The 'New World Order'
 
Digital ID Or Digital Prison
Home Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 God's Plan
The New World Order
It's An Evil And Sinister Conspiracy That Involves Very Rich And Powerful People Who Mastermind Events And Control World Affairs Through Governments And Corporations And Are Plotting Mass Population Reduction And The Emergence Of A Totalitarian World Government!   By Using Occult Secret Societies The ILLUMINATI Will Bring All Of The Nations Of This World Together As One.   We'll Have No Recourse But To Submit And Be Under Their Control Utilizing Their Digital Central Bank Currency Or To Reject This Ill-Fated Digital Identification.   The Goal Is UN Agenda 2030!   This Is The Beginning Of The End!
Rockefeller Admitted Elite Goal Of Microchipped Population
 
Hollywood director Russo goes in-depth for first time on the astounding admissions of Nick Rockefeller, including his prediction of 9/11 and the war on terror hoax, the Rockefeller's creation of women's lib, and the elite's ultimate plan for world population reduction and a microchipped society 


Paul Joseph Watson
 
Monday, January 29, 2007
Hollywood director and documentary film maker Aaron Russo has gone in-depth on the astounding admissions of Nick Rockefeller, who personally told him that the elite's ultimate goal was to create a microchipped population and that the war on terror was a hoax, Rockefeller having predicted an "event" that would trigger the invasions of Iraq and Afghanistan eleven months before 9/11.
Rockefeller also told Russo that his family's foundation had created and bankrolled the women's liberation movement in order to destroy the family and that population reduction was a fundamental aim of the global elite.
Russo is perhaps best known for producing Trading Places starring Eddie Murphy but was more recently in the spotlight for his exposé of the criminal run for profit federal reserve system, the documentary America From Freedom to Fascism. 
Currently undergoing more treatment in his fight against cancer, Russo made time for a sit down interview with radio host and fellow documentary film maker Alex Jones in which he dropped bombshell after bombshell on what Rockefeller had told him about the direction the world was being steered towards by the global elite. See Video Rockefeller Admitted Elite Goal Of Microchipped Population.
After his popular video Mad As Hell was released and he began his campaign to become Governor of Nevada, Russo was noticed by Rockefeller and introduced to him by a female attorney. Seeing Russo's passion and ability to affect change, Rockefeller set about on a subtle mission to recruit Russo into the elite.
During one conversation, Rockefeller asked Russo if he was interested in joining the Council on Foreign Relations (CFR) but Russo rejected the invitation, saying he had no interest in "enslaving the people" to which Rockefeller coldly questioned why he cared about the "serfs."
"I used to say to him what's the point of all this," states Russo, "you have all the money in the world you need, you have all the power you need, what's the point, what's the end goal?" to which Rockefeller replied (paraphrasing), "The end goal is to get everybody chipped, to control the whole society, to have the bankers and the elite people control the world."
Rockefeller even assured Russo that if he joined the elite his chip would be specially marked so as to avoid undue inspection by the authorities.
Russo states that Rockefeller told him, "Eleven months before 9/11 happened there was going to be an event and out of that event we were going to invade Afghanistan to run pipelines through the Caspian sea, we were going to invade Iraq to take over the oil fields and establish a base in the Middle East, and we'd go after Chavez in Venezuela."
Rockefeller also told Russo that he would see soldiers looking in caves in Afghanistan and Pakistan for Osama bin Laden and that there would be an "Endless war on terror where there's no real enemy and the whole thing is a giant hoax," so that "the government could take over the American people," according to Russo, who said that Rockefeller was cynically laughing and joking as he made the astounding prediction.
In a later conversation, Rockefeller asked Russo what he thought women's liberation was about. Russo's response that he thought it was about the right to work and receive equal pay as men, just as they had won the right to vote, caused Rockefeller to laughingly retort, "You're an idiot! Let me tell you what that was about, we the Rockefeller's funded that, we funded women's lib, we're the one's who got all of the newspapers and television - the Rockefeller Foundation."
Rockefeller told Russo of two primary reasons why the elite bankrolled women's lib, one because before women's lib the bankers couldn't tax half the population and two because it allowed them to get children in school at an earlier age, enabling them to be indoctrinated into accepting the state as the primary family, breaking up the traditional family model.
This revelation dovetails previous admissions on behalf of feminist pioneer Gloria Steinem that the CIA bankrolled Ms. Magazine as part of the same agenda of breaking up traditional family models.
Rockefeller was often keen to stress his idea that "the people have to be ruled" by an elite and that one of the tools of such power was population reduction, that there were "too many people in the world," and world population numbers should be reduced by at least half.








New World Order

USA PATRIOT Act

 

Introduction

The clumsily-titled Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act, or USAPA) introduced a plethora of legislative changes which significantly increased the surveillance and investigative powers of law enforcement agencies in the United States. The Act did not, however, provide for the system of checks and balances that traditionally safeguards civil liberties in the face of such legislation.
Legislative proposals in response to the terrorist attacks of September 11, 2001 were introduced less than a week after the attacks. President Bush signed the final bill, the USA PATRIOT Act, into law on October 26, 2001. Though the Act made significant amendments to over 15 important statutes, it was introduced with great haste and passed with little debate, and without a House, Senate, or conference report. As a result, it lacks background legislative history that often retrospectively provides necessary statutory interpretation.
The Act was a compromise version of the Anti-Terrorism Act of 2001 (ATA), a far-reaching legislative package intended to strengthen the nation's defense against terrorism. The ATA contained several provisions vastly expanding the authority of law enforcement and intelligence agencies to monitor private communications and access personal information. The final legislation included a few beneficial additions from the Administration's initial proposal: most notably, a so-called sunset provision (which provides that several sections of the act automatically expire after a certain period of time, unless they are explicitly renewed by Congress) on some of the electronic surveillance provisions, and an amendment providing judicial oversight of law enforcement's use of the FBI's Carnivore system.
However, the USA PATRIOT Act retains provisions appreciably expanding government investigative authority, especially with respect to the Internet. Those provisions address issues that are complex and implicate fundamental constitutional protections of individual liberty, including the appropriate procedures for interception of information transmitted over the Internet and other rapidly evolving technologies.

History

One of the most striking features of the USA PATRIOT Act is the lack of debate surrounding its introduction. Many of the provisions of the Act relating to electronic surveillance were proposed before September 11th, and were subject to much criticism and debate. John Podesta, White House Chief of Staff from 1998 - 2001, has questioned what has changed since then.
The events of September 11 convinced ... overwhelming majorities in Congress that law enforcement and national security officials need new legal tools to fight terrorism. But we should not forget what gave rise to the original opposition - many aspects of the bill increase the opportunity for law enforcement and the intelligence community to return to an era where they monitored and sometimes harassed individuals who were merely exercising their First Amendment rights. Nothing that occurred on September 11 mandates that we return to such an era.
- John Podesta, USA Patriot Act - The Good, the Bad, and the Sunset (Winter, 2002)
When the legislative proposals were introduced by the Bush administration in the aftermath of September 11th, Attorney General John Ashcroft gave Congress one week in which to pass the bill -- without changes. Vermont Democrat Patrick Leahy, chairman of the Senate Judiciary Committee, managed to convince the Justice Department to agree to some changes, and members of the House began to make significant improvements. However, the Attorney General warned that further terrorist acts were imminent, and that Congress could be to blame for such attacks if it failed to pass the bill immediately.
Extensive and hurried negotiation in the Senate resulted in a bipartisan bill, stripped of many of the concessions won by Sen. Leahy. Senator Thomas Daschle, the majority leader, sought unanimous consent to pass the proposal without debate or amendment; Senator Russ Feingold was the only member to object.
Minor changes were made in the House, which passed the bill 357 to 66. The Senate and House versions were quickly reconciled, and the Act was signed into law on October 26, 2001.

