the former, corruption has primarily taken the form of rent extraction with the resulting financial capital moved overseas rather than invested at home (hence the stereotypical, but often accurate, image of African dictators having Swiss bank accounts). In Nigeria, for example, more than $400 billion was stolen from the treasury by Nigeria’s leaders between 1960 and 1999.[3] University of Massachusetts researchers estimated that from 1970 to 1996, capital flight from 30 sub-Saharan countries totaled $187bn, exceeding those nations’ external debts.[4] (The results, expressed in retarded or suppressed development, have been modeled in theory by economist Mancur Olson.) In the case of Africa, one of the factors for this behavior was political instability, and the fact that new governments often confiscated previous government’s corruptly-obtained assets. This encouraged officials to stash their wealth abroad, out of reach of any future expropriation. In contrast, Asian administrations such as Suharto‘s New Order often took a cut on business transactions or provided conditions for development, through infrastructure investment, law and order, etc.

[edit] Environmental and social effects

Corruption facilitates environmental destruction. Corrupt countries may formally have legislation to protect the environment, it cannot be enforced if officials can easily be bribed. The same applies to social rights worker protection,unionization prevention, and child labor. Violation of these laws rights enables corrupt countries to gain illegitimate economic advantage in the international market.

The Nobel Prize-winning economist Amartya Sen has observed that “there is no such thing as an apolitical food problem.” While drought and other naturally occurring events may trigger famine conditions, it is government action or inaction that determines its severity, and often even whether or not a famine will occur. Governments with strong tendencies towards kleptocracy can undermine food security even when harvests are good. Officials often steal state property. In Bihar, India, more than 80% of the subsidized food aid to poor is stolen by corrupt officials.[5] Similarly, food aid is often robbed at gunpoint by governments, criminals, and warlords alike, and sold for a profit. The 20th century is full of many examples of governments undermining the food security of their own nations – sometimes intentionally.[6]

[edit] Effects on Humanitarian Aid

The scale of humanitarian aid to the poor and unstable regions of the world grows, but it is highly vulnerable to corruption, with food aid, construction and other highly valued assistance as the most at risk.[7] Food aid can be directly and physically diverted from its intended destination, or indirectly through the manipulation of assessments, targeting, registration and distributions to favour certain groups or individuals.[7] Elsewhere, in construction and shelter, there are numerous opportunities for diversion and profit through substandard workmanship, kickbacks for contracts and favouritism in the provision of valuable shelter material.[7] Thus while humanitarian aid agencies are usually most concerned about aid being diverted by including too many, recipients themselves are most concerned about exclusion.[7] Access to aid may be limited to those with connections, to those who pay bribes or are forced to give sexual favours.[7] Equally, those able to do so may manipulate statistics to inflate the number beneficiaries and syphon of the additional assistance.[7]

[edit] Other areas: health, public safety, education, trade unions, etc.

See also: Police corruption

Corruption is not specific to poor, developing, or transition countries. In western countries, there have been cases of bribery and other forms of corruption in all possible fields: under-the-table payments made to reputed surgeons by patients willing to be on top of the list of forthcoming surgeries,[8] bribes paid by suppliers to the automotive industry in order to sell poor quality connectors used for instance in safety equipment such as airbags, bribes paid by suppliers to manufacturers of defibrillators (to sell poor quality capacitors), contributions paid by wealthy parents to the “social and culture fund” of a prestigious university in exchange for it to accept their children, bribes paid to obtain diplomas, financial and other advantages granted to unionists by members of the executive board of a car manufacturer in exchange for employer-friendly positions and votes, etc. Examples are endless. These various manifestations of corruption can ultimately present a danger for the public health; they can discredit certain essential institutions or social relationships.

Corruption can also affect the various components of sports activities (referees, players, medical and laboratory staff involved in anti-doping controls, members of national sport federation and international committees deciding about the allocation of contracts and competition places).

There have also been cases against (members of) various types of non-profit and non-government organisations, as well as religious organisations.

