Saturday, June 1, 2013

Easy fix to IRS corruption


Easy fix to IRS corruption

Exclusive: Matt Barber pushes idea that forces agency to act constitutionally

Published: 20 hours ago
Matt Barber is an attorney concentrating in constitutional law.    

Sir John Dalberg-Acton famously observed, “Power tends to corrupt, and absolute power corrupts absolutely.” No federal agency enjoys more power than the “absolute power” wielded by the Internal Revenue Service. It’s little wonder, then, that under this power-drunk Obama regime, the IRS has become “corrupted absolutely.” It’s become the hammer to this president’s favorite nail: political dissent.

The bureaucratic cat’s out of the bag, and the evidence is undeniable. The Obama IRS has been illegally targeting conservative, Christian and Jewish groups and individuals for political retaliation, intimidation and, ultimately, destruction. These revelations have spurred calls for criminal prosecution and even impeachment. Still, little has been said about how to prevent such Stalinist abuses of power in the future. 
We’ve been over-thinking the problem. Sometimes complicated questions come with easy answers. I wish I could take credit for it, but while I was participating in a recent meeting in Washington, D.C., Judson Phillips, founder of Tea Party Nation, hit on the simple solution. “The Constitution is a great place to go in order to rein in the rampant and repeated abuses at the IRS,” he suggested. Namely, the Fourth Amendment, which guarantees the following:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

No individual – and especially no federal agency – is above the law. Regrettably, and largely through both citizen and government acquiescence, the IRS has been brandishing arbitrary and extra-constitutional authority, unchecked, for well over a century.

Imagine if the Department of Homeland Security, the FBI, or the ATF suddenly began “searching” and “seizing” the “persons, houses, papers, and effects,” of millions of U.S. citizens every year without a warrant – without probable cause or even reasonable suspicion that any criminal or civil violation had occurred. People would be outraged, and for good reason. Such actions would rightly and universally be decried as unconstitutional. The lawsuits would fly, heads would roll and the courts would immediately shut down such “unreasonable searches and seizures.” This is exactly the kind of government tyranny our founders endeavored to thwart.

So why has the IRS been allowed to do just that – to violate, systemically and systematically, the Fourth Amendment? How is it that this one federal agency, with neither probable cause nor a warrant, is permitted to invade your privacy and confiscate your “houses, papers and effects” on a whim? How is it that if you fail to comply with their warrantless searches and seizures, they have the authority to ruin you financially and even throw you in prison?
No warrant? No problem. When the IRS arbitrarily and capriciously says “jump,” America opens its doors wide and says, “how high?” Is this the IRS or the ISS? Either way, it’s time that “we the people” put an end to this unconstitutional abuse of power.

At least some good has come from Mr. Obama’s IRS-gate scandal. It’s exposed the unprecedented depths to which corruption has weaseled its way from the top down. It’s also underscored the autocratic nature of the contemporary IRS beast. It’s unified many Republicans, Democrats and independents around this fundamental reality: America must de-politicize the IRS.

Politicians on both sides of the aisle love to pay lip service to a need for “tax reform.” Well, honorable sirs and madams, put up or shut up. It’s time for a new federal “Taxpayer Bill of Rights.” A centerpiece to such legislation must be the simple codification of that which the Fourth Amendment already mandates; namely, that, when conducting “searches and seizures” (aka, audits), the IRS must adhere to the same U.S. Constitution that restricts every other federal agency.

Such a bill, notes Phillips, “would codify as federal law that no IRS audit (or any other agency audit) of a person, organization or business could be conducted without first having the IRS agent (or agent of the agency conducting the audit) to prepare an affidavit that is sworn to in front of a federal judge, federal magistrate or a tax court judge that states with specificity why there is probable cause to believe the audit will result in either the discovery of criminal activities or the discovery of civil wrong doing. It will be the functional equivalent of a search warrant.”

Phillips is on to something big here. Especially when you consider this last minor factoid: The IRS is also the OEA: the “Obamacare enforcement agency.”

If that doesn’t send a chill down your spine, then nothing will.

What do you get when you cross one tyrannical, hyper-politicized bureaucratic beast with another?

You get tyranny on steroids. You also get one happy Barack Hussein Obama.

Contact your legislators and A) respectfully request that they re-constitutionalize the IRS; B) that the IRS be required to observe the Fourth Amendment; and C) that they hold this president accountable for his unprecedented and despicable abuse of executive authority.
Finally, request that Congress pass a new Taxpayer Bill of Rights that covers “all of the above.”

Read more at http://www.wnd.com/2013/05/easy-fix-to-irs-corruption/#G64zdHhZmPSzP7CR.99

TIRED OF THE GOVERNMENT


TIRED OF THE GOVERNMENT STICKING THEIR NOSES UP YOUR YOU KNOW WHAT??   TRY THESE IDEAS....

Passing this on, On the third posting below, it is a post that I sent out long ago that has tools for privacy, review it and implement those you like in addition to reacting towards this dilemma specified in the two previous emails below. This problem is only going to get worse!

C

Third email posting:

It never hurts to hide your conversations and browser actions from snoops, government and otherwise.  A security conscious IT friend sent me the below info. 

