Parent Advocates
Search All  
The goal of ParentAdvocates.org
is to put tax dollar expenditures and other monies used or spent by our federal, state and/or city governments before your eyes and in your hands.

Through our website, you can learn your rights as a taxpayer and parent as well as to which programs, monies and more you may be entitled...and why you may not be able to exercise these rights.

Mission Statement

Click this button to share this site...


Bookmark and Share











Who We Are »
Betsy Combier

Help Us to Continue to Help Others »
Email: betsy.combier@gmail.com

 
The E-Accountability Foundation announces the

'A for Accountability' Award

to those who are willing to whistleblow unjust, misleading, or false actions and claims of the politico-educational complex in order to bring about educational reform in favor of children of all races, intellectual ability and economic status. They ask questions that need to be asked, such as "where is the money?" and "Why does it have to be this way?" and they never give up. These people have withstood adversity and have held those who seem not to believe in honesty, integrity and compassion accountable for their actions. The winners of our "A" work to expose wrong-doing not for themselves, but for others - total strangers - for the "Greater Good"of the community and, by their actions, exemplify courage and self-less passion. They are parent advocates. We salute you.

Winners of the "A":

Johnnie Mae Allen
David Possner
Dee Alpert
Aaron Carr
Harris Lirtzman
Hipolito Colon
Larry Fisher
The Giraffe Project and Giraffe Heroes' Program
Jimmy Kilpatrick and George Scott
Zach Kopplin
Matthew LaClair
Wangari Maathai
Erich Martel
Steve Orel, in memoriam, Interversity, and The World of Opportunity
Marla Ruzicka, in Memoriam
Nancy Swan
Bob Witanek
Peyton Wolcott
[ More Details » ]
 
Current Wikileaks
The server in France is down. Assange is in jail in London. Wikileaks must be kept open.
          
Current Wikileaks

NOTE: At the moment WikiLeaks is not accepting new submissions due to re-engineering improvements the site to make it both more secure and more user-friendly. Since we are not currently accepting submissions during the re-engineering, we have also temporarily closed our online chat support for how to make a submission. We anticipate reopening the electronic drop box and live chat support in the near future.

1. Material we accept

Wikileaks will accept restricted or censored material of political, ethical, diplomatic or historical significance. We do not accept rumor, opinion, other kinds of first hand accounts or material that is publicly available elsewhere. This is because our journalists write news stories based on the material, and then provide a link to the supporting documentation to prove our stories are true. It's not news if it has been publicly available elsewhere first, and we are a news organisation. However, from time to time, the editors may re-publish material that has been made public previously elsewhere if the information is in the public interest but did not have proper news analysis when first released.

If you are sending us something, we encourage you to include a brief description of why the documents is important and what the most significants parts are within the document. It will help our journalists to write up and released the story much faster.

2. Our anonymous electronic drop box

Wikileaks has an anonymous electronic drop box if you wish to provide original material to our journalists. Wikileaks accepts a range of material, but we do not solicit it. If you are going to send in material it should be done as securely as possible. That is why we have created our novel method of submission based on a suite of security technologies designed to provide anonymity. We have put a great deal of technical and design work into the drop box because we take the journalist-source relationship very seriously.

2.1 Its easy to submit

Our drop box is easy to use and provides military-grade encryption protection.

Submitting documents to our journalists is protected by law in better democracies. For other countries, the electronic drop box is there to offer help and protection. It is particularly designed to keep your identity hidden from everyone, including WikiLeaks. We never keep logs of who uses the drop box or where they are coming from.

There are several ways to send in material, but the most secure and anonymous is at the following link.

(currently closed for re-engineering security and useability improvements)

To add another layer of protection,you might also want to use the secure TOR network (http://suw74isz7qqzpmgu.onion/) Tor is a secure anonymous distributed network that provides maximum security.

