James Comey and Loretta Lynch Should Be Impeached

DEPT OF OBSTRUCTING JUSTICE • OPINION

James Comey and Loretta Lynch Should Be Impeached for Whitewashing Clinton’s Crimes

Former federal prosecutor says that Hillary obstructed justice and destroyed evidence—with the support of the president himself

By Sidney Powell • 10/11/16 8:30am

Just when one thinks the cavalier cabal of Clinton and her cronies has exhausted all manner of corruption, yet another outrage surfaces, implicating even more people.

The bombshell this week is that Loretta Lynch and James Comey not only gave immunity to Hillary’s closest co-conspirators Cheryl Mills and Heather Samuelson—who, despite being attorneys, destroyed evidence right and left—but, in a secret side deal, agreed to limit the FBI’s review of the Clinton team laptops to pre-January 2015 and to destroy the laptops when the FBI review was complete.

Congress and every law-abiding citizen in this country should be outraged. This blatant destruction of evidence is obstruction of justice itself.

We no longer have a Department of Justice: We have a Department of Obstructing and Corrupting Justice to protect the power elite of the chosen side.

It’s easy to see now why Lynch secretly met Bill Clinton on an airport tarmac on June 27. Only a few days later, the FBI had its little chat with Hillary—neither under oath nor with a rights warning—in the presence of her coconspirators. Then, Hillary announced she would keep Lynch as Attorney General if she is elected president. Surely by coincidence, the very next day Comey does his song and dance ending the “investigation.”

Comey’s “investigation” was a farce. Any former prosecutor worth a flip would have convened a grand jury, issued subpoenas, gotten search warrants, seized computers, run wire taps, indicted the Clinton cabal, and squeezed the underlings to plead guilty and cooperate. This business of friendly chats, immunity agreements handed out like party favors, and side deals that include the Attorney General approving the destruction of evidence to keep it from Congress doesn’t happen for others targeted by the feds.

Just ask any number of Wall Street executives who for various reasons found themselves on the opposite side of the Department of “Justice.” In fact, my former client, Jim Brown, served a year in prison convicted of perjury and obstruction of justice for testifying about his personal understanding of a telephone call to which he was not even a party. Yes, you read that correctly. Read Licensed to Lie: Exposing Corruption in the Department of Justice.  It becomes more relevant every day.

How did we get here?

Thanks to the work of Judicial Watch and others, we learned over a year ago now that Hillary Clinton ran the most important and confidential of world affairs and the United States Department of State through an unsecured computer server assembled by her minions and ensconced in the basement of her New York home. She did so despite repeated warnings of security risks, against protocol, and contrary to her own memo to all of her underlings. That posed no problem simply because the rules don’t apply to Clinton.

Conveniently, her server also handled Clinton Foundation correspondence that facilitated the personal enrichment of Hillary and Bill by hundreds of millions of dollars. That money came from Bill’s remarkable “speaking fees” at hundreds of events around the world—each of which was quickly approved as requested by Clinton crony Cheryl Mills at the State Department—as if there were no conflict of interest. Simultaneously, foreign entities made “donations” of hundreds of millions of dollars to the Clinton Foundation to obtain the immediate attention of and curry favor with the secretary of state—and it worked.

The conflict of interest inherent in that entire scenario is palpable. It’s the Clintonian equivalent of the scheme former Enron CFO Andrew Fastow conceived that destroyed Enron—a large side-slush fund that operated as his own piggy bank.  The Clintons boldly went where no one has gone before: They privatized the State Department for their massive personal gain, creating a net worth for each of over $100 million dollars in a few short years. Ironically enough, lead counsel for the Clinton Foundation now was President Obama’s longest-serving White House counsel. A former prosecutor on the Enron Task Force, Kathryn Ruemmler was implicated in various forms of prosecutorial misconduct and its cover-up.

The personal home server allowed Hillary Clinton to send and receive all of her emails and run the State Department free from protected, secure, and requiredgovernment channels. It was established deliberately to circumvent the Federal Records Act and the Freedom of Information Act—both of which applied to her work-related correspondence.

That was no problem for Clinton however, as she simply “didn’t know how to use a computer,” apparently was incapable of learning to do so (unlike most toddlers in the country), and she liked her Blackberry—which was reason enough for her highness to ignore the national security interests of the entire country.