Since Skype sold out to Microsoft and government eavesdropping, we've been looking for a tool or tools to help us maintain our privacy. And perhaps this is the best set of tools I've seen so far. They're in an article by Sovereign Man and can be read by clicking 
HERE. The five tools are:
  1. Tor Browser - Tor is a great weapon in the fight for online anonymity as it allows you to surf the web without giving up your location and other personal data to the websites you visit.The Tor Browser Bundle is the easiest and most secure way to get started; simply download it, and start surfing the web with the Tor Browser. It’s available for Windows, Mac, and Linux.
  2. Duck Duck Go - If you want privacy, don’t search with Google. Google store all of your searches to customize ads for you, but even worse, they can hand over the whole list of searches to any government agency that are curious about what you’ve been looking at for the last couple years. A better alternative is Duck Duck Go, a completely anonymous search engine that does not store any information about you or your searches. The search results are essentially identical to Google’s, so there’s no loss of quality.
  3. HTTPS Everywhere - HTTPS Everywhere is a plug-in for Firefox and Google Chrome that tries to force a website to connect in secure mode, thus encrypting your traffic with the website you are visiting. This makes your browsing more secure because it prevents eavesdropping thieves or state-mafia from intercepting your unencrypted Internet traffic.
  4. Cryptocat - Cryptocat is an encrypted chat that beats Facebook and Skype when it comes to security and privacy. If you want to chat in private then this is one simple solution. It’s also open source, which means you can see the full code and be sure there are no government “backdoors” built in.
  5. Silent Circle - Silent Circle is a new player on the market, but it is founded by “old” players in the security and encryption industry. One of the founders, Phil Zimmerman, is also the creator of PGP, one of the most-used encryption platforms in the world. Silent Circle is the only service on this list that is not free. But having the gold standard of encryption may be worth it for you. It is for me.


The most promising tool listed is Silent Circle, a peer-based end-to-end encryption suite including Silent Phone, Silent Text, Silent Eyes, and Silent Mail (coming soon). Each of these tools includes a complete end-to-end peer-based encryption making penetration and eavesdropping impossible. Phil Zimmerman, the creator of Pretty Good Privacy (PGP) and ZPhone is part of the team of developers for this effort. Silent Circle is actually a suite of tools which include the following:

Silent Phone is your answer to Secure Mobile Video & Voice. It is an easy to download app that will provide you with HD quality calling over 3G, 4G and WiFi Networks that utilizes ZRTP encryption software invented by Phil Zimmermann and used worldwide. The Silent Circle phone service interoperates with any SIP/RTP phone. Key negotiations are purely peer-to-peer through the media stream. The ZRTP software detects when the call starts, and initiates a cryptographic key agreement between the two parties, and then proceeds to encrypt and decrypt the voice & data packets on the fly. The keys are destroyed at the end of the call.  Worldwide Secure Voice & Video Calling on Silent Phone allows you to make secure encrypted phone calls all over the world over any Network. Silent Phone connects directly into our custom-built Secure Network for amazing clarity and sound quality. Make Secure Encrypted Cell Phone Calls Over 3G, 4G and WiFi Networks. Silent Phone utilizes ZRTP Protocol encryption software invented by Phil Zimmermann and used worldwide for premium security.

Our new revolutionary technology allows you to send encrypted business documents (Word, Excel, Powerpoint, Pages, Keynote, PDF's, CAD drawings, etc.) any file, any movie, any picture – map locations, URL’s, calendar invites completely peer-to-peer encrypted and delete them with our “Burn Notice” feature. You have the ability to control your text communications securely with Silent Text. You decide how long your text can be seen with BURN NOTICE. Silent Text gives you the ability to transmit secure encrypted text messages between Silent Circle members, anywhere. The messages are encrypted on your device and the keys are negotiated for each conversation, and never leave your device. Each message is encrypted to a new key that is only used once and then destroyed, so if your device is examined, there are no keys to be had after the conversation is complete. Send your Mobile Device Map Location (Google, Apple Maps) encrypted and controlled.

Silent Eyes is your answer to secure video and voice communication on your desktop. It is an easy download desktop icon that will provide you with HD quality calling over WiFi Networks that utilizes ZRTP Protocol encryption software invented by Phil Zimmermann and used worldwide. The Silent Circle phone service interoperates with any SIP/RTP phone. Key negotiations are purely peer-to-peer through the media stream. The ZRTP Protocol software detects when the call starts, and initiates a cryptographic key agreement between the two parties, and then proceeds to encrypt and decrypt the voice & data packets on the fly. The keys are destroyed at the end of the call.

Silent Mail (coming soon)
Silent Mail is encrypted email with PGP Universal , the world’s most used encryption designed by two of Silent Circles founders Phil Zimmermann and Jon Callas. Silent Mail offers easy and automatic operation protecting sensitive email without changing or interfering with the users email environment.Silent Mail is a very easy, user-friendly encrypted email solution, providing secure, encrypted email without burdening users. Silent Mail integrates seamlessly with all existing email clients, enabling automatic encryption and decryption of sensitive communications without changing the users email interface. Silent Circle’s own Phil Zimmermann invented PGP encryption and our CTO Jon Callas invented the PGP Universal Server system-the world’s most used email encryption solution. Since Silent Mail utilizes a server-side key management system – we recommend this be utilized for day-to-day email communications for normal threat models. We want you to know what Silent Mail can and cannot do.

Silent Mail can help protect you against eavesdropping, government surveillance, unauthorized content analysis, identity theft and email forgery. Silent Mail utilizes cutting edge RSA and AES asymmetric and symmetric encryption algorithms to deliver total security inside the Silent Circle Network.


Why Do I Want Silent Circle?
Since Skype was purchased by Microsoft and is currently participating in full eavesdropping by the our government, this set of tools is incredibly promising. The big difference between Silent Circle and Skype, Google Chat, FaceTime, and all the other Instant Messaging (IM) clients is that they are FREE… for a price: the government records everything. Whereas Silent Circle has a modest cost of $20/mo and you keep your communications private.

Subscribe now and get 3 thirty-day passes by clicking HERE.

