Tag Archives: Americans

US Army Preparing for Deadly Forced Against Unarmed US Civilians

US Army Preparing for Deadly Forced Against Unarmed US Civilians

Training to use lethal Force during “Full Scale Riots”

Training manual outlines “sniper response” during crowd control operations

by PAUL JOSEPH WATSON, Infowars.com

Document: Army Preparing to Use Lethal Force Against "Unarmed Civilians" During "Full Scale Riots" in U.S.

A document released by the U.S. Army details preparations for “full scale riots” within the United States during which troops may be forced to engage in a “lethal response” to deal with unruly crowds of demonstrators.

The appearance of the document amidst growing unrest in Ferguson, Missouri, with the National Guard now being called in to deal with the disorder, is an ominous coincidence.

The 132-page document, titled U.S. Army Techniques Publication 3-39.33: Civil Disturbances (PDF), was written in April 2014 and recently obtained by Public Intelligence.

Soldier fighting military

The document makes it clear that the techniques detailed therein are to be applied both outside andinside the “continental United States (CONUS)” in the event of “unruly and violent crowds” where it is “necessary to quell riots and restore public order.”

The training manual outlines scenarios under which, “Civil unrest may range from simple, nonviolent protests that address specific issues, to events that turn into full-scale riots.”

The most shocking aspect of the document is the fact that it describes the deployment of a “lethal response” directed against “unarmed civilians,” including “sniper response” and “small arms direct fire.”

Under the heading “sniper response,” the document states, “Ensure that target leaders or troublemakers are targeted,” in addition to a passage which states, “Exploit the psychological effect of an attack.”

Under the heading “small arms direct fire,” the manual states, “Escalate gradually, starting with a small caliber, single round and work up to a large caliber, automatic.”

Another graphic which depicts “escalation of trauma” directs soldiers how to use “riot batons” in order to cause the necessary level of injury or death to the subject. “Deadly force final target areas” include the back of the neck, the solar plexus, the neck, the spine and the head.

In light of events in Ferguson, where a predominantly black community has faced off with militarized police, it’s interesting to note that the manual makes reference to civil unrest that can arise out of “ethnic hatred” and, “Community unrest (that) results in urban conflicts that arise from highly emotional social and economic issues.” The document also mentions how rioters target “retail stores,” as happened during the looting in Ferguson.

“Significant ethnic differences in a community can create an atmosphere of distrust, even hatred…… (and) can cause an eruption of civil disorder that can lead to full riots,” states the document.

Although the document makes reference to the Constitutional rights of American citizens it goes on to stress that such protections are null and void under a state of emergency, asserting that Posse Comitatus, which is supposed to limit the power of the federal government to use military personnel domestically, “does not apply” under declared “emergency authority” or “When the need for the protection of federal property or federal functions exists.”

Police searching car
Police searching car

It is important to stress that this training manual applies to U.S. Army operations in foreign countries as well as domestically on U.S. soil. Indeed, section 2-18 of the document goes into detail about domestic protests such as the 1999 anti-WTO demonstration in Seattle.

The emergence of the document as National Guard troops prepare to descend on Ferguson, Missouri to deal with looting and civil unrest follows a report we published just a few weeks before the outbreak of the Ferguson riots which documented how National Guard troops were training to detain unruly African-American citizens in prison camps before handing them over to police.

In a special video report, Alex Jones documented how the story was part of wider preparations by the government for domestic disorder that have been ongoing for years.

We have reported previously on similar documents that outline how the U.S. Army would be forced to resort to lethal measures in order to deal with unruly Americans during times of emergency within the United States.

In 2012 we covered FM 3-39.40 Internment and Resettlement Operations, a U.S. Army manual that describes how political activists in prison camps will be indoctrinated by specially assigned psychological operations officers. The document makes numerous references to how government agencies like the DHS, ICE and FEMA will be involved in the domestic internment of U.S. citizens during “civil support operations.”

second US Army Military Police manual that was leaked months later also outlined how military assets would be used domestically to quell riots, confiscate firearms and even kill Americans on U.S. soil during mass civil unrest.

U.S. troops and National Guard also worked with local police to incarcerate Americans in detention camps during drills Alex Jones covered in 1999 in Oakland, California.

A report produced in 2008 by the U.S. Army War College’s Strategic Institute warned that the United States may experience massive civil unrest in the wake of a series of crises which it termed “strategic shock.”

