Archive

Archive for the ‘White House’ Category

We Need Immigration Enforcement and Not Immigration Reform

There is talk on Capitol Hill on more immigration reform. President Obama says he’ll act without Congress and while the debate rages on what to do by our government, illegal aliens, better known as illegal immigrants have entered our republic illegally.

Why is this happening? Why can’t our leadership enforce our immigration laws? The answer is simple, it is because they have no interest in enforcing our immigration laws. This is all but a dog and pony show to get you, the American people, to believe that President Obama actually cares about illegal immigrants. A news flash for every one out there, if President Obama actually cared about solving the illegal immigration problem plaguing the southern United States, he would have put troops, or more border guards on our southern border.

Don’t believe me? The president of the United States is the commander-in-chief of the armed forces, guess what? He has the authority to put troops on the border with Mexico and order them to enforce the border.

Notice how we are so quick to order troop deployments to Iraq, Afghanistan, Pakistan and other countries around the world, but we’re not so keen on sending troops on our borders to enforce the border. Ask yourself, why is that? You will than come to the realization that Barack Obama never intended to enforce the border in the first place. Him, and the likes of Nancy Pelosi with criminal intent are not honoring their oaths, they are committing open treason against the United States by not enforcing its laws thus bringing about anarchy in the land, which means they are committing treason by sedition.

It is my opinion that the real intent of President Obama and Nancy Pelosi is to bring in illegal immigrants, so that they can vote Democrat, and in effect create a one party system. Does this sound familiar courtesy of NAZI Germany? You see President Obama is taking over our republic by breaking down our laws, and as result is using this anarchy to justify his own existence as president, and thus eventually leading to the suspending of the U.S. Constitution.

It is the only conclusion of where this leads to because if you notice, as president of the United States, the president is charged with enforcing our laws. Ask yourself, why is it that he is making a huge effort to not enforce the current laws on the books? Why is it that he is saying there needs to be a path to citizenship? Why is it that he is refusing to enforce our borders? Why is it that he is actively doing nothing but to delay to resolve the problem? Any president worth their salt, any president who understands his or her oath to the United States, and the Constitution would not be stonewalling or pussy footing around the issue and would put a stop to the lawlessness now, and not later.

Also, why does the media and government insist on calling those individuals who have broken our immigration laws as “undocumented immigrant?” Why not call them for what they really are, ILLEGAL IMMIGRANTS or ILLEGAL ALIENS. This comes to show you that the mainstream media are in on it, too. Why do I say this? It is because if the media were doing its job properly, they would call things for what they really are and would not sugar coat it with a fancy buzz word. This is like calling a serial rapist or murderer a “misunderstood individual.” What is there to misunderstand, except that these individuals are ILLEGALLY here, and have thus broken our immigration laws.

The fact that illegal immigrant minors are being encouraged to come here testifies to the fact that this is done deliberatively shows you our governments knows what it is doing and as a result is allowing it to continue. Illegal immigrants get better treatment than our veterans or poor and this comes to show you the state of our republic and the disdain that President Obama, Nancy Pelosi and the likes thereof has for us. They’re interested in our laws, they’re interested in staying in power, and they’re interested in seeing how much money they can make off of the backs of hard working Americans.

 

My greatest fear, is that the only way to fix the problems now inherent in our republic is not through the ballot box, because it has shown time, and time again it is not working. The argument will soon be exhausted, the long war of words between the leaders of our republic and the American citizen will be waxed into a war of guns.

 

The American citizen, I am afraid, will come to the realization gradually and naturally in this furnace of debate, the ballots have been cast, our leaders have not honored their oaths, nothing has been done, and the citizenry will assume the mantle once held by our Southern Sister States in 1861, by the great Troup of Georgia: “The argument is exhausted; we stand to our guns.”

I.R.S. Conspiracy and the White House: Who do you trust?

