Educational

[Home] [Downloads] [Videos] [Documents] [Weapons] [Links] [Our Shops] [Chat] [Contact Us]

Important Information

The Communist Manifesto - A spectre is haunting Europe -- the spectre of Communism. All the Powers of old Europe have entered into a holy alliance to exorcise this spectre: Pope and Czar, Metternich and Guizot, French Radicals and German police-spies.

Hitler's Enabling Act - On March 23, 1933, the newly elected members of the German Parliament (the Reichstag) met in the Kroll Opera House in Berlin to consider passing Hitler's Enabling Act. It was officially called the 'Law for Removing the Distress of the People and the Reich.' If passed, it would effectively mean the end of democracy in Germany and establish the legal dictatorship of Adolf Hitler.

A Balancing Act between Crime Prevention and Privacy Protection - Proposal for a Privacy Protection Guideline on Secret Personal Data Gathering and Transborder Flows of Such Data in the Fight against Terrorism and Serious Crime.

Mein Kampf - ON APRIL 1st, 1924, I began to serve my sentence of detention in the Fortress of Landsberg am Lech, following the verdict of the Munich People's Court of that time. After years of uninterrupted labour it was now possible for the first time to begin a work which many had asked for and which I myself felt would be profitable for the Movement. So I decided to devote two volumes to a description not only of the aims of our Movement but also of its development.

National Security and Double Government - National security policy in the United States has remained largely constant from the Bush Administration to the Obama Administration. This continuity can be explained by the “double government” theory of 19th-century scholar of the English Constitution Walter Bagehot.

Current Communist Goals - Compare these goals to what our current ruling class, progressives, dems, and some rinos are pushing on us.

Americas Top 20 Facts of (Law) Believe it or Not - This has gotta be bullshit.....

New World Order - The Ancient Plan Of Secret Societies - This book shows how an ancient plan has been hidden for centuries deep within secret societies. This scheme is designed to bring all of mankind under a single world government - a New World Order. This plan is of such antiquity that its result is even mentioned in the Bible - the rule of the Antichrist mentioned in the Revelation of Saint John the Divine.

Cloward And Piven Strategy - Francis Fox Piven and Richard Cloward are two Columbia University sociologists from the 1960’ and 1970’s. Wrote the article "The Weight of the Poor: A Strategy to End Poverty". This strategy seeks to hasten the fall of capitalism by overloading the government bureaucracy with a flood of impossible demands.

Rules for Radicals - Lest we forget at least an over-the-shoulder acknowledgment to the very first radical: from all our legends, mythology, and history (and who is to know where mythology leaves off and history begins—or which is which), the first radical known to man who rebelled against the establishment and did it so effectively that he at least won his own kingdom — Lucifer.

The International Solidarity Movement - Threat to America, Israel and the World - The International Solidarity Movement (ISM) is technically a Palestinian-led movement but involves heavy use of American radicals and leftists and exploits the U.S. educational system, particularly American colleges, to delegitimize the democratic State of Israel, a U.S. ally. At the same time, it provides support for groups such as Hamas that use armed violence and terrorism against Israel. The Meir Amit Intelligence and Terrorism Information Center

Report of the Accountability Review Boards - Bombings of the US Embassies in Nairobi, Kenya and Dar es Salaam, Tanzania on August 7, 1998. The near simultaneous vehicular bombings of the US Embassies in Nairobi, Kenya, and Dar Es Salaam, Tanzania, on August 7, 1998, were terrorist incidents costing the lives of over 220 persons and wounding more than 4,000 others.

Policing Free Speech - Police Surveillance and Obstruction of First Amendment - Protected Activity - United States law enforcement agencies, from the FBI to local police, have a long history of spying on American citizens and infiltrating or otherwise obstructing political activist groups. Political spying was rampant during the Cold War under the FBI’s COINTELPRO, the CIA’s Operation Chaos, and other program.

The Posse Comitatus Act and Related Matters: The Use of the Military to Execute Civilian Law - The Posse Comitatus Act outlaws willful use of any part of the Army or Air Force to execute the law unless expressly authorized by the Constitution or an Act of Congress. History supplies the grist for an argument that the Constitution prohibits military involvement in civilian affairs subject to only limited alterations by Congress or the President, but the courts do not appear to have ever accepted the argument unless violation of more explicit constitutional command could also be shown.