“Widespread civil violence inside the United States would force the defense establishment to reorient priorities in extremis to defend basic domestic order and human security,” stated the report, authored by [Ret.] Lt. Col. Nathan Freir, adding that the military may be needed to quell “purposeful domestic resistance”.

Rex 84, short for Readiness Exercise 1984, was established under the pretext of a “mass exodus” of illegal aliens crossing the Mexican/US border.

During the Iran-Contra hearings in 1987, however, it was revealed that the program was a secretive “scenario and drill” developed by the federal government to suspend the Constitution, declare martial law, assign military commanders to take over state and local governments, and detain large numbers of American citizens determined by the government to be “national security threats.”

Ebola Tests Across The Nation; Gov’t Suppresses News

Ebola Tests Across The Nation; Gov’t Suppresses News

ebola suits medical workers

 

After Tuesday’s Ebola update news conference in New York, confusion reigned on the “six” patients reportedly being treated for possible Ebola infections in the Big Apple. Breitbart News has learned that the confusion stems from there not being six potential Ebola cases in New York– it seems that the CDC was talking about six patients nationwide, meaning the scare has spread across the country.

What is the Ebola Virus?

In a report on Tuesday, CNN’s Sanjay Gupta cited the CDC saying that there were six patients being watched for the deadly virus. From there news agencies across the country reported that there were six just in New York. Gupta did not specify New York, though, and it seems that his words were misconstrued by subsequent reports.

Ebola Images and Pictures

A few hours after the conference, New York’s Mr. Sinai corrected the record in a press release, saying that contrary to recent reports, “there is only one patient currently at Mount Sinai being tested for the Ebola Virus Disease (EVD).”

Why is Obama Bringing the Ebola Virus to the US?

Sources in the NYC Department of Health and Mental Hygiene confirmed that there was only one patient in New York City who was isolated for fear of the virus.

As to the five other patients, ABC News reported on Tuesday that “The CDC said has tested blood samples from six people with possible Ebola symptoms who had recently traveled to West Africa.” The report did not specify where all six patients were, but did not suggest they were all in New York. In fact, the same ABC report mentions a case in Ohio, where a woman tested negative for the virus.

Additionally, the CDC reported that one patient at Johns Hopkins in Baltimore, Maryland was tested for Ebola. While testing negative for Ebola, the woman was found to have contracted malaria.

This leaves three patients across the country that have been tested for Ebola, with the CDC not stating whether they tested positively or negatively, or where they are.

Breitbart News has reached out to the CDC to request more information on these three cases– particularly location and viral status. No reply has been received at press time.

Americans Protecting Themselves Labeled ‘Extremists’ By US Gov’t

Americans Protecting Themselves Labeled ‘Extremists’ By US Gov’t

by WASHINGTON’S BLOG JULY 6, 2014  by Infowars

Department of Homeland Security

In the wake of revelations about the extent of mass surveillance by the NSA and other agencies, people are trying to protect themselves by adopting encryption and other privacy tools.

The Guardian reported in January:

The gathering crisis of trust around consumer web services and the fallout from Edward Snowden’s revelations is fuelling a significant uptake in anonymity tools, new research shows, as internet users battle censorship and assert their right to privacy online.

Globally, 56% of those surveyed by GlobalWebIndex reported that they felt the internet is eroding their personal privacy, with an estimated 415 million people or 28% of the online population using tools to disguise their identity or location.

Aggregating market research data from 170,000 internet users worldwide, GWI found that 11% of all users claim to use Tor, the most high profile for anonymising internet access.

TOR Project

Tor was created – largely with funding from the U.S. government – in order to allow people who live in repressive authoritarian regimes to communicate anonymously on the Internet.

So it is ironic that the NSA targets as “extremists” (the word the U.S. government uses for “probable terrorists”) anyone who uses Tor or any other privacy tool … or even searches for information on privacy tools on the Internet.

Jacob Appelbaum and other privacy experts explain at Das Erste:

– Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.

– Among the NSA’s targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.

The NSA program XKeyscore is a collection and analysis tool and “a computer network exploitation system”, as described in an NSA presentation. It is one of the agency’s most ambitious programs devoted to gathering “nearly everything a user does on the internet.”

The source code contains several rules that enable agents using XKeyscore to surveil privacy-conscious internet users around the world. The rules published here are specifically directed at the infrastructure and the users of the Tor Network, the Tails operating system, and other privacy-related software.