2.2 Help with any questions about submitting

You can also chat to us online and we will answer any questions or solve any problems you might have with submitting (https://chat.wikileaks.org) (Currently temporarily closed with the electronic drop box for re-engineering.) Our chat is designed to be secure and anonymous. Visitors are protected by many layers of security. They can not see each other. There is a mechanism in place to stop logging and the server forbids potentially dangerous commands that could reveal other user's identity. Communication is secured with SSL encryption.

2.3 Protection for you

Wikileaks does not record any source-identifying information and there are a number of mechanisms in place to protect even the most sensitive submitted documents from being sourced. We do not keep any logs. We can not comply with requests for information on sources because we simply do not have the information to begin with. Similarly we can not see your real identity in any anonymised chat sessions with us. Our only knowledge of you as a source is if you provide a coded name to us. A lot of careful thought by world experts in security technologies has gone into the design of these systems to provide the maximum protection to you. Wikileaks has never revealed a source.

2.4 How it works

When WikiLeaks receives a document, our accredited journalists assess the submission. If it meets the criteria, our journalists then write or produce a news piece based on the document. This typically includes a description of the document, an analysis of why it is important, and an explanation of what it signifies to broader society. The news piece might also highlight the parts of the document that are most newsworthy. Our news stories are deliberately analytical regarding the wider significance of the document. We then link from the news piece to the original submission.

Submissions establish a journalist-source relationship. Online submissions are routed via countries which have strong shield laws to provide additional protection to sources and journalists.

Some documents submitted contain highly sensitive information. WikiLeaks has developed a harm minimisation proceedure to clean documents which might endanger innocent lives. In other instances, WikiLeaks may delay publishing some news stories and their supporting documents until the publication will not cause danger to such people. However in all cases, WikiLeaks will only redact the details that are absolutely necessary to this end. Everything else will be published to support the news story exactly as it appeared in the original document.

WikiLeaks has a overriding objective to publish and bring information into the public arena to encourage an informed society. It will stay doggedly true to this goal.

3. Directions for how to submit material

If you want to send us a message of your own, as opposed to a document, please see Contact.

3.1 Submissions via secure upload

Fast, easy and automatically encrypted with the best banking-grade encryption. We keep no records as to where you uploaded from, your time zone, browser or even as to when your submission was made (if you choose a non-zero publishing delay, we set the file time record to be the release date + a random time within that day).

If you are anonymously submitting a Microsoft word file (".doc") that you have edited at some stage, please try to send a PDF document (".pdf") instead, as Word documents may include your name or the name of your computer, see Word file redaction for further information. If you have no means to produce a PDF file your document will be converted by WikiLeaks staff.

The process your document will undergo is outlined for understanding submissions.
NOTE: At the moment WikiLeaks is not accepting new submissions due to re-engineering improvements the site to make it both more secure and more user-friendly. Since we are not currently accepting submissions during the re-engineering, we have also temporarily closed our online chat support for how to make a submission. We anticipate reopening the electronic drop box and live chat support in the near future.

You can also use secure TOR network (secure, anonymous, distributed network for maximum security)

3.2 Submissions via our discreet postal network

Submissions to our postal network offer a strong form of anonymity and are good for bulk truth-telling.

Steps:

1. First place your leak onto a floppy disk, CD, DVD or a USB Flash Drive. If you are using a floppy disks, please create two as they are often unreliable. If you only have paper documents, we will scan them if they are of significant political or media interest (if you are unsure whether this may be the case, please contact us first). This will delay the process however.
2. Post your information to one of our trusted truth facilitators listed below. You may post to whatever country in the list that you feel most suitable given the nature of the material and your postal service. If your country's mail system is unreliable, you may wish to send multiple copies, use DHL, FedEX or another postal courier service.

WikiLeaks truth facilitators will then upload your submission using their fast internet connection. If you use a floppy disk, be sure to send two for increased reliability.

You can use whatever return address you like, but make doubly sure you have written the destination correctly as postal workers will not be able to return the envelope to you.

After receiving your postal submission our facilitators upload the data to WikiLeaks and then destroy the mailed package.

