Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged 1984

Rss Feed Group items tagged

Paul Merrell

'UK surveillance is worse than 1984' says UN privacy chief (Wired UK) - 0 views

  • The UN's newly appointed special rapporteur on privacy, Joseph Cannataci, has described digital surveillance in the UK as "worse" than anything imagined in George Orwell's totalitarian dystopia 1984.Speaking to the Guardian, Cannataci -- who doesn't own a Facebook account or use Twitter -- lambasted the oversight of British digital surveillance as "a rather bad joke at its citizens' expense".Warning against the steady erosion of privacy and increasing levels of government intrusion, he also drew sinister parallels with Orwell's vision of a mass-surveilled society, adding that today's reality was far worse than the fiction: "At least Winston [a character in Orwell's 1984] was able to go out in the countryside and go under a tree and expect there wouldn't be any screen, as it was called. Whereas today there are many parts of the English countryside where there are more cameras than George Orwell could ever have imagined."
  • Cannataci, who holds posts as a professor of technology of law at the University of Groningen, and as head of the department of Information Policy and Governance at the University of Malta, also called for a "Geneva convention-style law" for the internet. "Some people may not want to buy into it. But you know, if one takes the attitude that some countries will not play ball, then, for example, the chemical weapons agreement would never have come about."
  • As part of his new role -- which elevates digital privacy to the same level of importance as other human rights -- Cannataci has vowed to begin systematically reviewing government policies and the business models of large corporations, which he accuses of "very often taking the data that you never even knew they were taking". Although the privacy chief admits that his mandate is more than likely "impossible to achieve in the next three years", he stressed the importance of a "longer-term view" in an effort to help protect people's data and safeguard their digital rights.
Gary Edwards

An Inconvenient Truth: Liberal Climate Inquisition Can't Explain Past Temperature Changes - 0 views

  • For instance, the chart above shows reconstructed average world temperature data for the past 500,000 years. Depending on the magnification and size of your monitor, each pencil dot would span something on the order of 1,000 years. The myriad 10-degree Celsius temperature flips all happened before man-made carbon dioxide could have had any impact—the final temperature spike started at the end of the last ice age.
  • Now see if you can follow this: The “science thought police” insist that even though none of the temperature variations for the first 499,950 years had anything to do with human activity, virtually none of the temperature increases of the past 50 years had anything to do with nature. Got it?
  •  
    "In the week prior to the administration signing what should constitute an international climate treaty, one think tank, the Competitive Enterprise Institute, was subpoenaed for casting doubt on the agreement's associated science of climate catastrophe. As disturbing as such thuggery from state attorneys general would be in any case, the premise of the subpoena is faulty. The Competitive Enterprise Institute did not cast doubt on the dubious climate science. The actual data cast the doubt. The think tank and others have simply pointed out what the data show. It looks like thoughtcrime has now moved from George Orwell's novel "1984" to the twisted reality of our judicial system. Pointing out facts should never be a real crime. The Heritage Foundation's new Paris-bubble-popping science summary is also a case of letting the numbers tell a story. A story many never hear in the media-hyped spectacle that is international climate policy."
Paul Merrell

Netanyahu and Trump: A Shared Focus on Terrorism « LobeLog - 0 views

  • Scholars of terrorism credit a specific 1979 symposium in Jerusalem as a turning point in the U.S. and international usage of “terrorism” as we understand it today. The Jonathan Institute, founded following the death of Benjamin Netanyahu’s brother Yonatan during a raid to rescue hostages from a PLO hijacking, hosted a 1979 conference in Jerusalem— and a follow up in 1984 in Washington—on “International Terrorism.” Directed by Benjamin Netanyahu, the Jonathan Institute maintained close ties to the Israeli government. Current and former Israeli officials across the political spectrum—including Golda Meir, Menachem Begin, Yitzhak Rabin, Ezer Weizman, Moshe Dayan, and Shimon Peres—dominated its administrative committee. Lisa Stampnitsky, in her 2013 book Disciplining Terror, discusses how the Jonathan Institute helped internationalize Israel’s use of the term to describe terrorist violence as both irrational and illegitimate in both means and ends, and as primarily targeting democracies and “the West.” Previously, she notes, terrorism referred largely to rational political violence, either state or individual, and was dealt with as an issue of criminality and law. The shift helped Israel delegitimize the political aims of certain groups, such as the Palestinian resistance to its colonization and territorial occupation. One cannot be a “freedom fighter” if one’s political aims are demonized as illegitimate or irrational. Stampnitsky argues that the shift to using terrorism to describe violence outside the law also set the stage for retaliatory strikes (such as the 1986 U.S. air strikes in Libya in response to a bombing at a Berlin disco that killed an American soldier) and eventually for the doctrine of preemptive force that has characterized the post-9/11 “War on Terror.”
  • Israel’s role in the development of a specifically anti-Muslim discourse of terrorism is deeply intertwined with the foreign policies of American politicians. As Deepa Kumar and others have pointed out, American neocons and Israel’s Likud party jointly developed a shared language around Islamic terrorism. The 1979 Jonathan Institute conference was attended by prominent American officials and political figures, including future President George H.W. Bush and representatives of the American Enterprise Institute, the Center for Strategic and International Studies, and Commentary magazine who brought the ideas, and later a follow-up conference, back to the U.S. Intended to serve as an intervention into the international discourse on terrorism, the explicit aim of the Jerusalem conference was to awaken the Western world to the problem of terrorism as defined by the conference organizers. It contributed to entrenching in the minds of American conservatives what was popularized a few years later as the “clash of civilizations,” firmly situating Israel in the category of Western democracies threatened by Soviets and Palestinians. The follow-up conference in the United States in 1984 went further by emphasizing the relationship between Islam and terror. As Netanyahu himself wrote in the book that came out of the conference: “the battle against terrorism was part of a much larger struggle, one between the forces of civilization and the forces of barbarism.” Then, as now, Netanyahu presented Israel as the bulwark against terrorism, a specific kind of illegitimate political violence that threatens not just Israel but all democracies and the Western world.
  • Echoes of this framing of the debate on terrorism can be found in how Western politicians, including Netanyahu and Trump, discuss the issue. Terrorism, which has no single agreed-upon definition in U.S. or international law, now serves as a moniker applied to all violence that established states deem illegitimate. Most often these days, Western democracies use “terrorism” to describe violence committed by Muslims. As journalist Glenn Greenwald writes, “In other words, any violence by Muslims against the West is inherently ‘terrorism,’ even if targeted only at soldiers at war and/or designed to resist invasion and occupation.” The term functions not as a descriptive tool but an ideological one. It doesn’t merely identify a particular kind of violence. It justifies and even requires a particular kind of forceful response by the state. Israel today presents itself as the world’s expert on counterterrorism. It maintains a profitable security industry predicated on selling expertise and technology tested in its interactions with Palestinians. American tax dollars have been funneled into this industry through U.S. military aid, over 25% of which Israel was allowed to spend domestically (the new military aid deal signed by the Obama White House will phase out this allowance over the next 10 years, sending the rest of the $3.8 billion per year to U.S. defense contractors). The United States and Israel collaborate on counterterrorism initiatives, including joint military exercises and police exchange programs. Here tactics and skills are developed and exchanged for surveillance and violent repression of protests that primarily impact Muslims and people of color in the U.S. and Palestinians and Black Jews in Israel.
  • ...1 more annotation...
  • In this context, Trump’s framing of his anti-Muslim immigration policies as a national security priority to keep out terrorists is nothing new. What is new in this political moment is the extent to which the U.S. public is seeing straight through this discourse and rallying against discrimination and bigotry. Ahead of Trump and Netanyahu’s meeting this week, there’s an opportunity to pay attention to how these discourses have enabled Israel to justify decades of military occupation and human rights abuses with the discourse of national security and counterterrorism. As the Trump administration goes back to the drawing board to devise restrictive immigration policies that will hold up in court, Netanyahu and Israel’s example shouldn’t be far from mind.
Paul Merrell

The NSA is turning the internet into a total surveillance system | Alexander Abdo and P... - 0 views

