This was written by NCA Lt. General Len Taylor, it is a very good read.

 

Over the last few months I have spoken to so many people concerning the New Confederate Army. The vast majority of those I have talked with agree with our goals, with what we are trying to achieve. Most have expressed the desire to support us, although some of them do not want their names associated with the movement. Many have told me that they are concerned that the “Empire” will target them if their name is associated with the NCA and the movement to liberate our country. 

 To this I would like to pose a question. How many of you have signed the petitions to allow the various states to “peacefully” leave the Union? If you have done this then the “Empire” already has your information…you have already cast your lot with us. You may say “I only had to leave my name, email address and state on the petition”. To this I say the following…1)You most likely signed the petition from your home computer, which means they have your IP address, and, 2) Your signed your name…think about this, they assigned you an id number when you were born, your social security number, which means by having your name they can find out anything they want. 

 So, with this being said…you already have a target on your back. The moment you signed into Facebook and joined the pages you frequent, you painted the target on your own back. You have already given them the information they were looking for. Now, since the “Empire” already has you in its sights…join us! NOW is the time to take a stand! Now is the time to let your voice be heard and to make a difference! Join the New Confederate Army and make your ancestors proud! Please visit https://thenewconfederatearmy.tripod.com/home.html…if you still do not want to join, please consider making a financial contribution…it isn’t just for you…it is for the future of your children, and for the liberation of the land that your ancestors founded over 150 years ago. 

  

Regards, 

 Len Taylor 

 Lieutenant General 

 Commander-Texas Division 

 Communications Officer 

 New Confederate Army 

__________________________________________________

 

We have all heard about the loss of civil liberties and freedoms since the signing into law of the NDAA (National Defense Authorization Act). In the 11 years after the terrorist attacks of 2001, the United States is assembling a vast domestic intelligence apparatus to collect information about Americans, using the FBI, local police, state homeland security offices and military criminal investigators. The system, by far the largest and most technologically sophisticated in the nation's history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrong doing. The government's goal is to have every state and local law enforcement agency in the country feed information to Washington to buttress the work of the FBI, which is in charge of terrorism investigations in the United States. Other democracies - Britain and Israel, to name two - are well acquainted with such domestic security measures. But for the United States, the sum of these new activities represents a new level of governmental scrutiny.


The FBI is building a database with the names and certain personal information, such as employment history, of thousands of U.S. citizens and residents whom a local police officer or a fellow citizen believed to be acting suspiciously. It is accessible to an increasing number of local law enforcement and military criminal investigators, increasing concerns that it could somehow end up in the public domain.


The Department of Homeland Security sends its state and local partners intelligence reports with little meaningful guidance, and state reports have sometimes inappropriately reported on lawful meetings.


The need to identify U.S.-born or naturalized citizens who are planning violent attacks is more urgent than ever, U.S. intelligence officials say. This month's FBI sting operation involving a Baltimore construction worker whoallegedly planned to bomb a Maryland military recruiting station is the latest example. It followed a similar arrest of a Somali-born naturalized U.S. citizen allegedly seeking to detonate a bomb near a Christmas tree lighting ceremony in Portland, Ore. There have been nearly two dozen other cases just this year.


"The old view that 'if we fight the terrorists abroad, we won't have to fight them here' is just that - the old view," Homeland Security Secretary Janet Napolitano told police and firefighters.
By now you have likely seen reports that contain news of the list of terms the Department of Homeland Security searches for online, as it tracks what people are saying around the Internet. The list is extremely long, vague, and often quite humorous (even in the face of its importance). However, the list is worrisome all the same. The broadness of the terms that are being used as a starting point for tracking online communications is disconcerting; these are the words that could flag a person or conversation as potentially a threat to the United States. And thus, to have terms that come up in the daily news, and normal conversation, marked as worthy of tracking, is unsettling. This is a current list of terms that will be used by the NOC [National Operations Center] when monitoring social media sites to provide situational awareness and establish a common operating picture. As natural or manmade disasters occur, new terms may be added. The new search terms will not use PII [Personally Identifiable Information] in searching for relevant mission-related information.