Spying

The former NSA director General Keith Alexander stated that all those communicating with encryption will be regarded as terror suspects and will be monitored and stored as a method of prevention, as quoted by the Frankfurter Allgemeine Zeitung in August last year.

The top secret source code published here indicates that the NSA is making a concerted effort to combat any and all anonymous spaces that remain on the internet. Merely visiting privacy-related websites is enough for a user’s IP address to be logged into an NSA database.

The comment in the source code above describes Tails as “a comsec mechanism advocated by extremists on extremist forums”. In actuality, the software is used by journalists, human rights activists, and hundreds of thousands of ordinary people who merely wish to protect their privacy.

Tor Project’s Roger Dingledine stated the following:

We’ve been thinking of state surveillance for years because of our work in places where journalists are threatened. Tor’s anonymity is based on distributed trust, so observing traffic at one place in the Tor network, even a directory authority, isn’t enough to break it.

Tor has gone mainstream in the past few years, and its wide diversity of users – from civic-minded individuals and ordinary consumers to activists, law enforcement, and companies – is part of its security. Just learning that somebody visited the Tor or Tails website doesn’t tell you whether that person is a journalist source, someone concerned that her Internet Service Provider will learn about her health conditions, or just someone irked that cat videos are blocked in her location.

Trying to make a list of Tor’s millions of daily users certainly counts as wide scale collection. Their attack on the bridge address distribution service shows their “collect all the things” mentality – it’s worth emphasizing that we designed bridges for users in countries like China and Iran, and here we are finding out about attacks by our own country.

If you read Linux Journal – or even read extremely popular sites like Boing Boing – the NSA will target you.

Reddit and other popular websites have promoted privacy tools. 6% of all American adults – and 15% of males aged 18-29 – use Reddit. Are they targeted as well?

If you think we’re exaggerating the threat to privacy from the NSA, remember that the Department of Homeland Security called DHS’ own privacy office “terrorists”.

And the Department of Justice blacked out words in a document saying their disclosure would pose a “grave threat” to national security. The words? The Fourth Amendment.

This flies in the face of American values. After all:

– The Founding Fathers valued privacy over safety. Indeed, the Revolutionary War was largely started to stop the use of spying by the British. Background here. In other words, the Founding Fathers gave up their safe life with little freedom to strive for real freedom.

– The Founding Fathers – and later the Supreme Court – also said that Americans have the right to anonymous political speech

And it shows an authoritarian mindset of treating any attempt to resist their power as terrorism.

Indeed, it is like a cancer that treats any immune system response as a threat to be taken out.

Examples are – sadly – widespread in modern America:

– Reporters are treated as the enemy. And real journalism – that is, exposing government corruption – is treated as terrorism

– Whistleblowers who expose government wrongdoing are prosecuted … in order to hide government hypocrisy

– The Department of Homeland Security and other government agencies want to unmask everyone, so that we have no anonymity in our political speech

– Protesting against the government’s claimed power to indefinitely detain anyone without charge … could result in your getting detained

– Indeed, protesting anything is considered low-level terrorism

– The Associated Press reported in 2011 – in relation to the pepper spraying of peaceful UC Davis students participating in Occupy protests:

Charles J. Kelly, a former Baltimore Police Department lieutenant who wrote the department’s use of force guidelines, said … After reviewing the video [of the pepper spraying of UC Davis students] he observed at least two cases of “active resistance”from protesters. In one instance, a woman pulls her arm back from an officer. In the second instance, a protester curls into a ball. Each of those actions could have warranted more force, including baton strikes and pressure-point techniques.

“What I’m looking at is fairly standard police procedure,” Kelly said.

– Videotaping or photographing police beating up peaceful protesters may be considered terrorism

Of course, NSA apologists will pretend that targeting privacy tool users is necessary to stop the bad guys. This argument is demolished by the fact that for 5,000 years straight, mass surveillance has always been used by tyrants to crush dissent.

Feds Seize Spy Records in Florida to Keep them Secret

By Josh Ely, WND.com

WASHINGTON – Federal agents in Florida seized cell phone surveillance records that were targeted in a “run-of-the-mill” public records request in state court so that information about the tracking process, using devices known as “stingrays,” would be kept from the public, according to a report.

The fight is being handled by the American Civil Liberties Union, whose staff attorney, Nathan Freed Wessler, explained the situation online.