One of our favorite Clinton lies is: ‘My staff and I will cooperate completely with the investigation.’
Clinton’s insistence on operating outside the government security protocols demonstrated at best deliberate disregard for the law and national security—and, at worst, conduct that was treasonous. That is why 18 USC 793 (d) and (f) make it a crime punishable by imprisonment for 10 years to even move any information relating to the national defense from secure conditions or to fail to return it upon demand. Clinton did both—repeatedly.

The unsecure server also facilitated the clearly conflicting roles of Clinton confidant and protégé Huma Abedin, who was paid simultaneously by the Clinton Foundation and the taxpayers through the State Department. That made it easier for the double-dipping Abedin to schedule meetings quickly for Clinton with those who had paid to play—substantial donors to the Foundation, such as the Crown Prince of Bahrain, who had been denied a face-to-face through those pesky State Department protocols in place for mere mortals. His millions in contributions to the Foundation got him an appointment with Clinton through Abedin in a matter of hours.

We wrote more than a year ago—as soon as we heard one Clinton server was “wiped”—about the Countless Crimes of Hillary Clinton. We foresaw the need for a special prosecutor and predicted that if emails could be found, they would likely implicate high ranking people across the government, including the president.

Lo and behold, President Obama, who told the country he heard of Clinton’s private email from news reports, was in reality emailing her at Clintonemail.com and using an alias. He must have forgotten. But, wait—just this week, we get more emails, and there’s now evidence that the White House and the State Department coordinated an attempt to minimize the problem.

Now we have a candidate for president of the United States who has committed lie after lie, obstructed justice, and destroyed evidence with the support of the president himself—conduct for which many people are in prison. Sometimes it’s called False Statements to federal officials, punishable by up to five years in prison under 18 USC 1001. Under other circumstances, such as in sworn statements to federal judges or testimony to Congress, it can be perjury under 18 USC 1621 or 1623.

And let’s not forget obstruction of justice under 18 USC 1519. That statute was tailor-made to fit the facts of the Clinton cabal’s destruction of evidence. It reads:

Whoever knowingly alters, destroys, mutilates, conceals, covers up, falsifies, or makes a false entry in any record, document, or tangible object with the intent to impede, obstruct, or influence the investigation or proper administration of any matter within the jurisdiction of any department or agency of the United States or any case filed under title 11, or in relation to or contemplation of any such matter or case, shall be fined under this title, imprisoned not more than 20 years, or both.

Remember the man relentlessly prosecuted by the feds for throwing a few fish overboard? That case had to go all the way to the Supreme Court for them to decide that fish weren’t the kind of tangible objects/evidence to which Congress intended the new obstruction statute to apply. But emails, computers, and servers are. Senator Clinton voted for that new statute—but it doesn’t apply to her. Well, it would, but Loretta Lynch and James Comey just agreed to destroy evidence of it themselves.

These false statement and obstruction offenses are so easy to prove that prosecutors often tack them on to already multi-count indictments just for good measure when they want to hammer Wall Street bankers or other citizens and business people who actually work for a living.

How many of these federal criminal offenses are established by the limited evidence that has been pried out of the Clintons’ hands or resurrected from unsuccessful although mighty attempts to destroy it? They are truly countless, as each email would be a separate charge but, for the sake of brevity, we’ll just pick three or four—that don’t even include all the conspiracy charge options routinely used by “reasonable” prosecutors.

First, Clinton testified to Congress that she “turned over all of her work-related emails.” Second, she “only wanted to use one device.” Later, she chose her words carefully, claiming “nothing was marked classified when it was sent or received.”  That sounds good to people who are not lawyers, but it’s Clintonese and not the law.

She “turned over all her work emails”?

First, her friend Sidney Blumenthal found a number of emails he exchanged with her about confidential matters of State that she didn’t produce. Next, that pesky Pentagon found over 1,000 emails between Hillary and General Petraeus alone. Most recently, the FBI found roughly 15,000 Clinton thought had been erased completely when she had her servers “wiped” professionally with BleachBit. We’ll never know how many were deliberately destroyed to protect her incompetence and corruption. Mills, Samuelson, and others at Platte River Networks destroyed whatever they wanted.