Overview

The USA PATRIOT Act introduced sweeping changes to U.S. law, including amendments to:

Russ Feingold, the only Senator to oppose the Act, was particularly concerned with the effects the Act might have on the civil liberties of immigrants. Feingold expressed his concern and certainty that the enhanced authority to profile and engage in electronic surveillance would be disproportionately wielded:
Now here is where my caution in the aftermath of the terrorist attacks and my concerns over the reach of the anti-terrorism bill come together. To the extent that the expansive new immigration powers that the bill grants to the Attorney General are subject to abuse, who do we think that is most likely to bear the brunt of the abuse? It won't be immigrants from Ireland. It won't be immigrants from El Salvador or Nicaragua. It won't even be immigrants from Haiti or Africa. It will be immigrants from Arab, Muslim and South Asian countries. In the wake of these terrible events out government has been given vast new powers and they may fall most heavily on a minority of our population who already feel particularly acutely the pain of this disaster.
- Senator Russ Feingold, Statement on the Anti-Terrorism Bill (Oct. 25, 2002)
The implications for online privacy are considerable. For example, the Act increases the ability of law enforcement agencies to authorize installation of pen registers and trap and trace devices (a pen register collects the outgoing phone numbers placed from a specific telephone line; a trap and trace device captures the incoming numbers placed to a specific phone line -- a caller-id box is a trap and trace device), and to authorize the installation of such devices to record all computer routing, addressing, and signaling information. The Act also extends the government's ability to gain access to personal financial information and student information without any suspicion of wrongdoing, simply by certifying that the information likely to be obtained is relevant to an ongoing criminal investigation.

Surveillance and Privacy Laws Affected

The USA PATRIOT Act significantly expanded law enforcement authority to surveill and capture communications. There are three major laws that create the framework for the government interception of communications:
  • Title III: Requires probable cause, a high legal standard to meet, from a judge for real-time interception of the content of voice and data communications. See EPIC's Wiretapping Page.
  • Electronic Communications Privacy Act (ECPA): Governs government access to stored email and other electronic communications. Within ECPA, the Pen Register statute governs real time interception of "numbers dialed or otherwise transmitted on the telephone line to which such device is attached." Although the use of such devices requires a court order, it does not require probable cause: there is no judicial discretion, and the court must authorize the surveillance upon government certification. A government attorney need only certify to the court that the "information likely to be obtained by such installation and use is relevant to an ongoing criminal investigation." Therefore, the Pen Register and Trap and Trace statute lacks many of the privacy protections found in the wiretap statute.
  • Foreign Intelligence Surveillance Act (FISA): Authorizes the government to carry out electronic surveillance -- against any person, even Americans -- in the United States upon obtaining a judicial order based upon probable cause that the target is a foreign power or an agent of a foreign power. FISA, which applies primarily to the government's power in foreign intelligence and counter-intelligence cases, therefore does not offer many of the protections required under the federal wiretap statute. See EPIC's FISA Page.
Title III governs the "contents" of communications, defined as "any information concerning the substance, purport, or meaning of that communication." The Supreme Court has held that the contents of a communication are entitled to full Fourth Amendment protection. Therefore, the government's access to "content" information is limited by constitutionally imposed search and seizure requirements. In order to abide by these constitutional restrictions, Title III imposes strict limitations upon the government's ability to obtain communication content:
  • a law enforcement agency may intercept content only pursuant to a court order issued upon findings of probable cause to believe that
    1. an individual is committing one of a list of specifically enumerated crimes,
    2. communications concerning the specified offense will be intercepted, and
    3. "the pertinent facilities are commonly used by the alleged offender or are being used in connection with the offense."
  • Only designated officials can authorize such interception,
  • The interception is authorized for a limited time period.
  • Interception is subject to a statutory exclusionary rule: any information intercepted in violation of the wiretap statute cannot be admitted into evidence in any judicial or administrative proceeding.
Conversely, the Supreme Court has held that there is no constitutionally recognized privacy interest in the telephone numbers intercepted by a pen register or trap and trace device. In U.S. v. New York Telephone Co., 434 U.S. 159 (1977), the Supreme Court emphasized the limited information captured by pen register devices: "neither the purport of any communication between the caller and the recipient of the call, their identities, nor whether the call was even completed is disclosed by pen registers." This is reflected in the ease with which law enforcement officers are able to obtain trap and trace/pen register installation: upon the certification by an attorney that pen register information is likely to be relevant, the judge must approve the installation of the device.

Analysis of Specific USA PATRIOT Act Provisions

Pen Registers, the Internet and Carnivore

Prior to the passage of the USA PATRIOT Act, the statute authorizing the use of "pen register" and "trap and trace" devices governed real time interception of "numbers dialed or otherwise transmitted on the telephone line to which such device is attached." Although the use of such devices requires a court order, it does not require a showing of probable cause. There is, in effect, no judicial discretion, as the court is required to authorize monitoring upon the mere certification by a government attorney that the "information likely to be obtained by such installation and use is relevant to an ongoing criminal investigation." Therefore, such procedures lack almost all of the significant privacy protections found in Title III, the statute governing the interception of the actual "content" of a communication (e.g., a phone conversation or the text of an e-mail message).
Section 216 of the Act significantly expanded law enforcement authority to use trap and trace and pen register devices. Prior law relating to the use of such devices was written to apply to the telephone industry, therefore the language of the statute referred only to the collection of "numbers dialed" on a "telephone line" and the "originating number" of a telephone call. The new legislation redefined a pen register as "a device or process which records or decodes dialing, routing, addressing, or signaling information transmitted by an instrument or facility from which a wire or electronic communication is transmitted." A trap and trace device is now "a device or process which captures the incoming electronic or other impulses which identify the originating number or other dialing, routing, addressing, and signaling information reasonably likely to identify the source or a wire or electronic communication."
By expanding the nature of the information that can be captured, the new law clearly expanded pen register capacities to the Internet, covering electronic mail, Web surfing, and all other forms of electronic communications. The full impact of this expansion of coverage is difficult to assess, as the statutory definitions are vague with respect to the types of information that can be captured and are subject to broad interpretations. The fact that the provision prohibits the capture of "content" does not adequately take into account the unique nature of information captured electronically, which contains data far more revealing than phone numbers, such as URLs generated while using the Web (which often contain a great deal of information that cannot in any way be analogized to a telephone number). Although the FBI, prior to the enactment of the USA PATRIOT Act, compared telephone calls to Internet communications to justify invocation of the existing pen register statute to authorize the use of its controversial Carnivore system, whether the law as then written in fact granted such authority remained an open and debatable question. The amendment made by Section 216 codified the FBI's questionable interpretation of the pen register statute, thereby closing the door to fully informed and deliberate consideration of this complex issue.
When the FBI's use of Carnivore was first revealed in July 2000, there was a great deal of concern expressed by members of Congress, who stated their intent to examine the issues and draft appropriate legislation. To facilitate that process, former Attorney General Reno announced that issues surrounding Carnivore would be considered by a Justice Department review panel and that its recommendations would be made public. That promised report had not been released when Ms. Reno left office, and Attorney General Ashcroft announced that a high-level Department official would complete the review process. That review, however, was not completed prior to September 11, 2001. As a result of the delay, Congress did not have the benefit of the promised findings and recommendations when it enacted the USA PATRIOT Act. Because Carnivore provides the FBI with access to the communications of all subscribers of a monitored Internet Service Provider (and not just those of the court-designated target), it raises substantial privacy issues for millions of law-abiding American citizens.
The USA PATRIOT does contain a provision requiring law enforcement to file under seal with the court a record of installations of pen register/trap and trace devices. This amendment may provide some measure of judicial oversight of the use of this enhanced surveillance authority.

