Skip to main content

Home/ Politically Minded/ Group items tagged due process

Rss Feed Group items tagged

thinkahol *

The due-process-free assassination of U.S. citizens is now reality - Salon.com - 0 views

  •  
    What amazes me most whenever I write about this topic is recalling how terribly upset so many Democrats pretended to be when Bush claimed the power merely to detain or even just eavesdrop on American citizens without due process.  Remember all that?  Yet now, here's Obama claiming the power not to detain or eavesdrop on citizens without due process, but to kill them; marvel at how the hardest-core White House loyalists now celebrate this and uncritically accept the same justifying rationale used by Bush/Cheney (this is war! the President says he was a Terrorist!) without even a moment of acknowledgment of the profound inconsistency or the deeply troubling implications of having a President - even Barack Obama - vested with the power to target U.S. citizens for murder with no due process. Also, during the Bush years, civil libertarians who tried to convince conservatives to oppose that administration's radical excesses would often ask things like this: would you be comfortable having Hillary Clinton wield the power to spy on your calls or imprison you with no judicial reivew or oversight?  So for you good progressives out there justifying this, I would ask this:  how would the power to assassinate U.S. citizens without due process look to you in the hands of, say, Rick Perry or Michele Bachmann?
thinkahol *

YouTube - Targeted Killing - 0 views

  •  
    This video from the American Civil Liberties Union condemns the U.S. government practice of issuing death sentences without due process as part of its targeted killing policy. "Targeted Killing" is being released to coincide with the filing today of an unprecedented lawsuit by the ACLU and the Center for Constitutional Rights (CCR) challenging the government's asserted authority to use lethal force against U.S. citizens located far from any battlefield without judicial process, and without disclosing the standards it uses to target individuals for death.
thinkahol *

Things That Make Me Angry | Thinkahol's Blog - 0 views

  •  
    Wall Street Isn't Winning - It's Cheating The two-tiered justice system: an illustration 9/10/2001: Rumsfeld says $2.3 TRILLION Missing from Pentagon  The due-process-free assassination of U.S. citizens is now reality The Quiet Coup "the finance industry has effectively captured our government" What OWS is about + data behind the movement Data privacy is now extinct in the U.S. "The problem that confronts us is that every living system in the biosphere is in decline and the rate of decline is accelerating. There isn't one peer-reviewed scientific article that's been published in the last 20 years that contradicts that statement. Living systems are coral reefs. They're our climatic stability, forest cover, the oceans themselves, aquifers, water, the conditions of the soil, biodiversity. They go on and on as they get more specific. But the fact is, there isn't one living system that is stable or is improving. And those living systems provide the basis for all life." The 1% are the very best destroyers of wealth the world has ever seen The prison industry in the United States: big business or a new form of slavery? How the GOP Became the Party of the Rich: The inside story of how the Republicans abandoned the poor and the middle class to pursue their relentless agenda of tax cuts for the wealthiest one percent
thinkahol *

Criminalizing free speech - Glenn Greenwald - Salon.com - 0 views

  •  
    Alex Seitz-Wald of Think Progress rightly takes Sen. Rand Paul to task for going on Sean Hannity's radio program -- one week after commendably leading opposition to the Patriot Act on civil liberties grounds -- and advocating the arrest of people who "attend radical political speeches."  After claiming to be against racial and religious profiling, Paul said:  "But if someone is attending speeches from someone who is promoting the violent overthrow of our government, that's really an offense that we should be going after -- they should be deported or put in prison."  Seitz-Wald correctly notes the obvious:  "Paul's suggestion that people be imprisoned or deported for merely attending a political speech would be a fairly egregious violation on the First Amendment, not to mention due process." 
thinkahol *

Speech on media propaganda - Glenn Greenwald - Salon.com - 0 views

  •  
    The 30-minute speech I gave last month at the Symphony Space in New York is now available on video, and is posted below in three YouTube segments (the first segment also contains the 4-minute introduction of my speech). The speech pertains to the evolution of my views on media criticism, the nature of media propaganda and what drives it, and what can be done to combat it. A DVD of the entire event -- featuring the three other speeches: from Amy Goodman, Noam Chomsky and Michael Moore -- is available at FAIR's website. I want to note one example, from today, that vividly illustrates many of the themes I discussed in that speech.  It is found in the following passage from this Reuters article on Obama's escalation of the covert war in Yemen and his targeting of U.S. citizen Anwar Awlaki for assassination: A U.S. official confirmed to Reuters that a U.S. strike last Friday killed Abu Ali al-Harithi, a midlevel al Qaeda operative, which followed last month's attempted strike against Anwar al-Awlaki, the leader of al Qaeda in the Arabian Peninsula. Whether Awlaki has any operational role in Al Qaeda at all is a matter of intense controversy.  The U.S. Government has repeatedly asserted that he does, but has presented no verifiable evidence to support that accusation.  But what is not in dispute is the notion that Awlaki is "the leader of al Qaeda in the Arabian Peninsula."  He unquestionably is not, and never has been, as multiple Yemen experts have repeatedly noted.  The Reuters claim is factually and entirely false. Whatever one's views are on Obama's assassination program, targeting U.S. citizens without due process obviously raises extraordinary and vitally important questions.  As The New York Times' Scott Shane put it when confirming Awlaki's inclusion on Obama's hit list: "The Obama administration has taken the extraordinary step of authorizing the targeted killing of an American citizen. . . . It is extremely rare, if not unprecedented, for an America
thinkahol *

A surprising war on leaks under Obama - Philly.com - 0 views

  •  
    When President Obama took office, federal employees who had exposed wrongdoing or were considering doing so had reason for hope. Eight years of the Bush administration's relentless retaliation against whistle-blowers had ended, and Obama spoke encouragingly of transparency and due process. Since then, the administration has taken some positive steps for whistle-blowers, most notably in (unsuccessfully) advocating legislation to protect them and in loosening the government's grip on public information. However, its treatment of national-security and intelligence whistle-blowers - arguably the ones we need most - has been brutal. It has pursued multiple prosecutions of such whistle-blowers on espionage charges.
The Ravine / Joseph Dunphy

Another Beatty Christmas | a public defender - 0 views

  •  
    Watch a mockery being made of due process - husband held in prison for 14 years on a civil contempt charge.
thinkahol *

Newly leaked documents show the ongoing travesty of Guantanamo - Glenn Greenwald - Salo... - 0 views

  •  
    Numerous media outlets -- The New York Times, The Washington Post, The Guardian, The Telegraph, and NPR, among others - last night published classified files on more than 700 past and present Guantanamo detainees. The leak was originally provided to WikiLeaks, which then gave them to the Post, NPR and others; the NYT and The Guardian claim to have received them from "another source" (WikiLeaks suggested the "other source" was Daniel Domscheit-Berg, a former WikiLeaks associate who WikiLeaks claims took, without authorization, many WikiLeaks files when he left). The documents reveal vast new information about these detainees and, in particular, the shoddy and unreliable nature of the "evidence" used (both before and now) to justify their due-process-free detentions. There are several points worth noting about all this:
thinkahol *

Unconditional Support Ensures Political Impotence | Thinkahol's Blog - 0 views

  •  
    Obama's policies cannot be more antithetical to our constitution and values. Obama's administration has even arrogated the power to assassinate American citizens without oversight let alone due process. If Obama does not lose your support for this, what would it take?
thinkahol *

The killing of Awlaki's 16-year-old son - Salon.com - 0 views

  •  
    Two weeks after the U.S. killed American citizen Anwar Awlaki with a drone strike in Yemen - far from any battlefield and with no due process - it did the same to his 16-year-old son, Abdulrahman al-Awlaki, ending the teenager's life on Friday along with his 17-year-old cousin and seven other people. News reports, based on government sources, originally claimed that Awlaki's son was 21 years old and an Al Qaeda fighter (needless to say, as Terrorist often means: "anyone killed by the U.S."), but a birth certificate published by The Washington Post proved that he was born only 16 years ago in Denver. As The New Yorker's Amy Davidson wrote: "Looking at his birth certificate, one wonders what those assertions say either about the the quality of the government's evidence - or the honesty of its claims - and about our own capacity for self-deception." The boy's grandfather said that he and his cousin were at a barbecue and preparing to eat when the U.S. attacked them by air and ended their lives. There are two points worth making about this:
Skeptical Debunker

