Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged legal research resource

Rss Feed Group items tagged

Paul Merrell

WorldLII - WorldLII: About WorldLII - 0 views

  • You are here: WorldLII >> About WorldLII   What is WorldLII? The World Legal Information Institute (WorldLII) is a free, independent and non-profit global legal research facility developed collaboratively by the following Legal Information Institutes and other organisations. Australasian Legal Information Institute (AustLII) British and Irish Legal Information Institute (BAILII) Canadian Legal Information Institute (CanLII) Hong Kong Legal Information Institute (HKLII) Legal Information Institute (Cornell) (LII (Cornell)) Pacific Islands Legal Information Institute (PacLII) Wits University School of Law (Wits Law School) For further details, see the WorldLII brochure. The LIIs, meeting in Montreal in October 2002, adopted the Montreal Declaration on public access to law. WorldLII comprises three main facilities: Databases, Catalog and Websearch.
  • WorldLII Databases WorldLII provides a single search facility for databases located on the following Legal Information Institutes: AustLII; BAILII; CanLII; HKLII; LII (Cornell); and PacLII. WorldLII also includes as part of this searchable collection its own databases not found on other LIIs. These include databases of decisions of international Courts and Tribunals, databases from a number of Asian countries, and databases from South Africa (provided by Wits Law School). Over 270 databases from 48 jurisdictions in 20 countries are included in the initial release of WorldLII. Databases of case-law, legislation, treaties, law reform reports, law journals, and other materials are included. WorldLII welcomes enquiries concerning the possible inclusion of other databases on WorldLII or on one of its collaborating LIIs. WorldLII Catalog and Websearch The WorldLII Catalog provides links to over 15,000 law-related web sites in every country in the world. WorldLII's Websearch makes searchable the full text of as many of these sites as WorldLII's web-spider can reach. WorldLII welcomes enquiries from law librarians and other legal experts who are interested to become Contributing Editors to the WorldLII Catalog.
  • Operation of WorldLII The provision of the WorldLII service is coordinated by the Australasian Legal Information Institute (AustLII), which maintains WorldLII's user interface, the WorldLII Catalog and Websearch, and the databases located only on WorldLII. Technical enhancements to WorldLII are being developed jointly by the cooperating Legal Information Institutes. Contacting WorldLII General contact: feedback@worldlii.org AustLII/WorldLII Co-Directors: Professor Andrew Mowbray, UTS <andrew@austlii.edu.au> Professor Graham Greenleaf, UNSW <graham@austlii.edu.au> Philip Chung, AustLII Executive Director <philip@austlii.edu.au> Mail: WorldLII, c/- AustLII, UTS Faculty of Law, PO Box 123 Broadway NSW 2007 Australia Telephone: +61 2 9514 4921 Fax: +61 2 9514 4908 We hope that you enjoy using WorldLII and find it to be a useful service. Feedback (particularly words of encouragement or constructive criticism) are welcome and may be sent to feedback@worldlii.org. WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback URL: http://www.worldlii.org/worldlii/
  •  
    The various Legal information Institutes that collaborate on WorldLII have the most advanced, integrated, and largest public legal research databases available on the Internet, searchable through a common interface. Still nothing like a complete university law library because so many legal source materials are copyrighted, this is the combined effort of many law schools. A companion browser extension is available for Chrome and Firefox called Jureeka. That extension causes your pages rendered in the browser to contain hyperlinks to all legal authorities cited on the page that are recognized by the extension, with the links going to case law, regulations, and statues that are in the public domain. https://chrome.google.com/webstore/detail/jureeka/ediidjmindkcaflpfjgabfaibhngadbb?utm_source=chrome-app-launcher-info-dialog Thus far, Jureeka is integrated with all legal materials published by the Legal Information Institute long located at Cornell Law School, as well as the Justia archives of U.S. case law. Rumor has it that the extension will be extended to cover materials published by other Legal Information Institutes at various law schools around the globe.
Paul Merrell

Cybersecurity Information Sharing: A Legal Morass, Says CRS - 0 views

  • Several pending bills would promote increased sharing of cybersecurity-related information — such as threat intelligence and system vulnerabilities — in order to combat the perceived rise in the frequency and intensity of cyber attacks against private and government entities. But such information sharing is easier said than done, according to a new report from the Congressional Research Service, because it involves a thicket of conflicting and perhaps incompatible laws and policy objectives. “The legal issues surrounding cybersecurity information sharing… are complex and have few certain resolutions.” A copy of the CRS report was obtained by Secrecy News. See Cybersecurity and Information Sharing: Legal Challenges and Solutions, March 16, 2015. Cyber information sharing takes at least three different forms: the release of cyber intelligence from government to the private sector, information sharing among private entities, and the transfer of threat information from private entities to government agencies.
  • “While collectively these three variants on the concept of cyber-information sharing have some commonalities, each also raises separate legal challenges that may impede cyber-intelligence dissemination more generally,” said the CRS report, which examines the legal ramifications of each category in turn. Among the concerns at issue are: the potential for liability associate with disclosure of cybersecurity information, inappropriate release of private information through open government laws, loss of intellectual property, and potential compromise of personal privacy rights. All of these create a legal morass that may be unreconcilable. “A fundamental question lawmakers may need to contemplate is how restrictions that require close government scrutiny and control over shared cyber-information can be squared with other goals of cyber-information sharing legislation, like requirements that received information be disseminated in an almost instantaneous fashion,” the CRS report said.
  • “Ultimately, because the goals of cyber-information legislation are often diametrically opposed, it may simply be impossible for information sharing legislation to simultaneously promote the rapid and robust collection and dissemination of cyber-intelligence by the federal government, while also ensuring that the government respects the property and privacy interests implicated by such information sharing,” the report said. Other new or newly updated CRS reports that Congress has withheld from public distribution include the following. Cybersecurity: Authoritative Reports and Resources, by Topic, March 13, 2015
  • ...1 more annotation...
  • U.S. Strategic Nuclear Forces: Background, Developments, and Issues, March 18, 2015
Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Gary Edwards

