| 
                                 
                                 
                                  received 2 2 11    |  United States Justice Foundation Post
                                    Office Box 2806 Rancho Cucamonga, CA 91729 800-362-2723  |  
 Dear Patriot, NOTE:  This newsletter
                                    concerns a matter of vital national interest and is for educational purposes only.  This is not a fundraising effort
                                    on our part!  You must read this information to intelligently assess the grave risk to our freedoms now being implemented
                                    by Obama. Today
                                    I write to you about a very, very important issue – Obama’s continuing efforts to control our daily life and impose
                                    his will upon us, this time by controlling our internet access.
  To do this, I am going to educate you a little
                                    bit.  As a former professor and teacher, perhaps my insight can help guide you to realize the imminent danger facing
                                    us all.
  The following lesson is ever-more important in light of the rioting and governmental retribution now going
                                    on in Egypt.  Though the situation in Egypt is complex, one thing that has been made crystal clear is that the government
                                    controls the internet, what information we can receive and how we are going to get it.
  Obama in early January,
                                    2011 stated that he had tasked our federal Commerce Department with the job of deploying a digital identity for every American
                                    and that for any American to use the internet the federal digital identity would have to be used.
  Well,
                                    what is a digital identity and what does it do?
  In all electronic communications – whether such
                                    is in the form of sending or receiving email, visiting pages on the internet and even in cell phone conversations –
                                    there is the possibility of using what is called “encrypted communications”.  The objective of encryption
                                    is to “jumble” the electronic information being passed from the sender to the intended recipient in such a manner
                                    that the information cannot be understood by an eavesdropper.
  This “jumbling” is accomplished through
                                    electronic “keys”.  An electronic key is issued by a so-called Certifying Authority.   Here is
                                    an example of a key of this type:   Another
                                    name for a digital key is a “hash”.  While the hash above looks like an indecipherable string of characters,
                                    to a computer that holds the corresponding private key, all of the information sent through the use of this public key is
                                    easily readable.  But, unless you hold the private key, you cannot read such information.  Think of it as a modern,
                                    much more complex version of the old “secret codes” used in World War II and since.  Different letters and
                                    numbers meant different things, so the message could only be understood by someone with a “code sheet”, explaining
                                    what the letters and numbers meant.
  Any company can be a Certifying Authority (“CA”) because the status
                                    is solely dependent upon whether, or not, the internet community will accept the company as such.  For example, VeriSign,
                                    GoDaddy, Microsoft, IBM and similar companies are all recognized as authoritative because each has earned the public’s
                                    trust and the trust of other prominent companies that dominate the internet.
  This is the loophole through which
                                    Obama wishes to seek entry to your most private information.  Namely, he will impose his will on all major internet communications
                                    companies and force them to comply.  In a moment I will show you how he will do that; but now, some more information
                                    is required for full understanding of the process.
  Each key has two sub-parts and one will not work without the
                                    other:  A public key and a private key.  The public key is handed out to anyone who needs to send information over
                                    the internet to the owner of the private key.  The private key is kept secret by its owner.  When incoming information
                                    is received, the owner of the private key is able to “un-jumble” the information using its private key in a process
                                    called decryption.  Thus, as long as the owner of the private key keeps it private, any personal information you send
                                    (such as your name, address, driver’s license, credit card data, social security numbers, etc.) is forever private.
  Here is the trick, though, that Obama is going to try:  He wants the federal government to become a Certifying
                                    Authority!  
  He wants the Commerce Department to hold a national “Private Key” that can be used
                                    to decrypt every bit of information that you – and every other American - sends, or receives, over the internet. 
                                    If this is accomplished, you will have no private thoughts left.
  How will this be done?
  While it is a process that only takes milliseconds to complete, the technology behind it is complex.  Obama will base
                                    his national digital ID on the fact that YOU will not be allowed on the internet unless you expose Obama’s public key
                                    through your browser (such as Microsoft’s Internet Explorer, Apple’s Safari Browser, or the FireFox browser) or
                                    your email client (such as Microsoft’s Outlook or Outlook Express or Apple Mail).  If, say, Google or Bing or Yahoo!
                                    cannot read Obama’s public key on your computer you will be denied internet access:  you will not be able to browse
                                    the internet or send (or receive) email!
  Thus, Obama could have complete control over everything you do on your
                                    computer!
  You will not be able to read, see or communicate with anyone Obama does not like without a government
                                    approved “key”, and guess who would have the ultimate authority to approve or disapprove you having one? Obama!
  How will Obama gain such control?  First, he will direct the Commerce Department to issue an administrative ruling
                                    – without approval by either the Congress or Senate – that will require any “Internet Service Provider”
                                    regulated in any manner by the federal government to require that everyone show the Obama-approved public key.
  What
                                    sort of companies would come under such control?
  Any company that provides telephone service such as AT&T,
                                    BellSouth, SBCGlobal would be included.  These sorts of companies control over 1.4 billion email addresses throughout
                                    the world according to their own advertisements.
  Any company that provides public cable services involving telephone,
                                    communications or data transmissions.  This will include such giants as Comcast, Cox Cable, Cablevision, Cable One, Charter
                                    Communications, Mediacom, RCN, Road Runner and Time Warner Cable.  
  Between just these two types of companies
                                    regulated by the Federal Communications Commission, there is more than 100% control of American communications within Obama’s
                                    grasp should he succeed!  
  How can something be “… more than 100%”?
  Easy, just think of how many people have phone service by one company and cable by another.  The figures add
                                    up very quickly so you will have no place to turn where Obama is not reading your thoughts!
  We as a nation must
                                    band together and force our Congress to stop this frightening power grab!
  In a few days I will forward a game plan
                                    I hope we can all follow to stop Obama in his tracks!  
  The bulwark of the game plan will be a proposed bill
                                    I wrote.  We need to get a Member of Congress and at least one Senator to carry this bill.  Then, we need to get
                                    behind them and push as hard as we can to get it enacted.  While I have written the bill, I cannot yet forward it because
                                    I am awaiting comments from several people.
  If you have any questions in the mean time, please do not hesitate
                                    to send them to me.  |  
 | Sincerely,
                                     |     |  Charles
                                    Benninghoff, Editor In behalf of United States Justice Foundation Post Office Box 2806 Rancho Cucamonga,
                                    CA 91729 800-362-2723  |  
 Grassroots
                                    Campaign Creations, Ltd. | Post Office Box 2806 | Rancho Cucamonga | CA | 91729 | US
 
  |  
  
                                  
                                 
                                 
                               |