3.3 High risk postal submissions

If your leak is extremely high risk, you may wish to post away from your local post office at a location that has no witnesses or video monitoring.

Many CD and DVD writers will include the serial number of the DVD or CD writer onto the CD/DVDs they write. If the post is intercepted this information can in theory be used to track down the manufacturer and with their co-operation, the distributor, the sales agent and so on. Consider whether there are financial records connecting you to the CD/DVD writer sale if your adversary is capable of intercepting your letter to us and has the will to do this type of expensive investigation. Pay cash if you can for the CD/DVD writer.

Similarly, CD and DVD media themselves include a non-unique manufacturing "batch number" for each group of around 10,000 CD/DVDs made. Pay cash when buying the CD or DVD. Try to choose a store without video cameras at the register.

Although we are aware of no instances where the above has been successfully used to trace an individual, anti-piracy operations have used the information to trace piracy outfits who sell tens or hundreds of thousands of counterfeit CDs or DVDs.

If you post it to us, a good option is to encrypt the USB file/CD file and then contact us at a later date via live online chat with the encryptin passphrase. That way if the post is intercepted, the data can not be copied.

If you suspect you are under physical surveillance, discreetly give the letter to a trusted friend or relative to post. On some rare occasions, targets of substantial political surveillance have been followed to the post office and have had their posted mail seized covertly. In this rare case if you are not intending to encrypt the data and if the police or intelligence services in your country are equipped to perform DNA and/or fingerprint analysis you may wish to take the appropriate handling precautions.

3.4 Postal addresses of our trusted truth facilitators

You may post to any country in our network.

Pick one that best suits your circumstances. If the country you are residing in has a postal system that is unreliable or frequently censored, you may wish to send your material to multiple addresses concurrently. For unlisted postal addresses, please contact us.

In Australia:

To: "WL" or any name likely to evade postal censorship in your country.

BOX 4080
Australia Post Office - University of Melbourne Branch
Victoria 3052
Australia

Free Julian Assange! Hands off WikiLeaks!
By Bill Van Auken
LINK

December 08, 2010 "WSWS" -- Julian Assange, the founder of WikiLeaks, was jailed in Britain Tuesday on charges that are nothing more than a pretext for an act of political repression dictated by the US government.

The aim of this judicial travesty is, in the first instance, to punish Assange for having made public secret cables exposing crimes and conspiracies carried out by US officials.

Second, by throwing Assange into London’s Wandsworth prison, the US and British authorities hope not only to silence WikiLeaks but also to intimidate anyone else from daring to lift the lid on government secrets and lies.

It is almost certain that the ultimate goal of the shoddy legal frame-up is to have Assange extradited to the United States to be tried as a spy or even as an accomplice of terrorism.

Given the unprecedented and shameful public outcry by leading American politicians and media figures for Assange to be declared an “enemy combatant” or “terrorist” and “taken out” or “assassinated,” not only would his ability to get a fair trial in the US be excluded, but his very survival would be in doubt.

Those leading the campaign against Assange and WikiLeaks are representatives of a government and a ruling establishment that is responsible for decades of criminality carried out behind the backs of the American people—from stolen elections, to illegal wars of aggression, to torture and other acts of international terror.

This is a country that was dragged into a war in Iraq that has cost hundreds of thousands of lives based upon outright lies—reported as fact by an obedient and complicit media—about “weapons of mass destruction” and nonexistent terrorist ties.

This and other crimes have been either concealed or justified by means of propaganda, the invocation of state secrets or outright lying to the public. This is what makes those attacking WikiLeaks hate and fear its work, and what makes this work so vitally necessary.

Last April, the WikiLeaks site made public the “Collateral Murder” videotape, documenting a 2007 massacre in Baghdad carried out by an attack helicopter in which 15 Iraqis, including two Reuters journalists, were killed. Private First Class Bradley Manning was arrested soon after, charged with leaking the video and other documents. He is presently being held in a prison cell in Quantico, Virginia.

