Left in Doubt, Speculations, and Real Questions Under Obama, The Usual Mode of Operation

WASHINGTON, DC - MAY 1:  In this handout image...

Image by Getty Images via @daylife

First of all, this man, Barry Soetero, aka Barack Hussein Obama, is a proven LIAR. Not just your typical Politician with his arsenal of deception techniques that even include wishful thinking promises that could never be promised by a mortal, President of the USA or King of Sheba.

There is NO proof, no evidence, absolutely NOTHING other than this LYING, self gratifying and promoting fool’s word. HIS WORD IS NO GOOD. He has NO credibility, is a slimy chameleon that slips in and out of personalities and values held as the critics and polls fluctuate. His strategy and only goal: STAY IN POWER whatever it takes, however despicable, deceptive and sleazy it may be. And IT IS.. ALL OF IT.

The Truth will come out, it always does, eventually. Bin Laden is Dead, Halle-fucking-loo-yah!! It was bound to happen sooner or later. The man was aging at an accelerated pace due to failing kidneys and his frailty left him virtually impotent as anything other than the poster child for terrorism, and the mastermind of 9-11, which had been forced into the abyss of lost memories by the very man who campaigned and feigned on the tomb. SICK KARMA BITCH. It’s coming your way, and when the truth comes out, PEOPLE, a corrupt charlatan will emerge, making the United States the biggest joke on the map. We’ll come back because the Liberal population will be extinct after this attempt at a world deteriorated by Western Civilization’s demise. You, yourselves to despise.

George W. Bush will be the last of the best, until Allen West. They’ll share the humble light, that rekindles the USA and our values so RIGHT. God Bless America, George W. Bush, and the U.S. Troops.

Enhanced by Zemanta

Video ~ Islam –> The New Nazism

http://vimeo.com/22681921

Islam: The Nazism of Today from Kyle Reese on Vimeo.

FBI — Economic Espionage

The Seal of the United States Federal Bureau o...

Image via Wikipedia

FBI — Economic Espionage

Economic Espionage
Introduction
The Cold War is not over, it has merely moved into a new arena: the global marketplace. The FBI  estimates that every year billions of U.S. dollars are lost to foreign and domestic competitors who deliberately target economic intelligence in flourishing U.S. industries and technologies, and who cull intelligence out of shelved technologies by exploiting open source information and company trade secrets. Foreign competitors who criminally seek economic intelligence generally operate in three ways:
  1. They aggressively target and recruit insiders (often from the same national background) working for U.S. companies and research institutions;
  2. They conduct economic intelligence through operations like bribery, cyber intrusions, theft, dumpster diving (in search of discarded intellectual property or prototypes), and wiretapping; and,
  3. They establish seemingly innocent business relationships between foreign companies and U.S. industries to gather economic intelligence, including trade secrets.
In an effort to safeguard our nation’s economic secrets, the Economic Espionage Act (EEA) was signed into law on October 11, 1996.
How to Protect Your Business from Espionage:  Six Steps
  1. Recognize there is an insider and outsider threat to your company.
  2. Identify and valuate trade secrets.
  3. Implement a proactive plan for safeguarding trade secrets.
  4. Secure physical and electronic versions of your trade secrets.
  5. Confine intellectual knowledge on a “need-to-know” basis.
  6. Provide training to employees about your company’s intellectual property plan and security.
Definitions
Economic Espionage is (1) whoever knowingly performs targeting or acquisition of trade secrets to (2) knowingly benefit any foreign government, foreign instrumentality, or foreign agent. (Title18 U.S.C., Section 1831).
Trade secrets are all forms and types of financial, business, scientific, technical, economic or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically or in writing, which the owner has taken reasonable measures to protect; and has an independent economic value. “Trade secrets” are commonly called classified proprietary information, economic policy information, trade information, proprietary technology, or critical technology.
Theft of trade secrets occurs when someone (1) knowingly performs targeting or acquisition of trade secrets or intends to convert a trade secret to (2) knowingly benefit anyone other than the owner. Commonly referred to as Industrial Espionage. (Title 18 U.S.C., SECTION 1832).
Foreign Agent is any officer, employee, proxy, servant, delegate, or representative of a foreign government.
Foreign Instrumentality is defined as: (1) any agency, bureau, ministry, component, institution, or association; (2) any legal commercial or business organization, corporation, firm, or entity; and, (3) substantially owned, controlled, sponsored, commanded, managed or dominated by a foreign government.
Statutory authority:  The Economic Espionage Act (EEA) of 1996
TERRITORIAL LIMITS: EEA protects against theft that occurs either (1) in the United States, or (2) outside the United States and (3) an act in furtherance of the offense was committed in the United States, or (4) the violator is a US person or organization.
Frequently Asked Questions
What are some methods of targeting or acquiring trade secrets?
1. Steal, conceal, or carry away by fraud, artifice, or deception;
2. Copy, duplicate, sketch, draw, photograph, download, upload, alter, destroy, photocopy, replicate, transmit, deliver, send, mail, communicate, or convey; and, 3. Receive, buy, or possess a trade secret, knowing the same to have been stolen or appropriated, obtained, or converted without authorization.
Does the Economic Espionage Act of 1996 apply if the offender is a foreign person?
Yes.  The Act states that (1) whoever knowingly performs targeting or acquisition of trade secrets to (2) knowingly benefit any one other than the owner. Other elements will apply for prosecution.
Does the Economic Espionage Act of 1996 apply if it occurs outside the United States?
Yes.  However, the violator must be (1) a US person or organization; or (2) an act in furtherance of the offense was committed in the United States.
Are there other statutes that can apply if trade secrets are not classified and therefore cannot be prosecuted under the Economic Espionage Act of 1996 Title 18 U.S.C. Section 1831 and 1832?
Yes.  The following is a list of violations that may apply: mail fraud, wire fraud, interstate transportation of stolen property, export control, and misuse of a computer system. Contact your local FBI for further assistance.
Is the FBI proactive in its approach to economic espionage?
Yes. FBI Director Robert Mueller has designated counterintelligence as the FBI’s number two priority , second only to counterterrorism. The Economic Espionage Unit is dedicated to countering the economic espionage threat to include developing training and outreach materials; participating in conferences; visiting private industry; working with the law enforcement and intelligence community on requirement issues; and providing specific classified and unclassified presentations.
How to Contact Us
To report violations, please contact your local field office or your nearest U.S. embassy or consulate overseas.
Related articles
The New Age of Economic Espionage is now being committed by the most unlikely suspect.
New policies and internal policing must be implemented.  If the POTUS is a criminal breaking laws left
and right while ignoring subpoena requests and other calls for following procedures and rules, what’s a nation
to do?
We’ll find out eventually.  I hope our politicians see a need for legislation to protect us from the ENEMY Within.
Enhanced by Zemanta