Addition of Terrorism and Computer Crimes as Predicate Offenses Permitting Interception of Communications Under the Wiretap Act

Section 201 added crimes of terrorism or production/dissemination of chemical weapons as predicate offenses under Title III, suspicion of which enable the government to obtain a wiretap of a party's communications. Because the government already had substantial authority under FISA to obtain a wiretap of a suspected terrorist, the real effect of this amendment is to permit wiretapping of a United States person suspected of domestic terrorism.
Section 202 added "a felony violation of section 1030 (relating to computer fraud and abuse)" as a crime providing the predicate for a Title III wiretap application. Felony offenses under Section 1030 are: intentional, unauthorized access to a protected government computer to obtain and communicate classified information for clandestine foreign "with reason to believe that such information so obtained could be used to the injury of the United States or to the advantage of any foreign nation"; access to a protected computer causing more than $5000 damage; access to a protected computer with the intent to extort; or any second offense.
Neither Section 201 nor Section 202 changes the definition of communications subject to intercept, or the standard that the government must reach in order to obtain an intercept.

Expanded Dissemination of Information Obtained in Criminal Investigations

Section 203 amended the Federal Rules of Criminal Procedure to permit disclosures of "matters occurring before the grand jury" when the matters "involve foreign intelligence or counterintelligence" to "any Federal law enforcement, intelligence, protective, immigration, national defense, or national security official in order to assist the official receiving that information in the performance of his official duties." Rule 6(e)(3)(c) governs the permissive disclosure and use of information revealed in a grand jury proceeding, which prior to the enactment of the USA PATRIOT Act could be disclosed only when directed by a court in connection with a judicial proceeding; when permitted by a court upon the request of the defendant or upon a showing that the information discloses a violation of a state criminal law; or when disclosed by the prosecutor to another grand jury. The new law requires that a disclosure made under the new exception be revealed, under seal, to the court. The term "foreign intelligence information" is defined as information that "relates to the ability of the United States to protect against" an actual or potential attack, hostile act, sabotage, international terrorism, or clandestine intelligence activities conducted by a foreign power or its agent, as well as information relating to the national defense, security, or conduct of foreign affairs of the United States.
Section 203 also amended 18 U.S.C. 2517, which governs the permissive disclosure and use of intercepted communications. Under the new law, intercepted information related to "foreign intelligence or counterintelligence" can be disclosed to "any Federal law enforcement, intelligence, protective, immigration, national defense, or national security official" to the extent that "such disclosure is appropriate to the proper performance of the official duties of the officer making or receiving the disclosure," and the information can be used by any officer properly in possession of the information to assist "in the performance of his official duties."
Section 203, as codified, was an improvement from the equivalent amendment initially proposed by the Administration in the ATA. The ATA would have permitted broad disclosure of sensitive information gathered by law enforcement agencies with any employee of the executive branch, including the intercepts of telephone conversations, without any safeguards regarding the future use or dissemination of such information. The USA PATRIOT Act amendments limit the use of the information to a proper investigation (subject to legal sanctions as defined by Section 223 upon misuse or misdisclosure of the information). However, while such sharing may be appropriate in the case of international terrorism investigations, the limitation permitting sharing only of "foreign intelligence information" is insufficient to limit disclosure to information relating to investigations of terrorist activities.

Interception of "Computer Trespasser" Communications

Prior law prohibited anyone from intentionally intercepting or disclosing the contents of any intercepted communications without complying with the requirements of the wiretap statute, unless such interception and disclosure fell within one of several statutory exceptions. The USA PATRIOT Act, Section 217, creates a new exception, permitting government interception of the "communications of a computer trespasser" if the owner or operator of a "protected computer" authorizes the interception. The new exception has broad implications, given that a "protected computer" includes any "which is used in interstate or foreign commerce or communication" (which, with the Internet, includes effectively any computer). The "authorization" assistance permits wiretapping of the intruder's communications without any judicial oversight, in contrast to most federal communication-intercept laws that require objective oversight from someone outside the investigative chain.
The new law places the determination solely in the hands of law enforcement and the system owner or operator. In those likely instances in which the interception does not result in prosecution, the target of the interception will never have an opportunity to challenge the activity (through a suppression proceeding). Indeed, such targets would never even have notice of the fact that their communications were subject to warrantless interception. However, the USA PATRIOT Act does include an exception prohibiting surveillance of someone who is known by the owner of the protected computer "to have an existing contractual relationship with the owner or operator of the protected computer for access to all or part of the protected computer." The ATA, which did not contain such an exception, was so vague that the provision could have been applied to users downloading copyrighted materials off the Web. However, even with this fix, the amendment has little, if anything, to do with legitimate investigations of terrorism.

New Treatment of Voice-Mail Messages

Section 204 amended Title III and the Stored Communications Access Act so that stored voice-mail communications, like e-mail, may be obtained by the government through a search warrant rather than through more stringent wiretap orders. Section 204 also brings voice mail under the authority of Section 209, which permits nationwide search warrants. Messages stored on an answering machine tape remain outside the scope of either statute.

Application of Cable Companies to Electronic Surveillance

Section 211 amended Title III to provide that where a cable company provides telephone or Internet services, it must comply with the laws governing interception and disclosure of communications by other telephone companies or ISPs. This subjects cable companies acting in this capacity to 18 U.S.C. chapters 119 (Title III), 121, and 206, laws governing the interception and disclosure of real time wire, oral or electronic communications, pen register/trap and trace information, and stored communications. The new law supercedes the original provisions of the Cable Act relating to obligatory and voluntary disclosure of subscriber information, although the amendment would provide an exemption for "customer cable television viewing activity" (an undefined term, but one meant to address what channels are watched by the customer). However, the stringent privacy protections prohibiting release of customer information to non-governmental entities absent customer consent are left in place.

Nationwide Application of Surveillance Orders and Search Warrants

Prior to the passage of the USA PATRIOT Act, the laws relating to both wiretaps and pen register/trap and trace devices authorized execution of a court order only within the geographic jurisdiction of the issuing court. The Act (sections 216 and 219) expands the jurisdictional authority of a court to authorize the installation of a surveillance device anywhere in the United States. The availability of nationwide orders for the interception and collection of electronic evidence would remove an important legal safeguard by making it more difficult for a distant service provider to appear before the issuing court and object to legal or procedural defects. Indeed, it has become increasingly common for service providers to seek clarification from issuing courts when, in the face of rapidly evolving technological changes, many issues involving the privacy rights of their subscribers require careful judicial consideration. The burden would be particularly acute for smaller providers -- precisely those, for instance, who are most likely (according to the FBI) to be served with orders requiring the installation of the Carnivore system.
Section 219 amends the Federal Rules of Criminal Procedure to expand the jurisdictional authority of a court to authorize search warrants outside of the judicial district in an investigation of domestic or international terrorism. Although permitting nationwide application of search warrants creates the same problem as expanding the scope of surveillance orders -- making it harder for those served by such warrants to object to legal or procedural defects -- this provision, because it applies only to investigations of domestic or international terrorism, was more narrowly tailored to apply only to the anti-terrorism investigations.

