Conservative groups and Congressional Members should begin a national public relations/education campaign calling for a federal Balanced Budget Amendment (BBA) through an amendments convention (the second method to amend the Constitution). When 2/3 of states call for a BBA, it can be proposed for final consideration by 3/4 of states. Using the states method to amend the Constitution has not yet been accomplished, but this process has often been successfully used when the Congress initially refused to act (e.g., women’s suffrage & lowering alcohol age). This policy brief will show that this process has many benefits and will allow for a BBA without the otherwise necessary support from two-thirds of both chambers. 18 states already have outstanding petitions, so 16 additional states are required.
There has been much talk on both the national and state levels about tort reform, but there has been much less discussion about the particular policies included under this category. Many recognize that the legal system needs to be reformed but few know how to go about doing this. In fact, a poll conducted in the midst of the healthcare debate found that over 80 percent of people think some form of legal reform is needed.
The Posse Comitatus Act, has been a limitation on the use of military forces in civilian law enforcement operations since the Nineteenth Century. Today, where national defense may hinge on detecting smuggled biological or chemical weapons in small quantities, the continued relevance of this law is at issue.
A few years back we embarked on a journey to answer the question, “how prepared is our society for a large scale catastrophic event, that turns the lights off for an extended period of time?”
The Posse Comitatus Act outlaws willful use of any part of the Army or Air Force to execute the law unless expressly authorized by the Constitution or an Act of Congress. History supplies the grist for an argument that the Constitution prohibits military involvement in civilian affairs subject to only limited alterations by Congress or the President, but the courts do not appear to have ever accepted the argument unless violation of more explicit constitutional command could also be shown.
A poll conducted in the summer of 2012 found that 89 percent of voters consider lawsuit abuse a problem and 83 percent think improvements need to be made to our lawsuit system. While many recognize that the legal system needs to be reformed,few know how to go about doing this.
Plaintiffs BSG Resources (Guinea) Limited, BSG Resources (Guinea)Sarl, and BSG Resources Limited (collectively "plaintiffs" or "BSGR") as and for their complaint ("Complaint" against defendants George Soros ("Soros") and the Open Society Foundations ("OSF")(Collectively "defendants"), hereby allege, on personal knowledge as to themselves and for elements of fraud and belief as to all other matters as follows:
All citizens of the United States who are otherwise qualified by law to vote at any election by the people in any State, Territory, district, county, city, parish, township, school district, municipality, or other territorial subdivision, shall be entitled and allowed to vote at all such elections, without distinction of race, color, or previous condition of servitude; any constitution, law, custom, usage, or regulation of any State or Territory, or by or under its authority, to the contrary notwithstanding.
Advances in technology provide a number of useful products and services that can either enhance or threaten personal privacy, depending on how these products or services are used and for what purpose. These goods raise serious concerns about privacy, which leaves policymakers looking for solutions, especially in the context of online privacy and biometric identification. In an effort to craft solutions to privacy concerns, experts argue that policymakers must exercise caution. Rushed and unconsidered solutions run the risk of limiting consumers and becoming unworkable.
ALEC’s State Budget Reform Toolkit will advance a set of budget and procurement best practices to guide state policymakers as they work to solve the current budget shortfalls. The toolkit will assist legislators in prioritizing and more efficiently delivering core government services through advancing Jeffersonian principles of free markets, limited government, federalism, and individual liberty.
The near simultaneous vehicular bombings of the US Embassies in Nairobi, Kenya, and Dar Es Salaam, Tanzania, on August 7, 1998, were terrorist incidents costing the lives of over 220 persons and wounding more than 4,000 others. Twelve American USG employees and family members, and 32 Kenyan and 8 Tanzanian USG employees, were among those killed. Both chanceries withstood collapse from the bombings, but were rendered unusable, and several adjacent buildings were severely damaged or destroyed. In examining the circumstances of these two bombings, the Accountability Review Boards for Nairobi and Dar Es Salaam determined that:
This is not politics as usual but rather political warfare at an unprecedented level that is openly engaged in the direct targeting of a seated president through manipulation of the news cycle. It must be recognized on its own terms so that immediate action can be taken. At its core, these campaigns run on multiple lines of effort, serve as the non-violent line of effort of a wider movement, and execute political warfare agendas that reflect cultural Marxist outcomes.