The Sides Are Forming For The Coming Civil War. | Militia News - 1 views

  • America is in the choosing sides phase of the coming civil war. To use a college recruiting phrase, it is accurate to state that the letters of intent to join one side or another have mostly been signed and the commitments offered. However, there is one big uncommitted piece, but very soon the sides will be drawn.
  • The Chess Pieces of Civil War What is going on today in America all about choosing sides. There are clear lines being formed in the United States. The recruiting pool consists of the Department of Homeland Security, the American military, local law enforcement, the Russian troops pouring into the United States, the trickle of Chinese troops coming into the country through Hawaii and, of course, the poor, the middle class and elite. This is the recruiting pool which will form the chess pieces of the coming American Civil War. Even if all parties in this country wanted the country to continue, even in its present mortally wounded state, it would be foolish to believe that it could continue for much longer.
  • Barring a false flag event, US martial law will have a trigger event, which will lead to martial law, that will be financial and it will naturally occur as we are already on a collision course with destiny.
  • ...18 more annotations...
  • The net result of these staggering numbers can only end one way, and that is with a financial collapse, followed by a bank holiday, rioting in the streets and the full roll out of martial law. These financial numbers guarantee that the party cannot continue much longer. Since America, in her present form, cannot continue much longer without experiencing a cataclysmic shift, we would be wise to realize what resources are going to be the impetus for civil war. When you play the board game, Monopoly, the properties on Boardwalk are among the most coveted. It is no different in real life. The biggest prize of the coming conflict is real estate. Homes, office buildings and shopping malls are the most coveted prize. The MERS mortgage fraud continues unabated as millions of homes have been confiscated through mortgage fraud. When the dollar is worthless and is awaiting its replacement (e.g. the Amero or the Worldo), real estate will be more valuable than gold.
  • Other big game that is being hunted by both sides in the coming civil war will be bank accounts, which must be looted before the dormant computer digits we call money can be converted into hard assets. That is why my advice is, and has been, convert your cash into tangible assets which can enhance your survivability in the upcoming crash.
  • Also, your pensions, your 401K’s and your various entitlement programs are also at risk as evidenced by Secretary of Treasury Jack Lew’s “borrowing” from various Federal retirement accounts in order to increase the debt ceiling fight that will resurface in Congress, again, early next year.
  • Again, my advice is to convert your assets in tangible items which will aid in getting you through some very dark days coming up in the near future.
  • Before the cognitive dissonance crowd rears their ugly heads and accuses me of fear mongering, ask yourself what the elite did prior to the crash of the economy in 1929. For example, Joseph Kennedy took his money out of the stock market the day BEFORE it crashed. Vanderbilt, Rockefeller, Westinghouse, et al., all took their money out just prior to the crash, leaving the ignorant masses unaware of what was coming. Don’t make the same mistake.
  • I have news for you, there are Federal officials in every town, city and county in America. If one violates HR 347, they will be immediately arrested and charged with a felony.
  • The NDAA constitutes another big fence being built around the people in which all due process will soon be gone. The NDAA will allow the administration the “legal” right to secretly remove any burgeoning leadership of citizen opposition forces.
  • There are three paramount numbers that every American should be paying attention to and they are (1) national deficit ($17 trillion dollars), (2) the unfunded liabilities debt ($238 trillion dollars), and (3) the derivatives/futures debt (one quadrillion dollars which is 16 times the entire wealth of the planet.
  • In short, this spells the potential enslavement of the American people.
  • For those of you who still have your blinders on, research the NDAA and EO 13603 and then when you realize that I am correct in my interpretation, ask yourself one question; If the powers that be were not going to seize every important asset, then why would the government give itself the power to do just that?
  • And while you are at it, remember the Clean Water Act gives the EPA to control all private property as well as the precious resources of all water. And then of course, the FDA and the conflicts with local farmers is escalating.
  • And if this is not enough to convince the sheep of this country that the storm clouds are overhead, then take a look at HR 347 which outlaws protesting and takes away the First Amendment. This unconstitutional legislation makes it illegal to criticize the President and the government, as a whole, in the presence of Federal officials.
  • The second provision which will allow this country to quickly transition to martial law is Executive Order (EO) 13603 which allows the President to take control over any resource, property and even human labor within the United States. This EO gives the President unlimited authority including the ability to initiate a civilian draft as well as a military draft.
  • I just saw the Hunger Games sequel, Catching Fire, and this is eerily similar to what I saw in the movies in that the people are being provoked to revolution.
  • in the TV show, Revolution, the most evil entity in the series is the re-emergence of the United States government and the heroes of the show are rebelling against the abuse.
  • It seems like everywhere we turn in the media, the people are being encouraged to rise up now and challenge authority. I am sure the establishment would rather confront a small group of dissidents and squelch the rebellion now, before the numbers can become significant and overwhelming to the establishment and this theme is being carried out in the media.
  • The final action will consist of gun confiscation and one side of the coming conflict is attempting to position themselves to do that in the near future and that would be the DHS, the Russians and the Chinese.
  • I cannot think of another legitimate reason which would describe why they are here.
  •  
    While I'd be the first to agree that the degree of fiscal mismanagement of this nation's economy is beyond insane and have to admit that I see very little to admire in Barack Obama's presidency, the meme about Executive Order 13603 authorizing confiscation of any property and enslavement of the American public needs to be put to rest. See http://www.archives.gov/federal-register/executive-orders/2012.html#13603 E.O. 13603 is not much more than an updating of similar executive orders issued by prior presidents beginning with Dwight Eisenhower. In fact, in skimming it a few minutes ago, I didn't see anything drastically different from some of the prior related orders. E.g., it reflects that a bunch of agencies that were formerly either independent or under other departments are now under the newish Department of Homeland Security, whose Secretary now gets the authority formerly delegated to other department and agency heads. If blame must be cast, it belongs on the Congress that enacted the Defense Production Act of 1950, 50 U.S.C. 2061, et seq. The executive order does no more than obey that Act's instructions. For example there is a section authorizing pre-emption of manufacturing capacity of critical industries over any existing civilian contracts in the event of a national emergency, but that language is in the statute as well. But that power hasn't had much traction since Harry Truman tried to nationalize the steel industry to break a nationwide strike. The Supreme Court swatted down that effort as an abuse of a power that would be lawful in a true emergency, like another major. But even that semi-radical "survival" power is ameliorated by other provisions of the statute and the order that authorize loan guarantees for companies' construction and maintenance of critical productive capacity. Much of that has been implemented over the years as outright grants. So for example, many chemical manufacturing plants were built with Defense Production Act funds, with
Paul Merrell

