Shaymus Crow’s film is an excellent overview of the treacherous acts committed by the government funded program known as Child Protective Services (CPS).
Social welfare-agencies have been allowed the right to remove neglected and abused children from the care of their families since the early 1800s.
A report by John E.B. Meyers describes the birth of the first governmental agency supposedly created to protect children. The agency, born in New York in 1875 was called the New York Society for Prevention of Cruelty to Children (NYSPCC).
According to Meyers’ report, by 1922 over 300 nongovernmental child protection societies were existing across America, the creation of the juvenile court soon followed which was first established 1899 in Chicago. By 1919, most states had juvenile courts.
In 1825, the Humane Society, a group dedicated to curbing violence against animals and humans, founded the National Federation of Child Rescue agency which was aimed at conducting investigations on child abuse.
The Humane Society, which branched off of the British Royal Society for the Prevention of Cruelty to Animals (RSPCA), pushed forward private child protection agencies modeled after “existing animal protection organizations.”
While the federal Children’s Bureau was first introduced in 1912, it didn’t receive mandatory funding until an amendment was made in 1958 which required the state to begin funding the agency.
In 1974, the Child Abuse Prevention and Treatment Act (CAPTA) was introduced to provide “financial assistance for a demonstration program for the prevention, identification, and treatment of child abuse and neglect.”
According to Meyers’, “Prior to 1974, the federal government played a useful but minor role in child protection. The Children’s Bureau paid little to no attention to child abuse until the 1960s.”
The Social Security Act of 1935 was amended in 1962 to “provide money to expand child welfare services.” However, in 1973 U.S. Senator Walter Mondale wrote, “Nowhere in the Federal Government could we find one official assigned full time to the prevention, identification and treatment of child abuse and neglect.”
It was Mondale’s interest and persuasion in the matter that influenced Congress to “assume a leadership role with the passage of” CAPTA.
CAPTA allocated funds for “training, regional multidisciplinary centers focused on child abuse and neglect, and demonstration projects.”
Meyers’ report states, “CAPTA played a major role in shaping the nationwide system of governmental CPS” that’s in place today.
The video’s narrator quotes Mondale stating that after the bill passed it would turn “child protection into a child snatching business.”
The legislation soon turned the operation into a $12 billion a year business.
In 1997, President Clinton passed the Adoption and Safe Families Act which was intended to “promote the adoption of children in foster care.”
ABC News aired an exclusive segment featuring foster kids prescribed to psychotropic drugs, illustrating the heartbreaking emotional pain and trauma that foster children endure.
But instead of finding a solution to prevent this destiny for children, the segment publicized the need for more state funding and further promoted the myth that children are institutionalized because of the abundance of bad parents.
Legislation that was originally created for the purpose of helping children, has transformed into a financial operation aimed at kidnapping children for the financial benefit of the state.
The more children removed, the more money that’s made. The children while under the state’s care are prescribed an average of seven medications in an attempt to keep them chained to the system for a lifetime.
The state and federal government justifies the inflicted trauma arguing that children “adapt.”
The business is so lucrative that advocates like Nancy Schaefer, who aggressively took action against CPS exposing their crimes, were subsequently removed. The media reported that Nancy Schaefer’s husband, troubled by financial problems, shot his wife to death while she slept before turning the gun on himself in 2010.
A report by Infowars.com speculated on the circumstances surrounding the couple’s death, finding it odd that a suicide victim would shoot them self in the chest.
The report read, “Even before a GBI investigation could be initiated, media outlets began pronouncing that their death was a ‘murder-suicide’ and shut off most public comment posting on their web sites.”
Most disturbing is that, not unlike many other evil government programs, the atrocities are directly funded by the taxpayer. In essence, citizen are paying for programs that could potentially remove their own children.
Moscow says security agency FSB is in talks with the FBI over Snowden. But the whistleblower will not be extradited to the US, a Kremlin spokesman said, adding he's sure the fugitive NSA contractor will stop harming Washington if granted asylum in Russia.
