Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged 2007-orders

Rss Feed Group items tagged

Paul Merrell

F.B.I. Is Broadening Surveillance Role, Report Shows - NYTimes.com - 0 views

  • Although the government’s warrantless surveillance program is associated with the National Security Agency, the Federal Bureau of Investigation has gradually become a significant player in administering it, a newly declassified report shows.In 2008, according to the report, the F.B.I. assumed the power to review email accounts the N.S.A. wanted to collect through the “Prism” system, which collects emails of foreigners from providers like Yahoo and Google. The bureau’s top lawyer, Valerie E. Caproni, who is now a Federal District Court judge, developed procedures to make sure no such accounts belonged to Americans.
  • Then, in October 2009, the F.B.I. started retaining copies of unprocessed communications gathered without a warrant to analyze for its own purposes. And in April 2012, the bureau began nominating new email accounts and phone numbers belonging to foreigners for collection, including through the N.S.A.’s “upstream” system, which collects communications transiting network switches.That information is in a 231-page study by the Justice Department’s inspector general about the F.B.I.’s activities under the FISA Amendments Act of 2008, which authorized the surveillance program. The report was entirely classified when completed in September 2012. But the government has now made a semi-redacted version of the report public in response to a Freedom of Information Act lawsuit filed by The New York Times.
  • The report also filled in a gap about the evolving legality of the warrantless wiretapping program, which traces back to a decision by President George W. Bush in October 2001 to direct the N.S.A. to collect Americans’ international phone calls and emails, from network locations on domestic soil, without the individual warrants required by the Foreign Intelligence Surveillance Act, or FISA. The Times revealed that program in December 2005.After the article appeared, telecommunications providers that had voluntarily participated in the program were sued, and a Federal District Court judge in Detroit ruled that the program was illegal, although that decision was later vacated. The Bush administration sought to put the program on more solid legal footing by gaining orders from the Foreign Intelligence Surveillance Court approving it.Continue reading the main story Continue reading the main story Continue reading the main story In January 2007, the Bush administration persuaded the court’s Judge Malcolm Howard to issue an order to telephone and network companies requiring them to let the security agency target foreigners’ accounts for collection without individual warrants. But in April 2007, when the order came up for renewal before Judge Roger Vinson, he said that it was illegal.
  • ...1 more annotation...
  • Judge Vinson’s resistance led Congress to enact, in August 2007, the Protect America Act, a temporary law permitting warrantless surveillance of foreigners from domestic network locations. The next year, Congress replaced that law with the FISA Amendments Act.Last month, as a result of separate Freedom of Information Act lawsuits by The Times and the Electronic Frontier Foundation, the government declassified the identities of the judges who disagreed in early 2007 and several court filings from that episode. But it remained unclear what the N.S.A. had done in June and July of 2007.The newly declassified report said Judge Vinson issued an order on May 31, 2007, that allowed existing surveillance to continue by approving collection on a long list of specific foreign phone numbers and email addresses. But after that, when the agency wanted to start wiretapping an additional person, it had to ask the court for permission.The report said that “the rigorous nature of the FISA Court’s probable cause review of new selectors submitted to the various FISA Court judges following Judge Vinson’s May 31, 2007, order caused the N.S.A. to place fewer foreign selectors under coverage than it wanted to.” That and other factors “combined to accelerate the government’s efforts” to persuade Congress to enact the Protect America Act.
Paul Merrell

Customer proprietary network information - Wikipedia, the free encyclopedia - 0 views