  • Another burst of sunlight permeated the National Security Agency's black box of domestic surveillance last week.According to the New York Times, the NSA is searching the content of virtually every email that comes into or goes out of the United States without a warrant. To accomplish this astonishing invasion of Americans' privacy, the NSA reportedly is making a copy of nearly every international email. It then searches that cloned data, keeping all of the emails containing certain keywords and deleting the rest – all in a matter of seconds.
  • The NSA appears to believe this general monitoring of our electronic communications is justified because the entire process takes, in one official's words, "a small number of seconds". Translation: the NSA thinks it can intercept and then read Americans' emails so long as the intrusion is swift, efficient and silent.That is not how the fourth amendment works.Whether the NSA inspects and retains these messages for years, or only searches through them once before moving on, the invasion of Americans' privacy is real and immediate. There is no "five-second rule" for fourth amendment violations: the US constitution does not excuse these bulk searches simply because they happen in the blink of an eye.The government claims that this program is authorized by a surveillance statute passed in 2008 that allows the government to target foreigners for surveillance. Although the government has frequently defended that law as a necessary tool in gathering foreign intelligence, the government has repeatedly misled the public about the extent to which the statute implicates Americans' communications.
  • There should no longer be any doubt: the US government has for years relied upon its authority to collect foreigners' communications as a useful cover for its sweeping surveillance of Americans' communications. The surveillance program revealed last week confirms that the interception of American communications under this law is neither "targeted" at foreigners (in any ordinary sense of that word) nor "inadvertent", as officials have repeatedly claimed.Last week's revelations are a disturbing harbinger of future surveillance. Two months ago, this newspaper reported that the US government has been forcing American telecommunications companies to turn over the call records of every one of their customers "on an ongoing daily basis", to allow the NSA to later search those records when it has a reason to do so. The government has since defended the program, in part on the theory that Americans' right to privacy is not implicated by the initial acquisition of their phone records, only by their later searching.That legal theory is extraordinarily dangerous because it would allow the NSA to acquire virtually all digital information today simply because it might possibly become relevant tomorrow. The surveillance program revealed by the New York Times report goes one step further still. No longer is the government simply collecting information now so that the data is available to search, should a reasonable suspicion arise at some point in the future; the NSA is searching everything now – in real time and without suspicion – merely on the chance that it finds something of interest.
  • ...1 more annotation...
  • That principle of pre-emptive surveillance threatens to subvert the most basic protections of the fourth amendment, which generally prohibit the government from conducting suspicion-less fishing expeditions through our private affairs. If the government is correct that it can search our every communication in case we say or type something suspicious, there is little to prevent the NSA from converting the internet into a tool of pervasive surveillance.
  •  
    Obama was apparently technically accurate but materially misleading when he he said that no one is reading your email. But government computers are reading every email. "Although conduct by law enforcement officials prior to trial may ultimately impair that right, a constitutional violation occurs only at trial. Kastigar v. United States, 406 U. S. 441, 453 (1972). The Fourth Amendment functions differently. It prohibits 'unreasonable searches and seizures' whether or not the evidence is sought to be used in a criminal trial, and a violation of the Amendment is 'fully accomplished' at the time of an unreasonable governmental intrusion. United States v. Calandra, 414 U. S. 338, 354 (1974); United States v. Leon, 468 U. S. 897, 906 (1984)." United States v. Verdugo-Urquidez, 494 US 259, 265 (1990), http://scholar.google.com/scholar_case?case=10167007390100843851  
Paul Merrell

The American Deep State, Deep Events, and Off-the-Books Financing | Global Research - 0 views