Authority to Conduct Secret Searches ("Sneak and Peek")

Section 213 eliminates the prior requirement that law enforcement provide a person subject to a search warrant with contemporaneous notice of the search. The new "secret search" provision applies where the court "finds reasonable cause to believe that providing immediate notification of the execution of the warrant may have an adverse effect." Although the Administration's "Field Guidance on New Authorities Enacted in the 2001 Anti-Terrorism Legislation" states that the new authority "is primarily designed to authorize delayed notice of searches," the amendment permits seizure of any tangible property or communications where the court finds "reasonable necessity" for this seizure. The law requires that notice be given within a "reasonable period," which can be extended by the court for "good cause." "Reasonable period" is undefined, and the Administration's Field Guidance advises that this is a "flexible standard."
This significant change in the law applies to all government searches for material that "constitutes evidence of a criminal offense in violation of the laws of the United States" and is not limited to investigations of terrorist activity. Prior law authorized delayed notification of a search only under a very small number of circumstances (such as surreptitious electronic surveillance). The expansion of this extraordinary authority to all searches constitutes a radical departure from Fourth Amendment standards and could result in routine surreptitious entries by law enforcement agents.

Expanded Scope of Subpoenas for Records of Electronic Communications

Under prior law, law enforcement could use a subpoena to obtain "the name, address, local and long distance telephone toll billing records, telephone number or other subscriber number or identity, and length of service or a subscriber to or customer of such service and the type of services the subscriber or customer utilized" from an internet service provider. Section 210 expands the type of information that a provider must disclose to law enforcement to include, among other things, records of session times and duration; any temporarily assigned network address; and any means or source of payment. This heightened authority to use subpoenas (rather than court orders) for a broader (and more revealing) class of information is not be limited to investigations of suspected terrorist activity.

Lowered Standard for Foreign Intelligence Surveillance

Section 218 expands the application of FISA to those situations where foreign intelligence gathering is merely "a significant" purpose of the investigation, rather than, as prior FISA law provided, the sole or primary purpose. "Significant" is not defined, and this vagueness could lead to inconsistent determinations and potential overuse of the FISA standards. The more lenient standards that the government must meet under FISA (as opposed to the stringent requirements of Title III) are justified by the fact that FISA's provisions facilitate the collection of foreign intelligence information, not criminal evidence. This traditional justification is eliminated where the lax FISA provisions are applicable, at least in part, to the interception of information relating to a domestic criminal investigation. The change seriously alters the delicate constitutional balance reflected in the prior legal regime governing electronic surveillance.

Multi-Point ("Roving Wiretap") Authority

Section 206 expands FISA to permit "roving wiretap" authority, which allows the interception of any communications made to or by an intelligence target without specifying the particular telephone line, computer or other facility to be monitored. Prior law required third parties (such as common carriers and others) "specified in court-ordered surveillance" to provide assistance necessary to accomplish the surveillance. The amendment extends that obligation to unnamed and unspecified third parties.
Such "generic" orders could have a significant impact on the privacy rights of large numbers of innocent users, particularly those who access the Internet through public facilities such as libraries, university computer labs and cybercafes. Upon the suspicion that an intelligence target might use such a facility, the FBI can now monitor all communications transmitted at the facility. The problem is exacerbated by the fact that the recipient of the assistance order (for instance, a library) would be prohibited from disclosing the fact that monitoring is occurring.
The "generic" roving wiretap orders raise significant constitutional issues, as they do not comport with the Fourth Amendment's requirement that any search warrant "particularly describe the place to be searched." That deficiency becomes even more significant where the private communications of law-abiding American citizens might be intercepted incidentally.

Liberalized Use of Pen Register/Trap and Trace Devices under FISA

Section 214 removes the pre-existing statutory requirement that the government prove the surveillance target is "an agent of a foreign power" before obtaining a pen register/trap and trace order under the FISA. Therefore, the government could obtain a pen register/trap and trace device "for any investigation to gather foreign intelligence information," without a showing that the device has, is or will be used by a foreign agent or by an individual engaged in international terrorism or clandestine intelligence activities. The amendment significantly eviscerates the constitutional rationale for the relatively lax requirements that apply to foreign intelligence surveillance. That laxity is premised on the assumption that the Executive Branch, in pursuit of its national security responsibilities to monitor the activities of foreign powers and their agents, should not be unduly restrained by Congress and the courts. The removal of the "foreign power" predicate for pen register/trap and trace surveillance upsets that delicate balance.
However, The USA PATRIOT Act includes a provision prohibiting use of FISA pen register surveillance under any circumstances against a United States citizen where the investigation is conducted "solely on the basis of activities protected by the First Amendment." This exemption was not contained within the ATA, and limits to some extent the potential overreach of this expanded authority.

Access to "Any Tangible Things"

Section 215 grants the FBI the authority to request an order "requiring the production of any tangible things (including books, records, papers, documents, and other items)" relevant to an investigation of international terrorism or clandestine intelligence activities. Although the amendment is entitled "Access to Certain Business Records for Foreign Intelligence and International Terrorism Investigations," the scope of the authority is far broader and applies to any records relevant to the individual. This amendment, which overrides state library confidentiality laws, permits the FBI to compel production of business records, medical records, educational records and library records without a showing of "probable cause" (the existence of specific facts to support the belief that a crime has been committed or that the items sought are evidence of a crime). Instead, the government only needs to claim that the records may be related to an ongoing investigation related to terrorism or intelligence activities. Individuals served with a search warrant issued under FISA rules may not disclose, under penalty of law, the existance of the warrant or the facts that records were provided to the government. The final version of this provision contains an important clause -- which was not in the Administration's original bill -- restricting the potential misuse of the law. Although the USA PATRIOT Act deleted the requirement that any records requested pertain to an agent of a foreign power (or a foreign power), the Act prohibits investigation of a United States person solely on the basis of activities protected by the First Amendment. A second change from the ATA was the infusion of judicial involvement into the process. The ATA's proposed amendment would have allowed access to such records under a subpoena issued by investigators. The USA PATRIOT Act retains the requirement of pre-existing law, permitting access to records only upon court order.

Sunset Provision

The USA PATRIOT Act contains a sunset provision, terminating several of the amendments enhancing electronic surveillance authority on December 31, 2005. Because the law gives government much increased surveillance capability, a sunset is crucial to determine how well the tools work, how effective they havebeen, and how responsibly they have been applied. Of the provisions outlined above, the sunset provision does not apply to the expansion of pen register/trap and trace authority to the Internet; authority to share grand jury information; expansion of law enforcement authority over cable providers; expanded scope of subpoenas for electronic evidence; authority for delaying notice of the execution of a warrant; and expansion of jurisdictional authority of search warrants for terrorism investigations.

Additional Amendments Providing Government the Authority to Combat Terrorism

Section 205 of the Act provides for increased employment of translators by the FBI and designated five more judges to sit on the FISA Court (raising the number from seven to eleven seats on the court). These provisions are intended to increase the human intelligence capacities of the FBI and to provide additional judicial oversight of the enhanced FISA authority. Both amendments are commendable in their efforts to aid the government in preventing terrorist acts while maintaining a system checking intrusion onto citizens' civil liberties. In addition, Section 223 provides civil liability for unauthorized disclosure of information obtained through surveillance, which serves to limit misuse of communications captured through lawful surveillance.

