Results 1 to 3 of 3

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

  1. #1
    Senior Member
    Join Date
    Jul 2014
    Posts
    594

    "Jade 2 Master of the Human Domain" IA YOU NEED TO GET TO KNOW

    I know terms like "Trans Humanism", "Computer Takeover", Minority Report, and Eisenhower's "Technologically Elite Takeover", but here is the Computer Program System that all those comments are based on. The video is a little long, but THIS IS SOME POWERFUL STUFF.



    If you need some Context:
    Elon Musk donates $10 million to prevent a robot uprising: Entrepreneur says it is 'all fun and games' until something goes awry http://www.dailymail.co.uk/sciencete...goes-awry.html

    and here is the highlights of the Back Ink on White Paper w/ links-

    Jade Helm is Computer Driven
    By Clark Hay – June 7, 2015

    The following excerpts are straight from military and related sources.
    These excerpts provide strong evidence that behind JADE Helm 2015 are a set of
    computer programs constantly directing and updating directives based on
    information fed into the system from JADE Helm workstations.

    Much like the old IBM program “Deep Blue” was programmed to consider
    every possible move and strategy to beat the world’s best human chess player,
    the set of programs being used in the JADE [at the] Helm [for]
    2015
    exercise combines all the best military strategies and lessons learned
    with easily updatable information about:
    ·
    Political situations and events
    ·
    Military realities activities and inclinations
    ·
    Economic factors of all sides
    ·
    Social affiliations, relations, profiles, belief systems
    ·
    Infrastructure – key facilities, essential services, and
    installations that affect the overall stability of an area and their relevance
    to the population
    ·
    Information routes and relevance
    ·
    Physical Environment – how terrain affects people, equipment, trafficability,
    visibility, and
    ·
    Time sensitive elements

    JADE can process all of this information and issue battle plan
    directives to command and control centers in under 1 hour. Any new data or
    changes to any element of the campaign can be fed into the system from a “Human
    Domain workstation” to get a new and more relevant set of battle plans – almost
    in real time. This is a real plus in the ever changing conditions on the
    ground, or in the air, or behind the scenes.

    The above is what the phrase “Mastering the Human Domain” is all about.

    As you will see from the excerpts below, JADE can even make predictions
    for preemptive strikes.

    The large scale exercise of JADE this summer will be a test of all
    aspects of this complex system.

    Will the test “go live” if real life events “warrant” a real response?
    Will false flags occur between now and then? Is this the beginning of a
    computer controlled military similar to Cyberdyne from the Terminator movies?
    Will JADE’s predictive programming lead to a world like the one in the movie
    “Majority Report”? … Maybe. But that’s the subject speculators, fear mongers
    and the producers of doom porn.

    All I know is that we’re not in Kansas anymore.

    Now for the excerpts:

    The 1998 JADE Project – can generate an 80%
    logistics solution in less than an hour

    http://www.cs.cmu.edu/afs/cs/project...Jade/jade.html
    The Joint Assistant for Deployment and Execution (JADE)
    is an integrated mixed-initiative prototype whose goal is to provide military
    planners with the ability to generate a skeleton deployment plan within an
    extremely fast time period. That is, JADE
    can generate an 80% logistics solution in less than an hour.
    [Emphasis
    mine
    ]


    JADE – The OTHER Definition
    ADA490293.pdf

    P. 14
    3.3.2 DEEP Agents
    The DEEP ["Deep
    Episodic Exploratory Planning
    "] system uses two different types of
    agents. The first type is called an interface or planning agent
    and the second type is a critic agent.
    Agents in the DEEP
    architecture extend and use the Java Agent
    DEvelopment (JADE)
    framework (Bellifemine, 2006). DEEP requires a
    distributed multi-agent system and a framework to help simplify the
    implementation of this system. JADE was chosen because it is fully implemented
    in Java, and supports these requirements.


    The role of DEEP in the JADE Helm exercise:
    ADA490293.pdf

    Abstract
    This report
    describes an overview and the progress to date of the Distributed Episodic Exploratory
    Planning (DEEP) project. DEEP is a
    mixed-initiative decision support system that utilizes past experiences to
    suggest courses of action for new situations.
    It has been designed
    as a distributed multi-agent system, using agents to maintain and exploit the
    experiences of individual commanders as well as to transform suggested past plans
    into potential solutions for new problems. The
    system is mixed-initiative in the sense that a commander, through his or her
    agent, can view and modify the contents of the shared repository as needed. The
    agents interact through a common knowledge repository, represented by a
    blackboard in the initial architecture. The blackboard architecture is
    well-suited for dealing with ill-defined, complex situations such as warfare.