As both secretary of state and an attorney who had long been paid by the taxpayers, Clinton should know that information “relating to the national defense” is what is protected under 18 USC 793(f). It doesn’t have to be “classified”—marked or unmarked—even though much of it was.

Sure, let’s give her the presidency and the nuclear codes and access to every national secret—ISIS can just hack her and use our own missiles to destroy us. They won’t have to worry about trying to bring nukes into the country.

In any event, according to the FBI’s perfunctory investigation, more than 2,000 of the emails available are classified as Confidential or Secret or higher.

Clinton may have only wanted “one device,” but the truth is that she had 13“personal mobile devices that were lost, discarded, or destroyed.” Reporter Sharyl Attkisson has an excellent timeline of irrefutable, no-spin facts derived from the part of the FBI’s file that has been made public. The timeline of events alone is damning.

Not surprisingly, Attkisson reports that “[a]fter the State Dept. notified Hillary Clinton her records would be sought by the House Benghazi Committee, copies of her email on the laptops of her attorneys Cheryl Mills and Heather Samuelson were wiped with Bleachbit, and the FBI couldn’t review them. After her emails were subpoenaed, Hillary Clinton’s email archive was also permanently deleted from her then-server ‘PRN’ with BleachBit, and the FBI couldn’t review it.”

One of our favorite Clinton lies is: “My staff and I will cooperate completely with the investigation.”

I guess that’s why they invoked their Fifth Amendment privileges against self-incrimination, had hard-drives wiped, destroyed devices with hammers, put theselected emails in the hands of her attorney and refused to produce them for weeks, while her staff all refused to speak without grants of immunity or took the Fifth. I guess it just depends on how you define “cooperation.”

Enter stage left James Comey, Director of the FBI, who fills himself with righteous indignation to tell Congress what a great job the FBI did in this “investigation.” As Congressman Trey Gowdy said, and I concur, “This isn’t the FBI I used to work with.”

Clinton ran her shenanigans without an Inspector General in the State Department. An Inspector General is appointed by the President, but his or her job is to serve as a watchdog on behalf of the taxpayers. As The Wall Street Journal reported, Clintondeclined to allow an Inspector General at the State Department during her entire tenure—so there was no internal oversight, and President Obama allowed that. More than a year ago, the Inspector Generals for State and for the Intelligence Community conducted a limited review of only 40 of Clinton’s emails. They quickly found several containing classified information which they immediately reported to the executive branch and advised Congress. They wrote: “This classified information should never have been transmitted via an unclassified personal system.”

Remember Richard Nixon? Remember Attorney General John Mitchell?  Remember White House Counsel John Dean? Nixon White House cronies Haldeman and Erlichman? They all went to prison.

It’s not just the private server. It’s not about personal emails or even a few business emails sent from a personal account.

It is about the fair administration of justice and trust in our justice system. It is about the accountability of our highest officials. It is about destroying evidence in the face of a serious investigation. It is about national security breaches of the highest order, and it’s about the privatization and sale of our State Department for personal enrichment. The conduct of the Clintons, their cronies, their Foundation, and now our highest law enforcement officials make the entire Watergate scandal look like an insignificant computer hack.

Where is the Congress? Where are what used to be our great newspapers? The sounds of silence are terrifying indicators of how government-controlled our mainstream media has become. I guess that’s why Reporters Without Borders has dropped our Freedom of Press rank to 46th world-wide.

FBI Director James Comey and Attorney General Loretta Lynch should be impeached for their roles in whitewashing Clinton’s crimes and their own participation in the destruction of evidence. They facilitated and participated in the obstruction of justice—spitting in the face of the Congressional investigation. Congress should be able to name a special prosecutor when the Attorney General has a clear conflict—such as meeting secretly with Bill Clinton during the “investigation” and receiving a promise of continuing as Attorney General if Hillary is elected President. The timeline of events and their conduct reek of corruption.

Stay tuned. Clinton’s answers under oath to D.C. District Judge Emmet G. Sullivan are due October 13. Remember, he’s the judge who appointed a special prosecutor to investigate the Department of Justice following the Bush administration’s corrupted prosecution of former Alaska Senator Ted Stevens. And it was Judge John Sirica—combined with what was then the great Washington Post—who exposed the Nixon corruption.

