Sign up to receive Alan's newsletter by email.

Speaking engagements

  • Invite Alan Korwin to speak at your event! Thought-provoking, entertaining, freedom-oriented topics -- your guests will thank you for the excitement -- long after the applause ends!

Books

« July 2013 | Main | September 2013 »

Patriots Fight Back Against Intrusive Spying

The lamestream media told you:

Echelon, Carnivore and similar "packet sniffing" programs are among many government and commercial programs developed to read everyone's email and web surfing habits to look for keywords, data strings and behavior that may mean you're up to no good. This was first revealed as far back as 1997, got quite hot by about 2005 and has been recognized as an accepted practiced by anyone who is anybody since then. How far it has gone, what it has accomplished, who is using what version currently, and which nations are how far along is the stuff of spy novels and rumored assassinations. It is no secret that all nations are constantly cyber attacking each other an accusing each other of dirty tricks.

The Uninvited Ombudsman notes however that:

To fight back against presumed cyber-snooping, some patriot, monkeywrenching, survivalist and left-wing anti-government groups have developed countermeasures to government privacy invasion campaigns. Among these are attempted "filter overload" efforts, which seek to incapacitate various snooping programs by feeding them more search terms than they can handle. A list of purportedly valid trigger terms is attached to emails and posted on websites to throw off the spies. A sample list looks like this. It is not known how well such tactics work, but it is an interesting approach, with backfire potential, since it could prevent defense agencies from identifying real threats.