    Part of the program (DEEP) uses Artificial
    Intelligence:

    ADA490293.pdf

    3.3.1 Blackboard –
    The Distributed Shared Knowledge Structure
    As can be seen from
    the DEEP architecture in Figure 1, the various DEEP systems rely on a shared
    knowledge structure to act as a medium of communication and interaction.
    Also, in order to
    support the NCO vision discussed in Section 2.1, the DEEP architecture requires
    a mechanism that supports reach-back in a distributed system. A blackboard
    system was chosen to fulfill this need as it not only functions as a shared
    memory for the DEEP system, but as we discussed in Section 3.1, it provides
    other functionality as well.
    A blackboard system is an opportunistic artificial
    intelligence application based on the blackboard architectural software engineering
    paradigm (Corkill, 1991).The blackboard system functions as a central knowledge
    store facilitating communication and interaction between the different software
    systems, including interface agents, critic agents, and simulation
    engines (explained later in this chapter). These interactions are made possible
    by the sharing and passing of objects.
    To fully meet the
    requirements of the DEEP vision for distributed C2, a distributed blackboard
    system was required. Current commercial and open source blackboard system
    implementations are not distributed, so the paradigm needed to be extended from
    a monolithic to a distributed environment. The current DEEP blackboard, shown
    in Figure 4, was designed and implemented following this extended view using
    design patterns described in (Hughes & Hughes, 2003).


    The Predictive and Preemptive Capability of
    JADE – ala the Minority Report

    ADA490293.pdf

    p. 3
    Experience with
    recent operations also reveals that the C2
    process must transition from a process of observation and reaction to one of prediction
    and preemption
    . [Emphasis mine] To achieve this, we will need
    to go beyond the focus of military operations, and instead address the entire spectrum
    of Political, Military, Economics, Social, Infrastructure, and Information (PMESII)
    (Alberts & Hayes, 2007).
    To that end, the
    focus of the research reported here is on developing a C2 environment that
    supports the vision of Network Centric Operations (NCO) (Alberts & Hayes,
    2007).
    The tenets of NCO
    are:
    • Information
    sharing
    • Shared
    situational awareness
    • Knowledge of
    commander’s intent


    JADE can select its own course of action
    ADA490293.pdf

    p. 18
    3.3.4.3 Execution
    Selection Critic Agents

    Once there are several plans that have been
    instantiated, adapted, and scored by the various agents in the DEEP system ["Deep
    Episodic Exploratory Planning
    "], a
    final agent is responsible for selecting the top scoring plan(s) and sending
    them off for execution. This agent is known as the Execution Selection Critic
    Agent. Its specialization is taking all of the information on the blackboard
    and using it to evaluate and rank the plans. It then either decides which
    plan(s) are to be executed by either prompting the user for mixed-initiative
    input, or selecting one on its own. [Emphasis mine]…
    After the agent
    realizes that the plans have converged, it then sorts the plans in order of best
    to worst. In order to sort the plans, it uses the scores associated with each
    plan to rate them. This functionality does not currently assign a weight to the
    scores; however, in the future it should …