Last year, we experimented with securing our communications using a VPN out of Sweden, called VPNTunnel hosted by a company out of Sweden. You can use three of the most common ways to secure all your communications as it travels safely and encrypted outside the United States. Once your communication leaves the VPN tunnel, it's open to be viewed by anyone once again. However, the key here is that if you combine VPN Tunnel with TOR browser, keep your e-mail on JumpMail, and work to look at sites outside the US, you can dramatically increase your privacy and security. VPNTunnel supports the following three encryption methods:
  1. Point-to-Point Tunneling Protocol (PPTP), 3€ per month
  2. OpenVPN, 4€ per month
  3. Premium (includes both PPTP and OpenVPN), 6€ per month

Does a VPN secure all my internet communications including Skype?
Yes and no. If you imagine a VPN tunnel like an underwater tunnel between England and France, then while your data travels securely from your PC, it's completely hidden from eavesdropping (the tunnel under the English Channel). BUT, as soon as the data reaches "France" (in the example of our underwater tunnel), the data is now publicly visibly and traceable. That's why additional measures are needed such as Tor browser, Silent Circle, Crypto Chat, moving your e-mail to a multi-flag system (Jumpmail), erasing all cookies when you close your browser, etc. are also recommended to keep your information secure.



UTAH COUNTY TELLS FEDS NO GUN CONTROLS HERE


UTAH COUNTY TELLS FEDS NO GUN CONTROLS HERE
Iron County, Utah is making a preemptive strike against the Federal government’s attempts to infringe upon the Second Amendment rights of its citizens. According to a press release,Laws that violate 2nd Amendment are null and void and have no effect in Iron County, Utah.”
Today in Southwest Utah, the Iron County Board of Commissioners voted unanimously in passing an Iron County Second Amendment Protection Resolution. This is the second Resolution passed in the county, the first being the Cedar City Second Amendment Resolution passed by the City Council.

In that resolution, passed by Cedar City on February 13th, 2013, the Chief of Police is directed to support the resolution if the federal government attempts to enforce federal gun laws.
The county Resolution makes it clear that the county does not recognize any federal acts, laws, orders, rules, executive orders, or regulations that violate the Second Amendment of the US Constitution:
“NOW THEREFORE BE IT RESOLVED by the Governing Board of Iron County, Utah the Iron County Board of Commissioners declares that any federal act, law, order, executive order, rule, or regulation regarding firearms that is a violation and infringement of the 2nd Amendment of the Constitution of the United States, passed by the Congress, and/or signed by the President, violating the true meaning and intent of the 2nd Amendment of the Constitution of the United States as given by the Founders and Ratifiers of the Constitution, is invalid in Iron County, shall not be recognized by Iron County, is specifically rejected by Iron County, and shall be considered null and void and of no effect in Iron County.”

The county resolution goes further:
“BE IT FURTHER RESOLVED that it shall be the duty of the Sheriff of Iron County to take all measures as may be necessary to prevent the enforcement of any federal acts, laws, orders, rules, or regulations in violation of the 2nd Amendment to the Constitution of the United States.”
In talking with Iron County Sheriff Mark Gower, he said, “I will not allow anyone to come into this county and violate the Constitution of the United States or Utah. If I have to stand in the street and stop that from happening I would do it.” He further said, “I have refused to sign any agreements or contracts with Homeland Security or any other federal department and no one can come in and preempt the local control of our law enforcement. I will never give my command and control of the sheriff’s office to an outside agency. The US Constitution will not be violated on my watch.”
The effect of the county government and the largest city in the county both taking a stand on protecting the Second Amendment represents a solid foundation in supporting the gun rights of the citizens in the county. This provides a unified front should there be any challenge to those rights.
At this time the Utah state government is debating HR-114 and will hopefully, to some degree unknown at this point, support the resolutions passed here in Iron County. If HR-114 passes with similar provisions to the Iron County provisions, then a solid unified citizenry is what the people in Washington D.C. will see on the issue of federal gun control. They will think twice about trying to take away our guns or to abridge our Second Amendment rights.
The actions in Iron County show what can be done at the local level to stand up for your inalienable and God given rights. Now is the time for each person in each city and county across the nation to show the power of the people by enacting resolutions. It is an easy process. Anyone can introduce a resolution to your city council and country board. Get people to the meetings to support a resolution. If enough people speak up and declare the intent of the citizens of the community, the elected officials will usually listen.
This is only the beginning. There are still many issues that need addressing and many resolutions that need passing. After the resolutions come laws. There is a lot of work to do after sitting on our rears for all these years. If we value our country like we say we do then get up and call or talk to your neighbor, family member, workmate and then call your city council person, your county commissioner/county supervisor, state representative/state senator and get them working on passing the resolutions, ordinances, and laws.
This was all sparked by a man who simply got involved and saw it through. According to Sylvan Malis, “If I did it, you can too; anyone can do it! It’s easy!”

“The IRS appears to be a money laundry, extortion racket, and conspiracy to engage in a pattern of racketeering activity…



This is a message I sent to a Navy squadron mate who is now a CPA/tax accountant after we got into a discussion of the income tax during a brief visit at Christmas time.

I had hoped that Chuck would respond and show me the error of my assertions if I were wrong about the conclusions I had reached regarding the income tax. Unfortunately, I received no response.



 
Sent: Saturday, December 29, 2012 5:12 PM
To: XXXX
Subject: What you don’t know about the IRS and the federal income tax will shock you



This is to follow up on our abbreviated discussion regarding the fraudulent status of the federal income tax. It is not a simple matter to unravel, but you cannot fairly examine this information without concluding that the income tax is a major hoax perpetrated against the American people. A progressive income tax was also one of the key items on the Communist Party agenda for its plan to destroy the American constitutional republic.

There are many other well-researched sources to confirm everything contained in the document excerpted below, created by Paul Mitchell.  I challenge you to prove that anything included here is incorrect. Can you point me to the law that requires payment of an income tax or filing of an income tax return? You will find that every purported “rule” in the IRS publications is an obfuscation designed to mislead you into believing that you have an income tax liability when, in fact, no such liability exists.

The Founders provided for adequate revenues to support the limited federal government authorized by the Constitution. In fact, the federal government was running surpluses right up until the adoption of the income tax. The bankers wanted the income tax and the Federal Reserve System for their own purposes, not to provide needed revenue for government services.  (Please read “The Creature from Jekyll Island” by G. Edward Griffin for more on this insidious conspiracy.)