This was followed by the release of some 391,000 Afghanistan battlefield reports last July, documenting killings of civilians that had been covered up by the Pentagon, including the mowing down of unarmed demonstrators and assassinations by Special Forces death squads. Then in October, WikiLeaks made available 400,000 battlefield reports from Iraq, documenting more carnage against civilians and the complicity of the US military in horrific forms of torture against Iraqi detainees.

These documents laid bare to the public information that the government had systematically suppressed, with the assistance of a self-censoring media for which being “embedded” has become a permanent state of affairs. They provide ample evidence of war crimes carried out by both the Bush and Obama administrations.

The diplomatic cables that WikiLeaks began releasing last month—with less than 1,000 out of 250,000 thus far published—have already uncovered similar evidence of crimes and conspiracies, from the confirmation of a US missile strike that killed over 50 Yemeni civilians last December, to pressure campaigns to halt prosecutions of US officials for illegal kidnappings and torture, to instructions to US diplomats to gather personal intelligence—including DNA samples—on United Nations and foreign government officials.

Those now baying for Assange’s blood, calling his actions “criminal,” are responsible for real crimes whose victims number in the hundreds of thousands, if not millions.

Not only the Republican right, but “liberal” Democrats have joined in this campaign. Among them is California’s Democratic senator, Dianne Feinstein, who called in a column published by the Wall Street Journal Tuesday for the prosecution of Assange under the Espionage Act of 1917.

Feinstein charges Assange—a citizen of Australia—with being indifferent to “national security” and “our vital national interests,” interests that she, as a US senator, a multimillionaire and the wife of a wealthy Pentagon contractor, holds especially dear.

“Mr. Assange claims to be a journalist and would no doubt rely on the First Amendment to defend his actions,” she writes. “But he is no journalist: He is an agitator intent on damaging our government, whose policies he happens to disagree with, regardless of who gets hurt.”

Dismissing claims that WikiLeaks is covered by the First Amendment’s guarantee of freedom of speech, Feinstein continues, “Just as the First Amendment is not a license to yell ‘Fire!’ in a crowded theater, it is also not a license to jeopardize national security.”

The Espionage Act invoked by Feinstein has a long and reactionary history, used to jail the legendary workers’ leader Eugene V. Debs in 1918 along with thousands of members of the Industrial Workers of the World and other working class militants.

The senator articulates the same kind of police-state, lynch-mob spirit that animated that wave of repression. According to the Orwellian logic of the current vendetta, an “agitator” who exposes the crimes of a government engaged in armed aggression and torture is a criminal. And the right to free speech can be suspended by the mere invocation of “national security.”

This will not end with Assange and WikiLeaks. A frontal assault on core democratic rights is being prepared by a ruling elite that lives in fear of the people, concealing its actions and aims because it knows that the policies of social reaction at home and war abroad enjoy no popular support.

The attack on WikiLeaks has been aided and abetted by the cowardly media and by corporations ranging from Amazon to MasterCard, Visa and PayPal, all of which swung into line at the first sign of government intimidation, joining in the campaign to silence the Internet organization and cut off its funding.

Success in this act of state repression would set the stage for a more far-ranging drive to suppress freedom of the Internet as a whole, shut down other web sites that oppose the policies of the US government, and impose an even tighter veil of secrecy over the operations of the CIA, the Pentagon and the White House.

The financial aristocracy and its political representatives feel an urgent need to impose a stranglehold on the flow of information. They know that the crisis of their economic system and their attempts to impose its full weight on the backs of the working class, both at home and abroad, are creating the conditions for an eruption of class struggles. Depriving such a movement of free information and political perspective is seen as vital by the ruling elite.

This is what makes the launching of an international campaign in defense of WikiLeaks a life-and-death question for working people in every country. Mass protests and movements of solidarity must be organized to demand the immediate release of Julian Assange and Pfc. Bradley Manning and an end to the campaign of intimidation and repression against WikiLeaks.

 
© 2003 The E-Accountability Foundation