    So what is the Human Domain?
    From the “Cognitive
    Joint Force Entry White Paper
    ” – 26 September 2014
    3-2. Central Idea.
    The United States Army Special Operations Command (USASOC) provides Cognitive
    Joint Force Entry capability to support Geographic Combatant Commanders (GCC)
    and Joint Force Commanders (JFC) using information and influence activities to prepare
    the environment for follow-on actions. Cognitive
    Joint Force Entry is a proactive, Human Domain-centered strategy that
    synchronizes and employs all components of the global information environment
    to predispose populations of a foreign country or countries to favorably view
    U.S. activities or operations. It reflects campaigning to win in the
    shaping phase of an operation, and it is a component to achieve persistent
    influence within the operating environment to create decisive influence. It achieves strategic depth, builds
    cognitive security, and it provides scalable options to achieve favorable
    outcomes.
    3-3. Solution
    Concepts and Components.
    a. Win in the Human
    Domain. Cognitive Joint Force Entry is part of Strategic Landpower designed to
    prevail in the Human Domain. In COMUSSOCOM’s Posture Statement to the House
    Armed Services committee on 11 Mar 2014, Admiral McRaven described the Human
    Domain. He stated: “Our SOF engagement takes place in the Human Domain — the totality of the physical,
    cultural, and social environments that influence human behavior in a
    population-centric conflict.
    [Emphasis mine] The Human
    Domain is about developing an understanding of, and nurturing influence among,
    critical populaces. SOF is uniquely suited for operations that win
    population-centric conflicts, oftentimes, and preferably, before they
    start.”3 Success within the Human Domain “depends on the application
    of unique capabilities that are designed to influence, fight, and win in
    population-centric conflicts.”4 To achieve the goal of nurturing influence
    and winning in population-centric conflicts, the
    ARSOF approach will be to “first understand the population within the
    context of the operational environment and then take meaningful action to
    effectively influence human behavior toward achieving the desired
    outcome.”5 Cognitive Joint Force Entry provides the mechanism for ARSOF to
    set the conditions for success in the Human Domain.
    b. Establish a
    pro-active posture. ARSOF will employ Cognitive Joint Force Entry activities in
    the earliest stage to shape the future operating environment and achieve
    favorable outcomes before conflicts start. As the USSOCOM input to the 2014
    Quadrennial Defense Review (QDR) recommended, “Preventing war through
    presence and an innovative, small-footprint, low-cost, and responsive approach
    to posture is far cheaper than waging war and mitigating the instability and
    radiating effects that come with waging war.”6 Cognitive Joint Force Entry
    addresses a key notion of that cost calculus by using information and influence
    activities to shape the environment beginning in pre-conflict stages. ARSOF
    achieves this by maintaining a persistent, continuous awareness of the global
    information environment, which provides the ability to anticipate challenges
    and identify opportunities for early and responsive
    5
    actions. The
    pro-active posture provided by Cognitive Joint Force Entry will preclude
    shortfalls in the past where “the US was slow to recognize the importance
    of information and the battle for the narrative in achieving objectives at all
    levels,”7 and the proactive posture addresses the critique that “the
    US response to the emergent battle for the narrative was characterized by an
    initial lack of leadership emphasis and resources that addressed information as
    an instrument of national power.”8 Cognitive Joint Force Entry provides a
    vital capability in a critical domain at strategic windows of opportunity where
    other instruments of national power may not or cannot function. Adopting a
    pro-active posture through Cognitive Joint Force Entry will gain the initiative
    in setting the conditions for success by achieving favorable outcomes before
    conflicts start.
    c. Dominate
    Cognitive Depth. For the purposes of this paper,
    Cognitive Depth is a dimension of the operating environment encompassing a
    populations’ realm of perceptions, beliefs, opinions, and attitudes. It can
    have a global scope and includes the dimension of time. These components
    present a highly complex challenge for successfully generating persistent influence
    and preparing the environment for follow on actions.
    1) The concept of Cognitive Depth can be viewed through
    a combination of terms drawn from psychology linked to doctrine. It is a
    dimension influenced by an extremely broad range of factors, “to include
    individual and cultural beliefs, norms, vulnerabilities, motivation, emotion,
    experiences, morals, education, mental health, identities, and
    ideologies.” 9 That broad scope is formed over time and