The List
Domestic Security
Assassination
Attack
Domestic security
Drill
Exercise
Cops
Law enforcement
Authorities
Disaster assistance
Disaster management
DNDO (Domestic Nuclear Detection Office)
National preparedness
Mitigation
Prevention
Response
Recovery
Dirty bomb
Domestic nuclear detection
Emergency management
Emergency response
First responder
Homeland security
Maritime domain awareness (MDA)
National preparedness initiative
Militia
Shooting
Shots fired
Evacuation
Deaths
Hostage
Explosion (explosive)
Police
Disaster medical assistance team (DMAT)
Organized crime
Gangs
National security
State of emergency
Security
Breach
Threat
Standoff
SWAT
Screening
Lockdown
Bomb (squad or threat)
Crash
Looting
Riot
Emergency Landing
Pipe bomb Incident Facility
HAZMAT & Nuclear
Hazmat
Nuclear
Chemical spill
Suspicious package/device
Toxic National laboratory
Nuclear facility
Nuclear threat
Cloud
Plume
Radiation
Radioactive Leak
Biological infection (or event)
Chemical
Chemical burn
Biological Epidemic
Hazardous
Hazardous material incident
Industrial spill
Infection Powder (white)
Gas Spillover
Anthrax
Blister agent
Chemical agent
Exposure Burn
Nerve agent
Ricin
Sarin
North Korea
Health Concern + H1N1
Outbreak
Contamination
Exposure
Virus
Evacuation
Bacteria
Recall
Ebola
Food Poisoning
Foot and Mouth (FMD)
H5N1
Avian Flu
Salmonella
Small Pox
Plague
Human to human
Human to Animal
Influenza
Center for Disease Control (CDC)
Drug Administration (FDA)
Public Health
Toxic
Agro Terror
Tuberculosis (TB)
Agriculture
Listeria
Symptoms
Mutation Resistant
Antiviral Wave
Pandemic
Infection
Water/air-borne
Sick
Swine
Pork
Strain
Quarantine
H1N1 Vaccine
Tamiflu
Norvo
Virus
Epidemic
World Health Organization (WHO) (and components)
Viral
Hemorrhagic
Fever
E. Coli
Infrastructure Security
Infrastructure security
Airport
Airplane (and derivatives)
Chemical fire
CIKR (Critical Infrastructure& Key Resources)
AMTRAK
Collapse
Computer infrastructure
Communications infrastructure
Telecommunications
Critical infrastructure
National infrastructure
Metro
WMATA
Subway
BART
MARTA
Port Authority
NBIC (National Biosurveillance Integration Center)
Transportation security
Grid
Power
SmartBody scanner
Electric
Failure or outage
Black out
Brown out
Port
Dock
Bridge
Cancelled
Delays
Service disruption
Power lines
Southwest Border Violence
Drug cartel
Violence
Gang
Drug
Narcotics
Cocaine
Marijuana
Heroin
Border
Mexico
Cartel
Southwest
Juarez
Sinaloa
Tijuana
Torreon
Yuma
Tucson
Decapitated
U.S. Consulate
Consular
El Paso
Fort Hancock
San Diego
Ciudad Juarez
Nogales
Sonora
Colombia
Mara salvatrucha
MS13 or MS-13
Drug war
Mexican army
Methamphetamine
Cartel de Golfo
Gulf Cartel
La Familia
Reynosa
Nuevo
Leon
Narcos
Narco banners (Spanish equivalents)
Los Zetas
Shootout
Execution
Gunfight
Trafficking
Kidnap
Calderon Reyosa
Bust
Tamaulipas
Meth Lab
Drug trade
Illegal immigrants
Smuggling (smugglers)
Matamoros
Michoacana
Guzman
Arellano-Felix
Beltran-Leyva
Barrio
Azteca
Artistic
Assassins
Mexicles
New Federation
Terrorism
Terrorism
Al Qaeda (all spellings)
Terror
Attack
Iraq
Afghanistan
Iran
Pakistan
Agro
Environmental terrorist
Eco terrorism
Conventional weapon
Target
Weapons grade
Dirty bomb
Enriched
Nuclear
Chemical weapon
Biological weapon
Ammonium nitrate
Improvised explosive device IED (Improvised Explosive Device)
Abu Sayyaf
Hamas
FARC (Armed Revolutionary Forces Colombia)
IRA (Irish Republican Army)
ETA (Euskadi ta Askatasuna)
Basque
Separatists
Hezbollah
Tamil Tigers
PLF (Palestine Liberation Front)
PLO (Palestine Liberation Organization)
Car bomb
Jihad
Taliban
Weapons cache
Suicide bomber
Suicide attack
Suspicious substance
AQAP (AL Qaeda Arabian Peninsula)
AQIM (Al Qaeda in the Islamic Maghreb)
TTP (Tehrik-i-Taliban Pakistan)
Yemen
Pirates
Extremism
Somalia
Nigeria
Radicals
Al-Shabaab
Home grown
Plot
Nationalist
Recruitment
Fundamentalism
Islamist
Weather/Disaster/Emergency
Emergency
Hurricane
Tornado
Twister
Tsunami
Earthquake
Tremor
Flood
Storm
Crest
Temblor
Extreme weather
Forest fire
Brush fire
Ice
Stranded/Stuck
Help
Hail
Wildfire
Tsunami
Warning Center
Magnitude
Avalanche
Typhoon
Shelter-in-place
Disaster
Snow
Blizzard
Sleet
Mud slide or Mudslide
Erosion
Power outage
Brown out
Warning
Watch
Lightening
Aid
Relief
Closure
Interstate
Burst
Emergency Broadcast System
Cyber Security
Cyber security
Botnet
DDOS (dedicated denial of service)
Denial of service
Malware
Virus
Trojan
Keylogger
Cyber
Command
2600
Spammer
Phishing
Rootkit
Phreaking
Cain and abel
Brute forcing
Mysql injection
Cyber attack
Cyber terror
Hacker
China
Conficker
Worm
Scammers
Social media

The “Empire” is bent on making examples of as many as possible. Will it be you? I am somewhat certain it will be me. How long are we going to allow a foreign government to occupy our country? It is time to act! If not now, when?

 

Yours in the Cause of Southern Liberty,


Lt General Len Taylor
Commander-Texas Division
Communications Officer
New Confederate Army