Related: Police Depts Quietly Preparing For War

“A run-of-the-mill public records request about cell phone surveillance submitted to a local police department in Florida has unearthed blatant violations of open government laws, including an incredible seizure of state records by the U.S. Marshals Service, which is part of the Justice Department,” he wrote in an online posting.

SpyingHe said his organization has been filing dozens of public records requests all over Florida because it is interested in the use of “controversial cell phone tracking devices known as ‘stingrays.’ … Stingrays track phones by mimicking service providers’ cell towers and sending out powerful signals that trick nearby phones – including phones of countless bystanders – into sending their locations and identifying information.”

In one case, though, officers from the U.S. Marshal’s office in Tampa seized the records only hours before ACLU officials were scheduled to gain access to them. An emergency motion was filed, but Wessler argues online that the federal move was outlandish.

He noted that what eventually was revealed was that “stingrays ‘emulate a cell phone tower’ and ‘force’ cell phones to register their location and identifying information with the stingray instead of with real cell towers in the area.”

The details also revealed stingrays can track cell phones any time they are on, they can force cell phones to “transmit information back ‘at full signal, consuming battery faster,’” and capture details from all cell phones in the region, including those of innocent bystanders.

In the specific case, police allegedly used one stingray mounted on a police vehicle to drive through the area until they pinpointed an apartment complex, and walked door to door inside the building with another unit to figure out which apartment a cell phone was located in.

“In other words, police were lurking outside people’s windows and sending powerful electronic signals into their private homes in order to collect information from within,” Wessler wrote.

In seizing the records originally, the U.S. Marshals claimed that they had deputized a Sarasota police officer investigating a case with evidence provided by the device.

The documents reveal that police there have used the devices an estimated 200 times since 2010, but police have not ordinarily cited their source of information in documents, even search warrants, because the device’s maker insisted on a nondisclosure agreement.

The concept of such secrecy bothered author Cheryl Chumley, whose “Police State U.S.A.” addresses issues of privacy.

ATF Police“Of course the federal government doesn’t want America to learn specifics of its stingray program. The entire gist of the program is to covertly track people using their mobile phones and devices. If Americans learned just how much of their privacy was being encroached, that might cause enough outcry that the government would then have to obtain warrants before using it – something they have a growing track record of disdaining,” she said.

The ACLU’s interest in the stingray device developed with a case several years earlier, in which a defendant was identified in an alleged electronic tax fraud scheme through the use of the devices.

Authorities had supposedly sought judicial approval in their use of the stingray device in the case, but in actuality had not.

The duplicity was uncovered when a northern California ACLU office won a Freedom of Information lawsuit in 2013. It granted the ACLU access to Department of Justice emails that revealed the use of the devices.

From California, the ACLU’s interest spread to Florida and the Thomas v. State case, where Tallahassee police had used a stingray in locating a suspect in an alleged sexual battery and theft case. It was a cell phone that allegedly was taken.

The defendant now has been granted new court proceedings in his case, based on the fact authorities did not obtain a search warrant but instead used the secret stingray to hunt down information.

The appellate court opinion said, “We assume the police had probable cause to believe the missing cell phone was inside the apartment. But they needed a warrant, as well, absent any exception justifying their forced entry.”

The federal acquisition of state records, making them federal records, was a new concept for many, including a former U.S. magistrate judge, Brian Owsley, who told Ars Technica, “This one is particularly disturbing given the federal government’s role in coming in and taking all of these records that were at issue in a state open government act.”

Policy analyst Jay Stanley wrote for the ACLU a warning about secrecy:

“When one party to a dispute before a court, including the Supreme Court, can make assertions that the other party cannot dispute because of ‘state secrecy,’ then distortions, inaccuracies, and outright lies inevitably follow and should surprise no one,” he wrote. “Secrecy powers are inherently dangerous in a democracy, and need to be very tightly confined to those specific circumstances where the national interest genuinely requires that they be granted. Unfortunately, in the absence of strong checks and balances, government secrecy is metastasizing throughout our democracy. Drastic reform is needed to fix this situation. Nothing else will do.”

Josh Ely is a WND intern.

Facecrook: NSA storing your facial web images, millions intercepted daily

Facecrook: NSA storing your facial web images, millions intercepted daily

Reuters / Mario Anzuoni

The National Security Agency is collecting millions of images of people through its international surveillance network to be implemented in a number of other facial recognition programs, according to documents leaked by Edward Snowden.