Vodafone Law Enforcement Report - 0 views

  • As explained earlier in this report, Vodafone’s global business consists largely of a group of separate subsidiary companies, each of which operates under the terms of a licence or other authorisation issued by the government of the country in which the subsidiary is located, and each of which is subject to the domestic laws of that country. In this section of the report, we provide a country-by-country insight into the nature of the local legal regime governing law enforcement assistance, together with an indication of the volume of each country’s agency and authority demands wherever that information is available and publication is not prohibited. In addition, a summary of some of the most relevant legal powers in each of our countries of operation can be found in our legal Annexe (pdf, 1.76 MB).
Paul Merrell

"The War is Worth Waging": Afghanistan's Vast Reserves of Minerals and Natural Gas | Gl... - 0 views

  • US and NATO forces invaded Afghanistan more than 13 years ago in October 2001.   Afghanistan is defined as a state sponsor of terrorism. The war on Afghanistan continues to be heralded as a war of retribution in response to the 9/11 attacks.  This article, first published in June 2010, points to the “real economic reasons”  why US-NATO forces invaded Afghanistan in the wake of 9/11. 
  • The legal argument used by Washington and NATO to invade and occupy Afghanistan under “the doctrine of collective security” was that the September 11 2001 attacks constituted an undeclared “armed attack” “from abroad” by an unnamed foreign power, namely Afghanistan. Under the proposed Afghan-US security pact,  which is an integral part of Obama’s Asian pivot, Washington and its NATO partners are preparing to ensure a permanent military presence in Afghanistan, with military facilities located in proximity of China’s Western frontier.  The pact would allow the US to maintain their nine permanent military bases, strategically located on the borders of  China, Pakistan and Iran as well as Turkmenistan, Uzbekistan and Tajikistan. In addition to its vast mineral and gas reserves, Afghanistan produces more than 90 percent of the World’s supply of opium which is used to produce grade 4 heroin. US military bases in Afghanistan are also intent upon protecting the multibillion narcotics trade.  Narcotics, at present, constitutes the centerpiece of Afghanistan’s export economy.
  • The heroin trade, instated at the outset of the Soviet-Afghan war in 1979 and protected by the CIA, generates cash earnings in Western markets in excess of $200 billion dollars a year. “The highest concentration of NATO servicemen in Afghanistan is being accompanied with the highest concentration of opium poppy, ….  That situation causes doubts about the anti-terrorist mission and leads to the conclusion about catastrophic consequences of the eight-year stay [of coalition forces] in Afghanistan,” (Russia’s Federal Drug Control Service head Viktor Ivanov, January 2010)
  •  
    It bears notice that Afghanistan was one nation targeted for capture by the neocon Project for the New American Century's Rebuilding American Defenses report in 2000, specifically because of Afghanistan's abundant natural resources detailed in this article. The PNAC report also advocated for a natural gas pipeline passing through Afghanistan. That is the same report that said a "new Pearl Harbor" would be needed to create public support for the plan's execution. Enter 9-11 from stage left as just such a justification for invasion of Afghanistan (and later Iraq, another targeted nation). Several of the PNAC report authors and signatories went on to become high ranking members of the U.S. State and Defense departments when Bush II took office in January 2001. Notably, the PNAC report and above history provides irrefutable evidence that key U.S. policymakers had military goals for Afghanistan before 9-11 because of that nation's natural resources.  
Gary Edwards

The Daily Bell - Thomas DiLorenzo: More on the Myth of Lincoln, Secession and the 'Civi... - 1 views

  • The state cannot tell the people that it is bankrupting them and sending their sons and daughters to die by the thousands in aggressive and unconstitutional wars so that crony capitalism can be imposed at gunpoint in foreign countries, and so that the military-industrial complex can continue to rake in billions. That might risk a revolution. So instead, they have to use the happy talk of American virtue and American exceptionalism, the "god" of democracy," etc.
  • Specifically, he repeated the "All Men are Created Equal" line from the Gettysburg Address to make the case that it is somehow the duty of Americans to force "freedom" on all men and women everywhere, all around the globe, at gunpoint if need be. This is the murderous, bankrupting, imperialistic game that Lincoln mythology is used to "justify."
  • Lincoln spent his entire life in politics, from 1832 until his dying day, as a lobbyist for the American banking industry and the Northern manufacturing corporations that wanted cheaper credit funded by a government-run bank.
  • ...18 more annotations...
  • No member of the Whig Party was more in bed with the American banking establishment than Lincoln was, according to University of Virginia historian Michael Holt in his book on the history of the American Whig party.
  • Bank of the United States
  • The Whig Party "had no platform to announce," Masters wrote, "because its principles were plunder and nothing else." Lincoln himself once said that he got ALL of his political ideas from Henry Clay, the icon and longtime leader of the Whig Party.
    • Gary Edwards
       