With more and more government intrusion in every aspect of our individual businesses and lives, we are quickly losing the land of the free, and we now must wonder if any of the brave are home. Who has the chutzpah to stand up to the Clintons?  Where are the real Americans? Hopefully, on election day, they will pour out in droves and resoundingly demand real change. The election and Judge Sullivan are our only chances for justice at all.

Sidney Powell worked in the Department of Justice for 10 years, in three federal districts under nine United States Attorneys from both political parties. She was lead counsel in more than 500 federal appeals. She is the author of Licensed to Lie: Exposing Corruption in the Department of Justice—a legal thriller that tells the inside story of high-profile prosecutions.

RIDICULING THE WHITE WORKING CLASS VOTER

RIDICULING THE WHITE WORKING CLASS VOTER — Comments from Crista Huff

I’ve been shocked to see liberals on Twitter aggressively ridiculing the “white working class voter”. Is this about the Twitter libs being bigoted against white people, or about them expressing class superiority, or about them hating Republicans and/or people who voted for President-elect Trump?

Were the libs previously embracing white working class voters because they needed their votes, and now they’re revealing their true colors?

No matter how you slice and dice it, it’s extremely bigoted behavior. Would these people go into a supermarket and ridicule the cashier? Would they stop by a roadside work area and ridicule the guy who’s holding the “STOP” sign? Would they drive up to a toll booth and ridicule the tolltaker? How about warehouse managers and assembly line workers and janitors?

What takes place in the mind of an American when they feel emboldened to express public disdain for vast segments of the population? Why is there no “gut check” telling them that such bigotry is wrong, and that vocalizing bigotry simply doubles down on their shameful impulses?

Are we, as a society, just a couple years away from more overt and individualized persecution?

 

A SURGE IN CORPORATE EMPLOYMENT PLANS WITHIN THE U.S.

President-elect Trump will travel to Indiana on December 1 for Carrier’s announcement that it will not move its Indiana operations to Mexico. Carrier is a division of United Technologies. (Bloomberg, November 29, 2016)

After a discussion with President-elect TrumpFord Motor Company announced that it will not move its Lincoln automobile manufacturing plant from Kentucky to Mexico. (Breitbart, November 18, 2016)

Taiwan-based Quanta Computer has announced that it expects its U.S.-based manufacturing business to expand under a Trump presidency. Quanta makes data center servers, in Tennessee and California, for big-name tech companies. (Nikkei Asian Review, November 29, 2016)

Foxconn Technology Group, an assembler of iPhones for Apple Inc., is considering shifting some production from Taiwan to the U.S., after a June request to do so by Apple. (Nikkei Asian Review, November 18, 2016)

Are You Too Secure?

Are You Too Secure?

Should Terrorists Be?

A court order requiring Apple amounts to an “unprecedented” stretch of an antiquated law — one that is about to spark an epic fight pitting privacy against national security, legal scholars said Thursday. That being… to create a way to help law enforcement get access to a terrorist’s smartphone.

A federal judge in New York last fall unsealed portions of a case revealing that Apple had turned over information to law enforcement about 70 times in recent years, according to the government, based on court orders citing an obscure 1789 law called the All Writs Act. This act allowed courts to issue orders if other judicial tools were unavailable.

This week’s court order was different from those issued in the past as it requires Apple to create new software, experts said, not provide technology already at hand. In essence forcing Apple to make a new software that doesn’t exist in order to violate its own program of making something that was designed to be inaccessible.

“This is a new frontier,” said Jennifer Granick, director of civil liberties at Stanford Law School’s Center for Internet and Society. “I know of no other statutory provision that would arguably create an obligation for device manufacturers to help out the government.”

Apple may not have fought orders in the past because “it was easy for Apple to give the data,” she said. “But the architecture of the phones changed. This is about Apple creating a new forensic version of its software to do the job the FBI wants it to do.”

Apple has hired attorneys Ted Olson and Theodore J. Boutrous Jr. They are expected to argue the order violates constitutional provisions as well as the All Writs Act and would create bad public policy.

Law enforcement has relied on a 1977 Supreme Court ruling that said the All Writs Act could be used to compel New York Telephone Co. to provide technology to enable investigators to track calls being made in a gambling operation. The phone company was a heavily regulated public utility and already had the technology, however technology has certainly changed since then and key differences from the Apple case, experts said.