June 15, 2014 Leave a comment

So the I.R.S. is claiming that they lost all of Lois Lerner’s e-mails for the last two years or so. Any one with a I.T. background would know that a high level government organization like the I.R.S. would and does have redundancy checks in place to protect against losing e-mails or data on their file servers. Any organization, like the I.R.S., with an I.T. department that does not have such checks against data loss is probably filled with incompetent people, in particular the management.

However, I refuse to believe that this is the case, it is my opinion that the I.R.S. is filled with competent I.T. workers that are smart and capable. It is my belief, that the upper management, some members of Congress, including the White House are involved in a conspiracy to keep those e-mails secret. Think about it for one moment. Why would would government officials, in particular publicly elected officials want to hide or discard those e-mails that Lois Lerner sent?

The answers are not hide to find, all we have to do is put two and two together and we will see that it is about keeping the current two party system in power and intimidating conservative groups. Congress requested the e-mails of Lois Lerner, and the I.R.S. from 2009 through 2011, when most of the targeting of the conservative groups were taking place. Now as the public pressure to investigate grew in 2013, Congress began its investigation, along with a White House promise to get to the bottom of this whole fiasco.

Unfortunately, Commissioner Koskinen promised to produce to all of Lois Lerner’s documents, when it came to time to hand in his homework, he failed to produce it. Why? Because to produce the documents in question would have exposed not just the members of Congress, the I.R.S. but would have implicated the White House. So, as a result, President Obama through indirect channels along with members of Congress told certain I.T. employees of the I.R.S. to make unavailable the documents in question.

It sounds crazy, right? Any one in their right minds would believe that a conspiracy such as this would be good for a Saturday Night Live comedy skit, but unfortunately, this is not the case. Remember:

  • if the United States government can fabricate an incident like the Gulf of Tonkin which led us straight into a conflict with Viet Nam and learn years later the event was a false flag,
  • if the government can fabricate a wild story, that a man in a cave orchestrated most massive conspiracy and attack against the United States, and yet there are so many coincidences that leaves much to the laws of physics being absent on that horrible day
  • if the government can fabricate a story that Saddam Hussein had weapons of mass destruction, and come to find out, Saddam Hussein had no WMDs
  • if the government can fabricate a story that only two brothers, Tamerlan and Jahar Tsarnaev with a rice cooker orchestrated a conspiracy knowing full well that they were in contact with the agencies of the CIA and FBI
  • if the government can fabricate a story, that a boy with asperger syndrome can suddenly become a mass murderer of 26 people

. . . than how can we believe what the government is saying is true? What makes you think the government would not fabricate another story?

Keep in mind, to question government version of events is paramount to being called paranoid, delusional or my favorite term, a conspiracy theorist. They like to call people who question the government narrative crazy, or that the Boogey man is out to get them. However, it is not a conspiracy theory or one isn’t being paranoid when the Boogey man actually does say he is out to get you!

Now back to the I.R.S., their I.T. and those lost e-mails. . .

Why this story continues to be a debate in the mainstream media and general public at large would be a topic appropriate for an investigative report in psychology and not an issue in the respective fields of I.T. or American politics. The average American citizen is not expected to have the technical expertise of complex enterprise e-mail systems or expertise of some one who has been in the I.T. field for the past 20 years. It should be noted that I am not field expert in enterprise I.T. solutions but base my observations for last 20 years from being in the field of I.T. as a programmer, operating systems enthusiast and having to interface / communicate with those involved with file server and e-mail administration.

Most big companies, like say, Adobe, Yahoo!, or Google have I.T. infrastructures with data retention. In other words, these big companies store information, like your emails, photos, documents, etc. on massive hard drives. The same can be said with the I.R.S., Congress, and the White House. These hard drives than are copied, and are backed-up onto other hard drives. Now, to ensure that the e-mail system is not damaged and to ensure continuity, there are secondary hard drives(5 to 10 or even more) connected to the e-mail system. These hard drives are called a R.A.I.D. The word R.A.I.D. stands for “Redundant Array of Inexpensive(or Independent) Disks.” There are different types of R.A.I.D. levels, but for the sake of simplicity, we’ll just say RAID. Now if main drive of the e-mail server fails, one of the RAID disks will pick up where the main drive left off. So this prevents the e-mail system from crashing and the data is still intact.