The problem is that the left began its assault on the Constitution over one hundred years ago, gradually but relentlessly building a federal government leviathan that is now unmanageable and unsustainable, and one that pursues increased control over the daily lives of our citizens without restraint. Where this all leads is frightening to contemplate, and we are clearly running out of time to avoid a worst-case scenario.

You pointed out that I am one of the beneficiaries of this system by virtue of my Social Security benefits. Well, I will not be held hostage by this Communist scheme. I will gladly sacrifice those benefits in return for a restoration of the United States Constitution.




What you don’t know about the IRS and the federal income tax will shock you
“The IRS appears to be a money laundry, extortion racket, and conspiracy to engage in a pattern of racketeering activity… There are no statutes that create a specific liability for federal income taxes… the Internal Revenue Code has never been enacted into positive law, and the code is so deliberately vague as to render it  unconstitutional under the Sixth Amendment…and the purported Sixteenth Amendment is demonstrably fraudulent.”
Excerpted from:   “31 Questions and Answers about the Internal Revenue Service” by Paul A. Mitchell

The IRS is not an organization within the United States Department of the Treasury

In the case of Chrysler Corp. v. Brown, 441 U.S. 281 (1979), the U.S. Supreme Court admitted that no organic Act for the IRS could be found, after they searched for such an Act all the way back to the Civil War, which ended in the year 1865 A.D…

The IRS appears to be a collection agency working for foreign banks and operating out of Puerto Rico under color of the Federal Alcohol Administration (“FAA”).  But the FAA was promptly declared unconstitutional inside the 50 States by the U.S. Supreme Court in the case of U.S. v. Constantine, 296 U.S. 287 (1935), because Prohibition had already been repealed…

When all the evidence is examined objectively, IRS appears to be a money laundry, extortion racket, and conspiracy to engage in a pattern of racketeering activity, in violation of 18 U.S.C. 1951 and 1961 et seq. (“RICO”)…Administrative Procedures Act.  The governments of all federal Territories are expressly excluded from Act of Congress, nor any Executive Order, giving IRS lawful jurisdiction to operate within any of the 50 States of the Union…

Deceptive nomenclature (showing “Department of the Treasury” on outgoing IRS mail) is intended to convey the false impression that IRS is a lawful bureau or department within the U.S. Department of the Treasury

The IRS is not an “agency” as that term is legally defined in the Freedom of Information Act or in the Administrative Procedures Act.  The governments of all federal Territories are expressly excluded from the definition of federal “agency” by Act of Congress.  See 5 U.S.C. 551(1)(C). Since IRS is domiciled in Puerto Rico (RICO?), it is thereby excluded from the definition of federal agencies which can be represented by the DOJ…

Neither (the Fourteenth nor the Sixteenth Amendment) was properly ratified.  In the case of People v. Boxer (December 1992), docket number #S-030016, U.S. Senator Barbara Boxer fell totally silent in the face of an Application to the California Supreme Court by the People of California, for an ORDER compelling Senator Boxer to witness the material evidence against the so-called 16th amendment…

The so‑called sixteenth “amendment” allegedly authorized federal income taxation, even though it contains no provision expressly repealing two Constitutional Clauses mandating that direct taxes must be apportioned.  The Ninth Circuit Court of Appeals and the U.S. Supreme Court have both ruled that repeals by implication are not favored.

The so‑called 16th amendment has now been correctly identified as a major fraud upon the American People and the United States…

Similarly, the so-called 14th amendment was never properly ratified either.  In the case of Dyett v. Turner, 439 P.2d  266, 270 (1968), the Utah Supreme Court recited numerous historical facts proving, beyond any shadow of a doubt, that the so‑called 14th amendment was likewise a major fraud upon the American People...
Judging by the sheer amount of litigation its various sections have generated, particularly Section 1, the so‑called 14th amendment is one of the worst pieces of legislation ever written in American history…
______________________________________________________________________________________
There are no statutes that create a specific liability for federal income taxes.
Section 1 of the Internal Revenue Code (“IRC”) contains no provisions creating a specific liability for taxes imposed by subtitle AAside from the statutes which apply only to federal government employees, pursuant to the Public Salary Tax Act, the only other statutes that create a specific liability for federal income taxes are those itemized in the definition of “Withholding agent” at IRC section 7701(a)(16).  For example, see IRC section 1461.  A separate liability statute for “employment” taxes imposed by subtitle C is found at IRC section 3403.
After a worker authorizes a payroll officer to withhold taxes, typically by completing Form W‑4, the payroll officer then becomes a withholding agent who is legally and specifically liable for payment of all taxes withheld from that worker’s paycheck.  Until such time as those taxes are paid in full into the Treasury of the United States, the withholding agent is the only party who is legally liable for those taxes, not the worker.  See IRC section 7809 (“Treasury of the United States”).
If the worker opts instead to complete a Withholding Exemption Certificate, consistent with IRC section 3402(n), the payroll officer is not thereby authorized to withhold any federal income taxes.  In this latter situation, there is absolutely no liability for the worker or for the payroll officer;  in other words, there is no liability PERIOD, specifically because there is no withholding agent.

Federal regulations do not and can not create an income tax liability for any class of people.
The regulations at 26 CFR 1.1-1 attempted to create a specific liability for all “citizens of the United States” and all “residents of the United States”.  However, those regulations correspond to IRC section 1, which does not create a specific liability for taxes imposed by subtitle ATherefore, these regulations are an overly broad extension of the underlying statutory authority; as such, they are unconstitutional, null and void ab initio (from the beginning).  The Acker case cited above held that federal regulations cannot exceed the underlying statutory authority.