Amendments to Immigration Laws

The Act contains significant amendments to immigration and other laws. These sections are not discussed here. For further information on such provisions, see:
  • The ACLU's analysis of the immigration provisions
  • The Lawyers Committee for Human Rights, analysis of the USA PATRIOT Act Immigration Provisions (Oct. 26, 2001)

Patriot Act  Text of the Patriot Act (PDF file)

Source     epic.org/privacy/terrorism/usapatriot/default.html#analysis




New World Order

TOTALITARIANISM AND WORLD WAR III


February 2009
"Some of the biggest men in the United States, in the field of commerce and manufacture, are afraid of somebody, are afraid of something. They know that there is a power some- where so organized, so subtle, so watchful, so interlocked, so complete, so pervasive, that they had better not speak above their breath when they speak in condemnation of it."
President Woodrow Wilson, The New Freedom, 1918 [1]
"An understanding of the forces that shaped the events of past centuries is predicated not on facts to be learned, but rather on secrets to be discovered." Author unknown.
"The idea gleaming and dancing before ones eyes like a will-of-the wisp at last frames itself into a plan. Why should we not form a secret society with but one object, the furtherance of the British Empire, and the bringing of the whole uncivilised world under British rule, for the recovery of the United States, for the making the Anglo-Saxon race but one Empire."
Cecil Rhodes: Confession of Faith, 1877, (punctuation added) [2]

"The Trilateral Commission is international. . . . It is intended to be the vehicle for multi- national consolidation of the commercial and banking interests by seizing control of the political government of the United States."
Senator Barry Goldwater, With No Apologies, 1979. [3]

We live in a wonderful country, but it is changing. Have you ever wondered why the United States is changing? Is someone, or some group, responsible for the growing Federal effort to monitor and control the American people? Should we be concerned that:

- Social Security numbers are used to identify and track American citizens.
- The Defense Department (DARPA), the FBI, and National Security Agency (NSA) maintain dossiers on American citizens.
- Companies maintain an electronic record of every item purchased with credit cards and grocery cards.
- Telephone companies maintain permanent records of every fax, cell and telephone call that is made.
- The National Security Agency (NSA) monitors every fax, e-mail, and telephone call through Project Echelon.
- When you use a cell phone, government agencies can determine your location and monitor your conversation.
- Some cell phones contain a remote-activated switch that lets government agencies monitor conversations when the cell phone is turned off.
- Google keeps a record of every Internet site you visit.
- Many new automobiles are equipped with a GPS device that tracks your location, and where you have been.
- Some cars have electronic devices that facilitate their use of toll roads and toll bridges.
- Video cameras are being installed in banks, stores, schools, offices, hallways, government buildings, parking lots, at intersections, and on highways to monitor American citizens.
- U.S. military satellites monitor activity in the United States.
- Government bureaucrats want Americans to carry an ID card.
- New U.S. passports contain an RFID chip.
- Every farm animal must have an RFID chip or other type of identification.
- Most cats and dogs have been chipped.
- International and domestic shipments are tracked via RFID.
- Government bureaucrats want to "chip" every U.S. citizen.
- Recent Privacy Legislation permits government surveillance of medical records.
- Congress appropriated $82 million to refurbish the World War II Japanese concentration camps.
- Congress appropriated $385 million to build concentration camps in the United States.
- Recent legislation permits the President to mobilize the National Guard, and use the units to control American citizens.
- The Posse Comitatus Act prevents the use of army units against American citizens, but President Bush said he didn't have to obey that law. [4]
Why are these things happening? Does someone, or some group, want to establish a dictatorship in the United States? Could the U.S. government become a totalitarian regime?
The Encyclopedia Americana (1966) describes "totalitarianism" as:

". . . a highly centralized form of government, controlled by a despot or clique, which admits of no political opposition and seeks to regulate all aspects of the citizen's life. White's Political Dictionary (New York, 1947) defines a totalitarian government as one which 'interferes with, affects and regulates every aspect of the life of the individual' . . . . 'A reaction against parliamentarianism . . . in favour of a "totalitarian" or unitary state, whether Fascist or Communist.' Fascist Italy, Nazi Germany, and Communist Russia are typical totalitarian regimes." [5]
Why is America changing? Why is every level of government restricting our freedom? What does the future hold?
Ninety-five years ago my grandfather told my father there was a secret cabal that controlled our nation. Was there a secret cabal at that time? Does it exist today?
Ninety years ago President Woodrow Wilson recognized the danger, and wrote:

"Since I entered politics, I have chiefly had men's views confided to me privately. Some of the biggest men in the United States, in the field of commerce and manufacture, are afraid of somebody, are afraid of something. They know that there is a power somewhere so organized, so subtle, so watchful, so interlocked, so complete, so pervasive, that they had better not speak above their breath when they speak in condemnation of it. They know that America is not a place of which it can be said, as it used to be, that a man may choose his own calling and pursue it just as far as his abilities enable him to pursue it; because to-day, if he enters certain fields, there are organizations which will use means against him that will prevent his building up a business which they do not want to have built up; organizations that will see to it that the ground is cut from under him and the markets shut against him. . . .
American industry is not free, as once it was free; American enterprise is not free; the man with only a little capital is finding it harder to get into the field, more and more impossible to compete with the big fellow. Why? Because the laws of this country do not prevent the strong from crushing the weak. That is the reason, and because the strong have crushed the weak the strong dominate the industry and the economic life of this country." [6]
What were "some of the biggest men in the United States" afraid of? What did they fear? On page 184 and 185 of his book, The New Freedom, President Wilson discussed the powerful men who controlled the American economy at that time, and, although he didn't mention their names, they were: J.P. Morgan, John D. Rockefeller, the Whitneys, the Mellons, and the Rothschild agents: Jacob Schiff, Paul Warburg, and the Lehman brothers. [7] They eventually died, but most of the financial institutions they created exist today, and direct the economic destiny of our nation. The influence of the Whitney family and the Mellon family eventually diminished, and their banks merged with other banks, but J.P. Morgan Chase, Morgan Stanley, and Citigroup are largely controlled by the Rockefeller dynasty, and the Rothschild dynasty controls several major banks in the United States today. [8]
President Wilson wrote:

"However it has come about, it is more important still that the control of credit also has become dangerously centralized. It is the mere truth to say that the financial resources of the country are not at the command of those who do not submit to the direction and domination of small groups of capitalists who wish to keep the economic development of the country under their own eye and guidance. The great monopoly in this country is the monopoly of big credits. So long as that exists, our old variety and freedom and individual energy of development are out of the question. A great industrial nation is controlled by its system of credit. Our system of credit is privately concentrated. The growth of the nation, therefore, and all our activities are in the hands of a few men who, even if their action be honest and intended for the public interest, are necessarily concentrated upon the great undertakings in which their own money is involved and who necessarily . . . chill and check and destroy genuine economic freedom. This money trust, or, as it should be more properly called, this credit trust . . . is no myth; it is no imaginary thing. It is not an ordinary trust like another. It doesn't do have seen men who . . . were put 'out of business by Wall Street,' because Wall Street found them inconvenient and didn't want their competition." [9]
In the years that followed, J.P. Morgan, the Rockefeller family, and the Rothschilds precipitated a series of senseless wars. They incited World War I because they wanted to create a world government (the League of Nations). Why did the United States enter the Great War? J.P Morgan, and his associates, purchased the editorial policy of 25 major U.S. newspapers, and launched a coordinated propaganda campaign to convince the American people the U.S. had a moral obligation to enter the conflict. Congressman Oscar Callaway's February 8, 1917, Congressional Record article described what happened. (Volume LIV, page 2947). He wrote:

"In March 1915, the J.P. Morgan interests . . . got together 12 men high up in the news- paper world and employed them to select the most influential newspapers in the United States and sufficient number of them to control generally the policy of the daily press of the United States. These 12 men worked the problem out by selecting 179 newspapers, and then began, by an elimination process, to retain only those necessary for the purpose of controlling the general policy of the daily press throughout the country. They found it was only necessary to purchase the control of 25 of the greatest papers. The 25 papers were agreed upon; emissaries were sent to purchase the policy . . . of these papers; an agreement was reached; the policy of the papers was bought, to be paid for by the month; an editor was furnished for each paper to properly supervise and edit information regarding the questions of preparedness, militarism, financial policies, and other things of national and international nature considered vital to the interests of the purchasers." [10]
During World War I, and every subsequent U.S. war, the banking dynasties financed both sides of the conflict, and prolonged the engagements until both sides were exhausted, disheartened, and bankrupt. Most of the historians who have studied the Great War believe the banking dynasties prolonged the conflict because they wanted to make money, but I believe the financiers prolonged the Great War because they wanted to increase the number of casualties, and develop support for world government. [11]
What was the true reason for World War II? The banking dynasties, and the corporations they controlled, financed Adolph Hitler and built the armaments that were used by the Allied forces and the Nazis during the terrible conflict. Why? Because the banking dynasties wanted to create the United Nations, and a world government. Can that be verified? Certainly. I suggest you read:

Antony Sutton, "Wall Street and the Rise of Hitler."
James Poole, "Who Financed Hitler?"
Charles Hingham, "Trading with the Enemy."
In addition, when I researched Colonel Edward Mandell House's papers at Yale University in 1980, I discovered a letter that Ambassador Dodd, the U.S. ambassador to Germany, wrote to Colonel House on October 29, 1936. Ambassador Dodd was concerned because U.S. corporations were arming the Nazis, and he wrote:

"It seems to me that a very large part of the wealth of every country is now devoted to rearmament - the completest armament that Europe has ever known. This would remind you sadly of what you saw here in June 1914. . . . I might say to you that in spite of all the debts and all the huge losses since the great war, more than a hundred of our great corporations have subsidiaries here, and are of course involved in a great deal of the acute business which goes on. At the same time no corporation can take profits out of the country. . . . This entanglement of great business relations all over the world would seem to me to argue strongly for peace. Yet a great many of these corporations are supplying the means for rearmament, actually supplying arms. It's strange to me that they are willing to risk the property of their stock- holders in such a way. But you know how unwise bankers were between 1923 and 1928; also how much they lost for their depositors. Is it not possible some way to avoid a repetition of such tremendous losses." [12]
General Motors, General Electric, Standard Oil, ITT, IBM, Ford, Dow Chemical, and dozens of other U.S. corporations, built the German weapons that killed millions of English, French, Russian, and American servicemen during World War II, but the information has been kept from the American people. [13]
The banking dynasties, and their corporate allies, involved the U.S. in a series of no-win wars that were fought under the auspices of the United Nations: i.e. Korea, Vietnam, Gulf War I, and Gulf War II. Why? Because they wanted to destroy the moral fabric of our nation, accumulate wealth, and promote support for a world government. [14]
The financial dynasties used the military and economic power of the United States to install authoritarian leaders in foreign nations: i.e. Lenin and Stalin in Russia, Adolph Hitler in Germany, Benito Mussolini in Italy, Chairman Mao in China, Fidel Castro in Cuba, the Mullahs in Iran, and Robert Mugabe in Rhodesia (Zimbabwe). Why? Because the financial dynasties needed a foreign enemy to justify increasing the power of the U.S. government, and expanding domestic surveillance. [15]
The effort to establish a totalitarian world government has existed since Nimrod tried to unite the nations 5,000 years ago. There have been numerous attempts since that time, but they invariably failed because most people don't want to be ruled by other nations. The Egyptians tried to conquer the world, the Babylonians tried to conquer the world, the Persians tried, Alexander the Great tried, and Rome tried, but they failed, and the western segment of the Roman Empire collapsed in 476 A.D. Three-hundred-and fifty years later Charlemagne established the Holy Roman Empire, and that government ruled Europe until 1806 when Napoleon Bonaparte defeated the Austrian army. During the years that followed Napoleon conquered most of Europe, and might have conquered the world if his attack on Russia had succeeded in 1812. Two years later (1814) Napoleon was forced into exile, but he returned the following year, and fought his final battle two miles south of a Belgian village called Waterloo.
Have you ever wondered how Napoleon Bonaparte was able to win dozens of battles? Was he a military genius? Was he lucky? Thousands of books have been written about Napoleon's life, but only a few of them mention the fact that Napoleon obtained a copy of The Book of Fate when he was in Egypt, and accessed the esoteric knowledge that guided the remainder of his military career. Why is that important? Because:

"An understanding of the forces that shaped the events of past centuries is predicated not on facts to be learned, but rather on secrets to be discovered."
Was the "esoteric knowledge" Napoleon learned in The Book of Fate the source of his military success? If you research that subject on the Internet, you will discover several sites support that thesis, and other sites that discuss the fact that many military leaders and philosophers have been involved in astrology and/or the occult: i.e. Pythagoras, Socrates, Plato, Aristotle, Alexander (the Great), Hitler, Cecil Rhodes, Winston Churchill, Theodore Roosevelt, Franklin Roosevelt, Harry Truman, Richard Nixon, Ronald Reagan, Nancy Reagan, Hillary Clinton, J.P. Morgan, Andrew Carnegie, Henry Ford, the Rothschilds, and members of the Rockefeller family. If you would like to verify that information, on the Internet use a word search for the person's name and the word "occult." I also suggest:

www.paranormality.com/napoleon_fate_book.shtml
http: en.wikipedia.org/wiki/Hitler_and_the_Occult
"The Eye Of The Phoenix," DVD, Adullam Films
"The Secret Mysteries of America's Beginnings," DVD, Adullam Films
"The Dark Worship," Toyne Newton
"Brotherhood of Darkness," Stanley Monteith
"The Secret Destiny of America," Manly P. Hall
"The Life of Alexander," Plutarch. [16]
If my premise is correct, why did the occult force that guided Napoleon abandon him at Waterloo? I believe the men who controlled the British government at that time were also involved in the occult, and they utilized the amazing power of "fractional reserve banking" to purchase the weapons and mercenaries that defeated Napoleon Bonaparte.
Can I verify that premise? No, but I can verify the fact that leading members of the British aristocracy have been members of "The Order of the Garter" which is an occult organization, [17] and they have used the hidden power of "fractional reserve banking" to finance their effort to unite the world - from 1694 when William Paterson established the Bank of England [18] - until 1918 when the Round Table (a front group for Cecil Rhodes' secret society) ceded control of their program to an American group led by J.P. Morgan who was deeply involved in astrology and the occult. [19] Three years later, (1921) J.P. Morgan, and his followers, founded the Council on Foreign Relations, which is an integral part of the "invisible government" that rules the United States today. [20] What is their objective? They want to establish a world government, a world financial system, and a world religion.
To verify that statement, I suggest you read:

Carroll Quigley: "Tragedy and Hope: A History of the World in Our Time."
Carroll Quigley: "The Anglo-American Establishment."
Gary Allen: "None Dare Call it Conspiracy."
Cleon Skousen: "The Naked Capitalist."
Stanley Monteith: "Brotherhood of Darkness."
All of the books discuss Cecil Rhodes' secret society, but my book, Brotherhood of Darkness, discusses the spiritual force that is directing the current effort to unite the world. [21]
There is much more to this story, but it will have to wait until next month.
There are two major components to the current economic crisis. The first component is the collapse of the Collateralized Debt Obligations (bundled home mortgages) and the other fraudulent assets that were sold to financial institutions throughout the world. The second component is collapse of the $700 trillion derivative market (uninsured insurance policies) that will destroy the financial stability of every nation in the world.
What can be done? The Bush administration didn't address either problem. Instead, as of November 30, 2008, the Bush administration either pledged, loaned, or gave $7.4 billion to the financial institutions that precipitated the financial crisis, and by the time President Bush left office in January 2009, the Bush administration had either pledged, or given, an additional $2 million to the major financial institutions.
Will the massive expenditures solve the problem? No! You are witnessing the transfer of the wealth of the American people to the financial institutions that intentionally created the problem. What will happen? We will soon see the onset of hyperinflation (an increase in the supply of money) that will destroy the value of our currency, and destroy our nation.