Democrats Oversight and Government Reform

In the Trees

Image via Wikipedia

http://democrats.oversight.house.gov/index.php?option=com_content&view=article&id=5306%3Adocuments-for-the-may-24th-hearing-qwhos-watching-the-watchmen-oversight-of-the-cfpbq&catid=133%3Ahearings-tarp&Itemid=68

DOCUMENTS FOR THE MAY 24TH HEARING: “WHO’S WATCHING THE WATCHMEN? OVERSIGHT OF THE CFPB” PDF Print
Documents for the May 24th Hearing: “Who’s Watching the Watchmen? Oversight of the CFPB”

Read Ranking Member Quigley’s Opening Statement

Read Full Committee Ranking Member Cummings’ Opening Statement

Read the Testimony of Elizabeth Warren, Assistant to the President and Special Advisor to the Secretary of the Treasury, Consumer Financial Protection Bureau

Read the Testimony of Adam J. Levitin, Associate Professor of Law, Georgetown University

Read the Testimony of Todd J. Zywicki, Foundation Professor of Law, George Mason University

Read the Testimony of Andrew J. Pincus, Mayer Brown Rowe & Maw LLP

Read the Testimony of David S. Evans, Chairman, Global Economics Group

Enhanced by Zemanta

U.S. to investigate Counterintelligence/economic espionage

Seal of the Office of the Director of National...

Image via Wikipedia

http://www.fbi.gov/about-us/investigate/counterintelligence/economic-espionage

Economic Espionage

Introduction

The Cold War is not over, it has merely moved into a new arena: the global marketplace. The FBI estimates that every year billions of U.S. dollars are lost to foreign and domestic competitors who deliberately target economic intelligence in flourishing U.S. industries and technologies, and who cull intelligence out of shelved technologies by exploiting open source information and company trade secrets. Foreign competitors who criminally seek economic intelligence generally operate in three ways:

They aggressively target and recruit insiders (often from the same national background) working for U.S. companies and research institutions;
They conduct economic intelligence through operations like bribery, cyber intrusions, theft, dumpster diving (in search of discarded intellectual property or prototypes), and wiretapping; and,
They establish seemingly innocent business relationships between foreign companies and U.S. industries to gather economic intelligence, including trade secrets.
In an effort to safeguard our nation’s economic secrets, the Economic Espionage Act (EEA) was signed into law on October 11, 1996.

How to Protect Your Business from Espionage: Six Steps

Recognize there is an insider and outsider threat to your company.
Identify and valuate trade secrets.
Implement a proactive plan for safeguarding trade secrets.
Secure physical and electronic versions of your trade secrets.
Confine intellectual knowledge on a “need-to-know” basis.
Provide training to employees about your company’s intellectual property plan and security.
Definitions

Economic Espionage is (1) whoever knowingly performs targeting or acquisition of trade secrets to (2) knowingly benefit any foreign government, foreign instrumentality, or foreign agent. (Title18 U.S.C., Section 1831).

Trade secrets are all forms and types of financial, business, scientific, technical, economic or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically or in writing, which the owner has taken reasonable measures to protect; and has an independent economic value. “Trade secrets” are commonly called classified proprietary information, economic policy information, trade information, proprietary technology, or critical technology.