      Nice insult.  But watch how the interviewer responds; "Thanks for the insight".  These guys are funny!
  • I don't usually answer "when did you stop beating your wife"-type questions since they always come from people with I.Q.s in the single digits.
  • Thanks for the insights
  • War is always destructive to a nation's economy regardless of whether it wins or loses the war.
  • War is the opposite of capitalism.
  • Capitalism is a system of peaceful, mutually-advantageous exchanges at market prices based on the international division of labor.
  • War destroys the international division of labor and diverts resources from peaceful, capitalistic exchange to death and destruction.
  • However, there are always war profiteers – the people who profit from selling and financing the military. One doesn't need to invent a conspiracy theory about this: War profiteering is war profiteering and has always existed as an essential feature of all wars.
  • "American exceptionalism" did not become a tool of American imperialism until AFTER the Civil War.
  • British intellectuals like Lord Acton understood and wrote about how the result of the war would be a US government that would become more tyrannical and imperialistic.
  • Knights of the Golden Circle
  • Davis was not a dictator. He had a lot of help losing the war, especially from his generals who insisted on the Napoleonic battlefield tactics they were taught at West Point and which had become defunct because of the advent of more deadly military technology by the middle of the nineteenth century.
  • One of his biggest failures was waiting until the last year of the war to finally do what General Robert E. Lee had been arguing from the beginning – offering the slaves freedom in return for fighting with the Confederate Army in defense of their country.
  • eaceful secession is the only way out of the new slavery for the average American, and it will only happen if we have a president who is more like Gorbachev than Lincoln.
  • The union of the founders was voluntary, and several states reserved the right to withdraw from the union in the future if it became destructive of their rights. Since each state has equal rights in the union, this became true for all states.
  •  
    Thank you Thomas DiLorenzo for having the courage to set the record straight.  IMHO, Lincoln should be remembered for freeing the slaves and standing up to the International Bankster Cartel and Wall Street.  But what he did to the USA Constitution and the Bill of Rights was an unprecedented assault on individual liberty.  Good thing the guy could write beautifully on liberty and freedom because his actions amounted to a historic assault on everything the founding fathers held near and dear. excerpt:    "confronting academic "Lincoln revisionism." "Who was Lincoln really and why have you spent so much of your career trying to return Lincoln's academic profile to reality? Thomas DiLorenzo: Lincoln mythology is the ideological cornerstone of American statism. He was in reality the most hated of all American presidents during his lifetime according to an excellent book by historian Larry Tagg entitled The Unpopular Mr. Lincoln: America's Most Reviled President. He was so hated in the North that the New York Times editorialized a wish that he would be assassinated. This is perfectly understandable: He illegally suspended Habeas Corpus and imprisoned tens of thousands of Northern political critics without due process; shut down over 300 opposition newspapers; committed treason by invading the Southern states (Article 3, Section 3 of the Constitution defines treason as "only levying war upon the states" or "giving aid and comfort to their enemies," which of course is exactly what Lincoln did). He enforced military conscription with the murder of hundreds of New York City draft protesters in 1863 and with the mass execution of deserters from his army. He deported a congressional critic (Democratic Congressman Clement Vallandigham of Ohio); confiscated firearms; and issued an arrest warrant for the Chief Justice when the jurist issued an opinion that only Congress could legally suspend Habeas Corpus. He waged an unnecessary war (all other countries ended slavery
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Paul Merrell

Lifting the 24 Hour Siege: Julian Assange, London's Metropolitan Police and Continued D... - 0 views

  • While things tend to get murky, sometimes by design, regarding the police presence outside the Ecuadorean embassy in London, the announcement that the city’s Metropolitan Police would be lifting their twenty-four hour surveillance did surprise some. This was hardly to suggest that the police forces had lost interest in capturing Julian Assange.  What mattered here was that the costs in guarding Assange from a literal flight of fancy had simply become disproportionate, requiring a change of tact.  Over £12m in costs had been incurred since he skipped bail to avoid his Swedish sojourn, and irrespective of which side of the Assange side one was on, anger was mounting at a very conspicuously bloated project. The statement from the Metropolitan Police was cool in its language.  “Like all public services, MPS resources are finite.  With so many different criminal, and other, threats to the city it protects, the current deployment of officers is no longer believed proportionate” (The Guardian, Oct 12). The siege, according to WikiLeaks spokesman Kristinn Hrafnsson, had not been lifted so much as reconstituted.  “My interpretation is that it has not been lifted. They are calling off the uniformed presence but escalating the covert operation and will arrest him if he steps outside off the embassy.”  Costs, in other words, were going to be moved off the books to un-uniformed personnel.
  • Having been granted political asylum for fears that he might be carted off to the US via Sweden to face the findings of an empanelled grand jury, he remains confined to the cramped quarters of the embassy.  Nor can he rely on new laws in the form of the Anti Social Behaviour, Crime and Policing Act 2014 that make an “accusation” – in this case, claims of sexual assault on two Swedish nationals in Sweden – insufficient to require extradition.  As the laws were passed after the fact, precisely motivated by the Assange imbroglio, the foreign and commonwealth office has deemed it inapplicable retrospectively.  Assange, as ever, continues to be the legal exception, a singular target of juridical manipulation. In the meantime, the UN working group on arbitrary detention (WGAD) has been considering Assange’s case, and it likely to find in his favour given its previous rulings of a deprivation of liberty when a person is forced to choose between confinement or the forfeiture of a fundamental right such as asylum.[1] It is also a principle that holds for the European Court of Human Rights and the UN High Commissioner for Refugees (UNHCR).  The latter defines detention as confinement “within a narrowly bounded or restricted location, including prisons, closed camps, detention facilities or airport transit zones, where freedom of movement is substantially curtailed, and where the only opportunity to leave this limited area is to leave the territory.”
  • [2] Submission to the Working Group on Arbitrary Detention by Mr. Julian Assange, available at: https://justice4assange.com/IMG/pdf/assange-wgad.pdf
Paul Merrell

CNN apologizes for commentator who called WikiLeaks founder a 'pedophile' | McClatchy DC - 0 views