    incorporates multiple references in a complex framework of attitudes, beliefs,
    and behaviors, which are acquired.10 The source of attitudes are “culture,
    social role, laws, mass media, institutes, schools, parents, family, peers and
    others, various groups and direct experience.”11 Cognitive Depth, therefore, is formed, informed, and modulated by a
    whole-of-environment interaction. Understanding that complex arena to create
    effective strategies for the initial, shaping phase of a campaign requires
    significant skill, deep knowledge, and supporting capacity.
    2) While Cognitive
    Depth may be formed by multiple factors, its
    potential scale can range from individuals and groups to populaces and nations.
    As Global Trends 2030 has described an interconnected world with instant
    information access, it is possible that the perceptions, dispositions, and
    attitudes of people, groups, and populations can be exposed to a near limitless
    realm of influence, including global, virtual sources of influence. Cognitive Depth can therefore be both local and
    global and can range from the tactical to the strategic level. The
    global context may possess multiple strata where attitudes, perceptions,
    beliefs, and opinions can potentially create a range of decisions and
    behaviors. It includes what JP 2-0 calls “human factors affecting a leader’s
    or key actor’s decision-making influences.12 Those decisions and
    6
    behaviors could
    include various degrees of influence impacting a campaign. Therefore,
    understanding and assessing the complex, global nature of Cognitive Depth will
    become essential. Joint Publication 5-0 indicates “As planners assess
    complex human behaviors…they draw on multiple sources across the operational
    environment, including both analytical and subjective measures that support a
    more informed assessment.”13 The new information environment will be
    inherently dynamic and requires maintaining a persistent awareness to know how
    and where influence and information activities can be applied. Achieving persistent awareness will be a necessary
    precondition to effectively apply influence and information activities. Having
    the capacity to maintain persistent awareness remains an essential ingredient
    to success in the earliest stage of a campaign.
    3) As Cognitive
    Depth has a wide range and includes the realm of perceptions, beliefs,
    opinions, and attitudes, it also incorporates the dimension of time, past,
    present, and future. This characteristic
    requires a capacity to maintain persistent engagement in the information
    environment, understanding the past and looking into the future. The
    Joint Publication 3-13, Information Operations, states: “the cognitive
    dimension encompasses the minds of those who transmit, receive and respond to
    or act on information.”14 That description points to a space with
    processes working at the present time in the here and now. But because
    cognition is “a general term of the higher mental processes by which
    people acquire knowledge, solve problems, and plan for the future,”15 it
    also spans the past in terms of memory, functions in the present, and reaches
    into the future in terms of conceptualization. Maintaining persistent
    engagement will enable an understanding of the continuum of the information
    environment, which is necessary to implementing influence and information
    activities. The combination of persistent
    awareness and persistent engagement will yield deep cultural knowledge to craft
    and implement activities specifically tailored to the environment.
    4) Another aspect of
    time as it relates to Cognitive Depth is the tempo at which change occurs, and
    - within the cognitive domain – change takes time. Because change takes time, implementing influence and information
    activities should occur as early as possible in order to achieve persistent
    influence. Due to the complexity in the way opinions and attitudes are
    formed and held, and because aspects of the cognitive domain directly relate to
    the notion of identity and the way individuals interact with the world, changes
    in the cognitive domain occur over time. Psychology texts refer to the
    complexity of attitudes and why they are fundamental aspects of individuals.
    “Attitudes help [people] to function in the social world”16 and
    result from “the multiple processes by which humans adapt to their
    environment.”17 It indicates that attitudes are integral to the way that
    people function in relation to others and how individuals relate to the world.
    These primal factors contribute to the lengthy process where change occurs.
    Because of the lengthy process and the long lead times to effect change,
    information and
    7
    influence activities should be planned strategically
    and applied pro-actively to develop decisive influence in the earliest stage of
    campaigning. It should be planned through a whole-of-government approach
    and should be implemented in early, whole-of-government manner to achieve
    sustainable, persistent influence.