Big Content condemns foreign governments that endorse FOSS - 0 views

  • University of Edinburgh law lecturer Andres Guadamuz wrote a blog entry this week highlighting some particularly troubling aspects of the IIPA's 301 recommendations. The organization has condemned Indonesia and several other countries for encouraging government adoption of open source software. According to the IIPA, official government endorsements of open source software create "trade barriers" and restrict "equitable market access" for software companies. The profound absurdity of this accusation is exacerbated by the fact that Indonesia's move towards open source software was almost entirely motivated by a desire to eliminate the use of pirated software within the government IT infrastructure. It's important to understand that Indonesia has not mandated the adoption of open source software or barred government agencies from purchasing proprietary commercial software. The Indonesian government issued a statement in 2009 informing municipal governments that they had to stop using pirated software. The statement said that government agencies must either purchase legally licensed commercial software or switch to free and open source alternatives in order to comply with copyright law. This attempt by Indonesia to promote legal software procurement processes by endorsing the viability of open source software has apparently angered the IIPA. In its 301 recommendations for Indonesia, the IIPA demands that the government rescind its 2009 statement. According to the IIPA, Indonesia's policy "weakens the software industry and undermines its long-term competitiveness" because open source software "encourages a mindset that does not give due consideration to the value to intellectual creations [and] fails to build respect for intellectual property rights." The number of ways in which the IIPA's statements regarding open source software are egregiously misleading and dishonest are too numerous to count. The IIPA seems to have completely missed the fact that there is a very robust ecosystem of commercial software vendors in the open source software market and that open source software is at the heart of some of the most popular consumer electronics products that are sold in the United States. It has clearly become an important part of the US software economy and increasingly serves as an enabler of innovation and technological progress. In light of the profitability of Red Hat and other open source leaders, it seems absurd to contend that open source software adoption will weaken the software industry or reduce its competitiveness. In fact, the emergence of open source software has contributed to creating a more competitive landscape in the software industry by offering alternative business models that enable smaller companies to gain traction against the dominant incumbent players. The IIPA's position is profoundly hypocritical, because many parts of the US government, including the Department of Defense, have issued their own memos endorsing open source software adoption. The IIPA's disingenuous move to equate open source software with piracy reeks of desperation. The BSA and other IIPA members are likely losing sleep over open source software because that development model and approach to licensing will empower developing countries to build their own domestic IT industries, eliminating the need for them to tithe to American software giants. It's another failing of the 301 review, which Big Content wants used to coerce other countries into adopting ever-more-stringent copyright laws.
  •  
    In accordance with US trade law, the Office of the US Trade Representative (USTR) is required to conduct an annual review of the status of foreign intellectual property laws. This review, which is referred to as Special 301, is typically used to denounce countries that have less restrictive copyright policies than the United States. The review process is increasingly dominated by content industry lobbyists who want to subvert US trade policy and make it more favorable to their own interests. We have already noted the targeting of Canada for its supposedly lax copyright laws, but that is not the only nation drawing the ire of Big Content. One of the organizations that plays a key role in influencing the Special 301 review is the International Intellectual Property Alliance (IIPA), a powerful coalition that includes the RIAA, the MPAA, and the Business Software Alliance (BSA). The IIPA, which recently published its official recommendations to the USTR for the 2010 edition of the 301 review, has managed to achieve a whole new level of absurdity.
thinkahol *

Sullivan's defense of presidential assassinations - Glenn Greenwald - Salon.com - 0 views

  • I actually can't believe that there is even a "debate" over whether an American President -- without a shred of due process or oversight -- has the power to compile hit lists of American citizens whom he orders the CIA to kill far away from any battlefield.
  •  
    The justifications for Obama's hit list reveal what is missing most from American political thought
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
1 - 15 of 15
Showing 20 items per page