Conflicting provisions of the Constitution and the 1866 Civil Rights Act, together with the non-ratification of the Fourteenth Amendment, have resulted in the existence of two classes of citizens within the United States.  
There are two (2) classes of citizens:  State Citizens and federal citizens.  The first class originates in the Qualifications Clauses in the U.S. Constitution, where the term “Citizen of the United States” is used.  (See 1:2:2, 1:3:3 and 2:1:5.)  Notice the UPPER CASE “C” in “Citizen”.
The pertinent court cases have defined the term “United States” in these Clauses to mean “States United”, and the full term means “Citizen of ONE OF the States United”.  See People v. De La Guerra, 40 Cal. 311, 337 (1870);  Judge Pablo De La Guerra signed the California Constitution of 1849, when California first joined the Union. 
Similar terms are found in the Diversity Clause at Article III, Section 2, Clause 1, and in the Privileges and Immunities Clause at Article IV, Section 2, Clause 1
Prior to the Civil War, there was only one (1) class of Citizens under American Law.  See the holding in Pannill v. Roanoke, 252 F. 910, 914‑915 (1918), for definitive authority on this key point.
The second class originates in the 1866 Civil Rights Act, where the term “citizen of the United States” is used.  This Act was later codified at 42 U.S.C. 1983.  Notice the lower-case “c” in “citizen”.  The pertinent court cases have held that Congress thereby created a municipal franchise primarily for members of the Negro race, who were freed by President Lincoln’s Emancipation Proclamation (a war measure), and later by the Thirteenth Amendment banning slavery and involuntary servitude.  Compelling payment of a “tax” for which there is no liability statute is tantamount to involuntary servitude, and extortion.
Instead of using the unique term “federal citizen”, as found in Black’s Law Dictionary, Sixth Edition, it is now clear that the Radical Republicans who sponsored the 1866 Civil Rights Act were attempting to confuse these two classes of citizens.  Then, they attempted to elevate this second class to constitutional status, by proposing a 14th amendment to the U.S. Constitution.  As we now know, that proposal was never ratified.
Numerous court cases have struggled to clarify the important differences between the two classes.  One of the most definitive, and dispositive cases, is Pannill v. Roanoke, 252 F. 910, 914‑915 (1918), which clearly held that federal citizens had no standing to sue under the Diversity Clause, because they were not even contemplated when Article III in the U.S. Constitution was first being drafted, circa 1787 A.D.
 Another is Ex parte Knowles, 5 Cal. 300 (1855) in which the California Supreme Court ruled that there was no such thing as a “citizen of the United States” (as of the year 1855 A.D.).  Only federal citizens have standing to invoke 42 U.S.C. 1983;  whereas State Citizens do not.  See Wadleigh v. Newhall, 136 F. 941 (C.C. Cal. 1905).
Many more cases can be cited to confirm the existence of two classes of citizens under American Law.  These cases are thoroughly documented in the book entitled “The Federal Zone: Cracking the Code of Internal Revenue” by Paul Andrew Mitchell, B.A., M.S., now in its eleventh edition.  See also the pleadings in the case of USA v. Gilbertson, also in the Supreme Law Library.

The U.S. Supreme Court ruled in the Brushaber case that the income tax which is the subject of the purported Sixteenth Amendment is an indirect tax (“excise”) subject to the restriction of Article I Section 8 of the United States Constitution that such tax ”shall be uniform throughout the United States” as a result of a voluntary act resulting in the application of the tax. Thus the enforcement by the IRS of the income tax as an unapportioned direct tax is unquestionably unconstitutional.
Frank Brushaber was the Plaintiff in the case of Brushaber v. Union Pacific Railroad Company, 240 U.S. 1 (1916), the first U.S. Supreme Court case to consider the so‑called 16th amendment.  Brushaber identified himself as a Citizen of New York State and a resident of the Borough of Brooklyn, in the city of New York, and nobody challenged that claim. The Union Pacific Railroad Company was a federal corporation created by Act of Congress to build a railroad through Utah (from the Union to the Pacific), at a time when Utah was a federal Territory, i.e. inside the federal zone.
Brushaber’s attorney committed an error by arguing that the company had been chartered by the State of Utah, but Utah was not a State of the Union when Congress first created that corporation. Brushaber had purchased stock issued by the company.  He then sued the company to recover taxes that Congress had imposed upon the dividends paid to its stockholders
The U.S. Supreme Court ruled against Frank Brushaber, and upheld the tax as a lawful excise, or indirect tax.
The most interesting result of the Court’s ruling was a Treasury Decision (“T.D.”) that the U.S. Department of the Treasury later issued as a direct consequence of the high Court’s opinion.  In T.D. 2313, the U.S. Treasury Department expressly cited the Brushaber decision, and it identified Frank Brushaber as a “nonresident alien” and the Union Pacific Railroad Company as a “domestic corporation”.  This Treasury Decision has never been modified or repealed.
T.D. 2313 is crucial evidence proving that the income tax provisions of the IRC are municipal law, with no territorial jurisdiction inside the 50 States of the Union.  The U.S. Secretary of the Treasury who approved T.D. 2313 had no authority to extend the holding in the Brushaber case to anyone or anything not a proper Party to that court action.
Thus, there is no escaping the conclusion that Frank Brushaber was the nonresident alien to which that Treasury Decision refers.  Accordingly, all State Citizens are nonresident aliens with respect to the municipal jurisdiction of Congress, i.e. the federal zone.

The term “income” is not defined in the Internal Revenue Code, but the U.S. Supreme Court has defined income as “profit or gain derived from corporate activities”.

The Eighth Circuit Court of Appeals has ruled that the term “income” is not defined anywhere in the IRC:  “The general term ‘income’ is not defined in the Internal Revenue Code.”  U.S. v. Ballard, 535 F.2d 400, 404 (8th Circuit, 1976).
Moreover, in Mark Eisner v. Myrtle H. Macomber, 252 U.S. 189 (1920), the High Court told Congress it could not legislate any definition of “income” because that term was believed to be in the U.S. Constitution.  The Eisner case was predicated on the ratification of the 16th amendment, which would have introduced the term “income” into the U.S. Constitution for the very first time (but only if that amendment had been properly ratified).
In Merchant's Loan & Trust Co. v. Smietanka, 255 U.S. 509 (1921), the high Court defined “income” to mean the profit or gain derived from corporate activities.  In that instance, the tax is a lawful excise tax imposed upon the corporate privilege of limited liability, i.e. the liabilities of a corporation do not reach its officers, employees, directors or stockholders.