  • In fact, the pedophile allegation has little to do with Assange’s plight that has kept him in the embassy in London, which involves incidents in Stockholm in the summer of 2010.
  • Rather, it is a bizarre tale involving a Houston-based dating website and its global and well-funded efforts to discredit Assange around the globe. The byzantine saga involves disconnected telephones and mystery websites. The website, toddandclare.com, launched and ramped up its efforts against Assange during the U.S. presidential campaign, as WikiLeaks released hacked emails related to the campaign of Democratic nominee Hillary Clinton.Whoever is behind the dating site has marshaled significant resources to target Assange, enough to gain entry into a United Nations body, operate in countries in Europe, North America and the Caribbean, conduct surveillance on Assange’s lawyer in London, obtain the fax number of Canada’s prime minister and seek to prod a police inquiry in the Bahamas.The dating site’s campaign sought to thwart WikiLeaks’ efforts and discredit Assange, who played a role in a presidential campaign season that deeply divided the U.S. electorate and illuminated Russia as a major cyber adversary of the U.S. government.One part of toddandclare’s two-pronged campaign put a megaphone to unproven charges that Assange made contact with a young Canadian girl in the Bahamas through the internet with the intention of molesting her. The second part sought to entangle him in a plan to receive $1 million from the Russian government.
  • WikiLeaks claims the dating site is “a highly suspicious and likely fabricated” company. In turn, the company has lashed out at Assange and “his despicable activities against American national security,” and warned journalists to “check with your libel lawyers first before printing anything that could impact or endanger innocent people’s lives.”For nearly two months after the October allegations, toddandclare.com went off line. But it recently reappeared, repeating charges about the 8-year-old Canadian girl. The website did not immediately respond Thursday to a new query from McClatchy, and no respondent in the past has given a name or allowed telephone contact.The online company paints itself as all-American. Online material says its founders, Todd and Clare Hammond, “are an average American couple from Michigan, who met in the eighth grade.” In 2011, the company says, the Christian couple started an email dating service, and “have married 3,000 couples to date.” Their online network began in 2015, and a statement it filed to a U.N. body says it has “100,000+ female singles” in six countries. The company’s operating address is a warehouse loading dock in Houston. Its mail goes to a Houston drop box. Its phone numbers no longer work. WikiLeaks says Texas officials tell it the entity is not registered there either under toddandclare.com or a parent company, T&C Network Solutions.A person who answered emails to the website in November declined to identify him or herself.
  • ...5 more annotations...
  • The people behind toddandclare.com persuaded a U.N. body known as the Global Compact to give it status as a participant in May, and it submitted an eight-page report to the U.N. group Oct. 4 carefully laying out its allegations against Assange. The firm was delisted by the U.N. body eight days later amid controversy over its claims. The report was later taken off the internet. An Australian lawyer, Melinda Taylor, said the report’s precise language raised additional suspicions at WikiLeaks, where she assists Assange in human rights litigation.“This is not a report that’s been drafted by a dating agency. It’s highly legalistic and very structured. It’s the language of someone who has drafted complex legal submissions,” she said.Under Todd Hammond’s name, the report alleged that Assange’s Swedish lawyer had reached out in June to offer Assange’s services on a campaign against rape in exchange for an undisclosed amount of bitcoin. It said the two sides held two videoconferences.Then came the bombshell: It said the company had ended ties with Assange following “pedophile crimes” he had committed in the Bahamas in late September. It charged that the victim was the 8-year-old daughter of a Canadian couple on a monthlong yachting vacation. The father went to police in Nassau on Sept. 28, the report claimed, charging that his family held video and chat logs showing Assange “internet grooming” the child and “propositioning the 8-year-old juvenile ‘to perform oral and anal sex acts.’ ”It said Assange made a connection to the child’s 22-year-old sister, who was a client of the online dating site, from his refuge in London, eventually gaining access to the young girl.
  • An assistant commissioner for the Royal Bahamas Police Force, Stephen Dean, said “there is no investigation” into any such incident and that the police have received no evidence that such an incident occurred.“We got a phone call of someone giving us some information. But we never had a face-to-face. It could have been a hoax,” Dean said. “We don’t know.”If someone were in possession of video or chat logs about a pedophile crime, he or she did not provide them to Bahamian police, Dean said, which he said would be odd: “If you have something so significant, I think you’d want to leave a report.”Assange’s Swedish lawyer, Per Samuelson, wrote to the U.N. body on Oct. 10 alleging that Hammond’s report against Assange was “entirely false” in all its facets and that he had had no contact with the dating site or Hammond.Even as authorities in the Bahamas dismissed the report, the dating site sent a fax Oct. 17 to Canadian Prime Minister Justin Trudeau saying the Canadian family had fled the Bahamas due to “anti-white, racist abuse by Bahamian police.”“Julian Assange ... has started a smear campaign to claim our dating company is behind an elaborate scam. It is fully to be expected. Pedophiles are devious and cunning,” the fax said.The company said it would “continue to protect the family’s identity, until either the (Royal Bahamas Police Force) conduct a proper investigation, or hell freezes over. Whichever comes first.”
  • The fax was signed, “The Todd and Clare Team,” and left no way to contact the firm.While the founders of toddandclare.com say they’ve been in the matchmaking business since 2011, their internet presence dates only to September 2015 and really got going only early last year. Those who have done work for the company say they were kept at arm’s length.By summer, in the run-up to what many expected to be an “October surprise” from WikiLeaks to make an impact on the U.S. election, toddandclare.com began moving against Assange in multiple countries simultaneously. The DNC and a cyber-threat intelligence firm it had hired, CrowdStrike, were already fingering Russia as behind the hacks that would provide the fodder for WikiLeaks. They’d said in June that Russian hackers had access to DNC servers for about a year.A company representative, identifying herself as Hannah Hammond, emailed Assange’s Swedish and British legal agents offering $1 million for him to appear in a five-minute tongue-in-cheek television advertisement. In a subsequent exchange Sept. 19, the representative wrote that “the source of the $1,000,000 is the Russian government.”In a curious twist, she offered what she said were three facts about Assange’s London attorney that are “unknown to the public,” including details inside her home and an event in her son’s life, suggesting a capability to conduct surveillance.Taylor, the Assange lawyer, said the details appeared “to create the impression that the members of his team were under close surveillance and/or to bolster the bona fides of the claim that the offer was linked to a State. Its inclusion does appear quite menacing.”
  • A lawyer identifying himself only as “James” responded the next day, slamming the offer as an “elaborate scam designed to entrap” Assange and embarrass him for ties to Russia.The dating site representative sought to pull the veil off “James.”“Julian: We know it’s you writing. The offer expires at midnight, October 31st 2016,” she wrote back on Sept. 21, according to copies of the emails posted by WikiLeaks on its website.By early October, toddandclare.com went on the offensive. It filed a civil complaint in a British court against Assange, seeking 295 pounds sterling – about $359 – in damages because it said it could no longer use his services due to the “child sex offenses in Nassau.”The suit, said Taylor, Assange’s lawyer, “seems to be designed to evade defamation law in the U.K. They’ve put highly noxious information knowing that it would be made public.”The global tussle between the online dating company and WikiLeaks went public in mid-October when the anti-secrecy group voiced public doubt on whether toddandclare.com actually existed, or served only as a vehicle to attack Assange.
  • The announcement opened the gates for a disparate crew of internet sleuths – some motivated by hatred of Clinton and others impelled by support for WikiLeaks – to probe into the history of toddandclare.com, suspicious that the dating site might be an undercover operation with links to the Clinton campaign.Posting their findings on the discussion websites like Reddit.com, they unearthed some curious coincidences. A perusal into the archives of the internet revealed that the Hammonds had once occupied a San Francisco building later rented to a company, Premise Data, whose co-founder has ties to Clinton and her top supporters.Moreover, a telephone number once registered to a Todd Hammond later was registered to a former Premise employee, Aaron Dunn, although with a different area code.Premise co-founder David Soloff said such findings could only be coincidences.“I want to reiterate that Premise has no connection with this case. And beyond confirming that Aaron Dunn worked at Premise until 2014, I don’t know the answer to any of your questions,” Soloff wrote in an email.
Paul Merrell