Theft of trade secrets occurs when someone (1) knowingly performs targeting or acquisition of trade secrets or intends to convert a trade secret to (2) knowingly benefit anyone other than the owner. Commonly referred to as Industrial Espionage. (Title 18 U.S.C., SECTION 1832).

A Foreign Agent is any officer, employee, proxy, servant, delegate, or representative of a foreign government.

A Foreign Instrumentality is defined as: (1) any agency, bureau, ministry, component, institution, or association; (2) any legal commercial or business organization, corporation, firm, or entity; and, (3) substantially owned, controlled, sponsored, commanded, managed or dominated by a foreign government.

Statutory authority: The Economic Espionage Act (EEA) of 1996

TERRITORIAL LIMITS: EEA protects against theft that occurs either (1) in the United States, or (2) outside the United States and (3) an act in furtherance of the offense was committed in the United States, or (4) the violator is a US person or organization.

Frequently Asked Questions

What are some methods of targeting or acquiring trade secrets?

1. Steal, conceal, or carry away by fraud, artifice, or deception;
2. Copy, duplicate, sketch, draw, photograph, download, upload, alter, destroy, photocopy, replicate, transmit, deliver, send, mail, communicate, or convey; and, 3. Receive, buy, or possess a trade secret, knowing the same to have been stolen or appropriated, obtained, or converted without authorization.

Does the Economic Espionage Act of 1996 apply if the offender is a foreign person?

Yes. The Act states that (1) whoever knowingly performs targeting or acquisition of trade secrets to (2) knowingly benefit any one other than the owner. Other elements will apply for prosecution.

Does the Economic Espionage Act of 1996 apply if it occurs outside the United States?

Yes. However, the violator must be (1) a US person or organization; or (2) an act in furtherance of the offense was committed in the United States.

Are there other statutes that can apply if trade secrets are not classified and therefore cannot be prosecuted under the Economic Espionage Act of 1996 Title 18 U.S.C. Section 1831 and 1832?

Yes. The following is a list of violations that may apply: mail fraud, wire fraud, interstate transportation of stolen property, export control, and misuse of a computer system. Contact your local FBI for further assistance.

Is the FBI proactive in its approach to economic espionage?

Yes. FBI Director Robert Mueller has designated counterintelligence as the FBI’s number two priority , second only to counterterrorism. The Economic Espionage Unit is dedicated to countering the economic espionage threat to include developing training and outreach materials; participating in conferences; visiting private industry; working with the law enforcement and intelligence community on requirement issues; and providing specific classified and unclassified presentations.

How to Contact Us

To report violations, please contact your local field office or your nearest U.S. embassy or consulate overseas.

Counterintelligence Links

Counterintelligence Home

Inside FBI Counterintelligence
– Cases Past and Present
– National Security Branch
– Organizational History in FBI
– Strategic Partnerships

Threats and Intelligence
– 2011 Worldwide Threats Testimony (pdf)
– The Intel-Driven FBI
– Safety Tips for U.S. Students Traveling Abroad

Key Issues
– Counterproliferation
– Economic Espionage
– Weapons of Mass Destruction

Our Partners
– Director of National Intelligence
– National Counterintelligence Executive
– National Counterproliferation Center

Contact Us | About Us | Most Wanted | News | Stats & Services | Scams & Safety | Jobs | Fun & Games
Resources for: Law Enforcement | Intel Partners | Researchers/Students | Communities | Parents | Victims | Businesses
Follow Us On: Facebook | You Tube | Twitter | iTunes
Accessibility | eRulemaking | Freedom of Information Act | Legal Notices | Legal Policies and Disclaimers | Links | Privacy Policy | USA.gov | White House
FBI.gov is an official site of t

Enhanced by Zemanta

Buh Bye Blogger, Blogspot, and the Google Empire of the Dictatorship

Empire StateBuilding From NJ

Image via Wikipedia

A victim of Jesse Lee’s quick acting motivation to wipe out free speech, it’s time to boycott the blogger, blogspot family, as they’re spawned off by Google, and Chrome must join the landfill as well.   My blogs, all under one email were pretty consistent as conservative, yet varied, but extremely loyal to Mr. Obama, his administration and exposing the Truths that contradict the total hoax of a regime out to end the Unites States of America as we knew it.

I’m exhausted from attempting to enter my blogs dashboards, and even posting lints through the add it button.. I had been for the last few days, then whammo, it’s been highjacked.. The password doesn’t work , no many how many times I retry it, and I know all the detai;s and had no problem getting logged on for continued posting.. Well, that’s a  change we never hoped for.. And Whoo-hoo, the Prezidumbo actually does something he says he will.  What a Loser in Chief. Can’t wait for him to fade out and away.

Remember that pesky piece of paper, THE CONSTITUTION!! Ring a bell in that pin hollow head?

I thought so, and now there are more lucky “coincidences” of distraction.. They’re piling up, stacking into a pile as high as the Empire State Building.  The work I have to do is extensive, as I gathered a bunch of awesome information.  I refuse to let it all go, I hope others agree, We need to oust the dude with a drive-through degree.  It means nothing, obviously, and has been nothing but detrimental to the American people, hopefully to your demise.

Enhanced by Zemanta