The income tax provisions of the Internal Revenue Code are “municipal law” (applicable only to the District of Columbia, Guam, Virgin Islands, American Samoa, and Puerto Rico); Title 26 of the United States Code (the location of the IRC) has never been enacted into positive law; and the code is so deliberately vague as to render it  unconstitutional under the Sixth Amendment of the Bill of Rights.

The IRC’s income tax provisions are municipal law.  Municipal law is law that is enacted to govern the internal affairs of a sovereign State;  in legal circles, it is also known as Private International Law.  Under American Law, it has a much wider meaning than the ordinances enacted by the governing body of a municipality, i.e. city council or county board of supervisors.  In fact, American legal encyclopedias define “municipal” to mean “internal”, and for this reason alone, the Internal Revenue Code is really a Municipal Revenue Code.
A mountain of additional evidence has now been assembled and published in the book “The Federal Zone” to prove that the IRC’s income tax provisions are municipal law. One of the most famous pieces of evidence is a letter from a Connecticut Congresswoman, summarizing the advice of legal experts employed by the Congressional Research Service and the Legislative Counsel.  Their advice confirmed that the meaning of “State” at IRC section 3121(e) is restricted to the named territories and possessions of D.C., Guam, Virgin Islands, American Samoa, and Puerto Rico.
 In other words, the term “State” in that statute, and in all similar federal statutes, includes ONLY the places expressly named, and no more.
The general rule is that federal government powers must be expressed and enumerated.  For example, the U.S. Constitution is a grant of enumerated powers.  If a power is not enumerated in the U.S. Constitution, then Congress does not have any authority to exercise that power.  This rule is tersely expressed in the Ninth Amendment, in the Bill of Rights. If California is not mentioned in any of the federal income tax statutes, then those statutes have no force or effect within that State.  This is also true of all 50 States.
Strictly speaking, the omission or exclusion of anyone or anything from a federal statute can be used to infer that the omission or exclusion was intentional by Congress.  In Latin, this is tersely stated as follows:  Inclusio unius est exclusio alterius.  In English, this phrase is literally translated:  Inclusion of one thing is the exclusion of all other things [that are not mentioned].  This phrase can be found in any edition of Black’s Law Dictionary;  it is a maxim of statutory construction.
The many different definitions of the term “State” that are found in federal laws are intentionally written to appear as if they include the 50 States PLUS the other places mentioned.  As the legal experts in Congress have now confirmed, this is NOT the correct way to interpret, or to construct, these statutes. If a place is not mentioned, every American may correctly infer that the omission of that place from a federal statute was an intentional act of Congress.  Whenever it wants to do so, Congress knows how to define the term “United States” to mean the 50 States of the Union.  See IRC section 4612(a)(4)(A).

Federal income tax revenues are NOT used to pay for any government services.
The money trail is very difficult to follow, in this instance, because the IRS is technically a trust with a domicile in Puerto Rico.  See 31 U.S.C. 1321(a)(62). 
As such, their records are protected by laws which guarantee the privacy of trust records within that territorial jurisdiction, provided that the trust is not also violating the Sherman Antitrust Act. They are technically not an “agency” of the federal government, as that term is defined in the Freedom of Information Act and in the Administrative Procedures Act.  The governments of the federal territories are expressly excluded from the definition of “agency” in those Acts of Congress.  See 5 U.S.C. 551(1)(C).
All evidence indicates that they are a money laundry, extortion racket, and conspiracy to engage in a pattern of racketeering activity, in violation of 18 U.S.C. 1951 and 1961 et seq.
They appear to be laundering huge sums of money into foreign banks, mostly in Europe, and quite possibly into the Vatican.  See the national policy on money laundering at 31 U.S.C. 5341.
The final report of the Grace Commission, convened under President Ronald Reagan, quietly admitted that none of the funds they collect from federal income taxes goes to pay for any federal government services.  The Grace Commission found that those funds were being used to pay for interest on the federal debt, and income transfer payments to beneficiaries of entitlement programs like federal pension plans.
______________________________________________________________________________________
HOW SOME STATES DID NOT LEGALLY
RATIFY THE 16TH AMENDMENT
Bill Benson's findings, published in "The Law That Never Was," make a convincing case that the 16th amendment was not legally ratified and that Secretary of State Philander Knox was not merely in error, but committed fraud when he declared it ratified in February 1913.
What follows is a summary of some of the major findings for many of the states, showing that their ratifications were not legal and should not have been counted.
The 16th amendment had been sent out in 1909 to the state governors for ratification by the state legislatures after having been passed by Congress. There were 48 states at that time, and three-fourths, or 36, of them were required to give their approval in order for it to be ratified. The process took almost the whole term of the Taft administration, from 1909 to 1913.
Knox had received responses from 42 states when he declared the 16th amendment ratified on February 25, 1913, just a few days before leaving office to make way for the administration of Woodrow Wilson. Knox acknowledged that four of those states (Utah, Conn, R.I. and N.H.) had rejected it, and he counted 38 states as having approved it.
We will now examine some of the key evidence Bill Benson found regarding the approval of the amendment in many of those states.
In Kentucky, the legislature acted on the amendment without even having received it from the governor (the governor of each state was to transmit the proposed amendment to the state legislature). The version of the amendment that the Kentucky legislature made up and acted upon omitted the words "on income" from the text, so they weren't even voting on an income tax! When they straightened that out (with the help of the governor), the Kentucky senate rejected the amendment. Yet Philander Knox counted Kentucky as approving it!
In Oklahoma, the legislature changed the wording of the amendment so that its meaning was virtually the opposite of what was intended by Congress, and this was the version they sent back to Knox. Yet Knox counted Oklahoma as approving it, despite a memo from his chief legal counsel, Reuben Clark, that states were not allowed to change it in any way.
Attorneys who have studied the subject have agreed that Kentucky and Oklahoma should not have been counted as approvals by Philander Knox, and, moreover, if any state could be shown to have violated its own state constitution or laws in its approval process, then that state's approval would have to be thrown out. That gets us past the "presumptive conclusion" argument, which says that the actions of an executive official cannot be judged by a court, and admits that Knox could be wrong.
If we subtract Kentucky and Oklahoma from the 38 approvals above, the count of valid approvals falls to 36, the exact number needed for ratification. If any more states can be shown to have had invalid approvals, the 16th amendment must be regarded as null and void.
The state constitution of Tennessee prohibited the state legislature from acting on any proposed amendment to the U.S. Constitution sent by Congress until after the next election of state legislators. The intent, of course, is to give the proposed amendment a chance to become an issue in the state legislative elections so that the people can have a voice in determining the outcome. It also provides a cooling off period to reduce the tendency to approve an idea just because it happens to be the moment's trend. You've probably already guessed that the Tennessee legislature did not hold off on voting for the amendment until after the next election, and you'd be right - they didn't; hence, they acted upon it illegally before they were authorized to do so. They also violated their own state constitution by failing to read the resolution on three different days as prescribed by Article II, Section 18. These state constitutional violations make their approval of the amendment null and void. Their (Tennessee’s) approval is and was invalid, and it brings the number of approving states down to 35, one less than required for ratification.
Texas and Louisiana violated provisions in their state constitutions prohibiting the legislatures from empowering the federal government with any additional taxing authority. Now the number is down to 33.