    Pre-solicitation for a Human Domain
    Workstation:

    https://www.fbo.gov/index?s=opportun...d427e36f8effc7
    Solicitation Number:
    W909MY-05-R-T020
    Notice Type :
    Presolicitation
    Synopsis :
    Added: April 19,
    2005
    This is a Sole
    Source requirement for a one year, Time and Materials T&M, Indefinite
    Delivery Indefinite Quantity contract, with four, one year options to be issued
    to Northrop Grumman Information Technology Inc., 12005 Sunrise Valley Dr.,
    Reston, VA 20191-3404. Authority for Other Than Full and Open Competition is 10
    USC 2304 c 1 and FAR 6.302-1, Only One Responsible Source. All responsible
    sources may submit a written proposal which shall be considered by the agency
    for the procurement of engineering/technical support for the
    Counterintelligence/Human Intelligence (CI/HUMINT) Automation Management
    Software (CHAMS) and Human Domain
    Workstation (HDWS) Software Systems
    . The CHAMS and HDWS are the two
    software baselines within the CI/HUMINT Management System (CHIMS). CHIMS is a
    family of intelligence automation systems that facilitate the collection,
    reporting, analysis and management of human intelligence. The
    engineering/technical support will include system engineering, design, software
    development, hardware integration, testing, training development, program
    support, system security accreditation activities, and configuration
    management. The proposed effort will provide for the continued development of
    CHAMS, including enhancements to the current system, and initiatives to support
    future Army requirements in support of CI-HUMINT automation, and enhancements to
    the HDWS to meet requirements established jointly by Program Manager (PM),
    CHIMS and Program Manager, Distributed Common Ground Station-Ar my (PM DCGS-A).
    Please be advised that the response date included in this notice is a forecast
    date, see the solicitation document on the IBOP website for the actual response
    date. Previous procurement history will be in the solicitation. Drawings are
    not available. The U.S. Army Communications-Electronics Life Cycle Management
    Command (C-E LCMC) Acquisition Center has established a World Wide Business
    Opportunity Page at https://abop.monmouth.army.mil, to provide electronic
    transmittal of Request for Proposals (RFPs), Invitation for Bids (IFBs) and
    Request for Quotes (RFQs) for Government to Industry. All parties interested in
    doing business with C-E LCMC are invited to access, operate, and send and
    receive information for the C-E LCMC Acquisition Center World Wide Business
    Opportunities Page. Upon accessing the webpage, click on CECOM Business
    Opportunities Page. Registration for a user ID and password will only be
    necessary when you are considering the submission of proposals to the Business
    Opportunities Page. The solicitation W909MY-05-R-T020 will be uploaded to the
    internet site set forth above in or about 15 days. See note 22.***** Please
    contact the IBOP help desk, toll free at 1-888-414-BOSS (2677) for technical
    assistance with the IBOP. Please contact or e-mail
    evonne.lipscomb@cacw.army.mil to request information. The contracting officer
    for this proposal action is Rosetta Wisdo m-Russell 703-325-1717. SEE NOTE 22.
    Contracting Office
    Address :
    US Army
    Communications-Electronics Command, CECOM Acquisition Center Washington, ATTN:
    AMSEL-AC-W, 2461 Eisenhower Avenue, Alexandria, VA 22331-0700
    Place of Performance
    :
    US Army
    Communications-Electronics Life Cycle Mangement Command, Acquisition Center
    Washington ATTN: AMSEL-AC-W, 2461 Eisenhower Avenue Alexandria VA
    22331-0700
    Point of Contact(s)
    :
    Angle Trimmier,
    7033335802
    US Army
    Communications-Electronics Command, CECOM Acquisition Center Washington



    Northrop has a Human Domain Workstation:
    U.S.
    Army-Northrop Grumman Team Opens Soldiers’ Access to Intelligence Data Through
    Distributed Common Ground System-Army (DCGS-A)


    BALTIMORE, March 2,
    2007 (GLOBE NEWSWIRE) — A team led by Northrop Grumman Corporation (NYSE:NOC)
    has developed and demonstrated technology for users of the U.S. Army’s
    battlefield networks that allows access to
    actionable intelligence from virtually anywhere in the field.
    Northrop Grumman and
    teammates General Dynamics, Lockheed Martin, and Science Applications
    International Corp. were chartered by the U.S. Army to integrate multiple,
    existing intelligence, surveillance and reconnaissance (ISR) systems into a
    single multi-intelligence system called the Distributed Common Ground System -
    Army (DCGS-A). This team is officially named the DCGS-A Industry Team, with
    Northrop Grumman acting as the system integrator.
    The team
    successfully conducted several DCGS-A, Version 4, Proof of Concept (PoC) demonstrations
    at Ft. Belvoir, Va.; Ft. Huachuca, Ariz.; and Northrop Grumman laboratory
    facilities in Baltimore from August through December 2006. These efforts
    resulted in a new model for moving battlefield data and intelligence in support
    of tactically deployed combat commanders. The system uses queried/access
    methodology, and is designed to operate within a distributed-operations,
    enterprise environment.
    Participating
    systems included the Army’s Joint STARS Common Ground System, the Joint STARS
    Work Station, the Human Domain Work Station,
    the Digital Terrain Support System, the Integrated Meteorological System, the
    V3 Joint Intelligence Operations Capability – Iraq (JIOC-I) work suites and
    selected components of the Navy’s DCGS Multi-Intelligence Segment integrated
    with the DCGS Integration Backbone (DIB).
    Data interchange
    within the PoC was achieved using a combination of a commercially available
    Enterprise Service Bus and the U.S. Department of Defense DIB. The
    demonstration adhered to DoD’s guidance to remain consistent with DIB
    standards, be interoperable with existing components and be facilitated by the
    use of DIB architecture.
    The Northrop
    Grumman-led DCGS-A Industry Team has continued to expand the Army’s net-cetric
    enterprise capability with DCGS-A, Version 4. Previous DCGS versions included
    the Army’s Version 2, Joint Intelligence Operations Capability-Iraq (JIOC-I)
    and the DCGS-A Version 3, battle command interoperability.
    “Our team is committed to designing and delivering the
    best capabilities for producing actionable intelligence rapidly available to
    the warfighter,” said Ken Wilson, vice president of C4ISRT
    Networked Systems for Northrop Grumman’s Electronic Systems sector. “Our
    approach makes the best of the Army’s investment in ISR technologies. By
    working with our government and industry partners, we will continue to
    integrate ‘best of breed’ applications and services from multiple sources in an
    open service-oriented architecture environment.”
    Northrop Grumman
    Corporation is a $30 billion global defense and technology company whose
    120,000 employees provide innovative systems, products, and solutions in
    information and services, electronics, aerospace and shipbuilding to government
    and commercial customers worldwide.
    CONTACT: Paul
    Cabellon
    Northrop
    Grumman Electronic Systems
    (410)
    765-7192
    paul.cabellon@ngc.com