  • It is alleged that some of the bail money that released Sturgis and the other Watergate burglars was drug money from the CIA asset turned drug trafficker, Manuel Artime, and delivered by Artime’s money-launderer, Ramón Milián Rodríguez. After the Iran-Contra scandal went public, Milián Rodríguez was investigated by a congressional committee – not for Watergate, but because, in support of the Contras, he had managed two Costa Rican seafood companies, Frigorificos and Ocean Hunter, that laundered drug money.6
  • In the 1950s Wall Street was a dominating complex. It included not just banks and other financial institutions but also the oil majors whose cartel arrangements were successfully defended against the U.S. Government by the Wall Street law firm Sullivan and Cromwell, home to the Dulles brothers. The inclusion of Wall Street conforms with Franklin Roosevelt’s observation in 1933 to his friend Col. E.M. House that “The real truth … is, as you and I know, that a financial element in the larger centers has owned the Government ever since the days of Andrew Jackson.”18 FDR’s insight is well illustrated by the efficiency with which a group of Wall Street bankers (including Nelson Rockefeller’s grandfather Nelson Aldrich) were able in a highly secret meeting in 1910 to establish the Federal Reserve System – a system which in effect reserved oversight of the nation’s currency supply and of all America’s banks in the not impartial hands of its largest.19 The political clout of the quasi-governmental Federal Reserve Board was clearly demonstrated in 2008, when Fed leadership secured instant support from two successive administrations for public money to rescue the reckless management of Wall Street banks: banks Too Big To Fail, and of course far Too Big To Jail, but not Too Big To Bail.20
  • since its outset, the CIA has always had access to large amounts of off-the books or offshore funds to support its activities. Indeed, the power of the purse has usually worked in an opposite sense, since those in control of deep state offshore funds supporting CIA activities have for decades also funded members of Congress and of the executive – not vice versa. The last six decades provide a coherent and continuous picture of historical direction being provided by this deep state power of the purse, trumping and sometimes reversing the conventional state. Let us resume some of the CIA’s sources of offshore and off-the-books funding for its activities. The CIA’s first covert operation was the use of “over $10 million in captured Axis funds to influence the [Italian] election [of 1948].”25 (The fundraising had begun at the wealthy Brook Club in New York; but Allen Dulles, then still a Wall Street lawyer, persuaded Washington, which at first had preferred a private funding campaign, to authorize the operation through the National Security Council and the CIA.)26 Dulles, together with George Kennan and James Forrestal, then found a way to provide a legal source for off-the-books CIA funding, under the cover of the Marshall Plan. The three men “helped devise a secret codicil [to the Marshall Plan] that gave the CIA the capability to conduct political warfare. It let the agency skim millions of dollars from the plan.”27
  • ...18 more annotations...
  • The international lawyers of Wall Street did not hide from each other their shared belief that they understood better than Washington the requirements for running the world. As John Foster Dulles wrote in the 1930s to a British colleague, The word “cartel” has here assumed the stigma of a bogeyman which the politicians are constantly attacking. The fact of the matter is that most of these politicians are highly insular and nationalistic and because the political organization of the world has under such influence been so backward, business people who have had to cope realistically with international problems have had to find ways for getting through and around stupid political barriers.21
  • In the 1960s and especially the 1970s America began to import more and more oil from the Middle East. But the negative effect on the U.S. balance of payments was offset by increasing arms and aviation sales to Iran and Saudi Arabia. Contracts with companies like Northrop and especially Lockheed (the builder of the CIA’s U-2) included kickbacks to arms brokers, like Kodama Yoshio in Japan and Adnan Khashoggi in Saudi Arabia, who were also important CIA agents. Lockheed alone later admitted to the Church Committee that it had provided $106 million in commissions to Khashoggi between 1970 and 1975, more than ten times what it had paid to the next most important connection, Kodama.31 These funds were then used by Khashoggi and Kodama to purchase pro-Western influence. But Khashoggi, advised by a team of ex-CIA Americans like Miles Copeland and Edward Moss, distributed cash, and sometimes provided women, not just in Saudi Arabia but around the world – including cash to congressmen and President Nixon in the United States.32 Khashoggi in effect served as a “cutout,” or representative, in a number of operations forbidden to the CIA and the companies he worked with. Lockheed, for one, was conspicuously absent from the list of military contractors who contributed illicitly to Nixon’s 1972 election campaign. But there was no law prohibiting, and nothing else to prevent their official representative, Khashoggi, from cycling $200 million through the bank of Nixon’s friend Bebe Rebozo.33
  • The most dramatic use of off-the-books drug profits to finance foreign armies was seen in the 1960s CIA-led campaign in Laos. There the CIA supplied airstrips and planes to support a 30,000-man drug-financed Hmong army. At one point Laotian CIA station chief Theodore Shackley even called in CIA aircraft in support of a ground battle to seize a huge opium caravan on behalf of the larger Royal Laotian Army.30
  • At the time of the Marshall Plan slush fund in Europe, the CIA also took steps which resulted in drug money to support anti-communist armies in the Far East. In my book American War Machine I tell how the CIA, using former OSS operative Paul Helliwell, created two proprietary firms as infrastructure for a KMT army in Burma, an army which quickly became involved in managing and developing the opium traffic there. The two firms were SEA Supply Inc. in Bangkok and CAT Inc. (later Air America) in Taiwan. Significantly, the CIA split ownership of CAT Inc.’s plane with KMT bankers in Taiwan – this allowed the CIA to deny responsibility for the flights when CAT planes, having delivered arms from Sea Supply to the opium-growing army, then returned to Taiwan with opium for the KMT. Even after the CIA officially severed its connection to the KMT Army in 1953, its proprietary firm Sea Supply Inc. supplied arms for a CIA-led paramilitary force, PARU, that also was financed, at least in part, by the drug traffic.28 Profits from Thailand filtered back, in part through the same Paul Helliwell, as donations to members from both parties in Congress. Thai dictator Phao Sriyanon, a drug trafficker who was then alleged to be the richest man in the world, hired lawyer Paul Helliwell…as a lobbyist in addition to [former OSS chief William] Donovan [who in 1953-55 was US Ambassador to Thailand]. Donovan and Helliwell divided the Congress between them, with Donovan assuming responsibility for the Republicans and Helliwell taking the Democrats.29
  • The power exerted by Khashoggi was not limited to his access to funds and women. By the 1970s, Khashoggi and his aide Edward Moss owned the elite Safari Club in Kenya.34 The exclusive club became the first venue for another and more important Safari Club: an alliance between Saudi and other intelligence agencies that wished to compensate for the CIA’s retrenchment in the wake of President Carter’s election and Senator Church’s post-Watergate reforms.35
  • As former Saudi intelligence chief Prince Turki bin Faisal once told Georgetown University alumni, In 1976, after the Watergate matters took place here, your intelligence community was literally tied up by Congress. It could not do anything. It could not send spies, it could not write reports, and it could not pay money. In order to compensate for that, a group of countries got together in the hope of fighting Communism and established what was called the Safari Club. The Safari Club included France, Egypt, Saudi Arabia, Morocco, and Iran.36 Prince Turki’s candid remarks– “your intelligence community was literally tied up by Congress. …. In order to compensate for that, a group of countries got together … and established what was called the Safari Club.” – made it clear that the Safari Club, operating at the level of the deep state, was expressly created to overcome restraints established by political decisions of the public state in Washington (decisions not only of Congress but also of President Carter).
  • Specifically Khashoggi’s activities involving corruption by sex and money, after they too were somewhat curtailed by Senator Church’s post-Watergate reforms, appear to have been taken up quickly by the Bank of Credit and Commerce International (BCCI), a Muslim-owned bank where Khashoggi’s friend and business partner Kamal Adham, the Saudi intelligence chief and a principal Safari Club member, was a part-owner.37 In the 1980s BCCI, and its allied shipping empire owned by the Pakistani Gokal brothers, supplied financing and infrastructure for the CIA’s (and Saudi Arabia’s) biggest covert operation of the decade, support for the Afghan mujahedin. To quote from a British book excerpted in the Senate BCCI Report: “BCCI’s role in assisting the U.S. to fund the Mujaheddin guerrillas fighting the Soviet occupation is drawing increasing attention. The bank’s role began to surface in the mid-1980′s when stories appeared in the New York Times showing how American security operatives used Oman as a staging post for Arab funds. This was confirmed in the Wall Street Journal of 23 October 1991 which quotes a member of the late General Zia’s cabinet as saying ‘It was Arab money that was pouring through BCCI.’ The Bank which carried the money on from Oman to Pakistan and into Afghanistan was National Bank of Oman, where BCCI owned 29%.”38
  • In 1981 Vice-president Bush and Saudi Prince Bandar, working together, won congressional approval for massive new arms sales of AWACS (airborne warning and control system) aircraft to Saudi Arabia. In the $5.5 billion package, only ten percent covered the cost of the planes. Most of the rest was an initial installment on what was ultimately a $200 billion program for military infrastructure through Saudi Arabia.41 It also supplied a slush fund for secret ops, one administered for over a decade in Washington by Prince Bandar, after he became the Saudi Ambassador (and a close friend of the Bush family, nicknamed “Bandar Bush”). In the words of researcher Scott Armstrong, the fund was “the ultimate government-off-the-books.” Not long after the AWACS sale was approved, Prince Bandar thanked the Reagan administration for the vote by honoring a request by William Casey that he deposit $10 million in a Vatican bank to be used in a campaign against the Italian Communist Party. Implicit in the AWACS deal was a pledge by the Saudis to fund anticommunist guerrilla groups in Afghanistan, Angola, and elsewhere that were supported by the Reagan Administration.42 The Vatican contribution, “for the CIA’s long-time clients, the Christian Democratic Party,” of course continued a CIA tradition dating back to 1948.
  • The activities of the Safari Club were exposed after Iranians in 1979 seized the records of the US Embassy in Tehran. But BCCI support for covert CIA operations, including Iran-Contra, continued until BCCI’s criminality was exposed at the end of the decade. Meanwhile, with the election of Ronald Reagan in 1980, Washington resumed off-budget funding for CIA covert operations under cover of arms contracts to Saudi Arabia. But this was no longer achieved through kickbacks to CIA assets like Khashoggi, after Congress in 1977 made it illegal for American corporations to make payments to foreign officials. Instead arrangements were made for payments to be returned, through either informal agreements or secret codicils in the contracts, by the Saudi Arabian government itself. Two successive arms deals, the AWACS deal of 1981 and the al-Yamamah deal of 1985, considerably escalated the amount of available slush funds.
  • It is reported in two books that the BCCI money flow through the Bank of Oman was handled in part by the international financier Bruce Rappaport, who for a decade, like Khashoggi, kept a former CIA officer on his staff.39 Rappaport’s partner in his Inter Maritime Bank, which interlocked with BCCI, was E.P. Barry, who earlier had been a partner in the Florida money-laundering banks of Paul Helliwell.40
  • After a second proposed major U.S. arms sale met enhanced opposition in Congress in 1985 from the Israeli lobby, Saudi Arabia negotiated instead a multi-billion pound long-term contract with the United Kingdom – the so-called al-Yamamah deal. Once again overpayments for the purchased weapons were siphoned off into a huge slush fund for political payoffs, including “hundreds of millions of pounds to the ex-Saudi ambassador to the US, Prince Bandar bin Sultan.”43 According to Robert Lacey, the payments to Prince Bandar were said to total one billion pounds over more than a decade.44 The money went through a Saudi Embassy account in the Riggs Bank, Washington; according to Trento, the Embassy’s use of the Riggs Bank dated back to the mid-1970s, when, in his words, “the Saudi royal family had taken over intelligence financing for the United States.”45 More accurately, the financing was not for the United States, but for the American deep state.
  • This leads me to the most original and important thing I have to say. I believe that these secret funds from BCCI and Saudi arms deals – first Khashoggi’s from Lockheed and then Prince Bandar’s from the AWACS and al-Yamamah deals – are the common denominator in all of the major structural deep events (SDEs) that have afflicted America since the supranational Safari Club was created in l976. I am referring specifically to 1) the covert US intervention in Afghanistan (which started about 1978 as a Safari Club intervention, more than a year before the Russian invasion), 2) the 1980 October Surprise, which together with an increase in Saudi oil prices helped assure Reagan’s election and thus give us the Reagan Revolution, 3) Iran-Contra in 1984-86, 4) and – last but by no means least – 9/11. That is why I believe it is important to analyze these events at the level of the supranational deep state. Let me just cite a few details.
  • 1) the 1980 October Surprise. According to Robert Parry, Alexandre de Marenches, the principal founder of the Safari Club, arranged for William Casey (a fellow Knight of Malta) to meet with Iranian and Israeli representatives in Paris in July and October 1980, where Casey promised delivery to Iran of needed U.S. armaments, in exchange for a delay in the return of the U.S. hostages in Iran until Reagan was in power. Parry suspects a role of BCCI in both the funding of payoffs for the secret deal and the subsequent flow of Israeli armaments to Iran.46 In addition, John Cooley considers de Marenches to be “the Safari Club player who probably did most to draw the US into the Afghan adventure.”47 2) the Iran-Contra scandal (including the funding of the Contras, the illegal Iran arms sales, and support for the Afghan mujahideen There were two stages to Iran-Contra. For twelve months in 1984-85, after meeting with Casey, King Fahd of Saudi Arabia, in the spirit of the AWACS deal, supported the Nicaraguan Contras via Prince Bandar through a BCCI bank account in Miami. But in April 1985, after the second proposed arms sale fell through, McFarlane, fearing AIPAC opposition, terminated this direct Saudi role. Then Khashoggi, with the help of Miles Copeland, devised a new scheme in which Iranian arms sales involving Israel would fund the contras. The first stage of Iran-Contra was handled by Prince Bandar through a BCCI account in Miami; the second channel was handled by Khashoggi through a different BCCI account in Montecarlo. The Kerry-Brown Senate Report on BCCI also transmitted allegations from a Palestinian-American businessman, Sam Bamieh, that Khashoggi’s funds from BCCI for arms sales to Iran came ultimately from King Fahd of Saudi Arabia, who “was hoping to gain favor with Ayatollah Ruhollah Khomeini.”48
  • 3) 9/11 When the two previously noted alleged hijackers or designated culprits, al-Mihdhar and al-Hazmi, arrived in San Diego, a Saudi named Omar al-Bayoumi both housed them and opened bank accounts for them. Soon afterwards Bayoumi’s wife began receiving monthly payments from a Riggs bank account held by Prince Bandar’s wife, Princess Haifa bint Faisal.49 In addition, Princess Haifa sent regular monthly payments of between $2,000 and $3,500 to the wife of Osama Basnan, believed by various investigators to be a spy for the Saudi government. In all, “between 1998 and 2002, up to US $73,000 in cashier cheques was funneled by Bandar’s wife Haifa … – to two Californian families known to have bankrolled al-Midhar and al-Hazmi.”50 Although these sums in themselves are not large, they may have been part of a more general pattern. Author Paul Sperry claims there was possible Saudi government contact with at least four other of the alleged hijackers in Virginia and Florida. For example, “9/11 ringleader Mohamed Atta and other hijackers visited s home owned by Esam Ghazzawi, a Saudi adviser to the nephew of King Fahd.”51
  • But it is wrong to think of Bandar’s accounts in the Riggs Bank as uniquely Saudi. Recall that Prince Bandar’s payments were said to have included “a suitcase containing more than $10 million” that went to a Vatican priest for the CIA’s long-time clients, the Christian Democratic Party.52 In 2004, the Wall Street Journal reported that the Riggs Bank, which was by then under investigation by the Justice Department for money laundering, “has had a longstanding relationship with the Central Intelligence Agency, according to people familiar with Riggs operations and U.S. government officials.”53 Meanwhile President Obiang of Equatorial Guinea “siphoned millions from his country’s treasury with the help of Riggs Bank in Washington, D.C.”54 For this a Riggs account executive, Simon Kareri, was indicted. But Obiang enjoyed State Department approval for a contract with the private U.S. military firm M.P.R.I., with an eye to defending offshore oil platforms owned by ExxonMobil, Marathon, and Hess.55 Behind the CIA relationship with the Riggs Bank was the role played by the bank’s overseas clients in protecting U.S. investments, and particularly (in the case of Saudi Arabia and Equatorial Guinea), the nation’s biggest oil companies.
  • The issue of Saudi Embassy funding of at least two (and possibly more) of the alleged 9/11 hijackers (or designated culprits) is so sensitive that, in the 800-page Joint Congressional Inquiry Report on 9/11, the entire 28-page section dealing with Saudi financing was very heavily redacted.56 A similar censorship occurred with the 9/11 Commission Report: According to Philip Shenon, several staff members felt strongly that they had demonstrated a close Saudi government connection to the hijackers, but a senior staff member purged almost all of the most serious allegations against the Saudi government, and moved the explosive supporting evidence to the report’s footnotes.57 It is probable that this cover-up was not designed for the protection of the Saudi government itself, so much as of the supranational deep state connection described in this essay, a milieu where American, Saudi, and Israeli elements all interact covertly. One sign of this is that Prince Bandar himself, sensitive to the anti-Saudi sentiment that 9/11 caused, has been among those calling for the U.S. government to make the redacted 28 pages public.58
  • This limited exposure of the nefarious use of funds generated from Saudi arms contracts has not created a desire in Washington to limit these contracts. On the contrary, in 2010, the second year of the Obama administration, The Defense Department … notified Congress that it wants to sell $60 billion worth of advanced aircraft and weapons to Saudi Arabia. The proposed sale, which includes helicopters, fighter jets, radar equipment and satellite-guided bombs, would be the largest arms deal to another country in U.S. history if the sale goes through and all purchases are made.59 The sale did go through; only a few congressmen objected.60 The deep state, it would appear, is alive and well, and impervious to exposures of it. It is clear that for some decades the bottom-upwards processes of democracy have been increasingly supplanted by the top-downwards processes of the deep state.
  • But the deeper strain in history, I would like to believe, is in the opposite direction: the ultimate diminution of violent top-down forces by the bottom-up forces of an increasingly integrated civil society.61 In the last months we have had Wikileaks, then Edward Snowden, and now the fight between the CIA and its long-time champion in Congress, Dianne Feinstein. It may be time to see a systemic correction, much as we did after Daniel Ellsberg’s release of the Pentagon Papers, which was followed by Watergate and the Church Committee reforms. I believe that to achieve this correction there must be a better understanding of deep events and of the deep state. Ultimately, however, whether we see a correction or not will depend, at least in part, on how much people care.
Paul Merrell