Yahoo Tells Users: Let Us Read Your Emails or -- Goodbye!

SOME OF YOU MAY HAVE HEARD OF DR. KATHERINE ALBRECHT -  (www.katherinealbrecht.com/  and www.gaiamtv.com/KatherineAlbrecht  ARE TWO WEBSITES YOU CAN RESEARCH.  KATHERINE NOT ONLY  IS THE HOST OF HER OWN BROADCASTS,  BUT IS A FREQUENT GUEST ON OTHER BROADCASTS.   AN AVID FIGHTER FOR OUR CONSTITUTIONAL RIGHTS,  KATHERINE HAS BEEN INVOLVED IN THE PURSUIT OF EMAIL AND WEB SURFING PRIVACY.  SOME MAY KNOW HER BY THE SPONSORSHIP OF HER BROADCASTS BY IXQUICK AKA STARTPAGE.  BELOW IS AN EMAIL JUST RECEIVED FROM KATHERINE RELATING TO THE PRIVATE EMAIL SYSTEM THE COMPANY  IS IN FINAL STAGES OF PERFECTING.  YOU MAY WANT TO CONTACT THEM ABOUT IT.  THE ADDRESS IS BELOW.  


---------- Forwarded message ----------
From: <info@startmail.com>
Date: Fri, May 31, 2013 at 7:57 PM
Subject: Yahoo Tells Users: Let Us Read Your Emails or -- Goodbye!
 
Email Privacy is big news this week with Yahoo giving users just 30 days to switch over to their new email platform starting June 1st.   Yahoo's new privacy policy says the company will perform "content scanning and analyzing of your communications content" on all emails sent through Yahoo accounts. Talk about abusive!  Please see our press release below for details.

The good news is that StartMail internal beta testing will begin on June 24th. As we come down the home stretch of developing a fully state-of-the-art, private email alternative, your support means more to us than ever.

We look forward to welcoming you with a trial StartMail account this Fall when our full beta launch takes place. We know you are eagerly awaiting your trial account and we appreciate your patience.  We will be sending out regular updates in the immediate days and weeks to come, so stay tuned.

If you're not yet signed up as a beta tester, you can sign up at www.StartMail.com.

This is an exciting time to be working on privacy -- and we're so glad you're on board!

Sincerely,

Dr. Katherine Albrecht and The StartMail Team





MAY 31, 2013
FOR IMMEDIATE RELEASE

Yahoo Tells Users: Let Us Read Your Emails or -- Goodbye!,
https://www.startpage.com/eng/press/yahoo-reads-your-mails.html

NEW YORK: As of June 1, all Yahoo email users are required to upgrade to the company's newest platform, which allows Yahoo to scan and analyze every email they write or receive. According to Yahoo's help page, all users who make the transition agree to let the company perform "content scanning and analyzing of your communications content" to target ads, offer products, and perform "abuse protection."

This means any message that Yahoo's algorithms find disturbing could flag a user as a bully, a threat, or worse. At the same time, Yahoo can now openly troll through email for personal information that it can share or hold onto indefinitely.
See: http://help.yahoo.com/kb/index?page=content&y=PROD_MAIL_ML&locale=en_US&id=SLN3254
Archived at: https://www.startpage.com/graphics/yahoo-mail-upgrade.jpg

Gay and haven't come out yet? Yahoo knows. Having an affair? Your spouse may not know - but Yahoo does. Any interests, ailments or projects you'd rather not share? You're sharing them with Yahoo, perhaps forever.

The new tracking policy affects more than just Yahoo account holders. Everyone who corresponds with a Yahoo email account holder will also have their own message content scanned, analyzed, and stored by Yahoo, even if they themselves have not agreed to Yahoo's new terms of service.

"Emailing through Yahoo means surrendering your privacy, whether it's your own account or your friend's," says Harvard-trained privacy expert Katherine Albrecht, who is helping to develop StartMail, an upcoming email service that will not scan its users' correspondence. "It's time we start paying attention to these policies, because they're growing more shockingly abusive every day," she added. 

Where prior versions of Yahoo had tracking policies buried in the fine print, the company's tracking agenda is now openly stated in paragraph 2: "When you upgrade you will be accepting our ...Privacy Policy." That is, its anti-privacy policy.