UC Irvine School of Law Dean Erwin Chemerinsky said a carefully drafted federal law giving law enforcement the right to get around encryption in certain compelling situations probably would be constitutional. But he doubted a court could force a company to write software. “You can’t subpoena or get a warrant for something that doesn’t exist.”

The case, which will be heard in the magistrate’s courtroom next month, would then go before a federal district judge. If appealed, the case will be heard by the U.S. 9th Circuit Court of Appeals and possibly the U.S. Supreme Court.

Although the case could be fast-tracked, Chemerinsky said the Supreme Court probably would not want to hear one that poses such novel issues without a hearing by an appeals court. “Context is everything,” he said. “I don’t think the courts have the authority to tell someone to write software, but if the reason is to prevent a dirty bomb from exploding tomorrow, the context would matter a lot.”

David O’Brien, senior researcher at the Berkman Center for Internet and Society at Harvard University, said Apple is likely to argue that the government’s demand would place an unreasonable burden on the company. But the government can counter that public safety is at stake.

In the New York case, U.S. District Magistrate Judge James Orenstein hesitated at ordering Apple to unlock a customer’s smartphone. He wanted to know first whether the assistance sought by the government was technically feasible and whether the proposed order would be unduly burdensome.

Apple had the technology at that time to give the government, but the criminal defendant in the case later confessed and opened his phone for investigators. In today’s newest iPhone models, they are not capable of being unlocked and therefore a new software would be required to be created to accomplish the goal.

We’re in a situation where public safety is balanced with personal privacy AND… a company’s right to preserve its advantage over competitors. People (including terrorists) buy the new iPhone because their privacy is assured and customers know that the government can’t access emails, texts, location and other private information.

Dump Microsoft NOW

Why You Must Dump Microsoft NOW

· Aug 4th, 2015

I’ve written about dumping Microsoft before – and I stand by those comments – but the newest outrage from Redmond forces me to it again. I don’t care how “inconvenient” you think it may be, you have to stop enriching Microsoft. NOW.

Yes, I have serious issues with Apple too, but at least Wozniak and Jobs started out as real hackers. Gates was a political monopolist, and it still shows.

What’s Happening Now:

Beware of Microsoft

As of August 1, 2015 (that is, a few months ago), Microsoft announced a new privacy policy and a new services agreement. In the words of one network professional, “Basically, they redefined their operating system to be spyware.”

The European Digital Rights organization examined these new policies in depth and concluded this:

Summing up these 45 pages, one can say that Microsoft basically grants itself very broad rights to collect everything you do, say, and write with and on your devices in order to sell more targeted advertising or to sell your data to third parties. The company appears to be granting itself the right to share your data either with your consent “or as necessary.”

The Ugly Details

If you’d like to verify anything, you can find the privacy statement here and the services agreement here.

The first detail to mention is that this applies to “Bing, Cortana, MSN, Office, OneDrive, Outlook.com, Skype, Windows, Xbox, and other Microsoft services… Microsoft websites, apps, software, and devices.” So, more or less anything of theirs that you touch.

And of course, they are doing all of this for you! Or at least they say so.

They collect… in their own words:

[Y]our first and last name, email address, postal address, phone number, … passwords, password hints, and similar security information, … your age, gender, country and preferred language, … your location, … the teams you follow, … the stocks you track, … favorite cities, … credit card number and the security code, … items you purchase, the web pages you visit, and the search terms you enter, … IP address, device identifiers, … your contacts and relationships, … your documents, photos, music or video you upload, … subject line and body of email, text or other content of an instant message, audio and video recording of a video message.

And so on.

Now, if you are prepared to jump through a lot of hoops, they say you can opt out of some of this… not that many people will ever do it.

I’m not going to bore you with everything, but I will add just a few more tidbits:

  • Windows now has a device encryption feature, but they keep a copy of your recovery key, stored in their (very secure, trust us) “cloud.”
  • The also grab “data about the networks you connect to.” I interpret that as, “All your networks are belong to us too.”
  • “[W]e will access, disclose, and preserve personal data, including your content (such as the content of your emails, other private communications, or files in private folders), when we have a good faith belief that doing so is necessary.” (Their own words!) What that really means is, “We’ll listen in, record what you type, then store it or sell it as we see fit.”

Why Do They Do This?

Fundamentally, there are three reasons they do this:

People are suckers for ‘free.’ For reasons that I won’t go through here, the Internet has been overrun with an expectation that services should be free. That’s impossible, of course, but people want it all the same. So, clever people learned how to do make it possible: by trading in personal information.

And so, being an amoral, money-centric operation, Microsoft is running after the new model. Anything for a buck.

Keeping up with the Zuckerbergs. Google and Facebook became famous, sexy, and powerful playing the “own their private data” game, and Microsoft doesn’t want to be an also-ran. They want to be and remain the big dog. They want their status.

To service their masters. As best I can tell, Microsoft has sucked up to spy agencies and governments from the beginning, and this is just more of the same. A year or so ago, the FBI was complaining about encryption, moaning that it would enable people to “go dark.” These new policies will ensure that it never happens to anyone who uses a Microsoft product. I’m sure the watchers are appreciative.

What Should I do?

Move to Linux. Now.

And no, it’s not too hard. Millions of people use Linux every day, including housewives, children, and grandparents.

The version of Linux I like best is Linux Mint. With it, you can run OpenOffice (also called LibreOffice), which does everything essential that MS Office does. Then get Firefox for a browser and Thunderbird for email, and you’re in business.

A Final Warning

The stealing of your personal data is a much bigger deal than you probably think it is. I devoted an entire issue of my subscription newsletter to this (FMP #59), and I won’t be able to cover it today, but it is a major threat to the future… and the near future.

Bonus

If you’re even thinking about getting Windows 10, please take a look at these annotated pages of Win 10 documentation. You can enlarge them.

Paul Rosenberg
www.freemansperspective.com

 


 

Traditional Conservatism

With today’s political environment being uncertain, questionable, even potentially damaging to our future, there’s been a return to at least reviewing those standards and principles that were envisioned by our founders.

We’ve had questionably unconstitutional actions by our administration, insensitivity to the citizenry by our congress, and proposals and actions that defy all common rules of social etiquette, anti-racism, economic growth and personal freedoms.

With all this in mind, we invite your visit to a blog that has independent views and insights with a conservative slant.

Enjoy and CLICK HERE to visit the latest posts.

 

Water – Your Daily Danger

Water – Your path to Great Health or sickness.

It’s an unknown, often dismissed problem, and yet the water in our country is getting worse – and more scarce.

In Oct we’ll have the founder of a new “American Owned” bottling company that will be talking about how bad the problem is and how to look for the signs and solutions.

If you live in California you know the drought AND the situation where even Starbucks has stopped having its bottled water sourced and processed in California. And experts say in as little as 10 years, 40 states will have water shortages and problems.

Be sure to watch here for this upcoming special environmental program. It’s a must for your health – for your future.

Watch their video on Youtube: Caddo Mountain Spring Water

or their company site: www.caddomountainspringwater.com

 


 

Mind Wars

The MIND WARS are Winning

A New Book by Marie D. Jones and Larry Flaxman

From the dawn of humanity, the desire to control the thoughts, behaviors and actions of others has been a pervasive one. But few people know that mind control techniques have been around since the beginning of civilization. From the use of coercive persuasion by ancient Egyptians and the Knights of Templar, to today’s claims of electronic harassment and microwave “bombing,” we have been at the mercy of “mind hacks” whom wish to reprogram our thoughts and reshape our beliefs.

“Mind Wars” includes:

Ancient mind control via spell casting, potions and rituals.
The quest for a real Manchurian Candidate –MKUltra and the CIA connection.
Mind control techniques including hypnosis, drugs, sexual abuse, electroshock, radiation, and psychic driving.
Controlling mass thought through advertisement, media, politics and religion.
Cults and the use of mental re-programming.
The brave new world of electronic harassment, Voice to Skull Technology and gang-stalking.

The inner frontier of the human mind is the last bastion of privacy. But are we really in control of our own minds? The answer may shock you!