Legally required video surveillance - The Washington Post - 1 views

  • Chicago Mayor Rahm Emanuel has proposed an ordinance that would compel all gun dealers to video-record sales (“to discourage traffickers and buyers who use false identification”). Presumably the video recordings would have to be kept for an extended time, since future investigations that would use the video recordings could happen years after the sale. A similar New York state bill would require that the videos be kept for one year. Likewise, two weeks ago, Minnesota enacted a law — with much less fanfare — that would require video- or photo recording of people who come to sell cellular phones, with each recording to be kept for at least 30 days:
  • The ostensible focus of the law is on people who sell the phones (presumably in order to deter phone theft), but any video cameras — which “must be turned on at all times” — will also capture all cell phone buyers as well. The Center for Democracy & Technology has more on this statute. Likewise, last year, Minnesota enacted a similar law applicable to people who sell scrap vehicles, presumably aimed at sellers of stolen vehicles. I suspect that, especially if the gun sales videorecording bills are enacted, similar laws will be proposed for sales of alcohol (which is often sold to underage buyers who have fake IDs, or to straw purchasers who are buying on behalf of an underage buyer), for sales of marijuana in places where it has been legalized, for sales of legal substances that are nonetheless potential drug or bomb precursors, and so on.
  •  
    And of course it's only a hop from the video surveillance database to the facial recognition database. This is straight out of George Orwell's "1984" novel. Big Brother wants to watch you at all times, whether your conduct is legal or not. But note that because these measures do not discriminate between the lawful and unlawful conduct there's a strong argument that a prohibited Fourth Amendment search and seizure is involved, without particularized suspicion of a particular crime, i.e., without "probable cause." 
Gary Edwards

Obama's Ersatz Capitalism: Joseph Stiglitz "Heads i win, tales the taxpayer loses" Oba... - 0 views

  •  
    Paying fair market values for the assets will not work. Only by overpaying for the assets will the banks be adequately recapitalized. But overpaying for the assets simply shifts the losses to the government. In other words, the Geithner plan works only if and when the taxpayer loses big time. Some Americans are afraid that the government might temporarily "nationalize" the banks, but that option would be preferable to the Geithner plan. After all, the F.D.I.C. has taken control of failing banks before, and done it well. It has even nationalized large institutions like Continental Illinois (taken over in 1984, back in private hands a few years later), and Washington Mutual (seized last September, and immediately resold). What the Obama administration is doing is far worse than nationalization: it is ersatz capitalism, the privatizing of gains and the socializing of losses. It is a "partnership" in which one partner robs the other. And such partnerships - with the private sector in control - have perverse incentives, worse even than the ones that got us into the mess. So what is the appeal of a proposal like this? Perhaps it's the kind of Rube Goldberg device that Wall Street loves - clever, complex and nontransparent, allowing huge transfers of wealth to the financial markets. It has allowed the administration to avoid going back to Congress to ask for the money needed to fix our banks, and it provided a way to avoid nationalization. But we are already suffering from a crisis of confidence. When the high costs of the administration's plan become apparent, confidence will be eroded further. At that point the task of recreating a vibrant financial sector, and resuscitating the economy, will be even harder.
Paul Merrell