The one thing you need to know about Obamacare above anything else is that it was not passed to lower your costs or improve healthcare services and delivery. Obamacare is about cradle-to-grave control, a surveillance state horror that even one-time supporters of the law are beginning to realize (though much too late).
With the revelation that the federal government, through the National Security Agency, has been collecting phone and Internet records of U.S. citizens in the name of preventing terrorism, Americans are wondering whether private communication exists. Let’s explore how this surveillance works and the history of domestic spying programs (because, let’s face it, they’re not new) and how, even with broader knowledge of the government’s activities, a minority of Americans oppose such programs.
The recently revealed surveillance programs that collect mobile phone and Internet work in very much the same way: by copying data and filing it for searching and analysis.
Since the advent of the telephone, investigators and private individuals have used wiretaps and intercepted communications. And as technology has advanced, so have surveillance methods. But to be sure, the possibility that someone’s listening is nothing new.
Wiretapping starts soon after the invention of the phone. Early telephones require operators to patch and transfer calls, so intercepting communication on private calls is very easy. But even without operators, wiretapping is still relatively easy.
June 4, 1928
Supreme Court approves of wiretapping
In Olmstead v. United States, the court rules that federal agents can legally and constitutionally wiretap personal telephone conversations and use those conversations as evidence in court.
The Armed Forces Security Agency (the predecessor to the NSA) starts receiving microfilm copies of every telegram that enters and leaves the country and routes them to the appropriate agency. At one time the program was analyzing up to 150,000 messages a month (and this was before super-fast processing speeds and high-capacity storage).
Oct. 10, 1963–June 1, 1966
RFK, FBI Wiretap MLK
The FBI begins tapping the home and office of civil rights leader Martin Luther King Jr. Only after King’s murder is the program revealed.
Dec. 18, 1967
Katz v. United States
The Supreme Court overturns the previous precedent of Olmstead v. United States in a pair of decisions. One ruling says the Fourth Amendment applies to electronic transmissions, and the other says that the amendment extends to anywhere someone can reasonably expect privacy (a home, hotel room, phone booth, etc.).
June 19, 1968
Federal law restricts wiretapping
The Omnibus Crime Control and Safe Streets Act purports to restrict wiretapping and safeguard privacy, but it explicitly protects presidential powers to order surveillance in national security matters.
June 17, 1972–Aug. 9, 1974
President Richard Nixon directs a conspiracy to wiretap the Democratic National Committee headquarters and then tries to cover up the ensuing scandal. Nixon resigns, and several top aides are convicted in connection to the conspiracy.
Congressional critics began to investigate and expose Project SHAMROCK. In response, the NSA terminates the program.
Oct. 25, 1978
Foreign Intelligence Surveillance Act
Signed into law by President Jimmy Carter, FISA allows electronic surveillance without a court order under presidential authorization and permits court-ordered electronic surveillance. Later amendments would come during the so-called War on Terror.
Oct. 1, 1986
Electronic Communications Privacy Act
An amendment to a 1968 crime bill, the act seeks to enhance the privacy of emails, web pages, and cell phones and more while in transit by making search warrants harder to acquire. But it does little to ensure the privacy of stored electronic communications.
Oct. 23, 1995
First court-ordered Internet wiretap
A judge allows wiretapping in the case of Julio Ardita, who used Harvard computers to gain access to government sites. The first court-ordered wiretap allows authorities to identify and arrest Ardita, who pleads guilty in 1998.
2000 — 2006
ThinThread and Trailblazer
ThinThread, an NSA program intended strictly for foreign surveillance, is designed to compile massive amounts of phone and email data, systematically audit its own analysts and encrypt data tied to American citizens. The program never gets off the ground and is replaced by Trailblazer, a more expensive alternative that lacks the restriction against domestic surveillance. Trailblazer runs massively behind schedule and is abandoned in 2006.