The NSA Archive | American Civil Liberties Union - 0 views

  • The ACLU and others have long suspected that the National Security Agency has gone far beyond its mandate of gathering information for counterterrorism and foreign intelligence purposes, implementing a massive spying system to conduct bulk surveillance of hundreds of millions of innocent Americans. Those suspicions were confirmed when, on June 5, 2013, The Guardian released the first in a series of documents provided by Edward Snowden detailing the NSA's unlawful spying activities. All of the documents released since that day -- both by the media and the government -- are housed in this database. Together, they have triggered a remarkable and long-overdue public debate about the legality and propriety of the government's surveillance practices. You can search the text of the documents using the Keyword box to the right, and you can filter the documents using the tags below that box.
  • The ACLU and others have long suspected that the National Security Agency has gone far beyond its mandate of gathering information for counterterrorism and foreign intelligence purposes, implementing a massive spying system to conduct bulk surveillance of hundreds of millions of innocent Americans. Those suspicions were confirmed when, on June 5, 2013, The Guardian released the first in a series of documents provided by Edward Snowden detailing the NSA's unlawful spying activities. All of the documents released since that day -- both by the media and the government -- are housed in this database. Together, they have triggered a remarkable and long-overdue public debate about the legality and propriety of the government's surveillance practices. You can search the text of the documents using the Keyword box to the right, and you can filter the documents using the tags below that box.
Paul Merrell

U.S. "Humanitarian" Bombing of Iraq: A Redundant Presidential Ritual - The Intercept - 0 views

  • There are several brief points worth noting about all of this: (1) For those who ask “what should be done?,” has the hideous aftermath of the NATO intervention in Libya – hailed as a grand success for “humanitarian interventions” – not taught the crucial lessons that (a) bombing for ostensibly “humanitarian” ends virtually never fulfills the claimed goals but rather almost always makes the situation worse; (b) the U.S. military is not designed, and is not deployed, for “humanitarian” purposes?; and (c) the U.S. military is not always capable of “doing something” positive about every humanitarian crisis even if that were really the goal of U.S. officials? The suffering in Iraq is real, as is the brutality of ISIS, and the desire to fix it is understandable. There may be some ideal world in which a superpower is both able and eager to bomb for humanitarian purposes. But that is not this world. Just note how completely the welfare of Libya was ignored by most intervention advocates the minute the fun, glorious, exciting part – “We came, we saw, he died,” chuckled Hillary Clinton – was over.
  • (2) It is simply mystifying how anyone can look at U.S. actions in the Middle East and still believe that the goal of its military deployments is humanitarianism. The U.S. government does not oppose tyranny and violent oppression in the Middle East. To the contrary, it is and long has been American policy to do everything possible to subjugate the populations of that region with brutal force – as conclusively demonstrated by stalwart U.S. support for the region’s worst oppressors. Or, as Hillary Clinton so memorably put it in 2009: “I really consider President and Mrs. Mubarak to be friends of my family.” How can anyone believe that a government whose overt, explicit policy is “regime continuity” for Saudi Arabia, and who continues to lend all sorts of support to the military dictators of Egypt, is simultaneously driven by humanitarian missions in the region? (3) “Humanitarianism” is the pretty packaging in which all wars – even the most blatantly aggressive ones – are wrapped, but it is almost never the actual purpose. There are often numerous steps the U.S. could take to advance actually humanitarian goals, but those take persistence and resources, and entail little means of control, and are thus usually ignored in favor of blowing things and people up with Freedom Bombs.
  • (4) Note how even the pretenses of constitutional democracy are now dispensed with: there is a reasonable legal debate over legality, but in essence: the President has the power to order bombing of Iraq because he decides it should happen. (5) Perhaps having Israel and the U.S. simultaneously bombing Arabs in different countries – yet again – will create some extremely negative consequences?
  • ...2 more annotations...
  • (6) This above-documented parade of “Saddam-is-worse-than-Hitler” campaigns was surrounded by stints of U.S. arming and funding of the very same Saddam (the same, of course, was true of the Taliban precursors, Gadhaffi, Iran, Manuel Noriega, and virtually every other Latest Villain who needed to be bombed; the US was roughly allied with ISIS allies in Syria and American allies fund ISIS itself). The propaganda has gone from “pulling babies from incubators: as bad as Hitler” to “rape rooms: worse than Hitler” to the new slogan: “worse than al-Qaeda!” What’s left? For quite some time, it was Mahmoud Ahmadinejad – the democratically elected president of Iran who left office peacefully at the end of his term and who never actually invaded anybody – who was The New Hitler. As all of this demonstrates, there certainly are some heinous, violent people in the world: often including America’s closest allies and the ones who unleash the violence documented here, as well as those at whom that violence is directed. But perhaps some perspective and serious skepticism is warranted the next time we’re relentlessly bombarded with messaging about The New Greatest Villainous Threat in History – and especially manipulative accusations that opposition to U.S. military attack is indicative of support for those New Villains – as a means to secure acquiescence to the next bombing campaign.
  • (7) Maybe this and this, rather than humanitarianism, is a more significant influence in this new bombing campaign? Targeted strikes against ISIS is obviously not remotely the same as a full-scale invasion of Iraq, but whatever else is true, and whatever one’s opinions are on this latest bombing, it is self-evidently significant that, as the NYT’s Peter Baker wrote today, “Mr. Obama became the fourth president in a row to order military action in that graveyard of American ambition” known as Iraq.
Paul Merrell