Ultimately, the distinction between public and private sector corruption sometimes appears rather artificial and national anti-corruption initiatives may need to avoid legal and other loopholes in the coverage of the instruments.

[edit] Types

[edit] Bribery

Main article: Bribery

A bribe is a payment given personally to a government official in exchange of his use of official powers. Bribery requires two participants: one to give the bribe, and one to take it. Either may initiate the corrupt offering; for example, a customs official may demand bribes to let through allowed (or disallowed) goods, or a smuggler might offer bribes to gain passage. In some countries the culture of corruption extends to every aspect of public life, making it extremely difficult for individuals to stay in business without resorting to bribes. Bribes may be demanded in order for an official to do something he is already paid to do. They may also be demanded in order to bypass laws and regulations. In addition to using bribery for private financial gain, they are also used to intentionally and maliciously cause harm to another (i.e. no financial incentive). In some developing nations, up to half of the population has paid bribes during the past 12 months.[9]


In recent years, efforts have been made by the international community to encourage countries to dissociate and incriminate as separate offences, active and passive bribery. Active bribery can be defined for instance as the promising, offering or giving by any person, directly or indirectly, of any undue advantage [to any public official], for himself or herself or for anyone else, for him or her to act or refrain from acting in the exercise of his or her functions.(article 2 of the Criminal Law Convention on Corruption (ETS 173) of the Council of Europe). Passive bribery can be defined as the request or receipt [by any public official], directly or indirectly, of any undue advantage, for himself or herself or for anyone else, or the acceptance of an offer or a promise of such an advantage, to act or refrain from acting in the exercise of his or her functions (article 3 of the Criminal Law Convention on Corruption (ETS 173)). The reason for this dissociation is to make the early steps (offering, promising, requesting an advantage) of a corrupt deal already an offence and, thus, to give a clear signal (from a criminal policy point of view) that bribery is not acceptable. Besides, such a dissociation makes the prosecution of bribery offences easier since it can be very difficult to prove that two parties (the bribe-giver and the bribe-taker) have formally agreed upon a corrupt deal. Besides, there is often no such formal deal but only a mutual understanding, for instance when it is common knowledge in a municipality that to obtain a building permit one has to pay a “fee” to the decision maker to obtain a favourable decision. A working definition of corruption is also provided as follows in article 3 of the Civil Law Convention on Corruption (ETS 174): For the purpose of this Convention, “corruption” means requesting, offering, giving or accepting, directly or indirectly, a bribe or any other undue advantage or prospect thereof, which distorts the proper performance of any duty or behavior required of the recipient of the bribe, the undue advantage or the prospect thereof.


[edit] Trading in influence


Trading in influence, or influence peddling in certain countries, refers to the situation where a person is selling his/her influence over the decision process involving a third party (person or institution). The difference with bribery is that this is a tri-lateral relation. From a legal point of view, the role of the third party (who is the target of the influence) does not really matter although he/she can be an accessory in some instances. It can be difficult to make a distinction between this form of corruption and certain forms of extreme and poorly regulated lobbying where for instance law- or decision-makers can freely “sell” their vote, decision power or influence to those lobbyists who offer the highest retribution, including where for instance the latter act on behalf of powerful clients such as industrial groups who want to avoid the passing of certain environmental, social, or other regulations perceived as too stringent, etc. Where lobbying is (sufficiently) regulated, it becomes possible to provide for a distinctive criteria and to consider that trading in influence involves the use of “improper influence”, as in article 12 of the Criminal Law Convention on Corruption (ETS 173) of the Council of Europe.

[edit] Patronage

Main article: Patronage

Patronage refers to favoring supporters, for example with government employment. This may be legitimate, as when a newly elected government changes the top officials in the administration in order to effectively implement its policy. It can be seen as corruption if this means that incompetent persons, as a payment for supporting the regime, are selected before more able ones. In nondemocracies many government officials are often selected for loyalty rather than ability. They may be almost exclusively selected from a particular group (for example, Sunni Arabs in Saddam Hussein‘s Iraq, the nomenklatura in the Soviet Union, or the Junkers in Imperial Germany) that support the regime in return for such favors. A similar problem can also be seen in Eastern Europe, for example in Romania, where the government is often accused of patronage (when a new government comes to power it rapidly changes most of the officials in the public sector).

[edit] Nepotism and cronyism

Main articles: Nepotism and Cronyism


Favoring relatives (nepotism) or personal friends (cronyism) of an official is a form of illegitimate private gain. This may be combined with bribery, for example demanding that a business should employ a relative of an official controlling regulations affecting the business. The most extreme example is when the entire state is inherited, as in North Korea or Syria. A milder form of cronyism is an “old boy network“, in which appointees to official positions are selected only from a closed and exclusive social network – such as the alumni of particular universities – instead of appointing the most competent candidate.

Seeking to harm enemies becomes corruption when official powers are illegitimately used as means to this end. For example, trumped-up charges are often brought up against journalists or writers who bring up politically sensitive issues, such as a politician’s acceptance of bribes.

In the Indian political system, leadership of national and regional parties are passed from generation to generation creating a system in which a family holds the center of power, some examples are most of the Dravidian parties of south India and also the largest party in India – Congress.

[edit] Electoral fraud

Main article: Electoral fraud


Electoral fraud is illegal interference with the process of an election. Acts of fraud affect vote counts to bring about an election result, whether by increasing the vote share of the favored candidate, depressing the vote share of the rival candidates, or both. Also called voter fraud, the mechanisms involved include illegal voter registration, intimidation at polls, and improper vote counting.

[edit] Embezzlement

Main article: Embezzlement

Embezzlement is outright theft of entrusted funds. It is a misappropriation of property.

Another common type of embezzlement is that of entrusted government resources; for example, when a director of a public enterprise employs company workers to build or renovate his own house.

[edit] Kickbacks

See also: Anti-competitive practices and Bid rigging


A kickback is an official’s share of misappropriated funds allocated from his or her organization to an organization involved in corrupt bidding. For example, suppose that a politician is in charge of choosing how to spend some public funds. He can give a contract to a company that is not the best bidder, or allocate more than they deserve. In this case, the company benefits, and in exchange for betraying the public, the official receives a kickback payment, which is a portion of the sum the company received. This sum itself may be all or a portion of the difference between the actual (inflated) payment to the company and the (lower) market-based price that would have been paid had the bidding been competitive. Kickbacks are not limited to government officials; any situation in which people are entrusted to spend funds that do not belong to them are susceptible to this kind of corruption. Kickbacks are also common in the pharmaceutical industry, as many doctors and physicians receive pay in return for added promotion and prescription of the drug these pharmaceutical companies are marketing.

[edit] Unholy alliance

An unholy alliance is a coalition among seemingly antagonistic groups, especially if one is religious,[10] for ad hoc or hidden gain. Like patronage, unholy alliances are not necessarily illegal, but unlike patronage, by its deceptive nature and often great financial resources, an unholy alliance can be much more dangerous to the public interest. An early, well-known use of the term was by Theodore Roosevelt (TR):

“To destroy this invisible Government, to dissolve the unholy alliance between corrupt business and corrupt politics is the first task of the statesmanship of the day.” – 1912 Progressive Party Platform, attributed to TR[11] and quoted again in his autobiography[12] where he connects trusts and monopolies (sugar interests, Standard Oil, etc.) to Woodrow Wilson, Howard Taft, and consequently both major political parties.

[edit] Involvement in organized crime

An illustrative example of official involvement in organized crime can be found from 1920s and 1930s Shanghai, where Huang Jinrong was a police chief in the French concession, while simultaneously being a gang boss and co-operating with Du Yuesheng, the local gang ringleader. The relationship kept the flow of profits from the gang’s gambling dens, prostitution, and protection rackets undisturbed.

The United States accused Manuel Noriega‘s government in Panama of being a “narcokleptocracy“, a corrupt government profiting on illegal drug trade. Later the U.S. invaded Panama and captured Noriega.

[edit] Conditions favorable for corruption

It is argued that the following conditions are favorable for corruption:

  • Information deficits
    • Lacking freedom of information legislation. The Indian Right to Information Act 2005 has “already engendered mass movements in the country that is bringing the lethargic, often corrupt bureaucracy to its knees and changing power equations completely.”[13]
    • Lack of investigative reporting in the local media.
    • Contempt for or negligence of exercising freedom of speech and freedom of the press.
    • Weak accounting practices, including lack of timely financial management.
    • Lack of measurement of corruption. For example, using regular surveys of households and businesses in order to quantify the degree of perception of corruption in different parts of a nation or in different government institutions may increase awareness of corruption and create pressure to combat it. This will also enable an evaluation of the officials who are fighting corruption and the methods used.
    • Tax havens which tax their own citizens and companies but not those from other nations and refuse to disclose information necessary for foreign taxation. This enables large scale political corruption in the foreign nations.[14][citation needed]
  • Lacking control of the government.
    • Lacking civic society and non-governmental organizations which monitor the government.
    • An individual voter may have a rational ignorance regarding politics, especially in nationwide elections, since each vote has little weight.
    • Weak civil service, and slow pace of reform.
    • Weak rule of law.
    • Weak legal profession.
    • Weak judicial independence.
    • Lacking protection of whistleblowers.
    • Lack of benchmarking, that is continual detailed evaluation of procedures and comparison to others who do similar things, in the same government or others, in particular comparison to those who do the best work. The Peruvian organization Ciudadanos al Dia has started to measure and compare transparency, costs, and efficiency in different government departments in Peru. It annually awards the best practices which has received widespread media attention. This has created competition among government agencies in order to improve.[15]
  • Opportunities and incentives
    • Individual officials routinely handle cash, instead of handling payments by giro or on a separate cash desk—illegitimate withdrawals from supervised bank accounts are much more difficult to conceal.
    • Public funds are centralized rather than distributed. For example, if $1,000 is embezzled from a local agency that has $2,000 funds, it is easier to notice than from a national agency with $2,000,000 funds. See the principle of subsidiarity.
    • Large, unsupervised public investments.
    • Sale of state-owned property and privatization.[citation needed]
    • Poorly-paid government officials.
    • Government licenses needed to conduct business, e.g., import licenses, encourage bribing and kickbacks.
    • Long-time work in the same position may create relationships inside and outside the government which encourage and help conceal corruption and favoritism. Rotating government officials to different positions and geographic areas may help prevent this; for instance certain high rank officials in French government services (e.g. treasurer-paymasters general) must rotate every few years.
    • Costly political campaigns, with expenses exceeding normal sources of political funding, especially when funded with taxpayer money.
    • Less interaction with officials reduces the opportunities for corruption. For example, using the Internet for sending in required information, like applications and tax forms, and then processing this with automated computer systems. This may also speed up the processing and reduce unintentional human errors. See e-Government.
    • A windfall from exporting abundant natural resources may encourage corruption.[16] (See Resource curse)
    • War and other forms of conflict correlate with a breakdown of public security.
  • Social conditions

According to a study of the conservative think tank The Heritage Foundation, lack of economic freedom explains 71% of corruption[17]

[edit] Size of public sector

It is a controversial issue whether the size of the public sector per se results in corruption. As mentioned above, low degree of economic freedom explains 71% of corruption. The actual share may be even greater, as also past regulation affects the current level of corruption due to the slowing of cultural changes (e.g., it takes time for corrupted officials to adjust to changes in economic freedom).[18] The size of the public sector in terms of taxation is only one component of economic un-freedom, so the empirical studies on economic freedom do not directly answer this question.

Extensive and diverse public spending is, in itself, inherently at risk of cronyism, kickbacks, and embezzlement. Complicated regulations and arbitrary, unsupervised official conduct exacerbate the problem. This is one argument forprivatization and deregulation. Opponents of privatization see the argument as ideological. The argument that corruption necessarily follows from the opportunity is weakened by the existence of countries with low to non-existent corruption but large public sectors, like the Nordic countries.[19] However, these countries score high on the Ease of Doing Business Index, due to good and often simple regulations, and have rule of law firmly established. Therefore, due to their lack of corruption in the first place, they can run large public sectors without inducing political corruption.

Like other governmental economic activities, also privatization, such as in the sale of government-owned property, is particularly at the risk of cronyism. Privatizations in Russia, Latin America, and East Germany were accompanied by large scale corruption during the sale of the state owned companies. Those with political connections unfairly gained large wealth, which has discredited privatization in these regions. While media have reported widely the grand corruption that accompanied the sales, studies have argued that in addition to increased operating efficiency, daily petty corruption is, or would be, larger without privatization, and that corruption is more prevalent in non-privatized sectors. Furthermore, there is evidence to suggest that extralegal and unofficial activities are more prevalent in countries that privatized less.[20]

There is the counter point, however, that oligarchy industries can be quite corrupt ( “competition” like collusive price-fixing, pressuring dependent businesses, etc. ), and only by having a portion of the market owned by someone other than that oligarchy, i.e. public sector, can keep them in line ( if the public sector gas company is making money & selling gas for 1/2 of the price of the private sector companies… the private sector companies won’t be able to simultaneously gouge to that degree & keep their customers: the competition keeps them in line ). Private sector corruption can increase the poverty/helplessness of the population, so it can affect government corruption, in the long-term.

In the European Union, the principle of subsidiarity is applied: a government service should be provided by the lowest, most local authority that can competently provide it. An effect is that distribution of funds into multiple instances discourages embezzlement, because even small sums missing will be noticed. In contrast, in a centralized authority, even minute proportions of public funds can be large sums of money.

[edit] Governmental corruption

If the highest echelons of the governments also take advantage from corruption or embezzlement from the state’s treasury, it is sometimes referred with the neologism kleptocracy. Members of the government can take advantage of thenatural resources (e.g., diamonds and oil in a few prominent cases) or state-owned productive industries. A number of corrupt governments have enriched themselves via foreign aid, which is often spent on showy buildings and armaments.

A corrupt dictatorship typically results in many years of general hardship and suffering for the vast majority of citizens as civil society and the rule of law disintegrate. In addition, corrupt dictators routinely ignore economic and socialproblems in their quest to amass ever more wealth and power.

The classic case of a corrupt, exploitive dictator often given is the regime of Marshal Mobutu Sese Seko, who ruled the Democratic Republic of the Congo (which he renamed Zaire) from 1965 to 1997. It is said that usage of the termkleptocracy gained popularity largely in response to a need to accurately describe Mobutu’s regime. Another classic case is Nigeria, especially under the rule of General Sani Abacha who was de facto president of Nigeria from 1993 until his death in 1998. He is reputed to have stolen some US$3–4 billion. He and his relatives are often mentioned in Nigerian 419 letter scams claiming to offer vast fortunes for “help” in laundering his stolen “fortunes”, which in reality turn out not to exist.[21] More than $400 billion was stolen from the treasury by Nigeria’s leaders between 1960 and 1999.[22]

More recently, articles in various financial periodicals, most notably Forbes magazine, have pointed to Fidel Castro, General Secretary of the Republic of Cuba since 1959, of likely being the beneficiary of up to $900 million, based on “his control” of state-owned companies.[23] Opponents of his regime claim that he has used money amassed through weapons sales, narcotics, international loans, and confiscation of private property to enrich himself and his political cronies who hold his dictatorship together, and that the $900 million published by Forbes is merely a portion of his assets, although that needs to be proven.[24]

[edit] Fighting corruption

Mobile telecommunications and radio broadcasting help to fight corruption, especially in developing regions like Africa,[25] where other forms of communications are limited.