Explosives, guns, assassination, conspiracy, primers, detonators, initiators, main charge, nuclear charges, ambush, sniping, motorcade, IRS, BATF, jtf-6, mjtf, hrt, srt, hostages, munitions, weapons, TNT, rdx, amfo, hmtd, picric acid, silver nitrite, mercury fulminate, presidential motorcade, salt peter, charcoal, sulfur, c4, composition b, amatol, petn, lead azide, lead styphante, ddnp, tetryl, nitrocellulose, nitrostarch, mines, grenades, rockets, fuses, delay mechanism, mortars, rpg7, propellants, incendiaries, incendiary device, thermite, security forces, intelligence, agencies, hrt, resistance, psyops, infiltration, assault team, defensive elements, evasion, detection, mission, communications, the football, platter charge, shaped charges, m118, claymore, body armor, charges, shrapnel, timers, timing devices, boobytraps, detcord, pmk 40, silencers, Uzi, HK-MP5, AK-47, FAL, Jatti, Skorpion MP, teflon bullets, cordite, napalm, law, Stingers, RPK, SOCIMI 821 SMG, STEN, BAR, MP40, HK-G3,FN-MAG, RPD,PzB39, Air Force One, M60, RPK74, SG530, SG540, Galil arm, Walther WA2000, HK33KE, Parker-Hale MOD. 82, AKR, Ingram MAC10, M3, L34A1, Walther MPL, AKS-74, HK-GR6, subsonic rounds, ballistic media, special forces, JFKSWC, SFOD-D, SRT, Rewson, SAFE, Waihopai, INFOSEC, ASPIC, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Kenya, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, NAIA, SAPM, ASU, ECHELON ASTS, National Information Infrastructure, InfoSec, SAO, Reno, Compsec, JICS, Computer Terrorism, Firewalls, Secure Internet Connections, RSP, ISS, JDF, Passwords, NAAP, DefCon V, RSO, Hackers, Encryption, ASWS, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secret Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, SALDV, PEM, resta, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, Tanzania, SAMU, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, ram, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, SADCC, NSLEP, SACLANTCEN, FALN, 877, NAVELEXSYSSECENGCEN, BZ, CANSLO, CBNRC, CIDA, JAVA, rsta, Active X, Compsec 97, RENS, LLC, DERA, JIC, rip, rb, Wu, RDI, Mavricks, BIOL, Meta-hackers, ^?, SADT, Steve Case, Tools, RECCEX, Telex, OTAN, monarchist, NMIC, NIOG, IDB, MID/KL, NADIS, NMI, SEIDM, BNC, CNCIS, STEEPLEBUSH, RG, BSS, DDIS, mixmaster, BCCI, BRGE, SARL, Military Intelligence, JICA, Scully, recondo, Flame, Infowar, Bubba, Freeh, Archives, ISADC, CISSP, Sundevil, jack, Investigation, JOTS, ISACA, NCSA, ASVC, spook words, RRF, 1071, Bugs Bunny, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC, bce, Lacrosse, Flashbangs, HRT, IRA, EODG, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, site, SASSTIXS, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, SARD, LABLINK, USACIL, SAPT, USCG, NRC, ~, O, NSA/CSS, CDC, DOE, SAAM, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, bemd, SGC, UNCPCJ, CFC, SABENA, DREO, CDA, SADRS, DRA, SHAPE, bird dog, SACLANT, BECCA, DCJFTF, HALO, SC, TA SAS, Lander, GSM, T Branch, AST, SAMCOMM, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, benelux, SAS, SBS, SAW, UDT, EODC, GOE, DOE, SAMF, GEO, JRB, 3P-HV, Masuda, Forte, AT, GIGN, Exon Shell, radint, MB, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, SART, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, diwn, 747, ASIC, 777, RDI, 767, MI5, 737, MI6, 757, Kh-11, EODN, SHS, ^X, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, NSS, Duress, RAID, Uziel, wojo, Psyops, SASCOM, grom, NSIRL, D-11, SERT, VIP, ARC, S.E.T. Team, NSWG, MP5k, SATKA, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, MEU/SOC,PSAC, PTT, RFI, ZL31, SIGDASYS, TDM, SUKLO, SUSLO, TELINT, fake, TEXTA, ELF, LF, MF, SIGS, VHF, Recon, peapod, PA598D28, Spall, dort, 50MZ, 11Emc Choe, SATCOMA, UHF, SHF, ASIO, SASP, WANK, Colonel, domestic disruption, 5ESS, smuggle, Z-200, 15kg, DUVDEVAN, RFX, nitrate, OIR, Pretoria, M-14, enigma, Bletchley Park, Clandestine, NSO, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, SARA, Rapid Reaction, JSOFC3IP, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, M-x spook, Z-150T, High Security, Security Evaluation, Electronic Surveillance, MI-17, ISR, NSAS, Counterterrorism, real, spies, IWO, eavesdropping, debugging, CCSS, interception, COCOT, NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside, Capricorn, NAVCM, Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss, ASDIC, .tc, 2EME REP, FID, 7NL SBS, tekka, captain, 226, .45, nonac, .li, Ionosphere, Mole, Keyhole, NABS, Kilderkin, Artichoke, Badger, Emerson, Tzvrif, SDIS, T2S2, STTC, DNR, NADDIS, NFLIS, CFD, quarter, Cornflower, Daisy, Egret, Iris, JSOTF, Hollyhock, Jasmine, Juile, Vinnell, B.D.M., Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, rusers, Covert Video, Intiso, r00t, lock picking, Beyond Hope, LASINT, csystems, .tm, passwd, 2600 Magazine, JUWTF, Competitor, EO, Chan, Pathfinders, SEAL Team 3, JTF, Nash, ISSAA, B61-11, Alouette, executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, SUW, J2, Embassy, ETA, Fax, finks, Fax