Now, every now and than, the e-mail server will do some house keeping called data backup. During a data back up, the e-mail system will take its current data from the main drive and copy itself to another hard drive. This hard drive that the e-mail is backed up to is than removed and a new blank disk is put in so that when the next scheduled back up occurs, it can put in the new data. Now most organizations use Microsoft Outlook as their client and Microsoft Exchange as their e-mail server. E-mail Servers can have terabytes of data backed up but which are accessible by simply using the e-mail server to get that data back or by using recovery software to retrieve e-mail. Now back ups can go as far back as 5 to 6 years depending on the I.T. infrastructure and resources available. Given that the I.R.S., Congress and White House have funds available courtesy of the American tax-payer to meet this kind of I.T. demand, the odds of them having e-mail back ups from the Bush, Sr. and Clinton days, odds are they have the e-mails of Lois Lerner and those involved in the conspiracy.

Now for the interesting part! If the White House, and I.R.S. use the software I think they use, also known as Microsoft products, on every PC that uses Microsoft Outlook, the email client, their exists a file called a PST file which holds also the emails that the user has sent, received or is in draft format. This file can grown very fast or very slow depending on the e-mail activity and my intuition tells me Lois Lerner, some members of Congress and the White House were extremely busy e-mailing each other over who to target. Now keep in mind, this communication could occur over other channels as well such as encrypted instant messages but for the sake discussion, lets concentrate on the e-mail client.

So an I.T. administrator could go into the e-mail server, either by using the interface or write a piece of programming code to literally go into hard disk and remove the e-mails in question of that user. By doing that, you erase the e-mails, however, there remains a problem: the back-ups! This would mean, that the I.R.S., and their co-conspiractors would have had to go into the data back-ups and do the exact same thing. Keep in mind, these data back-ups can range from gigabytes of data to terabytes of data. They would have to do this to also to those involved, such as the members of Congress that are involved to members of the White House. Odds are, they replaced those data drives with modified data which excludes mysteriously the incriminating evidence of Lois Lerner which could be just scrambled data. Another problem is that the e-mail keeps a log of all the activity, so we could pretty find out who e-mailed who, at what time and day. It won’t have the contents of the e-mail but you would get an idea of the activity.

So if I was looking something, I would start at the log level. Look at the data logs of the e-mail activity, and work your way backwards by subpoenaing the e-mails of those that e-mailed Lois Lerner, certainly their e-mails haven’t been damaged, and if they mysteriously are, than you know they deliberately deleted them. If they did, just go to the e-mail back-ups and that should have the answers.

Hopefully this gives you a small idea of how e-mail systems work, while I am not an expert by any means in e-mail servers or their administration, however, I have been dealing with people in the I.T. industry for 20 years who handle e-mail servers and data retention. So every now and than over the past 20 years, I have had to collaborate with them and learn how e-mail systems work because of projects I have had to do at work. So I would hope and think my experience is worth something, I hope. I would urge any one in the I.T. field, please fact check what I said, and if I am wrong, fine, feel free to mock me at my expense.

Oh yeah, one more thing, should this blog post “mysteriously” disappear, don’t worry, I have back ups and will be posted in different websites and locations!

A Little About Me:

Programmer since 1996: Java, PHP C, C++, JavaScript, VB, BASIC, PERL, bsh

Proficient in Linux/UNIX, MS Windows, OS X, VAX/VMS

Database Proficiency: mySQL, Oracle, MS SQL Server

Proficient in MS Outlook, Thunderbird and most software used in enterprise level organizations