This has gotta be bullshit.....
A spectre is haunting Europe -- the spectre of Communism. All the Powers of old Europe have entered into a holy alliance to exorcise this spectre: Pope and Czar, Metternich and Guizot, French Radicals and German police-spies.
On March 23, 1933, the newly elected members of the German Parliament (the Reichstag) met in the Kroll Opera House in Berlin to consider passing Hitler's Enabling Act. It was officially called the 'Law for Removing the Distress of the People and the Reich.' If passed, it would effectively mean the end of democracy in Germany and establish the legal dictatorship of Adolf Hitler
Proposal for a Privacy Protection Guideline on Secret Personal Data Gathering and Transborder Flows of Such Data in the Fight against Terrorism and Serious Crime.
ON APRIL 1st, 1924, I began to serve my sentence of detention in the Fortress of Landsberg am Lech, following the verdict of the Munich People's Court of that time. After years of uninterrupted labour it was now possible for the first time to begin a work which many had asked for and which I myself felt would be profitable for the Movement. So I decided to devote two volumes to a description not only of the aims of our Movement but also of its development.
Cyberspace is a defining feature of modern life. Individuals and communities worldwide connect, socialize, and organize themselves in and through cyberspace. From 2000 to 2010, global Internet usage increased from 360 million to over 2 billion people. As Internet usage continues to expand, cyberspace will become increasingly woven into the fabric of everyday life across the globe. James Madison in Federalist No. 45 explained the idea for the new American government when he wrote, "The powers delegated by the proposed Constitution to the federal government, are few and defined. Those which are to remain in the State governments are numerous and indefinite." Unfortunately, since the time of our nation’s founding, the size and reach of the federal government has grown immeasurably, while the ability of states to solve local problems without federal interference has been limited.
Compare these goals to what our current ruling class, progressives, dems, and some rinos are pushing on us.
Cyberspace is a defining feature of modern life. Individuals and communities worldwide connect, socialize, and organize themselves in and through cyberspace. From 2000 to 2010, global Internet usage increased from 360 million to over 2 billion people. As Internet usage continues to expand, cyberspace will become increasingly woven into the fabric of everyday life across the globe.
The Ancient Plan Of Secret Societies - This book shows how an ancient plan has been hidden for centuries deep within secret societies. This scheme is designed to bring all of mankind under a single world government - a New World Order. This plan is of such antiquity that its result is even mentioned in the Bible - the rule of the Antichrist mentioned in the Revelation of Saint John the Divine.
Francis Fox Piven and Richard Cloward are two Columbia University sociologists from the 1960’ and 1970’s. Wrote the article "The Weight of the Poor: A Strategy to End Poverty". This strategy seeks to hasten the fall of capitalism by overloading the government bureaucracy with a flood of impossible demands.
Lest we forget at least an over-the-shoulder acknowledgment to the very first radical: from all our legends, mythology, and history (and who is to know where mythology leaves off and history begins—or which is which), the first radical known to man who rebelled against the establishment and did it so effectively that he at least won his own kingdom — Lucifer
Threat to America, Israel and the World - The International Solidarity Movement (ISM) is technically a Palestinian-led movement but involves heavy use of American radicals and leftists and exploits the U.S. educational system, particularly American colleges, to delegitimize the democratic State of Israel, a U.S. ally. At the same time, it provides support for groups such as Hamas that use armed violence and terrorism against Israel. The Meir Amit Intelligence and Terrorism Information Center
National security policy in the United States has remained largely constant from the Bush Administration to the Obama Administration. This continuity can be explained by the “double government” theory of 19th-century scholar of the English Constitution Walter Bagehot.