Oct. 26, 2001
In response to the terror attacks of Sept. 11, President George W. Bush signs the Patriot Act, which includes allowing roving wiretaps that make it possible for warrants to cover an individual suspect rather than an individual device.
Oct. 31, 2001
Former NSA official William Binney resigns after learning the program he invented (ThinThread) had been transformed to target American citizens after 9/11.
Oct. 16, 2005
The New York Times exposes the warrantless wiretapping of thousands of U.S. citizens by the NSA, dating as far back as 2002 in a report delayed for a year due to White House pressure.
Aug. 5, 2007
Protect America Act
The Protect America Act amends FISA to address warrants, foreign and domestic wiretaps, data monitoring and more. The Department of Justice says the act “restores FISA to its original focus of protecting the rights of persons in the United States, while not acting as an obstacle to gathering foreign intelligence on targets located in foreign countries.”
July 10, 2008
FISA Amendments Act of 2008
Changes to FISA include a clause providing immunity to telecommunications companies that cooperate with the government, one permitting an increase in the allotted length for warrantless wiretaps (up to a week) and one permitting the government to destroy search records.
April 15, 2009
NSA denies allegations of illegal wiretaps
The New York Times reports on domestic wiretapping by the NSA. When the news breaks, the NSA responds by claiming that its “intelligence operations, including programs for collection and analysis, are in strict accordance with U.S. laws and regulations.” Two months later, PRISM begins collecting data from Facebook, joining Microsoft, Yahoo! and Google.
July 8, 2012
Cellular carriers reveal 1.3 million user data requests
The Times says law enforcement agencies are requesting enormous amounts of subscriber information from cellular carriers. The nature of the collection remains ambiguous, including whether they collected the content of text messages.
April 25, 2013 — July 19, 2013
Verizon grants NSA metadata
Verizon reveals it’s giving the NSA access to daily reports that include information on calls, such as length, location, time of day and more without revealing the content of the call.
June 5, 2013
Edward Snowden shocks the world
Technical contractor Edward Snowden released classified NSA material to media outlets that release details on some surveillance programs, including PRISM, which acquires user data from Microsoft, Yahoo, Google, Facebook, YouTube, Skype, AOL and Apple. Snowden flees to Hong Kong and continues to covertly communicate with some press.
June 19, 2013
FBI Director Robert Mueller admits that the United States uses drones for domestic surveillance.
Article continues below
Shortly after Edward Snowden’s revelation, a majority of Americans said they were not opposed to the NSA’s domestic surveillance programs.
* Includes answers qualified by “somewhat”
Join us on Facebook
Would you be willing to give up what Edward Snowden has given up? He has given up his high paying job, his home, his girlfriend, his family, his future and his freedom just to expose the monolithic spy machinery that the U.S. government has been secretly building to the world. He says that he does not want to live in a world where there isn't any privacy. He says that he does not want to live in a world where everything that he says and does is recorded. Thanks to Snowden, we now know that the U.S. government has been spying on us to a degree that most people would have never even dared to imagine.
Former NSA contractor and whistleblower Edward Snowden possesses dangerous information which could potentially lead to America's “worst nightmare” if it is revealed, according to the journalist who first published Snowden's leaked documents.
“Snowden has enough information to cause more damage to the US government in a minute alone than anyone else has ever had in the history of the United States,” Glenn Greenwald, the Guardian journalist responsible for publishing some of Snowden’s first leaks, told Argentina-based newspaper La Nación.
There was a great deal to address. At the State Dept press briefing today, Associated Press' Matthew Lee and CNN's Elise Labott attempted to address the issues. It was not a proud moment for Jen Psaki or for the State Dept.
Matthew Lee: Can we start in Russia –
Jen Psaki: Mm-hmm.
Matthew Lee: -- with Mr. Snowden? I’m wondering if, since he has now asked the Russians for asylum, there has been any contact between this building and the Russians about your feelings about his status