The Vineyard of the Saker: Mikhail Khazin Q&A with the Saker Community - 0 views

  • t is a huge pleasure, and honor, for me to present you today with the Q&A between Mikhail Khazin and the Saker Community.  For those who might have missed it, here it is (including a biography of Mr Khazin): http://vineyardsaker.blogspot.com/2014/10/exclusive-mikhail-khazin-q-with-saker.html
  • Considering the importance of this document, I have decided to try to make it as easy to access, copy and distribute as possible.  First, I have made it available in 4 formats: ODT, PDF, HTML and DOCX.  Second, I have uploaded it to both the Internet Archive and Mediafire.  Here are the links: https://archive.org/details/KhazinQAENFinal https://www.mediafire.com/#t713dfdpadk0z Third, you will find below the text pasted in from the HTML file.
  •  
    This is a must-read if you want to learn about Russia's internal politics as they affect Russian economic foreign policy.  There is a video of a roundtable discussion including Khazin touching on the same topics here. http://goo.gl/3E4QWL (I've borrowed the clip below from that page.) Mikhail Khazin is a mathematician and economist in Russia (graduated from Moscow State University in 1984). After working in various government and banking positions, he was discharged from his position as Deputy Chief of the Economic Directorate for attempting to fight corruption during Russia's failed experiment at privatization in 1997. Since 2000, he has worked as a consultant. He's an acquaintance of President Putin and is well informed of Kremlin politics, including the behind-the-scenes power struggles.  Besides being an expert economist, he seems to have a knack for predicting major world events. In 2000 he predicted the 2008 economic collapse (having previously predicted Russia's 1998 default). Then, on 10 September 2001, he predicted large-scale, U.S.-organized terror attacks as a cover for the States' economic deterioration. Now, in August of this year he predicted the end of a period of consumption stimulated by credit and a fresh round of bankruptcies and unemployment in the last quarter of 2014.  Back in September he had this to say about the current 'dollar economy': "There is nothing we will gain anymore from the dollar model. It's run dry."
Gary Edwards

The Empire Takes a Hit: NSA Update - 2 views

........................................................................................ NSA Conversation with retired lawyer and Open Source legal expert, "Marbux". ...........................

Federal-Reserve-Bankster-Cartel NSA

started by Gary Edwards on 15 Jun 13 no follow-up yet
Paul Merrell

Asia Times Online :: Orwell does America - 0 views

  • Welcome to the sweet abyss of an Orwellian vortex. 2013 increasingly looks like 1984. In two previous articles, for RT RT and for Asia Times Online I have looked into the superimposed levels of blowback implied by the Boston bombing. With still so many unanswered questions regarding what took place on the ground in Boston after the bombing, it's time to look at an extra, possible Top Ten list of lingering absurdities. And this without sidestepping other unanswered crucial questions, such as why a bomb drill - organized by Craft - was going on during the marathon at which the bombing took place; and why it was <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> vehemently denied that a bomb drill was going on. For this current set of questions, I'm grateful for the help of Asia Times Online's Bostonian readers.
  • 2. Since 9/11, the preferred FBI modus operandi is to use informants to lure ''potential'' terra-rists to act. See for example the Fast and Furious<-style Iran cum Mexican cartel plot. There's a strong possibility the Tsarnaev brothers were set up. In this case, is there anyone anywhere among the vast US intel apparatus investigating the FBI investigators?
  • 4. A Saudi student, injured at the bombing, who was in the US via a legal student visa, is suddenly deported on ''national security grounds'', even as investigators found ''unusual burns'' on his hand inconsistent with the injuries of other victims. He may have been a member of a Saudi clan notorious for its al-Qaeda connections. The FBI ''investigation'' is suddenly dropped shortly after the Saudi ambassador in the US held an unscheduled meeting with President Barack Obama. Add to it that even before the smoke had cleared, the Israel Lobby and the notorious disinformation website DEBKA were pointing their fingers at ''domestic terrorists with Middle East connections''.
  • ...3 more annotations...
  • 5. The description of the car hijacked by the brothers, a Mercedes E350 SUV, matches the description of their car left at a service station in Cambridge for two weeks prior to the bombing. A mechanic in Cambridge said Dzhokhar, Tamerlan's brother, picked up his "black Mercedes SUV" on Tuesday, the day after the marathon. The two cars may be one and the same; that blows up the whole official ''carjacking'' narrative. 6. Additionally, there's a media blackout on the owner of the allegedly hijacked Mercedes, who in theory managed to escape and call the police, who maintains that the brothers went to three ATMs and withdrew US$800 from his account - not before telling him they were the ''marathon bombers and had killed an MIT police''. The driver said he was let off at a gas station on Memorial Drive in Cambridge. But some witnesses saw Dzhokhar at the station's convenience store - without any driver. Then the narrative of the brothers robbing a convenience store was revealed to be false. Police scanners referred to a "black top" person. Still, the official narrative is that the Tsarnaev brothers were at the same place and the same time of the robbery.
  • 9. The whole law enforcement apparatus insisted that there was a heavy exchange of gunfire with Dzokhar while he was hiding in a boat, before his arrest. That is false. He was unarmed, barely moving and the hail of bullets towards the boat came from the police.
  • Do the martial dance What the day-long delay in Dzhokhar's arrest indeed made possible was to turn Watertown into a monster dry run for urban martial law - euphemized as ''lockdown'' - in a very near future. As total militarization of civilian life goes - featuring, for instance, Homeland Security running amok with hundreds of armored vehicles - this was a major success. Meanwhile, on the ''legal'' front, the White House and the Justice Department are firmly on track to finally suppress the Miranda warning; that went into effect already two years ago, when an Obama secret executive order ruled the Miranda warning would not apply to suspected terrorists. Dzhokhar is a ''suspected'' terrorist - now charged with using and conspiring to use a weapon of mass destruction, yet already convicted by corporate media. Welcome to Police State USA - where at least everyone still has the right to go out shopping. For now.
Paul Merrell

Britain has passed the 'most extreme surveillance law ever passed in a democracy' | ZDNet - 0 views

  • It's 2016 going on 1984. The UK has just passed a massive expansion in surveillance powers, which critics have called "terrifying" and "dangerous".
  • The new law, dubbed the "snoopers' charter", was introduced by then-home secretary Theresa May in 2012, and took two attempts to get passed into law following breakdowns in the previous coalition government. Four years and a general election later -- May is now prime minister -- the bill was finalized and passed on Wednesday by both parliamentary houses. But civil liberties groups have long criticized the bill, with some arguing that the law will let the UK government "document everything we do online". It's no wonder, because it basically does. The law will force internet providers to record every internet customer's top-level web history in real-time for up to a year, which can be accessed by numerous government departments; force companies to decrypt data on demand -- though the government has never been that clear on exactly how it forces foreign firms to do that that; and even disclose any new security features in products before they launch.
  • Not only that, the law also gives the intelligence agencies the power to hack into computers and devices of citizens (known as equipment interference), although some protected professions -- such as journalists and medical staff -- are layered with marginally better protections. In other words, it's the "most extreme surveillance law ever passed in a democracy," according to Jim Killock, director of the Open Rights Group. The bill was opposed by representatives of the United Nations, all major UK and many leading global privacy and rights groups, and a host of Silicon Valley tech companies alike. Even the parliamentary committee tasked with scrutinizing the bill called some of its provisions "vague".
  • ...1 more annotation...
  • And that doesn't even account for the three-quarters of people who think privacy, which this law almost entirely erodes, is a human right. There are some safeguards, however, such as a "double lock" system so that the secretary of state and an independent judicial commissioner must agree on a decision to carry out search warrants (though one member of the House of Lords disputed that claim). A new investigatory powers commissioner will also oversee the use of the powers. Despite the uproar, the government's opposition failed to scrutinize any significant amendments and abstained from the final vote. Killock said recently that the opposition Labour party spent its time "simply failing to hold the government to account". But the government has downplayed much of the controversy surrounding the bill. The government has consistently argued that the bill isn't drastically new, but instead reworks the old and outdated Regulation of Investigatory Powers Act (RIPA). This was brought into law in 2000, to "legitimize" new powers that were conducted or ruled on in secret, like collecting data in bulk and hacking into networks, which was revealed during the Edward Snowden affair. Much of those activities were only possible thanks to litigation by one advocacy group, Privacy International, which helped push these secret practices into the public domain while forcing the government to scramble to explain why these practices were legal. The law will be ratified by royal assent in the coming weeks.
Paul Merrell

First Unitarian Church of Los Angeles v. NSA | Electronic Frontier Foundation - 0 views