    PMESII – An Acrostic for the Spectrum of
    Data Gathered

    ADA490293.pdf

    p. 38
    PMESII Political, Military, Economics, Social,
    Infrastructure, and Information


    More on what PMESII is:
    In Document “CTC-A-COIN-Guidebook.pdf
    p. 11
    As with ASCOPE3xD,
    equal consideration must be given to the insurgent, counterinsurgent, and the
    population when using ASCOPE/PMESII
    However, through the
    use of PMESII Counterinsurgents can begin to further analyze the information
    and
    civil considerations
    provided by ASCOPE3xD.
    In this regard, PMESII is defined as a set of interrelated
    operational variables that provides counterinsurgents with a method to analyze
    the OE through specific filters.
    Thus,
    counterinsurgents consider the following factors and their relevance to the OE
    as they relate to the civil considerations of ASCOPE:
    ·
    Political: Key
    elements of the formal, informal, and shadow governance and how they are
    relevant to the population and overall stability in the area.
    ·
    Military: Key
    elements influencing the security situation and overall stability in the area.
    ·
    Economic: Key
    elements of overall economic stability and activity in the area.
    ·
    Social: Key
    elements that influence traditional social dynamics in the area.
    ·
    Infrastructure: Key
    facilities, essential services, and installations that affect the overall
    stability of an area and their relevance to the population
    ·
    Information: Key
    elements that facilitate the transfer of information amongst the local
    population and their relevance to the population.
    ·
    Physical Environment:
    Key terrain affects people, equipment, trafficability, visibility, and the
    employment of many weapons.
    ·
    Time: The
    population, counterinsurgent, and insurgent often view time differently.

    http://beforeitsnews.com/military/20...e-2472076.html

  2. #2
    Senior Member
    Join Date
    Jul 2014
    Posts
    594

    A.I. Mastering Human Domain "JADE" Helm Exploring FROM CREATORS' Websites.

    They are 30 years AHEAD of what WE KNOW ABOUT.


  3. #3
    Senior Member
    Join Date
    Jul 2014
    Posts
    594
    A Very In depth Video I found on Jade2, A "GEO INT." Program. Know it, because IT KNOWS YOU.

Similar Threads

  1. Replies: 0
    Last Post: 10-03-2013, 05:35 PM
  2. Replies: 0
    Last Post: 09-27-2013, 08:41 PM
  3. Forget The "Bazookas": Here Come The "Tomahawks" And "Howitzers" - Greek Endgame
    By AirborneSapper7 in forum Other Topics News and Issues
    Replies: 0
    Last Post: 05-22-2012, 02:57 AM
  4. Ireland: "Germany Is Our New Master"
    By AirborneSapper7 in forum Other Topics News and Issues
    Replies: 1
    Last Post: 11-20-2011, 09:13 AM
  5. Illegals Face "Major Human Rights Crisis"--in Mexi
    By saveamerica in forum General Discussion
    Replies: 2
    Last Post: 04-29-2010, 10:29 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •