Fast Forward to 2:17 to Hear this Amazingly Sad Story of what the U.K. and Europe have Become. Free Speech is not Hate Speech! Stand up for your Rights!
Fast Forward to 2:17 to Hear this Amazingly Sad Story of what the U.K. and Europe have Become. Free Speech is not Hate Speech! Stand up for your Rights!

I recently re-posted an article that proved beyond any reasonable doubt that Facebook censors it’s users post according to their own liberal socialist values and “community standards” (and by “community” they mean the Socialist collective ideal of community, not the American one.)
Well here is the final nail in the coffin on that issue.
Facebook recently released a statement they will be reversing their position on publishing the photo below due to, and get this, a strongly worded letter from a journalist in Norway?
The Photo, which was taken in 1972 during the Vietnam War shows a young, naked Vietnamese girl fleeing a recent napalm bombing near Saigon, her clothes being just burned off of her from the fire.

So let me get this straight Facebook: (RANT ON)
You WILL publish this photo, which besides showing nudity of a minor, was also used as the rallying cry for the anti-war movement in this country for several years and was posted on picket signs at airports around this country when my FATHER and thousands more American soldiers like him came home from Vietnam and were SPIT on and called terrible names like “baby killer” by worthless, POS stinking hippies…
But you will NOT show this photo:

Which shows hundreds of Americans being senselessly MURDERED and VAPORIZED by islamic terrorist in one of the most horrific attacks on this country since Pearl Harbor?
I think we understand now perfectly, with crystal clear clarity, where your sentiments and political viewpoints stand, Mr. Zuckerberg.
If there was ever a clear-cut mouthpiece and pawn for the Socialist Agenda, Facebook is it.
George Orwell is rolling over in his grave right now.
Wake up Folks.
Stay Alert, Stay Armed and Stay Dangerous!

(click on above link title to be re-directed to source page)
This is not some conspiracy, tin foil hat non-sense folks. This is happening October 1st.
And despite Barney’s people telling us, it is “no big deal”, I can assure you, it is HUGE as it regards Free Speech
I will withhold further comments until October.
Stay Alert, Stay Armed and Say Dangerous!

SECRET FBI RULES allow agents to obtain journalists’ phone records with approval from two internal officials — far less oversight than under normal judicial procedures.
The classified rules, obtained by The Intercept and dating from 2013, govern the FBI’s use of national security letters, which allow the bureau to obtain information about journalists’ calls without going to a judge or informing the news organization being targeted. They have previously been released only in heavily redacted form.
Media advocates said the documents show that the FBI imposes few constraints on itself when it bypasses the requirement to go to court and obtain subpoenas or search warrants before accessing journalists’ information.
The rules stipulate that obtaining a journalist’s records with a national security letter (or NSL) requires the signoff of the FBI’s general counsel and the executive assistant director of the bureau’s National Security Branch, in addition to the regular chain of approval. Generally speaking, there are a variety of FBI officials, including the agents in charge of field offices, who can sign off that an NSL is “relevant” to a national security investigation.
There is an extra step under the rules if the NSL targets a journalist in order “to identify confidential news media sources.” In that case, the general counsel and the executive assistant director must first consult with the assistant attorney general for the Justice Department’s National Security Division.
But if the NSL is trying to identify a leaker by targeting the records of the potential source, and not the journalist, the Justice Department doesn’t need to be involved.
The guidelines also specify that the extra oversight layers do not apply if the journalist is believed to be a spy or is part of a news organization “associated with a foreign intelligence service” or “otherwise acting on behalf of a foreign power.” Unless, again, the purpose is to identify a leak, in which case, the general counsel and executive assistant director must approve the request.
Read the Remainder at The Intercept

RECENT HEADLINES WARN that the government now has greater authority to hack your computers, in and outside the US. Changes to federal criminal court procedures known as Rule 41 are to blame; they vastly expand how and whom the FBI can legally hack. But just like the NSA’s hacking operations, FBI hacking isn’t new. In fact, the bureau has a long history of surreptitiously hacking us, going back two decades.
That history is almost impossible to document, however, because the hacking happens mostly in secret. Search warrants granting permission to hack get issued using vague, obtuse language that hides what’s really happening, and defense attorneys rarely challenge the hacking tools and techniques in court. There’s also no public accounting of how often the government hacks people. Although federal and state judges have to submit a report to Congress tracking the number and nature of wiretap requests they process each year, no similar requirement exists for hacking tools. As a result, little is known about the invasive tools the bureau, and other law enforcement agencies, use or how they use them. But occasionally, tidbits of information do leak out in court cases and news stories.
A look at a few of these cases offers a glimpse at how FBI computer intrusion techniques have developed over the years. Note that the government takes issue with the word “hacking,” since this implies unauthorized access, and the government’s hacking is court-sanctioned. Instead it prefers the terms “remote access searches” and Network Investigative Techniques, or NIT. By whatever name, however, the activity is growing.
The FBI’s first known computer surveillance tool was a traffic sniffer named Carnivore that got installed on network backbones—with the permission of internet service providers. The unfortunately named tool was custom-built to filter and copy metadata and/or the content of communications to and from a surveillance target. The government had already used it about 25 times, beginning in 1998, when the public finally learned about it in 2000 after Earthlink refused to let the FBI install the tool on its network. Earthlink feared the sniffer would give the feds unfettered access to all customer communications. A court battle and congressional hearing ensued, which sparked a fierce and divisive debate, making Carnivore the Apple/FBI case of its day.
Read the Remainder at Wired