Read Snowden’s comments on 9/11 that NBC didn’t broadcast

Thanks to rapid advances being made in the field of facial recognition technology, the NSA is much better equipped to “exploit the flood of images included in emails, text messages, social media, video conferences and other communications,” according to an article in the New York Times, co-written by Laura Poitras, who, together with Glen Greenwald, are the only two journalists to have received the leaked NSA documents.

The NSA has the capacity to intercept “millions of images per day,” as well as some 55,000 “facial recognition quality images.” This latest milestone in US intelligence gathering, which goes a long way to putting the final touches on the much-feared Orwellian nightmare, gives the US spy agency“tremendous untapped potential,” according to the 2011 documents.

“It’s not just the traditional communications we’re after: It’s taking a full-arsenal approach that digitally exploits the clues a target leaves behind in their regular activities on the net to compile biographic and biometric information” that can help “implement precision targeting,” noted a document dated 2010.

Such comments are bound to spark fears that the harvesting of facial images, much like the collection of oral and written communications, will snag innocent Americans in the vast intelligence net.

The latest revelations to be gleaned from Snowden’s stash of top-secret documents prove the NSA is not just interested in collecting the meta-data from global communications, but also the images that put a face on potential terrorists and other would-be adversaries of the American government.

The NSA is unique in its ability to match images with huge troves of private communications.

“We would not be doing our job if we didn’t seek ways to continuously improve the precision of signals intelligence activities — aiming to counteract the efforts of valid foreign intelligence targets to disguise themselves or conceal plans to harm the United States and its allies,” said Vanee M. Vines, the agency spokeswoman.

ID databases out of the game?

Since most people have a number of photographs taken of themselves for identification purposes, the question arises as to how much reach the NSA has in acquiring peoples’ facial images.

According to Vines, the NSA does not access driver’s licenses or passport photos of Americans, but refused to say whether the agency had access to the State Department’s photo archive of foreign visa applicants. She also declined to say whether the spy agency collected photographs of Americans from social media sources, like Facebook and Instagram, which would not be a difficult task considering that millions of people willingly post ‘selfies’ to the web.

Moreover, the report claimed that one of the agency’s most intense efforts to acquire facial images is through a program dubbed Wellspring, which “strips out images from emails and other communications, and displays those that might contain passport images.”

AFP Photo / Chris Hondros

AFP Photo / Chris Hondros

Because images are considered a form of communicational content, the NSA is required to get court approval for collecting facial images of Americans, just as it is required to read emails or listen in on phone conversations, an NSA spokeswoman was quoted in the Times article as saying.

However, exceptions may be made in the event “an American might be emailing or texting an image to someone targeted by the agency overseas,” it said.

Human rights and civil liberty groups are expressing concern that the power of the technology, in the hands of government and corporate officials, could have a disastrous impact on privacy.

“Facial recognition can be very invasive,” Alessandro Acquisti, a researcher on facial recognition technology at Carnegie Mellon University in Pittsburgh, told the paper. “There are still technical limitations on it, but the computational power keeps growing, and the databases keep growing, and the algorithms keep improving.”

Harvesting on video conferences

The NSA facial recognition program made tremendous headway in 2010 when it successfully matched images from two separate databases, one in the NSA database code-named Pinwale, and another in the government’s primary terrorist watch database, known as Tide, the NSA files revealed.

That technical breakthrough led to an “explosion of analytical uses” for the agency.

The NSA has since brought on board “identity intelligence” analysts whose job it is to match the facial images with other records about individuals to build broad portfolios of intelligence targets.

The full depth of the image-collection program is daunting in that it has developed sophisticated methods of integrating facial recognition programs with numerous other databases.

Reuters / Nacho Doce

Reuters / Nacho Doce

“It intercepts video teleconferences to obtain facial imagery, gathers airline passenger data and collects photographs from national identity card databases created by foreign countries, the documents show,” the files revealed.

They also show that the NSA was attempting to infiltrate such databases in Pakistan, Saudi Arabia and Iran.

Aside from its own programs, the NSA partially relies on commercially available facial recognition technology, including from PittPatt, a company owned by Google, the leaked files show.

Geo-positioning does matter

But the power of facial recognition technology apparently goes beyond the collection of faces, and includes geographic points photographed from satellites.

One leaked file shows photographs of several men standing near a waterfront dock in 2011. Through the use of the recognition technology, the NSA was able to match their surroundings to a satellite image of the same dock taken about the same time.

The document said the photograph showed a militant training facility in Pakistan.

Meanwhile, US law remains surprisingly flimsy in terms of the protections it offers Americans when it comes to their images.