Concerned Yahoo users are invited to check out StartMail, a completely private email program slated for release this Fall. Anyone who would like to be a beta tester can visit StartMail (www.StartMail.com) and sign up for the upcoming release.

Rest assured: That information will not be shared with anyone at all.

Especially not Yahoo.

====




5-year-old Interrogated By School Over Toy Cap Gun Until He Wet Himself With Fear

FW:     !!!!! PSYCHO NUT JOB GOVERNMENT IS ALL THERE IS TODAY >>> 5-year-old Interrogated By School Over Toy Cap Gun Until He Wet Himself With Fear 

5-year-old Interrogated By School Over Toy Cap Gun Until He Wet Himself With Fear

Then suspended for rest of the year!!!!!!

Steve Watson
Infowars.com
May 31, 2013
Yet another child barely out of nappies has been persecuted by school officials for playing with a toy gun on the school bus.
The Washington Post reports that the five-year-old from Dowell Elementary School in Lusby, Maryland was questioned by school officials for over two hours after he showed a friend his cowboy-style cap gun on the way to school.
Officials finally called the boy’s mother when he wet his pants. The mother told the Post that she found it highly unusual that her son soiled himself, indicating that he was very intimidated.
The report states that the boy’s parents bought him the plastic, orange-tipped cap gun at Frontier Town, a western-themed adventure centre. Following the interrogation, the boy told his mother that he had brought it to school because he had “really, really” wanted to show his friend, who had previously brought a water pistol to school.
The school’s principal told the mother that her son had pointed the toy at other students and pretended to shoot them, although the boy and his sister, who was also on the bus and subsequently questioned, say this is not the case.
The principal even stated that had the gun been “loaded” with caps, then it would have been “deemed an explosive and police would have been called in.”
The boy, who remains anonymous has been suspended from school for 10 days. “If the punishment stands, it would become part of the boy’s permanent school record and keep him out of classes the rest of the school year,” the report notes.
“The school was quite obviously taking it very seriously, and he’s 5 years old,” the boy’s mother said. “Why were we not immediately contacted?”
“I have no problem that he had a consequence to his behavior,” the mother added. “What I have a problem with is the severity.”
The family has hired attorney Robin Ficker, who was also the attorney involved in the infamous Hello Kitty bubble gun incident back in January, when school officials in Pennsylvania suspended a five-year-old girl for “threatening” class mates with the toy that contains a harmless soap solution. Officials were also said to have interrogated the girl for several hours, before notifying her parents.
Officials at the Mount Carmel school issued a statement describing the girl’s actions as “terroristic” and then refused to retract it following media coverage.
“Kids play cowboys and Indians,” Ficker stated with regards to the latest incident. He added that the boy’s age is important. “They play cops and robbers. You’re talking about a little 5-year-old here.”
He’s “all bugs and frogs and cowboys,” the boy’s mother added.
School officials said they cannot comment on the matter but have scheduled a “disciplinary conference” today to resolve it.
This latest knee-jerk overreaction to children playing with anything that even remotely resembles a gun comes just days after another kindergartner was punished by school officials and forced to apologise for bringing a tiny miniature lego gun onto a school bus.
The list of previous incidents of this nature is now so long that it has prompted Maryland Sen. J. B. Jennings to introduce a bill to stop such idiotic over reactions being played out over and over again in schools.
In March, a 7-year-old boy from Maryland was suspended for unintentionally biting his pop tart into the shape of a gun.
A third grader in Michigan was reprimanded by school officials when he brought a cupcake to school with a plastic toy soldier, holding a gun, on top of it.
A ten year old Virginia boy who was arrested for taking a plastic toy gun to school was forced to deal with a potentially permanent criminal record over the incident.
A student in Florence, Arizona was recently suspended because he had a picture of a gun on his computer.
A six-year-old kindergartner in South Carolina was suspended for taking a small transparent plastic toy gun to school for a show and tell.
A five-year-old in Massachusetts who faced suspension for building a small toy gun out of lego bricks and play-shooting his classmates.
We also reported on an incident that erupted when a discussion between two children about a toy nerf gun caused a lockdown and a massive armed police response at two elementary schools in the Bronx.
In another incident, a Long Island high school was also placed on lock down for 6 hours in response to a student carrying a toy nerf gun.
The nerf gun was once again the deadly weapon of choice as a university campus in Rhode Island was placed on lockdown, causing panic and minor injuries when a stampede to flee the building ensued.
In another incident, a teacher at Malden High School in Massachusetts who glimpsed sight of a “gun”, alerted police who rushed to the scene only to discover a neon water pistol. School officials then vowed to track down the suspect who brought the toy to school using surveillance cameras.
A South Philadelphia elementary student was searched in front of classmates and threatened with arrest after she mistakenly brought a “paper gun” to school.
A 6-year-old boy was suspended from his elementary school, also in Maryland, for making a gun gesture with his hand and saying “pow”.
Another two 6-year-olds in Maryland were suspended for pointing their fingers into gun shapes while playing “cops and robbers” with each other.
A couple of second grade students at a Virginia elementary school were recently suspended for two days after violating the school’s “zero tolerance” policy on weapons when they pointed pencils at other students and made gun noises.
In Oklahoma, a five-year-old boy was also recently suspended for making a gun gesture with his hand.
A 13-year-old Middle School seventh grade student in Pennsylvania was also suspended for the same hand gesture.
The terrorists really are everywhere these days.
—————————————————————-
Steve Watson is the London based writer and editor for Alex Jones’ Infowars.com, and Prisonplanet.com. He has a Masters Degree in International Relations from the School of Politics at The University of Nottingham, and a Bachelor Of Arts Degree in Literature and Creative Writing from Nottingham Trent University.
This article was posted: Friday, May 31, 2013 at 10:58 am




BEST AMERICAN AD SLOGAN: HOW TO RUN THE COUNTRY INTO THE GROUND - EVIL BASTARDS INCORPORATED - WE DO THE JOB RIGHT