In the 1990s, initiatives were taken at an international level (in particular by the European Community, the Council of Europe, the OECD) to put a ban on corruption: in 1996, the Committee of Ministers of the Council of Europe, for instance, adopted a comprehensive Programme of Action against Corruption and, subsequently, issued a series of anti-corruption standard-setting instruments:

The purpose of these instruments was to address the various forms of corruption (involving the public sector, the private sector, the financing of political activities, etc.) whether they had a strictly domestic or also a transnational dimension. To monitor the implementation at national level of the requirements and principles provided in those texts, a monitoring mechanism – the Group of States Against Corruption (also known as GRECO) was created.

Further conventions were adopted at the regional level under the aegis of the Organization of American States (OAS or OEA), the African Union, and in 2003, at the universal level under that of the United Nations.

[edit] Whistleblowers

Main article: Whistleblower

[edit] Campaign contributions

In the political arena, it is difficult to prove corruption. For this reason, there are often unproven rumors about many politicians, sometimes part of a smear campaign.

Politicians are placed in apparently compromising positions because of their need to solicit financial contributions for their campaign finance. If they then appear to be acting in the interests of those parties that funded them, it could be considered corruption. Though donations may be coincidental, the question asked is, why are they funding politicians at all, if they get nothing for their money.

Laws regulating campaign finance in the United States require that all contributions and their use should be publicly disclosed. Many companies, especially larger ones, fund both the Democratic and Republican parties. Certain countries, such as France, ban altogether the corporate funding of political parties. Because of the possible circumvention of this ban with respect to the funding of political campaigns, France also imposes maximum spending caps on campaigning; candidates that have exceeded those limits, or that have handed in misleading accounting reports, risk having their candidacy ruled invalid, or even being prevented from running in future elections. In addition, the government funds political parties according to their successes in elections.

In some countries, political parties are run solely off subscriptions (membership fees).

Even legal measures such as these have been argued to be legalized corruption, in that they often favor the political status quo. Minor parties and independents often argue that efforts to rein in the influence of contributions do little more than protect the major parties with guaranteed public funding while constraining the possibility of private funding by outsiders. In these instances, officials are legally taking money from the public coffers for their election campaigns to guarantee that they will continue to hold their influential and often well-paid positions.

As indicated above, the Committee of Ministers of the Council of Europe recognised in 1996 the importance of links between corruption and political financing. It adopted in 1837 the Recommendation on Common Rules against Corruption in the Funding of Political Parties and Electoral Campaigns (Rec(2003)4). This text is quite unique at international levels as it aims i.a. at increasing transparency in the funding of political parties and election campaigns (these two areas are difficult to dissociate since parties are also involved in campaigning and in many countries, parties do not have the monopoly over the presentation of candidates for elections), ensuring a certain level of control over the funding and spending connected with political activities, and making sure infringements are subject to effective, proportionate, and dissuasive sanctions. In the context of its monitoring activities, the Group of States Against Corruption has identified a great variety of possible improvements in those areas (see the country reports adopted under the Third Evaluation Round).

[edit] Measuring corruption

Measuring corruption statistically is difficult if not impossible due to the illicit nature of the transaction and imprecise definitions of corruption.[26] While “corruption” indices first appeared in 1995 with the Corruption Perceptions Index, all of these metrics address different proxies for corruption, such as public perceptions of the extent of the problem.[27]

Transparency International, an anti-corruption NGO, pioneered this field with the Corruption Perceptions Index, first released in 1995. This work is often credited with breaking a taboo and forcing the issue of corruption into high level development policy discourse. Transparency International currently publishes three measures, updated annually: a Corruption Perceptions Index(CPI) (based on aggregating third-party polling of public perceptions of how corrupt different countries are); a Global Corruption Barometer (based on a survey of general public attitudes toward and experience of corruption); and a Bribe Payers Index, looking at the willingness of foreign firms to pay bribes. The Corruption Perceptions Index is the best known of these metrics, though it has drawn much criticism[27][28][29] and may be declining in influence.[30]