encryption, white noise, Fernspah, MYK, GAFE, forcast, import, rain, tiger, buzzer, N9, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, OC3, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, Z, sweeping, SURSAT, 5926, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, NAIAG, Cypherpunks, NARF, 127, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, JTF-6, AVN, ISSSP, Anonymous, W, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, SUBACS, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, UXO, (), OC-12, counterintelligence, Shaldag, sport, NASA, TWA, DT, gtegsc, owhere, .ch, hope, emc, industrial espionage, SUPIR, PI, TSCI, spookwords, industrial intelligence, H.N.P., SUAEWICS, Juiliett Class Submarine, Locks, qrss, loch, 64 Vauxhall Cross, Ingram Mac-10, wwics, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Siemens, RPC, Met, CIA-DST, INI, watchers, keebler, contacts, Blowpipe, BTM, CCS, GSA, Kilo Class, squib, primacord, RSP, Z7, Becker, Nerd, fangs, Austin, no|d, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, BROMURE, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Starr, Wackenhutt, EO, burhop, Wackendude, mol, Shelton, 2E781, F-22, 2010, JCET, cocaine, Vale, IG, Kosovo, Dake, 36,800, Hillal, Pesec, Hindawi, GGL, NAICC, CTU, botux, Virii, CCC, ISPE, CCSC, Scud, SecDef, Magdeyev, VOA, Kosiura, Small Pox, Tajik, +=, Blacklisted 411, TRDL, Internet Underground, BX, XS4ALL, wetsu, muezzin, Retinal Fetish, WIR, Fetish, FCA, Yobie, forschung, emm, ANZUS, Reprieve, NZC-332, edition, cards, mania, 701, CTP, CATO, Phon-e, Chicago Posse, NSDM, l0ck, spook, keywords, QRR, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, NSWT, press-release, WISDIM, burned, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Enforcers, Digicash, zip, SWAT, Ortega, PPP, NACSE, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, ISM, JCE, Middleman, KLM, Blackbird, NSV, GQ360, X400, Texas, jihad, SDI, BRIGAND, Uzi, Fort Meade, *&, , supercomputer, bullion, 3, NTTC, Blackmednet, :, Propaganda, ABC, Satellite phones, IWIS, Planet-1, ISTA, rs9512c, South Africa, Sergeyev, Montenegro, Toeffler, Rebollo, sorot, cryptanalysis, nuclear, 52 52 N - 03 03 W, Morgan, Canine, GEBA, INSCOM, MEMEX, Stanley, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, WASS, WID, Dolch, secure shell, screws, Black-Ops, O/S, Area51, SABC, basement, ISWG, $ @, data-haven, NSDD, black-bag, rack, TEMPEST, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, ISAF, unclassified, Sayeret Tzanhanim, PARASAR, Gripan, pirg, curly, Taiwan, guest, utopia, NSG, orthodox, CCSQ, Alica, SHA, Global, gorilla, Bob, UNSCOM, Fukuyama, Manfurov, Kvashnin, Marx, Abdurahmon, snullen, Pseudonyms, MITM, NARF, Gray Data, VLSI, mega, Leitrim, Yakima, NSES, Sugar Grove, WAS, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, XM, Parvus, NAVSVS, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, blow out, BUDS, WQC, Flintlock, PABX, Electron, Chicago Crust, e95, DDR&E, 3M, KEDO, iButton, R1, erco, Toffler, FAS, RHL, K3, Visa/BCC, SNT, Ceridian, STE, condor, CipherTAC-2000, Etacs, Shipiro, ssor, piz, fritz, KY, 32, Edens, Kiwis, Kamumaruha, DODIG, Firefly, HRM, Albright, Bellcore, rail, csim, NMS, 2c, FIPS140-1, CAVE, E-Bomb, CDMA, Fortezza, 355ml, ISSC, cybercash, NAWAS, government, NSY, hate, speedbump, joe, illuminati, BOSS, Kourou, Misawa, Morse, HF, P415, ladylove, filofax, Gulf, lamma, Unit 5707, Sayeret Mat'Kal, Unit 669, Sayeret Golani, Lanceros, Summercon, NSADS, president, ISFR, freedom, ISSO, walburn, Defcon VI, DC6, Larson, P99, HERF pipe-bomb, 2.3 Oz., cocaine, $, impact, Roswell, ESN, COS, E.T., credit card, b9, fraud, ST1, assassinate, virus, ISCS, ISPR, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, WWSV, Atlas, IWWSVCS, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, SASSTIXS, IWG, Lynch, 414, Face, Pixar, IRIDF, NSRB, eternity server, Skytel, Yukon, Templeton, Johohonbu, LUK, Cohiba, Soros, Standford, niche, ISEP, ISEC, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, NSOF, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, LITE, PKK, HoHoCon, SISMI, ISG, FIS, MSW, Spyderco, UOP, SSCI, NIMA, HAMASMOIS, SVR, SIN, advisors, SAP, Monica, OAU, PFS, Aladdin, AG, chameleon man, Hutsul, CESID, Bess, rail gun, .375, Peering, CSC, Tangimoana Beach, Commecen, Vanuatu, Kwajalein, LHI, DRM, GSGI, DST, MITI, JERTO, SDF, Koancho, Blenheim, Rivera, Kyudanki, varon, 310, 17, 312, NB, CBM, CTP, Sardine, SBIRS, jaws, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, meta, Faber, SFPD, EG&G, ISEP, blackjack, Fox, Aum, AIEWS, AMW, RHL, Baranyi, WORM, MP5K-SD, 1071, WINGS, cdi, VIA, DynCorp, UXO, Ti, WWSP, WID, osco, Mary, honor, Templar, THAAD, package, CISD, ISG, BIOLWPN, JRA, ISB, ISDS, chosen, LBSD, van, schloss, secops, DCSS, DPSD, LIF, PRIME, SURVIAC, telex, SP4, Analyzer, embassy, Golf, B61-7, Maple, Tokyo, ERR, SBU, Threat, JPL, Tess, SE, EPL, SPINTCOM, ISS-ADP, Merv, Mexico, SUR, SO13, Rojdykarna, airframe, 510, EuroFed, Avi, shelter, Crypto AG