  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • The case challenges the mass telephone records collection that was confirmed by the FISA Order that was published on June 5, 2013 and confirmed by the Director of National Intelligence (DNI) on June 6, 2013. The DNI confirmed that the collection was “broad in scope” and conducted under the “business records” provision of the Foreign Intelligence Surveillance Act, also known as section 215 of the Patriot Act and 50 U.S.C. section 1861. The facts have long been part of EFF’s Jewel v. NSA case. The case does not include section 702 programs, which includes the recently made public and called the PRISM program or the fiber optic splitter program that is included (along with the telephone records program) in the Jewel v. NSA case. 
  • ...5 more annotations...
  • Our goal is to highlight one of the most important ways that the government collection of telephone records is unconstitutional: it violates the First Amendment right of association. When the government gets access to the phone records of political and activist organizations and their members, it knows who is talking to whom, when, and for how long. This so-called “metadata,” especially when collected in bulk and aggregated, tracks the associations of these organizations. After all, if the government knows that you call the Unitarian Church or Calguns or People for the American Way or Students for Sensible Drug Policy regularly, it has a very good indication that you are a member and it certainly knows that you associate regularly. The law has long recognized that government access to associations can create a chilling effect—people are less likely to associate with organizations when they know the government is watching and when the government can track their associations. 
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • The First Amendment right of association is a well established doctrine that prevents the government “interfering with the right to peaceably assemble or prohibit the petition for a governmental redress of grievances.” The most famous case embracing it is a 1958 Supreme Court Case from the Civil Rights era called  NAACP v. Alabama. In that case the Supreme Court held that it would violate the First Amendment for the NAACP to have to turn over its membership lists in litigation. The right stems from the simple fact that the First Amendment protects the freedom to associate and express political views as a group. This constitutional protection is critical because, as the court noted “[e]ffective advocacy of both public and private points of view, particularly controversial ones, is undeniably enhanced by group association[.]” NAACP v. Alabama, 357 U.S. at 460. As another court noted: the Constitution protects freedom of association to encourage the “advancing ideas and airing grievances” Bates v. City of Little Rock, 361 U.S. 516, 522-23 (1960).
  • The collection and analysis of telephone records give the government a broad window into our associations. The First Amendment protects against this because, as the Supreme Court has recognized, “it may induce members to withdraw from the association and dissuade others from joining it because of fear of exposure of their beliefs shown through their associations and of the consequences of their exposure.” NAACP v. Alabama, 357 U.S. at 462-63. See also Bates, 361 U.S. at 523; Gibson v. Florida Legislative Investigation Comm., 372 U.S. 539 (1963).  Privacy in one’s associational ties is also closely linked to freedom of association: “Inviolability of privacy in group association may in many circumstances be indispensable to preservation of freedom of association, particularly where a group espouses dissident beliefs.” NAACP v. Alabama, 357 U.S. at 462. 
  • The Supreme Court has made clear that infringements on freedom of association may survive constitutional scrutiny only when they “serve compelling state interests, unrelated to the suppression of ideas, that cannot be achieved through means significantly less restrictive of associational freedoms.” Roberts v. United States Jaycees, 468 U.S. 609, 623 (1984); see also NAACP v. Button, 371 U.S. at 341; Knox v. SEIU, Local 1000, 132 S. Ct. 2277, 2291 (2012)  Here, the wholesale collection of telephone records of millions of innocent Americans’ communications records, and thereby collection of their associations, is massively overbroad, regardless of the government’s interest. Thus, the NSA spying program fails under the basic First Amendment tests that have been in place for over fifty years.
  •  
    This case is related to EFF's earlier pending case, Jewel v. NSA and has been assigned to Judge Whyte, the same judge who ruled earlier in Jewel that the State Secrets Privilege does not apply to NSA's call metadata "haystack." The plaintiffs are 22 different groups who would make strange bedfellows indeed, except in opposition to government surveillance and repression. 
Paul Merrell

Obama's Lies, NSA Spies, and the Sons of Liberty: Will You Choose Dangerous Freedom or ... - 0 views

  • After such a 1984-esque send-up, it doesn’t even really matter what else Obama had to say in his speech about NSA reforms and the like. Rest assured, it was largely a pack of lies. Mind you, Obama said it eloquently enough and interspersed it with all the appropriately glib patriotic remarks about individual freedom and the need to defend the Constitution and securing the life of our nation while preserving our liberties. After all, Obama has proven to be very good at saying one thing and doing another, whether it’s insisting that “you can keep your health care plan,” that he’ll close Guantanamo, or that his administration’s controversial drone strikes only target terrorists and not civilians. When it comes to the NSA, Obama has been lying to the American people for quite some time now. There was the time he claimed the secret FISA court is “transparent.” Then he insisted that “we don’t have a domestic spying program.” And then, to top it all off, he actually insisted there was no evidence the NSA was “actually abusing” its power. As David Sirota writes for Salon: “it has now become almost silly to insinuate or assume that the president hasn’t also been lying. Why? Because if that’s true — if indeed he hasn’t been deliberately lying — then it means he has been dangerously, irresponsibly and negligently ignorant of not only the government he runs, but also of the news breaking around him.”
  • So in terms of Obama’s latest speech on the NSA, if you read between the lines—or just ignore the president’s words and pay attention to his actions—it’s clear that nothing is going to change. The NSA will continue to abuse its power by spying on Americans’ phone calls and emails. They will continue to collect metadata on our various communications and activities. And they will continue to carry out their surveillance in secret, with no attempts at transparency or accountability. The NSA will do so, no matter what Obama claims to the contrary, because this black ops-funded agency whose very existence is abhorrent to the Constitution has become a power unto itself. They no longer work for us or for the president, for that matter. He works for them. Remember, Obama is the chief executive of a super secretive surveillance state whose overarching purpose is to remain in power by any means available. As such, he and his surveillance state cohorts have far more in common with King George and the British government of his day than with the American colonists who worked hard to foment a rebellion and overthrow a despotic regime.
  • Indeed, Obama and his speechwriters would do well to brush up on their history. In doing so, they will find that the Sons of Liberty, the “small, secret surveillance committee” they conveniently liken to the NSA, was in fact an underground, revolutionary movement that fought the established government of its day, whose members were considered agitators, traitors and terrorists not unlike Edward Snowden.
Paul Merrell

Yahoo webcam images from millions of users intercepted by GCHQ | World news | The Guardian - 0 views

  • Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally.Yahoo reacted furiously to the webcam interception when approached by the Guardian. The company denied any prior knowledge of the program, accusing the agencies of "a whole new level of violation of our users' privacy".
  • GCHQ does not have the technical means to make sure no images of UK or US citizens are collected and stored by the system, and there are no restrictions under UK law to prevent Americans' images being accessed by British analysts without an individual warrant.The documents also chronicle GCHQ's sustained struggle to keep the large store of sexually explicit imagery collected by Optic Nerve away from the eyes of its staff, though there is little discussion about the privacy implications of storing this material in the first place.
  • "Face detection has the potential to aid selection of useful images for 'mugshots' or even for face recognition by assessing the angle of the face," it reads. "The best images are ones where the person is facing the camera with their face upright."The agency did make efforts to limit analysts' ability to see webcam images, restricting bulk searches to metadata only.However, analysts were shown the faces of people with similar usernames to surveillance targets, potentially dragging in large numbers of innocent people. One document tells agency staff they were allowed to display "webcam images associated with similar Yahoo identifiers to your known target".Optic Nerve was based on collecting information from GCHQ's huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA's XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo's webcam traffic.
  • ...3 more annotations...
  • Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.The system, eerily reminiscent of the telescreens evoked in George Orwell's 1984, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs.Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds, partly to comply with human rights legislation, and also to avoid overloading GCHQ's servers. The documents describe these users as "unselected" – intelligence agency parlance for bulk rather than targeted collection.One document even likened the program's "bulk access to Yahoo webcam images/events" to a massive digital police mugbook of previously arrested individuals.
  • Programs like Optic Nerve, which collect information in bulk from largely anonymous user IDs, are unable to filter out information from UK or US citizens. Unlike the NSA, GCHQ is not required by UK law to "minimize", or remove, domestic citizens' information from its databases. However, additional legal authorisations are required before analysts can search for the data of individuals likely to be in the British Isles at the time of the search.There are no such legal safeguards for searches on people believed to be in the US or the other allied "Five Eyes" nations – Australia, New Zealand and Canada.
  • The documents also show that GCHQ trialled automatic searches based on facial recognition technology, for people resembling existing GCHQ targets: "[I]f you search for similar IDs to your target, you will be able to request automatic comparison of the face in the similar IDs to those in your target's ID".
Paul Merrell