Author   Stanley Monteith
source    www.radioliberty.com


New World Order

Timeline to Global Governance



(Links followed by (M) available to members of the Environmental Conservation Organization)
1891 The Society of the Elect and the Association of Helpers - (also known as the "Secret Society,"), was created by Cecil Rhodes, Alfred Milner, William T. Stead, Reginald Baliol Brett, and Lord Esher, in London. Rhodes died in 1902, leaving the society, and his fortune, under the control of Milner, who established the Rhodes Scholar program. Good background here.
1910 The Round Table - a periodical, first published by Milner's "Secret Society" for Britain's intellectual community. The writers, and those associated with the publication became known as the Round Table Group, and later, the Chatham House crowd. Comprehensive background.
1912 Edward Mandell House - published Philip Dru: Administrator,a novel describing how the world could best be governed by a benevolent administrator. House traveled in Europe in 1909, and met Woodrow Wilson November 25, 1911. Chronology: Met Sir Edward Grey (member of Milner's group) in 1913.
1913 Woodrow Wilson, U.S. President - Edward Mandell House served as Wilson's campaign manager, and then as chief advisor. Franklin D. Roosevelt appointed Assistant Secretary of the Navy.
Federal Reserve Act (M) enacted - creating the first "central bank" in America. Paul Warberg, whose family controlled the Reichsbank in Germany, was the architect of the system.

1914 World War I Begins - Wilson campaigned against U.S. entry into the war, then entered the war in 1917, one year before it ended.
1918 Wilson's 14 Points - presented to a joint session of Congress on January 8. The document was developed by Colonel Mandell House and advisors known as the "Inquiry."
The League of Nations - first proposed in The Round Table, in December, in an article entitled The League of Nations: A Practical Suggestion, written by Edward Mandell House and Lionel Curtis, a member of the original Rhodes/Milner "Secret Soceity."

1919 Paris Peace Conference - House is Wilson's chief deputy at the conference where he expanded his association with leaders of the Milner group.
Genesis of the CFR and RIIA - At a meeting on May 30, at the Majestic Hotel in Paris, Edward M. House, Lionel Curtis, Lord Eustace Percy, Harold Temperley, Herbert Hoover, Christian Herter, James T. Shotwell (Columbia), Charles Seymore (Yale), Archibald C. Coolidge (Harvard), were among 50 individuals who decided to create the Council on Foreign Relations in the U.S., and the Royal Institute of International Affairs in London.
The Treaty of Versailles - signed June 28, ended the war and incorporated The Covenant of the League of Nations as the first 30 Articles - very much as had been proposed by House and Curtis.
 

1920 League of Nations rejected by U.S. Senate - despite herculean efforts on both sides of the Atlantic.
Royal Institute of International Affairs - organized by the Milner group, housed at the Chatham House in London.

1921 Council on Foreign Relations - organized as U.S. counterpart to Royal Institute of International Affairs. John W. Davis, attorney to J.P. Morgan, was first president. Paul Warberg and J.D. Rockefeller were among initial funders. Began publishing Foreign Affairs in 1922. Described by Senator Barry Goldwater in 1979.
1925 Mein Kampf - published by Adolf Hitler.
1929 Stock Market Crash - Sets the stage for world wide depression, international response, and another war.
1930 Bank of International Settlements (M) - created in Basel, Switzerland. J.P. Morgan & Company, and others involved with the creation of the Federal Reserve, were among the founders.
1932 Franklin D. Roosevelt - begins his presidency amid the great depression. "The New Deal" was formulated by leftist, Henry A. Wallace, Secretary of Agriculture, and Secretary of State, Cordell Hulll, who, as a Senator, supported Wilson's League of Nations. Hull began drafting a United Nations Charter two weeks after Pearl Harbor. 1933 The Wilderness Society - founded by Bob Marshall, a socialist.
1936 National Wildlife Federation - founded.
1938 World marches toward war - A chronology of events leading to World War II, the event which gave rise to the United Nations.
1941 FDR delivers "Four Freedoms" speech - (January 6), and the Atlantic Conference (August 14), embody the idea of disarming sovereign nations under international authority.
Declaration of War on Japan (December 8); Declaration of War on Germany (December 11).

1942 Declaration by "United Nations" - first official use of the name "United Nations," suggested by Roosevelt. Chronnology of related events.
1943 Moscow Conference - Articles 5 - 7 refer to "United Nations" and post-war permanent organization.
United Nations Association - created by Eleanor Roosevelt.

1944 Bretton Woods Agreements - created the World Bank (M), and the International Monetary Fund (M). Henry Morganthau delivered the closing address. (Background and conference details.)
Dumbarton Oaks Conversations - produce the draft recommendations for a United Nations organization. The U.S. Team, led by Edward Stettinius, included Alger Hiss, Ralph Bunche, Leo Pasvolsky, and Grayson Kirk. Overview of the meeting.

1945 Yalta Conference - (February) reached agreement on U.N. draft recommendations and set the date for U.N. conference. Germany surrenders (May 7).
U.N. Charter - signed June 26, in San Francisco. Ratified by Senate (89-2) July 28.
International Court of Justice - established in The Hague.
August 6, & 9, atomic bombs dropped on Japan. Japan surrenders (August 14).
UNESCO - created in London, November 16.

1946 U.S. joins UNESCO - Julian Huxley, president of the Eugenics Society, and author of "The New Divinity", first Director. Socialist Joseph Needham, appointed Director of Natural Science.
World Health Organization created.

1947 World Federalist Association - founded in Asheville, North Carolina
World Federalist Movement - founded in Switzerland.

1948 IUCN Created - by Julian Huxley, in Geneva. Headquarters in Gland, Switzerland The U.S. Government, and several agencies are members.
Universal Declaration of Human Rights - adopted by U.N. General Assembly
Environmental Education - concept introduced to the U.N. by the IUCN.

1949 UNESCO Publication 356 (M) - "Toward World Understanding."
1951 The Nature Conservancy - organized.
1959 United Nations Development Program - evolved to maturity.
1960 Temple of Understanding - organized in New York. Dr. Robert Muller on Advisory Board.
1961 Freedom From War (M) - State Department Publication 7277, setting forth U.S. disarmament policy in favor of U.N. peacekeeping.
World Wildlife Fund - organized by Julian Huxley and IUCN.

1964 Wilderness Act of 1964 - and how it came to be.
UNCTAD - United Nations Conference on Trade and Development established.

1968 ECOSOC Resolution 1296 - directed by Dr. Robert Muller, establishes "Consultative Status" for NGOs (non-government organizations). Lucis Trust among first NGOs accredited.
Club of Rome - organized, and published Limits to Growth.

1970 First Earth Day - founder, Gaylord Nelson. Another view of Earth Day.
World Conference on Religion and Peace - opened headquartrs at the U.N. Center. Held conference in Kyoto, Japan, was accredited by ECOSOC in 1973.
Environmental Protection Agency - created.

1971 RAMSAR Treaty on Wetlands - signed in Ramsar, Iran. IUCN driving force behind RAMSAR.
1972 Clean WaterAct - passed by Congress. Wetland definitionexpanded by lawsuit brought by National WildlifeFederation, resulting in "Tulloch"decision in 1993. Tulloch overturned in1997.
WorldHeritage Convention - adopted by UNESCO. TechnicalReview.
EarthSummit I - First U.N. Conference on Environment.Maurice StrongConference leader.
James ParksMorton became dean of the Cathedral of St. John theDivine in New York City.