Lawsuit Reform for Competitive State Economies A Guide for State Legislators - A poll conducted in the summer of 2012 found that 89 percent of voters consider lawsuit abuse a problem and 83 percent think improvements need to be made to our lawsuit system. While many recognize that the legal system needs to be reformed,few know how to go about doing this. This Guide is intended to give policymakers an overview of lawsuit reform policy and some of the specific reforms helpful to the end goal of tempering excess in the legal system and efficiently delivering justice.

Case 1:17-cv-02726-JFK - BSG Resources (Guinea) Limited, Bsg Resources (Guinea) Sàrl, And Bsg Resources Limited, Plaintiffs, Against George Soros, Open Society Foundations, Open Society Institute, Foundation To Promote Open Society, Open Society Foundation, Inc., Alliance For Open Society International, Inc., Open Society Policy Center, And Open Society Fund, Defendants.

Potus & Political Warfare - BACKGROUND. The Trump administration is suffering under withering information campaigns designed to first undermine, then delegitimize and ultimately remove the President. Possibly confusing these attacks with an elevated interplay of otherwise normal D.C. partisan infighting and adversarial media relations, the White House response to these campaigns reflects a political advocacy mindset that it is intensely reactive, severely under-inclusive and dangerously inadequate to the threat. If action is not taken to re-scope and respond to these hostile campaigns very soon, the administration risks implosion and subsequent early departure from the White House.

Abuse and Misuse of Personal Information - Advances in technology provide a number of useful products and services that can either enhance or threaten personal privacy, depending on how these products or services are used and for what purpose. These goods raise serious concerns about privacy, which leaves policymakers looking for solutions, especially in the context of online privacy and biometric identification. In an effort to craft solutions to privacy concerns, experts argue that policymakers must exercise caution. Rushed and unconsidered solutions run the risk of limiting consumers and becoming unworkable.

State Budget Reform Toolkit - ALEC’s State Budget Reform Toolkit will advance a set of budget and procurement best practices to guide state policymakers as they work to solve the current budget shortfalls. The toolkit will assist legislators in prioritizing and more efficiently delivering core government services through advancing Jeffersonian principles of free markets, limited government, federalism, and individual liberty.

Department Of Defense Strategy For Operating In Cyberspace - Cyberspace is a defining feature of modern life. Individuals and communities worldwide connect, socialize, and organize themselves in and through cyberspace. From 2000 to 2010, global Internet usage increased from 360 million to over 2 billion people. As Internet usage continues to expand, cyberspace will become increasingly woven into the fabric of everyday life across the globe.

Restoring The Balance Thirteen Proposals To Return Sovereignty To The States - Cyberspace is a defining feature of modern life. Individuals and communities worldwide connect, socialize, and organize themselves in and through cyberspace. From 2000 to 2010, global Internet usage increased from 360 million to over 2 billion people. As Internet usage continues to expand, cyberspace will become increasingly woven into the fabric of everyday life across the globe. James Madison in Federalist No. 45 explained the idea for the new American government when he wrote, "The powers delegated by the proposed Constitution to the federal government, are few and defined. Those which are to remain in the State governments are numerous and indefinite." Unfortunately, since the time of our nation’s founding, the size and reach of the federal government has grown immeasurably, while the ability of states to solve local problems without federal interference has been limited.

Title 52—Voting And Elections - All citizens of the United States who are otherwise qualified by law to vote at any election by the people in any State, Territory, district, county, city, parish, township, school district, municipality, or other territorial subdivision, shall be entitled and allowed to vote at all such elections, without distinction of race, color, or previous condition of servitude; any constitution, law, custom, usage, or regulation of any State or Territory, or by or under its authority, to the contrary notwithstanding.

The State Legislator’s Guide Tort Reform Boot Camp - There has been much talk on both the national and state levels about tort reform, but there has been much less discussion about the particular policies included under this category. Many recognize that the legal system needs to be reformed but few know how to go about doing this. In fact, a poll conducted in the midst of the healthcare debate found that over 80 percent of people think some form of legal reform is needed.

Posse Comitatus – Has the Posse outlived its purpose? - The Posse Comitatus Act, has been a limitation on the use of military forces in civilian law enforcement operations since the Nineteenth Century. Today, where national defense may hinge on detecting smuggled biological or chemical weapons in small quantities, the continued relevance of this law is at issue.