OpenCongress - 113th Congress - Track bills, votes, senators, and representatives in th... - 0 views

  • Enter a lawmaker’s name, issue area or bill number to search OpenCongress. Discover who represents you, find relevant legislation and learn how to take action.
  • Track Bills, Follow Lawmakers and More Create an OpenCongress account to get updates on lawmaking activity, bills and votes, and connect with other users on issues you care about.
Paul Merrell

The Trans-Pacific Partnership and the Death of the Republic | WEB OF DEBT BLOG - 0 views

  • On April 22, 2015, the Senate Finance Committee approved a bill to fast-track the Trans-Pacific Partnership (TPP), a massive trade agreement that would override our republican form of government and hand judicial and legislative authority to a foreign three-person panel of corporate lawyers. The secretive TPP is an agreement with Mexico, Canada, Japan, Singapore and seven other countries that affects 40% of global markets. Fast-track authority could now go to the full Senate for a vote as early as next week. Fast-track means Congress will be prohibited from amending the trade deal, which will be put to a simple up or down majority vote. Negotiating the TPP in secret and fast-tracking it through Congress is considered necessary to secure its passage, since if the public had time to review its onerous provisions, opposition would mount and defeat it.
  • The most controversial provision of the TPP is the Investor-State Dispute Settlement (ISDS) section, which strengthens existing ISDS  procedures. ISDS first appeared in a bilateral trade agreement in 1959. According to The Economist, ISDS gives foreign firms a special right to apply to a secretive tribunal of highly paid corporate lawyers for compensation whenever the government passes a law to do things that hurt corporate profits — such things as discouraging smoking, protecting the environment or preventing a nuclear catastrophe. Arbitrators are paid $600-700 an hour, giving them little incentive to dismiss cases; and the secretive nature of the arbitration process and the lack of any requirement to consider precedent gives wide scope for creative judgments. To date, the highest ISDS award has been for $2.3 billion to Occidental Oil Company against the government of Ecuador over its termination of an oil-concession contract, this although the termination was apparently legal. Still in arbitration is a demand by Vattenfall, a Swedish utility that operates two nuclear plants in Germany, for compensation of €3.7 billion ($4.7 billion) under the ISDS clause of a treaty on energy investments, after the German government decided to shut down its nuclear power industry following the Fukushima disaster in Japan in 2011.
  • Under the TPP, however, even larger judgments can be anticipated, since the sort of “investment” it protects includes not just “the commitment of capital or other resources” but “the expectation of gain or profit.” That means the rights of corporations in other countries extend not just to their factories and other “capital” but to the profits they expect to receive there.
  • ...6 more annotations...
  • Under the TPP, could the US government be sued and be held liable if it decided to stop issuing Treasury debt and financed deficit spending in some other way (perhaps by quantitative easing or by issuing trillion dollar coins)? Why not, since some private companies would lose profits as a result? Under the TPP or the TTIP (the Transatlantic Trade and Investment Partnership under negotiation with the European Union), would the Federal Reserve be sued if it failed to bail out banks that were too big to fail? Firestone notes that under the Netherlands-Czech trade agreement, the Czech Republic was sued in an investor-state dispute for failing to bail out an insolvent bank in which the complainant had an interest. The investor company was awarded $236 million in the dispute settlement. What might the damages be, asks Firestone, if the Fed decided to let the Bank of America fail, and a Saudi-based investment company decided to sue?
  • Just the threat of this sort of massive damage award could be enough to block prospective legislation. But the TPP goes further and takes on the legislative function directly, by forbidding specific forms of regulation. Public Citizen observes that the TPP would provide big banks with a backdoor means of watering down efforts to re-regulate Wall Street, after deregulation triggered the worst financial crisis since the Great Depression: The TPP would forbid countries from banning particularly risky financial products, such as the toxic derivatives that led to the $183 billion government bailout of AIG. It would prohibit policies to prevent banks from becoming “too big to fail,” and threaten the use of “firewalls” to prevent banks that keep our savings accounts from taking hedge-fund-style bets. The TPP would also restrict capital controls, an essential policy tool to counter destabilizing flows of speculative money. . . . And the deal would prohibit taxes on Wall Street speculation, such as the proposed Robin Hood Tax that would generate billions of dollars’ worth of revenue for social, health, or environmental causes.
  • Clauses on dispute settlement in earlier free trade agreements have been invoked to challenge efforts to regulate big business. The fossil fuel industry is seeking to overturn Quebec’s ban on the ecologically destructive practice of fracking. Veolia, the French behemoth known for building a tram network to serve Israeli settlements in occupied East Jerusalem, is contesting increases in Egypt’s minimum wage. The tobacco maker Philip Morris is suing against anti-smoking initiatives in Uruguay and Australia. The TPP would empower not just foreign manufacturers but foreign financial firms to attack financial policies in foreign tribunals, demanding taxpayer compensation for regulations that they claim frustrate their expectations and inhibit their profits.
  • What is the justification for this encroachment on the sovereign rights of government? Allegedly, ISDS is necessary in order to increase foreign investment. But as noted in The Economist, investors can protect themselves by purchasing political-risk insurance. Moreover, Brazil continues to receive sizable foreign investment despite its long-standing refusal to sign any treaty with an ISDS mechanism. Other countries are beginning to follow Brazil’s lead. In an April 22nd report from the Center for Economic and Policy Research, gains from multilateral trade liberalization were shown to be very small, equal to only about 0.014% of consumption, or about $.43 per person per month. And that assumes that any benefits are distributed uniformly across the economic spectrum. In fact, transnational corporations get the bulk of the benefits, at the expense of most of the world’s population.
  • Something else besides attracting investment money and encouraging foreign trade seems to be going on. The TPP would destroy our republican form of government under the rule of law, by elevating the rights of investors – also called the rights of “capital” – above the rights of the citizens. That means that TPP is blatantly unconstitutional. But as Joe Firestone observes, neo-liberalism and corporate contributions seem to have blinded the deal’s proponents so much that they cannot see they are selling out the sovereignty of the United States to foreign and multinational corporations.
  • For more information and to get involved, visit: Flush the TPP The Citizens Trade Campaign Public Citizen’s Global Trade Watch Eyes on Trade
Paul Merrell