1973 CITES Signed - (March 3 - Convention on International Trade in Endangered Species). IUCN and WWF driving force behind CITES. Endangered Species Act - became U.S. law.
U.N. Environment Program - launched with Maurice Strong first Executive Director.
Trilateral Commission - formed, most participants also members of Council on Foreign Relations.
UNEP's Regional Seas Program - expands environmental outreach. Survey of U.S. participation.

1975 Belgrade Charter - Global Framework for Environmental Education. Promoted by NAAEE
1976 HABITAT I - adopts U.N. policy on land. William K. Reilly and Carla Hills
Federal Land Policy Management Act - adopted.
International Covenant on Civil and Political Rights - becomes international law.
UNIFEM - created to promote womens' rights.

1978 Global Taxation - first proposed by James Tobin. Current status. signed for U.S.
1979 U.S. MAB (M) - (Man and the Biosphere Program) launched by agency agreement with UNESCO.
First World Climate Conference - held in Geneva, Switzerland.
World Core Curriculum - introduced by Dr. Robert Muller, through the Robert Muller Schools.
CEDAW - (Convention on the Elimination of All Forms of Discrimination Against Women) adopted by the U.N. General Assembly.

1980 World Conservation Strategy - published jointly by UNEP, IUCN, and WWF.
MacBride Commission - (International Commission for the Study of Communications Problems. Report: Many Voices, One World. Chaired by Sean MacBride. Early efforts to control communications.
Brandt Commission - (Independent Commission on International Development) chaired by Willy Brandt. Report: North-South: A Program for Survival linked economic equity to development and was beginning of "sustainable development" concept.

1982 Palme Commission - (Independent Commission on Disarmament and Security Issues). Report: Common Security: A Blueprint For Survival linked security to development. Chaired by Olof Palme.
World Resources Institute - organized with help from Russell E. Train. Gustave Speth first director.
World Charter for Nature - precursor to the Earth Charter.
U.N. Convention on the Law of the seas - which created the International Seabed Authority.

1985 U.N. Convention on Ozone Depleting Substances - adopted in Vienna, Austria.
1987 Montreal Protocol - converts voluntary Ozone Treaty into international law.
Brundtland Commission - (World Commission on Environment and Development). Report: Our Common Future, which defined "sustainable development". Chaired by Gro Harlem Brundtland. Members included Shridath Ramphal and Maurice Strong (M).
Institute for Global Communications - created by the Tides Fouundtion to facilitate NGO communications.

1988 Global Forum on Human Survival - held in Oxford, England. Co-sponsored by the Temple of Understanding and the U.N. Committee on Parliamentarians and Population, chaired by James Parks Morton. James Lovelock was the featured speaker. Complete background here (M).
Intergovernmental Panel on Climate Change - created by WMO and UNEP.

1989 Berlin Wall falls - (November 9), USSR begins to disintegrate.
Convention on Rights of the Child - adopted by the U.N.
Climate Action Network - created in Germany to promote climate treaty.

1990 Global Forum on Human Survival - held in Moscow, hosted by Mikhail Gorbachev, and Javier Perez de Cuellar, chaired by James Parks Morton.
World Summit for Children - held in New York; adopted Plan of Action.
Women's Environment and Development Organization (WEDO) - created by Bella Abzug.
International Council for Local Environmental Initiatives (ICLEI) - created at the invitation of the U.N.,to advance Agenda 21 at the local level.

1991 Caring for the Earth - published jointly by UNEP, IUCN, and WWF.
Stockholm Initiative on Global Security and Governance - origin of Commission on Global Goverance.

1992 Commission on Global Governance - established. Willy Brandt, with the blessings of Boutros Boutros-Ghali, appointed Ingvar Carlsson and Shridath Ramphal (IUCN president) as co-chairs.
Global Biodiversity Strategy - published jointly by UNEP, IUCN, WWF, and WRI.
U.N. Conference on Environment and Development (UNCED) - Rio de Janeiro. Chaired by Maurice Strong. Produced: Agenda 21; Convention on Biological Diversity; Framework Convention on Climate Change; Statement of Forest Principles; and the Rio Declaration.
U.N. Commission on Sustainable Development - created to advance Agenda 21.
Earth Council - created in Costa Rica by Maurice Strong to coordinate global implementation of Agenda 21 through "National Councils" on Sustainable Development.
National Religious Partnership for the Environment - outgrowth of Temple of Understanding's "Joint Appeal."
The Wildlands Project - published by Dave Foreman, co-founder of Earth First!. Project seeks to convert half of America to wilderness.

1993 President's Council on Sustainable Development - created by Executive Order No. 12852 to implement Agenda 21 in America, co-chaired by WRI president, Jonathan Lash.
First Meridian Conference on Global Governance - held in Bolinas, California.
World Conference on Human Rights - in Vienna.
Green Cross - founded by Mikhail Gorbachev.
BIONET - created to promote Convention on Biological Diversity.

1994 World Trade Organization - formed at Uruguay round of GATT negotiations.
U.N. Conference on Population and Development - in Cairo

1995 World Summit on Social Development - in Copenhagen.
Commission on Sustainable Development - met in New York.
Fourth World Women's Congress - in Beijing. Documents.
State of the World Forum - San Francisco, hosted by Mikhail Gorbachev and Maruice Strong.
Our Global Neighborhood - final report released by the Commission on Global Governance.
Analysis - of Commission report.
Global Biodiversity Assessment - released by UNEP. Coordinated by Robert Watson.

1996 U.N. Conference on Human Settlements (HABITAT II) - Istanbul. Community Sustainability (M), U.S. HUD's report to the conference. Instanbul Declaration on Human Settlements.
Campaign for U.N. Reform - organized to lobby for global governance.

1997 Al Gore's report - to the U.N. at Rio +5. A broader view of Agenda 21
Kyoto Protocol - Adopted in Kyoto, Japan. Converts voluntary climate change treaty to binding international law. On-site reports.
International Conference on Environment and Society - sponsored by UNESCO in Thessaloniki. Survey of environmental education movement. implementation.

1998 International Criminal Court - created in Rome. On-site reports from Rome.
International Action Network on Small Arms (IANSA) - created to lobby for U.N. gun control.
U.N. Climate Change Conference - in Buenos Aires.

1999 Charter for Global Democracy - consolidates recommendations of Commission on Global Governance into 12 principles.
World NGO Conference - held in Canada to promote plan for "The Peoples Assembly."
U.N. Climate Change Conference - in Bonn.

2000 Earth Charter - final draft.
NGO Millennium Forum - New York, precursor to "The People's Assembly."
UNDPI/NGO Forum - August 28 - 30, New York (to strengthen "Civil Society" in UN operations)
Millennium Peace Summit of Religious and Spiritual Leaders - August 28 - 31, New York
State of the World Forum - September 4 - 10, New York
Millennium Assembly - September 5 - 8, New York
Millennium Summit - September 6 -8, New York
U.N. Desertification Treaty ratified by U.S. Senate by voice vote.
Bush-Gore election decided by U.S. Supreme Court. Chronology of this historic event. Map of Counties carried by Bush (red) and Gore (blue).
Kyoto Negotiations collapse - November 13-25, The Hague, Netherlands.

2001 Bush rejects Kyoto Protocol (March). NGO reaction. European reaction.
U.S. booted off U.N. Commission on Human Rights. (May) European view.
U.S. booted off U.N.'s Narcotic Control Board. (May) Reaction. More reaction.
Kyoto Protocol limps forwared without the U.S. (July)
U.N. Conference on Racism, Durban, South Africa, August 31 - September 7. U.S. walks out of Durban Conference.
Word Trade Center, Pentagon attacked by terrorists - September 11.
Osoma bin Laden video tape transcript, December 13, admission of responsibility.




New World Order