Government Documents

The documents presented on this page offer insight into actions certain elements of the U.S. Government are taking. How you interpret them is up to you. However, the general consensus is that the overall purpose for these documents is not one that will benefit the average American and unfortunately lead to Governments having to much power and the opportunity to abuse those powers.
WikiLeaks Cable 1: DOWNLOAD PDF
Description This Wikileaks cable discusses how Italy has strong objections to their cyber security act that officials are trying to implement. My Wikileaks cable documents are a little different in that I took some time to style it up a little bit to look like a magazine spread. Feel free to pass it around anyway.
Information Warfare Essay: DOWNLOAD PDF
Description This document is very interesting. Particularly in a few paragraphs it discusses cyber attacks. In those paragraphs it asks questions like "If a foreign country or state attacked important infrastructure, could the military (in a self defense mode) have legal grounds to retaliate with physical force?" Also other questions arise like "If a cyber attack occurs on important infrastructure, but the attacker hid behind unsuspecting totally innocent users computers, would it matter that the unsuspecting user had no idea and could the military have legal grounds take forceful action and perhaps charge them anyway?" Very eerie that those kinds of questions even arise in such a controversial manner
The Patriot Act: DOWNLOAD PDF
Description I Don't really need to say much about this document. JUST READ IT! Probably one of the biggest FU's the Government has ever dished out to the American people in history.
Public Enemy Part 1: DOWNLOAD PDF
Description One of many documents describing who DHS and the FBI considers to be the true enemy.
Public Enemy Part 2: DOWNLOAD PDF
Description One of many documents describing who DHS and the FBI considers to be the true enemy. This document singles out people wearing large winter clothing.
Public Enemy Part 3: DOWNLOAD PDF
Description One of many documents describing who DHS and the FBI considers to be the true enemy. Singling out people who have political views that are commonly referred to as left wing.
Public Enemy Part 4: DOWNLOAD PDF
Description One of many documents describing who DHS and the FBI considers to be the true enemy. Singling out Germany's citizens who have political views commonly referred to as right wing and that there is an increase of theft in Germany involving these groups.
Public Enemy Part 5: DOWNLOAD PDF
Description One of many documents describing who DHS and the FBI considers to be the true enemy. Very popular because it's the first of its kind to be leaked and widely known as the MIAC Strategic Report. Very shocking details indicating how serious DHS and the FBI are about who they consider a threat.
Public Enemy Part 6: DOWNLOAD PDF
Description One of many documents describing who DHS and the FBI considers to be the true enemy. This document reveals how DHS and the FBI spins and distorts normal non harmful ideas and intentions people, groups, and organizations have towards the environment.
Public Enemy Part 7: DOWNLOAD PDF
Description One of many documents describing who DHS and the FBI considers to be the true enemy. Singling out people who have political views that are commonly referred to as right wing.
Military Industrial Complex: DOWNLOAD PDF
Description More evidence of the Military Industrial Complex's intent to rule and dominate. Also more broad but vague descriptions and stereotyping. Leaving the door wide open for anyone to be targeted as a terrorist on the spot.
TSA Screening Policy: DOWNLOAD PDF
Description Outlines TSA's screening guidelines and policies which (after reading) they've clearly disregarded several times.
Quadrennial Defense Review: DOWNLOAD PDF
Description The best way I can describe this document is by saying that this document outlines the U.S. Military Industrial Complex's hell bent determination to rule and control all areas of the world.
Cyber Security Command: DOWNLOAD PDF
Description A report describing how Cyber Security will operate and the key role the U.S. Army holds in those operations.
Cyber Security Act: DOWNLOAD PDF
Description An amendment to the Homeland Security Act of 2002. Most likely the final destruction of the U.S. Constitution and Bill of Rights if passed.
Operation Northwoods: DOWNLOAD PDF
Description Justification for military intervention by the Joint Chiefs of Staff. Exposes the U.S. Government's willingness to use deception and criminal activity to achieve certain goals.
Fema Camps: DOWNLOAD PDF
Description Designates unused military installations to be used for disaster relief. Very vague on what constitutes a disaster and leaves open (what many suspect) the opportunity for these facilities to be used as concentration camps on the American people.
Martial Law Request: DOWNLOAD PDF
Description A memorandum for Alberto Gonzales from John Yoo requesting permission for the president to declare martial law if deemed necessary. Had 9/11 been the terrorist attack we were told it was I can see the justification in this request. But now not justifiable and very suspicious.
Statement of Robert P. Olislagers: DOWNLOAD PDF
Description A statement by Robert P. Olislagers (Director Centennial Airport) exposing the lack of disregard and professionalism from TSA pertaining to Proposed Rule Making for general aviation.
Automobile X-Ray Checkpoint: DOWNLOAD PDF
Description A quick assemble radiation x-ray device for automobile check points. Another device TSA is going to use to violate our right to privacy and bath us in radiation.
Statement by Janet Napolitano: DOWNLOAD PDF
Description It doesn't take long for Janet to show DHS's true colors in this document. By the third page she clearly points out that regular Americans are at the top of their most wanted list.
Left Wing Cyber Attackers: DOWNLOAD PDF
Description This is a Law Enforcement Sensitive document issued by DHS and FBI setting the tone to use extreme caution because anyone involved in politics carrying a laptop might be a terrorist.
Special Climate Change Program: DOWNLOAD PDF
Description A document drafted by world leaders for world leaders that reveals their intention to move forward with what could be the biggest scam in modern history known as global warming even though it's been exposed. The highlighted paragraph discusses how relocating human settlements might be necessary for preserving and restoring the natural environment. Very disturbing and forces someone to question the alternate motives for this if global warming has been exposed as a fraud.
Courthouse Plotting: DOWNLOAD PDF
Description More DHS propaganda hyping the threat of terror attacks on court houses throughout the United States.