"Crisis At The Border" Is Yet Another Example Of "Blowback." - 0 views

  • If you’re reading this, you probably follow the news. So you’ve probably heard of the latest iteration of the “crisis at the border”: tens of thousands of children, many of them unaccompanied by an adult, crossing the desert from Mexico into the United States, where they surrender to the Border Patrol in hope of being allowed to remain here permanently. Immigration and Customs Enforcement’s detention and hearing system has been overwhelmed by the surge of children and, in some cases, their parents. The Obama Administration has asked Congress to approve new funding to speed up processing and deportations of these illegal immigrants. Even if you’ve followed this story closely, you probably haven’t heard the depressing backstory — the reason so many Central Americans are sending their children on a dangerous thousand-mile journey up the spine of Mexico, where they ride atop freight trains, endure shakedowns by corrupt police and face rapists, bandits and other predators. (For a sense of what it’s like, check out the excellent 2009 film “Sin Nombre.”) NPR and other mainstream news outlets are parroting the White House, which blames unscrupulous “coyotes” (human smugglers) for “lying to parents, telling them that if they put their kids in the hands of traffickers and get to the United States that they will be able to stay.” True: the coyotes are saying that in order to gin up business. Also true: U.S. law has changed, and many of these kids have a strong legal case for asylum. Unfortunately, U.S. officials are ignoring the law.
  • The sad truth is that this “crisis at the border” is yet another example of “blowback.” Blowback is an unintended negative consequence of U.S. political, military and/or economic intervention overseas — when something we did in the past comes back to bite us in the ass. 9/11 is the classic example; arming and funding radical Islamists in the Middle East and South Asia who were less grateful for our help than angry at the U.S.’ simultaneous backing for oppressive governments (The House of Saud, Saddam, Assad, etc.) in the region. More recent cases include U.S. support for Islamist insurgents in Libya and Syria, which destabilized both countries and led to the murders of U.S. consular officials in Benghazi, and the rise of ISIS, the guerilla army that imperils the U.S.-backed Maliki regime in Baghdad, respectively. Confusing the issue for casual American news consumers is that the current border crisis doesn’t involve the usual Mexicans traveling north in search of work. Instead, we’re talking about people from Central American nations devastated by a century of American colonialism and imperialism, much of that intervention surprisingly recent. Central American refugees are merely transiting through Mexico.
  • “The unaccompanied children crossing the border into the United States are leaving behind mainly three Central American countries, Honduras, El Salvador and Guatemala. The first two are among the world’s most violent and all three have deep poverty, according to a Pew Research report based on Department of Homeland Security (DHS) information,” reports NBC News. “El Salvador ranked second in terms of homicides in Latin America in 2011, and it is still high on the list. Honduras, Guatemala and El Salvador are among the poorest nations in Latin America. Thirty percent of Hondurans, 17 percent of Salvadorans and 26 percent of Guatemalans live on less than $2 a day.” The fact that Honduras is the biggest source of the exodus jumped out at me. That’s because, in 2009, the United States government — under President Obama — tacitly supported a military coup that overthrew the democratically elected president of Honduras. “Washington has a very close relationship with the Honduran military, which goes back decades,” The Guardian noted at the time. “During the 1980s, the US used bases in Honduras to train and arm the Contras, Nicaraguan paramilitaries who became known for their atrocities in their war against the Sandinista government in neighbouring Nicaragua.”
  • ...2 more annotations...
  • Honduras wasn’t paradise under President Manuel Zelaya. Since the coup, however, the country has entered a downward death spiral of drug-related bloodshed and political revenge killings that crashed the economy, brought an end to law, order and civil society, and now has some analysts calling it a “failed state” along the lines of Somalia and Afghanistan during the 1990s. “Zelaya’s overthrow created a vacuum in security in which military and police were now focused more on political protest, and also led to a freeze in international aid that markedly worsened socio-economic conditions,” Mark Ungar, professor of political science at Brooklyn College and the City University of New York, told The International Business Times. “The 2009 coup, asserts [Tulane] professor Aaron Schneider, gave the Honduran military more political and economic leverage, at the same time as the state and political elites lost their legitimacy, resources and the capacity to govern large parts of the country.” El Salvador and Guatemala, also narcostates devastated by decades of U.S. support for oppressive, corrupt right-wing dictatorships, are suffering similar conditions.
  • Talk about brass! The United States does it everything it can to screw up Central America — and then acts surprised when desperate people show up at its front gate trying to escape the (U.S.-caused) carnage. Letting the kids stay — along with their families — is less than the least we could do.
1 - 15 of 15
Showing 20 items per page