U.S. Spy Agencies Are Spying

The lamestream media told you:

"An Internet scouring program, code-named PRISM, allows the NSA and FBI to tap directly into nine U.S. Internet companies to gather all Internet usage — audio, video, photographs, emails and searches. The effort is designed to detect suspicious behavior that begins overseas," according to the Associated Press, according to British newspaper reports.

"Any analyst at any time can target anyone. Any selector. Anywhere. Where those communications will be picked up depends on the range of those sensor networks and the authority that that analyst is empowered with," Edward Snowden said, a former CIA employee and NSA contractor, in accompanying video on the Guardian newspaper's website. "Not all analysts have the power to target anything. But I, sitting at my desk, had the authority to wiretap anyone, from you or your accountant to a federal judge to even the president if I had a personal email."

Director of National Intelligence James Clapper has decried the revelation of the intelligence-gathering programs as reckless and said it has done "huge, grave damage." The full article is fascinating:

http://news.yahoo.com/report-nsa-contract-worker-surveillance-source-185911834.html

The Uninvited Ombudsman notes however that:

Anyone who thinks the Internet is not an open party line directly to the government is an idiot.

More than a decade ago the Echelon and Carnivore programs were exposed as direct taps of everything flowing through the web, filtered by government agents, for "national security purposes," which could mean anything. This is just the latest version of that. The fact that a whistle blower has once again come out to say the same thing is almost meaningless.

An intelligence official saying this has done damage is pointless. Everyone in the spy community, diplomatic community, geek community, political community, even people of average intelligence know this. Nothing secret is revealed. If you have information you don't want the government to know, you don't write about it from your computer. Even jihadi warriors living in caves in mountains know this, after getting drone bombs dropped on them.

The "news" media should be ashamed of itself presenting this as news. Any expectation that these gross violations of Fourth Amendment or other constitutional protections will lead to jail or repercussions should be abandoned, because they won't. We would also be wise to heed to words of the man currently in the White House ("You can't have 100% security and then also have 100% privacy and zero inconvenience"), because Big Brother arrived long ago, and he is not about to leave anytime soon. This doesn't surprise Page Nine readers, does it?

Like many others working in the spy community, Snowden was freaked out by the degree to which officials could do anything and get away with it without controls. He simply had the cojones to say something about it. He is now being investigated for criminal charges. "My sole motive is to inform the public as to that which is done in their name and that which is done against them," Snowden told the newspaper. The AP reported he hoped Obama's election would curtail some of the clandestine programs. He said he was disappointed that Obama did not rein in the surveillance programs.

Two final notes before you get real angry at me for saying this. First, all any of you know about this is what you learned in the "news" and you know how accurate that is. Second, the president, attorney general and members of Congress should know better than to call a person a traitor on TV -- because that requires a trial, and according to the Constitution, two witnesses (Art. III, Sec. 3). Who were the witnesses again? I missed that part.

Government Hiding Sandy Hook Details

The lamestream media told you:

By Dave Collins. HARTFORD, Conn. (AP) — A plan by Connecticut officials to withhold some Newtown school shooting records from the public would be another blow to government transparency, which has taken hits in other states in recent years, advocates for freedom of information laws say.

The proposal is in a bill privately crafted by Gov. Dannel P. Malloy's office, the state's top prosecutor and legislative leaders. It would allow authorities to withhold from the public photographs, videos, 911 call recordings and other records depicting the physical condition of any victim of the Dec. 14 shootings, unless the family gives written permission.

The legislation would bar the release of emergency responders' audio transmissions... The bill also would limit disclosure of the death certificates of the 20 first-graders and six educators killed in the attack... Media groups and advocates of public records laws worry... They also question the bill being drafted in secrecy and not being subjected to the public hearing process like other bills are... "If you hide away documents from the public, then the public has no way of knowing whether police have done their jobs correctly," said Sonny Albarado, city editor at the Arkansas Democrat-Gazette and board president of the Society of Professional Journalists, a free press advocacy group based in Indianapolis.