“Unfortunately, our privacy laws provide no express protections for facial recognition data,” said Senator Al Franken, Democrat of Minnesota, in a letter in December to the head of the National Telecommunications and Information Administration.

News of the NSA’s ‘facial-mining’ techniques echo earlier leaked information, reported in February, that Britain’s spy agency GCHQ, in direct cooperation with the NSA, intercepted and stored the webcam images of millions of internet users not suspected of terrorism or other criminal behavior.

GCHQ records between 2008 and 2010 reveal a surveillance program, codenamed Optic Nerve, harvested still images of Yahoo webcam chats and stored them on databases, the Guardian reported.

“In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally,” the paper reported.

Obesity on the rise in America; how to fix it

Obesity on the rise in America; how to fix it

fat man on beach obese
Sexy on the beach

Obesity has been on the rise for years in America.  A recent Gallup poll shows that 27.7% of Americans are way over weight.  This goes up significantly if we include those of us who need to lose 20 pounds or less.

On FoxNew last night Bill O’Reilly and John Stossels argued on why and how to fix it.  They reminisced through our history where medical researchers once said fiber was bad for you, but now its not.  Fat and red meat were bad for you and now its not.

On the fat issue, medical scientists once said fat is very bad so avoid it.  But then came the low carb, high fat Atkins diet where you could devour huge sums of bacon, steaks, hamburger meat etc.  The medical scientists said this is a bad idea.  But Dr. Atkins stuck to his plan and now after years of studies, it appears Atkins was right.  Fat is not necessarily bad for you.

So the earth really isn’t flat and the sun doesn’t revolve around the sun.

A medical study a few years ago that included millions of people from around the world concluded that societies and countries that had low sugar consumption have almost no heart disease or diabetes.  This includes mainly Asia countries where meat and rice are the main dietary foods.  Mainly “advanced” societies such as the US, Britain, etc had huge health problems because our diets have large amounts of sugars.

Now Michelle Obama is spending $400 million dollars to fix school menus in order to “fix” the obesity in children.  Her plan, and law, will be that any school that receives federal funding MUST comply with this menu.

Here we go with another mandated government law trying to fix a problem.  Why are we always trying to make laws to regulate how people live?  What’s next, trying to regulate the size of a soda we can drink? (see story)

So this kid a few days ago kills people on a college campus in California, which is very sad, terrible, and shouldn’t have happened.  Of course its the guns fault according to liberals and democrats. That gun decided to get up that morning and target random individuals.

So out of 120 million gun owners yesterday who own over 300 million guns, we have to punish them instead of looking at ONE mentally troubled kid who it turns out the police failed to take into custody after being called by the kid’s therapist and many disturbing warning signs.

So a strong analogy between these two stories but we are blaming the food and the school systems for kids being fat.  So most all of us went to public schools. I see no way I could EVER get fat off my school lunch.  First, it wasn’t that great and second there wasn’t that much.

Michelle is trying to fix a problem that doesn’t exist…at least in the school systems.  The problem is YOU!…the parents.

Fat chubby kid eating watching TVOur kids come home from school grab a bag of chips, a couple of Twinkies, and chocolate chip cookies and a soda. That would be sugar plus more sugar plus extra fat and sugar.

Then they plop down in front of the TV to play Xbox or watch cartoons.  So lots of sugar and fats plus no exercise. Huh?  See where I’m going with this.  It doesn’t take a rocket scientist to figure this stuff out and it doesn’t take more government regulation.

When I was a kid we ate tons of sugar right after school but there was no Xbox so we had to go outside and rough it by playing football, basketball, or on a slow day, soccer.  We even had to walk to the neighbors pond about 200 yards away to go fishing. Oh and then there’s my Dad making us work! Mowing, raking, sweeping, and evening painting occasionally.

Today we can fish on the convenience of the Wii right from our TV.   We can even pause the game long enough to get another round of Twinkies and sodas.

Again, the government is trying to “fix” a problem that they can’t fix.  It lies in society with the parents and the proper training of our kids.  Instead we have become a society who doesn’t make our kids work, play outside, and instead stuff their face with Twinkies.

fat kid smoking
Chubby kid firing one up

If we can also teach our kids to smoke, we can add heart disease, lung disease, stroke, and diabetes to the long list of things we can give them later in life.

 

Please write your Congressman and let them know to not implement any of Michelle’s policies because we parents are to blame, not the government.