As Federal Prison Population Spiked 790 Percent, Average Drug Sentences Doubled | Think... - 0 views

  • The federal prison population has ballooned 790 percent since 1980, and almost half of those now imprisoned are there for drugs. In the coming years, the Bureau of Prisons projects that prison overcrowding will get even worse. While federal prisons are now 35 to 40 percent over capacity, they are expected by 2023 to reach 55 percent over capacity without a policy change, according to a new report by the Urban Institute. The prison population explosion was not driven primarily by a spike in crime, but by a change in punishment. Over a 25-year period, average drug sentences doubled from 38.5 months in 1984 to 74 months in 2011. And over a similar period, the percentage of convicted federal offenders sentenced to prison spiked from 50 percent in 1986 to 90 percent in 2011. Before the passage of several draconian laws that impose mandated harsh sentences and remove judicial discretion, many offenders received probation or a fine for the same violations.
  • Now, public officials are among those looking for a solution. And the Urban Institute found that, while no one policy change will be enough to cure the inmate population explosion, the one single thing that could have the greatest impact is reforming mandatory minimum sentences. “Cutting mandatory minimums in half could save almost $2.5 billion in 10 years,” Urban Institute Senior Fellow Julie Samuels writes. “This measure alone would reduce overcrowding to the lowest it has been in decades.” There are now several bipartisan mandatory minimum bills pending in both houses of Congress. And the bipartisan momentum has never been greater, with even the world’s largest association of corrections officials and the conservative American Legislative Exchange Council urging mandatory minimum reform.
  •  
    Life in the "land of the free." Five per cent of the world's population, but  25 per cent of the world's incarcerated prisoners. Drug legalization and release of all prisoners convicted of drug crimes not involving violence would do far more to bring some order to this mess.  But the desire to regulate seems irresistible, particularly when it serves as very thin cover for racial repression. Never mind that legalization would also end the drug war raging in Mexico.  "But we can't legalize immoral behavior." "Would you prefer that people buy their drugs from a government dispensary or from the kid down the block, you know, the one with the AK-47?"  
Paul Merrell

How a Court Secretly Evolved, Extending U.S. Spies' Reach - NYTimes.com - 0 views

  • Previously, with narrow exceptions, an intelligence agency was permitted to disseminate information gathered from court-approved wiretaps only after deleting irrelevant private details and masking the names of innocent Americans who came into contact with a terrorism suspect. The Raw Take order significantly changed that system, documents show, allowing counterterrorism analysts at the N.S.A., the F.B.I. and the C.I.A. to share unfiltered personal information.
  • The leaked documents that refer to the rulings, including one called the “Large Content FISA” order and several more recent expansions of powers on sharing information, add new details to the emerging public understanding of a secret body of law that the court has developed since 2001. The files help explain how the court evolved from its original task — approving wiretap requests — to engaging in complex analysis of the law to justify activities like the bulk collection of data about Americans’ emails and phone calls.“These latest disclosures are important,” said Steven Aftergood, the director of the Project on Government Secrecy at the Federation of American Scientists. “They indicate how the contours of the law secretly changed, and they represent the transformation of the Foreign Intelligence Surveillance Court into an interpreter of law and not simply an adjudicator of surveillance applications.”
  • The number of Americans whose unfiltered personal information has been shared among agencies is not clear. Since the Sept. 11 attacks, the court has approved about 1,800 FISA orders each year authorizing wiretaps or physical searches — which can involve planting bugs in homes or offices, or copying hard drives — inside the United States. But the government does not disclose how many people had their private conversations monitored as a result.
  • ...2 more annotations...
  • The new disclosures come amid a debate over whether the surveillance court, which hears arguments only from the Justice Department, should be restructured for its evolving role. Proposals include overhauling how judges are selected to serve on it and creating a public advocate to provide adversarial arguments when the government offers complex legal analysis for expanding its powers.
  • The Raw Take order, back in 2002, also relaxed limits on sharing private information about Americans with foreign governments. The bar was higher for sharing with outsiders: Raw information was not provided, and even information deemed relevant about a terrorism issue required special approval. Under procedures described in a 1984 report, only the attorney general could authorize such dissemination. But on Aug. 20, 2002, Attorney General John Ashcroft, citing the recent order, secretly issued new procedures allowing the N.S.A. to provide information to foreign governments without his clearance. “If the proposed recipient(s) of the dissemination have a history of human rights abuses, that history should be considered in assessing the potential for economic injury, physical harm, or other restriction of movement, and whether the dissemination should be made,” he wrote.
  •  
    NYT publishes a new treasure trove of Snowden documents. This lead article links to documents and links to other articles that link documents. A must-read for those interested in how the FISA Court and Congress "grew" the law governing the scope of permissible surveillance and the scope of who would be given access to the fruits of that surveillance. 
Paul Merrell

United States v. Verdugo-Urquidez, 494 US 259 - Supreme Court 1990 - Google Scholar - 1 views

  • Before analyzing the scope of the Fourth Amendment, we think it significant to note that it operates in a different manner than the Fifth Amendment, which is not at issue in this case. The privilege against self-incrimination guaranteed by the Fifth Amendment is a fundamental trial right of criminal defendants. See Malloy v. Hogan, 378 U. S. 1 (1964). Although conduct by law enforcement officials prior to trial may ultimately impair that right, a constitutional violation occurs only at trial. Kastigar v. United States, 406 U. S. 441, 453 (1972). The Fourth Amendment functions differently. It prohibits "unreasonable searches and seizures" whether or not the evidence is sought to be used in a criminal trial, and a violation of the Amendment is "fully accomplished" at the time of an unreasonable governmental intrusion. United States v. Calandra, 414 U. S. 338, 354 (1974); United States v. Leon, 468 U. S. 897, 906 (1984).
Gary Edwards

Feds confiscate investigative reporter's confidential files during raid | The Daily Caller - 3 views