"It sets a tone where it makes it easier to hide other things, and the public suffers, in my view," Albarado said. "Obviously, the mass murder of 26 people is a very horrific crime. But 26 people die regularly in most large towns within a few weeks or within a few months and we don't express the same kind of horror and we don't afford those victims or the perpetrators any kind of anonymity."

Malloy is defending the proposal, saying that the state wants to protect and respect the wishes of relatives of the Newtown victims and that the bill applies only to the Sandy Hook shootings...

"I've seen a gradual sea change ... toward more people asking questions about why should the public have access to information instead of why shouldn't they," Murphy said. "We forget why we have these laws. Any record created by government belongs to the people."

The Uninvited Ombudsman notes however that:

The effort by Sandy Hook officials to hide evidence from the Sandy Hook massacre only accents the questions that were never answered about this stunning crime that led to calls for suppression of the Second Amendment.

It is good, in a perverse sort of way, that government is attacking the First Amendment rights of the press, because this wakes up the "news" media, who are otherwise surprisingly content to let government abuse pass unchallenged. Let the slightest infringement of their rights surface, and the outrage knows no bounds, a good outcome for freedom, even if it is a double standard and hypocritical.

Early reports indicated the murderer used four handguns, found at the murder scene, to perpetrate the atrocity. Later, the "news" was changed to blame so-called "assault rifles," which police originally said were found unused in the criminal's vehicle.

A news conference was convened outdoors for the chief medical examiner, surrounded by state police officers. Normally, such a news conference would be held at the hospital, with the doctor surrounded by other doctors. The doctor, who claimed with pride to have experience and seniority over all the other medical personnel, and who had performed examinations of the victims, could not or would not identify the caliber of the bullets used.

He stuttered and stalled in failing to reveal this simple and critical piece of information. All of the rounds, scores of them, if the "assault rifle" story was accurate, would have been easily recognizable .223 caliber rounds. No explanation was ever given for this disjoint in the handgun (initial report) and "assault weapon" (refreshed report) version of the story. "Assault weapons" were viciously attacked by the media and some members of Congress afterwards, using the crime for leverage.

If Connecticut is successful in suppressing this information, which is being done "to protect the children," one more layer of government transparency will be forever lost. The effort to suppress this information through legislation is being limited only to this crime. This is known as (fill in the blank, you may as well use your own adjectives and outrage.)

The Amnesty Surprise

The lamestream media told you:

Congress is sure it will find a way to turn the 11 million undocumented migrants into citizens. The Senate has already passed a bill. The House is working on a compromise version. Senator McCain has worked out a solution with a Gang of Eight and is confident he can make it happen. There are even "dreamers" who believe they can find a way to solve the problem for everyone and share the dream with everybody. Republicans hate the idea and figure these people will all vote with the democrats.

The Uninvited Ombudsman notes however that:



When 11 Million Illegals Become Legal They Become 11 Million Potential New Gun Buyers


An unexpected consequence is about to hit the gun-rights fan in America.

Democrats -- and republicans too -- have failed to recognize the fact that when "11 million undocumented migrants" eventually gain citizenship through so-called comprehensive immigration reform, they simultaneously lose their status as prohibited gun possessors under federal law 18 USC §922g. They become an 11-million-person demographic base for new gun ownership -- and membership in the NRA.

Illegal aliens are banned from Second Amendment rights. Citizens are not.

When Minutemen brought the illegal-alien problem to our attention on Arizona's border in 2004, we were led to believe their numbers exceeded 20 million. The 20 million somehow became 11 million as fluidly as the “news” media changed watermelon juice (what Trayvon Martin bought one fateful night last year) into "ice tea," a politically correct beverage that had nothing to do with that case. The media plays fast and furiously loose with facts. But I digress.

Whatever the actual number, they were members of a class, one of nine groups of federally prohibited possessors, banned by that law from owning or using firearms. Illegal aliens are the largest single class of people banned from exercising the Second Amendment right to arms, with mental cases and convicted felons in second and third place (see chart).


Continue reading "The Amnesty Surprise" »

Read what people are saying about Page Nine, or tell Alan yourself.

See the archives below, or click through to an index of Page Nine posts at Gunlaws.com

About the Author

  • Freelance writer Alan Korwin is a founder and past president of the Arizona Book Publishing Association. With his wife Cheryl he operates Bloomfield Press, the largest producer and distributor of gun-law books in the country. Here writing as "The Uninvited Ombudsman," Alan covers the day's stories as they ought to read. Read more.

Recent Comments

Read the last 100 comments on one handy page here!