Alzheimer’s Disease Reversal

Alzheimer’s Disease Reversal Breakthrough

Research By University of Miami Miller School of Medicine Produced Stunning Results

Erskine Overnight Interviews Lead researcher John E. Lewis, associate professor at the University of Miami Miller School of Medicine

regarding this very important breakthrough

Alzheimer’s Disease is one of the most frightening diseases facing us all

“If I had a loved one with Alzheimer’s I would get this as there are NO side effects and the results are startling. 46% improvement and 54% no further progression !!!”. . . . Erskine
What if Alzheimer’s disease could be reversed? That’s the stunning hope spawned by new research from the University of Miami and published in the Journal of Alzheimer’s Disease.

The study shows that a dietary supplement consisting of an extract of aloe vera and other key nutrients seems to improve cognitive and immune functioning in those with dementia. Lead researcher John E. Lewis, associate professor at the University of Miami Miller School of Medicine, recently visited Newsmax Health to discuss his surprising findings.


SCOTUS Decision Affects You and Your Dr

Dr. Elaina George was a guest on Erskine Overnight and continues to provide the latest inside info on Obamacare.

You may recognize Dr. George as a guest on many television shows such as Neil Cavuto on Fox.

Dr. George is working on a program to assist the Private Practice Doctor who chooses to maintain independence from the Big Federal Government System better known as Obamacare.

SCOTUS Decision Affects You and Your Dr

We at Erskineonradio.com are in agreement with her philosophy and believe she is onto something cutting edge.

Dr. George is a frequent guest on Erskine Overnight and we will continue to support her and re post her articles as soon as available.

Check out Dr. George’s bio at the bottom of her article which we are proud to feature below:

What the King v Burwell Decision Means for Doctors and Patients

While reading the Supreme Court’s decision on King vs. Burwell, I realized that I was not surprised by the ruling. It fits the pattern that has developed over the last several years. The letter of the law has not applied to The Affordable Care Act, this was true when it was upheld as a tax instead of an abrogation of the Commerce clause, and now the ruling has massaged the meaning of subsidies that apply to state run exchanges to apply to everyone.

The other thing that has not changed is the fact that patients will continue to find access limited by rising out of pocket expenses in the form of rising deductibles, co-insurance and premiums that are expected to continue to increase further. We can continue to look forward to patients using emergency rooms as primary care centers because they can’t afford to see a physician and independent physicians closing their practices or becoming hospital employees further exacerbating the doctor shortage. The ruling does nothing to change the reality that having health insurance in the age of Obamacare does not equal access to quality healthcare.

Finally, the winners have been rewarded. When the stock value of health related companies such as corporate hospitals rise on the news of the decision, doctors and patients should take pause. The insurance companies and hospitals have clearly figured out that business as usual can continue. In fact, it will become business as usual on steroids. Insurance companies will be empowered to further limit their physician panels, they will continue to decrease the medications that they will cover, they will continue to decrease what they cover as medically unnecessary and experimental to limit access to physician directed care while they increase their premiums increasing their profits in the bargain. Hospitals will continue to get larger taking over the market and setting prices without pressure from honest competition from independent physicians, ambulatory surgery centers, labs and radiology centers that would encourage cost control.

The King vs. Burwell decision has answered the question of who stands to gain in the age of Obamacare. Justice Roberts in his opinion said it best “Congress passed the Affordable Care Act to improve health insurance markets, not to destroy them.” With this decision medical insurance companies, hospitals and other pieces of the corporate healthcare delivery system now have the scale clearly tipped in their favor at the expense of doctors the patients – the mission has been accomplished.

King v Burwell Decision Affects You and Your Dr

DR. ELAINA GEORGE BIO:

Dr Elaina George is a Board Certified Otolaryngologist. She graduated from Princeton University with a degree in Biology. She received her Masters degree in Medical Microbiology from Long Island University, and received her medical degree from Mount Sinai School of Medicine in New York. Dr George completed her residency at Manhattan, Eye Ear & Throat Hospital. Her training included general surgery at Lenox Hill Hospital, pediatric ENT at The NY-Presbyterian Hospital, and head and neck oncology at Memorial Sloan-Kettering Cancer Center. She has published in several scientific journals and presented her research at national meetings. As a solo practitioner in private practice who is also a small business owner, she has a unique perspective on the problems of health care delivery, the true costs of healthcare and viable solutions. Dr George is a recipient of the Patients’ Choice Award in 2008 and 2009. She was recently honored with membership in The Leading Physicians of the World and Who’s Who Top Doctors Honors Edition.