The World Bank collects a range of data on corruption, including survey responses from over 100,000 firms worldwide and a set of indicators of governance and institutional quality. Moreover, one of the six dimensions of governance measured by the Worldwide Governance Indicators is Control of Corruption, which is defined as “the extent to which power is exercised for private gain, including both petty and grand forms of corruption, as well as ‘capture’ of the state by elites and private interests.”[31] While the definition itself is fairly precise, the data aggregated into the Worldwide Governance Indicators is based on any available polling: questions range from “is corruption a serious problem?” to measures of public access to information, and not consistent across countries. Despite these weaknesses, the global coverage of these datasets has led to their widespread adoption, most notably by the Millennium Challenge Corporation.[26]

In part in response to these criticisms, a second wave of corruption metrics has been created by Global Integrity, the International Budget Partnership, and many lesser known local groups, starting with the Global Integrity Index, first published in 2004. These second wave projects aim not to create awareness, but to create policy change via targeting resources more effectively and creating checklists toward incremental reform. Global Integrity and the International Budget Partnership each dispense with public surveys and instead uses in-country experts to evaluate “the opposite of corruption” – which Global Integrity defines as the public policies that prevent, discourage, or expose corruption.[32] These approaches compliment the first wave, awareness-raising tools by giving governments facing public outcry a checklist which measures concrete steps toward improved governance.[26]

Typical second wave corruption metrics do not offer the worldwide coverage found in first wave projects, and instead focus on localizing information gathered to specific problems and creating deep, “unpackable” content that matches quantitative and qualitative data. Meanwhile, alternative approaches such as the British aid agency’s Drivers of Change research skips numbers entirely and favors understanding corruption via political economy analysis of who controls power in a given society.[26]

Rule of Law

The Rule of law in its most basic form is no one is above the law.
Perhaps the most important application of the rule of law is the principle that governmental authority is legitimately exercised only in accordance with,
publicly disclosed laws,
adopted and enforced in accordance with established procedural steps that are referred to as due process.
The rule of law is hostile to dictatorship and to anarchy.
According to modern Anglo-American thinking, hallmarks of adherence to the rule of law commonly include a
clear separation of powers,
legal certainty,
the principle of legitimate expectation
and equality of all before the law.
The concept is not without controversy, and it has been said that
“the phrase the rule of law has become meaningless thanks to ideological abuse and general over- use”



Obstruct Justice truth and source kill


ASK: Alien Search Knowledge

Who is Alien in God’s Universe
That is to Say

Holism not to be confused with -Holism
Positive not negative eh!!!

One Family
Truths Holistic Interactive Retrospect Transcendental Electromagnetism Enslavers Nemesis

1 law of 3
Invincible Triad
Humanity (Spirit Force Law) Rule of Law
strength, courage, character, GUTS, will, strength of mind, fortitude,
Get Up To Speed

Who and or what would dare alienate us under the watchful eye of God
Who Luvs Us
All Eh!!!


For Ever Eh!!!

2B or not 2B

God And Guv
In Trust
Gives me Hives eh!!!

Lost Realms – Zecharia Sitchin – FREE MOVIE
From <https://www.youtube.com/watch?v=P2uJG3SA3kQ&list=PLO6v9-euI-fKc-ck9ILUwuYIBGbPnNW_k>

Who created the Gods and who has the
Unambiguous Original Copy of
God’s Reality Instructions To


United Perception Solidarity
Ultimate Potential Society

Guaranteed Legal Ascertainable Direction

Nuclear War
2024 BC
War Monger’s Bible

Not 4 Amateurs

Who could recognize His signature

Strong Arm


Political Religious Illusion Charlatan Kayfabe
media inciting
Fickle Inherent Bias Ignorant Bliss

Armaments Disarmaments
Better Use For Fiduciary Essence Tacit

“There were no dates in this history, but scrawled this way and that across every page were the words
Benevolence Righteousness and Morality
… finally I began to make out what was written between the lines.
The whole volume was but a single phrase,
Eat People”

“Fine words and an insinuating appearance are seldom associated with true virtue”

“The people may be made to follow a course of action, but they may not be made to understand IT”

Serpent Induced Neurosis

You can lead a horse to water but cannot make it drink
Cause Effect
People Shit in IT
They Shoot Horses Eh!!!

Scribes Pirate Universe
Underground Pharisees Subterfuge

Vatican Insider, Who is “The Master” ? Apex of Illuminati – Ancient Bloodlines
From <https://www.youtube.com/watch?v=P8ZltIZRfHI&t=197s>
Family dates back 26,000 years 3 Crosses reveals Systemic Theft from Idealism

Laura Magdalene Eisenhower: ET invasion has already occurred and governments do not want us to know
From <https://www.youtube.com/watch?v=OdfIuTm2VuM>

1 law of 3
Invincible Triad
Humanity (Spirit Force Law) Rule of Law
strength, courage, character, GUTS, will, strength of mind, fortitude,
Get Up To Speed


witches-culdron-1Reoccurring “Lost Civilizations” due process

Perpetual Liars Onset Picture
Word Art Revelations



Bar to Bar Justice Causes Eccentric to Saddle Up to The Bar

Frank & Stein 13
Jekyll & Hides

Yet to determine if ME Mother Earth is Flat
That is To Say
Round Voluptuous Or What
Time Of Weaning
Tug Of War
Muther Fucker
Still attempting to figure 8 the Bible!!!

God Knows
Street Talk Eh!!!

That Is To Say

What did Oedipus Say?


Video Proof That Nibiru Has Come and Gone

From <https://www.youtube.com/watch?v=zjD5aayptXk&index=10&list=PLO6v9-euI-fKc-ck9ILUwuYIBGbPnNW_k
Assuredly He works in Mysterious ways!!!
very-interestingBearers of Gobbly Gook
A Way Of Life
2 not bear mention of Gobbly Gook
Baring Eh!!!
That Is To Say
Emperor wears no Cloths!!!
Having some bearing on self’s way of life eh!!!
Not So Mysterious
Apathetic Intel

CHIconfucius12“He who is sincere hits what is right, and apprehends without the exercise of thought”

The master said
“The gentleman understands what is moral. The small man understands what is profitable”
“What the superior man seeks is in himself. What the mean man seeks is in others”

“Shall I tell you what knowledge is?
When you know a thing, to hold that you know it;
And when you do not know a thing, to allow that you do not know it.
This is knowledge.”

“It is only the wisest and the stupidest that cannot change”

“Do not do to others what you would not want for self!
“Recompense injury with justice and recompense kindness with kindness”

571 BC – 479 BC
Jesus Back

“Do unto others what you would have them do unto you”

Negative And Positive

Giving credence to that least apt to be mistaken by sane kind
needing only to be of sane kind to know what is and what is not receptive to a fellow sane kind
Forgiveness A Tyrannical Insertion Masticating All
forgiving self went on to investigate self to find self forever innocent
Due Process
Displaced Persons
Went on to find famine for themselves

Dire Straits
Investment Tip

Elite Success Promiscuous

Smarties And Gullible Equilibrium
masterbateBait Switch
Pragmatic Semantics

4th Wall
Chicken Or Egg Decipher

13-goldenWhat’s IT all about Alfie!!!
The Elephant in the Room

Suspension Of Disbelief

Green Side Up Eh!!!

911 Witnesses Killed
pick-your-knows2Confucius say … or was it I
He assigned to investigate self
Bloody Stupid
If finds self guilty

Confucius Goes Platinum!!!

u-turnWhat’s Going On!!!

Coherence Omnipresence Manifest
One Family
Spirit Of Universal Law

Just Around the Corner!!!