  • A veteran Washington D.C. investigative journalist says the Department of Homeland Security confiscated a stack of her confidential files during a raid of her home in August — leading her to fear that a number of her sources inside the federal government have now been exposed. In an interview with The Daily Caller, journalist Audrey Hudson revealed that the Department of Homeland Security and Maryland State Police were involved in a predawn raid of her Shady Side, Md. home on Aug. 6. Hudson is a former Washington Times reporter and current freelance reporter. A search warrant obtained by TheDC indicates that the August raid allowed law enforcement to search for firearms inside her home.
  • But without Hudson’s knowledge, the agents also confiscated a batch of documents that contained information about sources inside the Department of Homeland Security and the Transportation Security Administration, she said. Outraged over the seizure, Hudson is now speaking out. She said no subpoena for the notes was presented during the raid and argues the confiscation was outside of the search warrant’s parameter. “They took my notes without my knowledge and without legal authority to do so,” Hudson said this week. “The search warrant they presented said nothing about walking out of here with a single sheet of paper.”
  • After the search began, Hudson said she was asked by an investigator with the Coast Guard Investigative Service if she was the same Audrey Hudson who had written a series of critical stories about air marshals for The Washington Times over the last decade. The Coast Guard operates under the Department of Homeland Security.
  •  
    If reality is as stated, the reporter has a pretty strong civil rights case against the government officials who knowingly participated in the theft and retention of the reporter's notes, two distinct conspiracies. Under the 4th Amendment, officers executing a search and seizure warrant may lawfully seize the items particularly described in the warrant and any other evidence of crime that is in plain view during the search. It's a big push of credibility to argue that reading documents stored in a bag in search for a gun falls within the "plain view" doctrine. The officer could instead just reach his hand into the bag and feel around for a gun. Quite a few extra steps involved in removing the documents and reading them simply to determine whether the bag contains a gun. Add in the facts that: [i] the supposed recognition of government documents argument does not explain why the officers seized personal handwritten notes too; and [ii] the evidence that the officer who discovered the docs had learned that the reporter was one who had called the conduct of his agency into question, and it comes out smelling a lot more like an attempt to discover the reporters' sources than a legitimate search for guns when the bag was searched.   Only one side heard from so far, of course. But this sounds more like low-level government officials who were ignorant of their legal obligations than a White House-driven scandal. But I wouldn't want to be the government lawyer who authorized the retention of the seized notes and other documents. They should have been returned without retaining copies the instant the lawyer learned of the circumstances of their seizure. There's not only a 4th Amendment liberty interest but also a 1st Amendment freecdom to communicate anonymously right protecting those documents and notes. 
  • ...1 more comment...
  •  
    I listened to an interview with Audrey Hudson last night. It seems to me the key fact is in this clip; "But without Hudson's knowledge, the agents also confiscated a batch of documents that contained information about sources inside the Department of Homeland Security and the Transportation Security Administration, she said." Audrey had written a series of articles describing how the Homeland Security and Transportation agency had been lying about air marshalls and the post 911 program to secure passenger flights. The documents that were stolen listed her sources - the whistle blowers inside the Homeland Security administration who leaked information about the lies and the many problems with the program that the Obama administration was covering up. This sounds to me like another example of Obama hunting down and persecuting whistleblowers. A direct violation of the 1989 - 2007 Whistleblower Protection Act. Not surprisingly, Ms Hudson had not tried to contact any of her whistleblowing sources for fear that the NSA would be watching and that this persecution would happen. Interestingly, the warrant was to seize a "potato launcher". No kidding! It seems Ms. Hudson's husband had, at one time been a licensed arms dealer. He lost that license having sold a gun with faulty paperwork. This event had occurred years earlier, and Mr. Hudson had long since moved on and was currently working for the Coast Guard as an outside contractor/consultant. So they seized the toy "potato launcher", as described in the warrant. But they also ransacked the home looking for the key documents that listed Ms Hudson's inside Homeland Security sources behind her air marshal scandal articles. These documents were the only items seized - other than the "potato launcher" that was the only item listed in the warrant. Seems we've been here before. From wikipedia, the story of Friedrich Gustav Emil Martin Niemöller: ........................... Arrested on 1 July 1937, N
  •  
    "But without Hudson's knowledge, the agents also confiscated a batch of documents that contained information about sources inside the Department of Homeland Security and the Transportation Security Administration, she said."
  •  
    What troubles me the most about this event, assuming the truth of what's reported, is how well known the limitations on execution of a search warrant are within the law enforcement community. If it happened as described, it seems very unlikely that the officer who grabbed the documents did not know he was violating the 4th Amendment. Ditto for the lawyer or other official(s) who learned of what went down shortly thereafter, but kept the documents anyway. There's an arrogance that goes with government and corporate officials who don't have to personally pay damage awards. With no personal monetary liability (in reality, since the government or corporation picks up the tab), it becomes a matter of personal ethics and whether the misbehavior will anger or please the boss. If the ethics are weak, that becomes a pretty simple choice.
Paul Merrell

CISPA is back! - 0 views

  • OPERATION: Fax Big Brother Congress is rushing toward a vote on CISA, the worst spying bill yet. CISA would grant sweeping legal immunity to giant companies like Facebook and Google, allowing them to do almost anything they want with your data. In exchange, they'll share even more of your personal information with the government, all in the name of "cybersecurity." CISA won't stop hackers — Congress is stuck in 1984 and doesn't understand modern technology. So this week we're sending them thousands of faxes — technology that is hopefully old enough for them to understand. Stop CISA. Send a fax now!
  • (Any tweet w/ #faxbigbrother will get faxed too!) Your email is only shown in your fax to Congress. We won't add you to any mailing lists.
  • CISA: the dirty deal between government and corporate giants. It's the dirty deal that lets much of government from the NSA to local police get your private data from your favorite websites and lets them use it without due process. The government is proposing a massive bribe—they will give corporations immunity for breaking virtually any law if they do so while providing the NSA, DHS, DEA, and local police surveillance access to everyone's data in exchange for getting away with crimes, like fraud, money laundering, or illegal wiretapping. Specifically it incentivizes companies to automatically and simultaneously transfer your data to the DHS, NSA, FBI, and local police with all of your personally-indentifying information by giving companies legal immunity (notwithstanding any law), and on top of that, you can't use the Freedom of Information Act to find out what has been shared.
  • ...1 more annotation...
  • The NSA and members of Congress want to pass a "cybersecurity" bill so badly, they’re using the recent hack of the Office of Personnel Management as justification for bringing CISA back up and rushing it through. In reality, the OPM hack just shows that the government has not been a good steward of sensitive data and they need to institute real security measures to fix their problems. The truth is that CISA could not have prevented the OPM hack, and no Senator could explain how it could have. Congress and the NSA are using irrational hysteria to turn the Internet into a place where the government has overly broad, unchecked powers. Why Faxes? Since 2012, online and civil liberties groups and 30,000+ sites have driven more than 2.6 million emails and hundreds of thousands of calls, tweets and more to Congress opposing overly broad cybersecurity legislation. Congress has tried to pass CISA in one form or another 4 times, and they were beat back every time by people like you. It's clear Congress is completely out of touch with modern technology, so this week, as Congress rushes toward a vote on CISA, we are going to send them thousands of faxes, a technology from the 1980s that is hopefully antiquated enough for them to understand. Sending a fax is super easy — you can use this page to send a fax. Any tweet with the hashtag #faxbigbrother will get turned into a fax to Congress too, so what are you waiting for? Click here to send a fax now!
Paul Merrell

Investigative Reporter Robert Parry to receive I.F. Stone Medal for Journalistic Indepe... - 0 views

  • In recognition of a career distinguished by meticulously researched investigations, intrepid questioning and reporting that has challenged both conventional wisdom and mainstream media, the Nieman Foundation for Journalism at Harvard will present journalist Robert Parry with the 2015 I.F. Stone Medal for Journalistic Independence during a ceremony in Cambridge, Mass., on Oct. 22, 2015.
  • Parry established the website, consortiumnews.com in 1995 as the first investigative news magazine on the Internet. He continues to edit the site and notes that a founding idea behind the project was the belief that “a major investment was needed in journalistic endeavors committed to honestly informing the American people about important events, reporting that truly operated without fear or favor.” Parry is known for breaking many of the stories related to the Iran-Contra affair while working at The Associated Press and Newsweek in the 1980s. He received the George Polk Award for National Reporting in 1984 for his work on Iran-Contra at the AP, where he broke the story that the CIA had provided a manual to the Nicaraguan Contras (“Psychological Operations in Guerrilla Warfare”) that outlined ways to build support for the Contra cause and carry out political assassinations.
  • In 1985, he was the first to report on Oliver North’s involvement in the affair and along with his AP colleague Brian Barger, was the first to describe the Contras’ role in cocaine trafficking in the United States – stories that led to an internal investigation and a congressional inquiry. Parry also was a 1985 Pulitzer finalist for his work. In the early 1990s, Parry made several documentaries for PBS’s Frontline on the October Surprise allegations about a plot to influence the outcome of the 1980 presidential election between incumbent Jimmy Carter and Ronald Reagan. He continued to report on the topic and published two related books: “Trick or Treason: The October Surprise Mystery” (1993) and “The October Surprise X-Files: The Hidden Origins of the Reagan-Bush Era” (1996). Parry’s other books include “America’s Stolen Narrative: From Washington and Madison to Nixon, Reagan and the Bushes to Obama” (2012), “Neck Deep: The Disastrous Presidency of George W. Bush” (2007), “Secrecy & Privilege: Rise of the Bush Dynasty from Watergate to Iraq” (2004), “and “Lost History: Contras, Cocaine, the Press & ‘Project Truth’” (1992).
  • ...1 more annotation...
  • Parry worked for Bloomberg News from 2000-2004. He has reported from Grenada, El Salvador, Nicaragua, Iran, Israel and Haiti and has taught at the New York University Graduate School of Journalism. Former Nieman Foundation curator Bill Kovach, chair of the advisory committee that oversees the annual award, said, “Robert Parry has for decades been one of the most tenacious investigative journalists. Driven by his concern that the information flooding our communications system increasingly substitutes opinion for historical fact and undermines effective citizen and government decisions, he has created a unique news website to replace disinformation with facts based on deep research.” Established in 2008, the I.F Stone Medal honors the life of investigative journalist I.F. Stone and is presented annually to a journalist whose work captures the spirit of journalistic independence, integrity and courage that characterized I.F. Stone’s Weekly, published 1953-1971. The award is administered by the Nieman Foundation for Journalism at Harvard and its Nieman Watchdog Project.
  •  
    Recognition for a journalist whose articles I often bookmark on Diigo.
1 - 20 of 28 Next ›
Showing 20 items per page