  • Customer proprietary network information (CPNI) is the data collected by telecommunications companies about a consumer's telephone calls. It includes the time, date, duration and destination number of each call, the type of network a consumer subscribes to, and any other information that appears on the consumer's telephone bill. Telemarketers working on behalf of telephone companies, attempting to either win back a customer or upsell a customer with more services, must ask the customer's consent before accessing the billing information or before using that information to offer an upsell or any change of services. Usually this is done at the beginning of a call from the telemarketer to the telephone subscriber.
  • Note that as long as an affiliate is "communications" related, the FCC has ruled that CPNI is under an opt-out approach (can be shared without your explicit permission). A phone company is permitted to sell all information on you, such as numbers you call, when you called them, where you were when you called them, or any other personally identifying information. CPNI would normally require a warrant for law enforcement agencies, but it can be freely sold to "communications" related companies. One can verify this by checking rule 64.2007(b)(1) and footnote 137 in the 2007 CPNI order. One can call up a phone company and opt out by requesting that they do not share CPNI information. In the case of
  • The U.S. Telecommunications Act of 1996 granted the Federal Communications Commission (FCC) authority to regulate how customer proprietary network information (CPNI) can be used and to enforce related consumer information privacy provisions. The rules in the 2007 FCC CPNI Order further restrict CPNI use and create new notification and reporting requirements. The rules in the 2007 CPNI Order include: Limits the information which carriers may provide to third-party marketing firms without first securing the affirmative consent of their customers Defines when and how customer service representatives may share call details Creates new notification and reporting obligations for carriers (including identity verification procedures) Verification process must MATCH what is shown with the company placing the call.
  • ...1 more annotation...
  • The 2007 CPNI Order does not revise all CPNI rules. For example, the rule revisions adopted in the Order do not limit a carrier's ability to use CPNI to perform billing and collections functions, restrict CPNI use to effect maintenance and repair activity, or impact responses to lawful subpoenas. Fines for failure to comply with CPNI rules can be substantial. Since 2006, the FCC, focusing on one rule regarding internal annual compliance certificates, proposed over $1 million in fines and those fines are not necessarily indicative of the fines the FCC could propose. The FCC is authorized to impose fines of up to $150,000 for each rule violation or each day of a continuing violation up to a maximum of $1.5 million for each continuing violation.[1] The rules adopted in the Order are effective either six months after the Order is published in the Federal Register or on receipt of Office of Management and Budget approval of the new rules depending on which event is later. (Order at ¶61)
  •  
    A term that may become controversial in the context of pending cases under the 4th Amendment against NSA surveillance, going to the "reasonableness" of a customer's expectation of privacy in call metadata.
Paul Merrell

New Saudi King Tied to Al Qaeda, Bin Laden and Islamic Terrorism Washington's Blog - 0 views

  • We’ve long noted that Saudi Arabia is a huge supporter of terrorism. But the new Saudi king is particularly bad. Investors Business Daily notes: King Salman has a history of funding al-Qaida, and his son has been accused of knowing in advance about the 9/11 attacks. *** Salman once ran a Saudi charity tied to al-Qaida and has been named a defendant in two lawsuits accusing the Saudi royal family of helping the 9/11 terrorists, one of which the U.S. Supreme Court recently let move forward after years of being blocked by the State Department and the well-funded Saudi lobby. Plaintiffs have provided an enormous amount of material to source their accusations against Salman. Here’s why his ascension to the throne is not good news, especially as the terrorism threat grows: • Salman once headed the Saudi High Commission for Relief to Bosnia and Herzegovina, which served as a key charitable front for al-Qaida in the Balkans. • According to a United Nations-sponsored investigation, Salman in the 1990s transferred more than $120 million from commission accounts under his control — as well as his own personal accounts — to the Third World Relief Agency, another al-Qaida front and the main pipeline for illegal weapons shipments to al-Qaida fighters in the Balkans.
  • • A U.N. audit found that the money was transferred following meetings with Salman, transfers that had no legitimate “humanitarian” purpose. • Former CIA officer Robert Baer has reported that an international raid of Saudi High Commission offices found evidence of terrorist plots against America. • Baer also revealed that Salman “personally approved” distribution of funds from the International Islamic Relief Organization, which also has provided material support to al-Qaida. • A recent Gulf Institute report says Salman and former Saudi intelligence chief Prince Turki al-Faisal knowingly aided and abetted al-Qaida in the run-up to 9/11. • Salman works closely with Saudi clerics Saleh al-Moghamsy, a radical anti-Semite, and Safar Hawali, a one-time mentor of Osama bin Laden, according to the Washington Free Beacon. • In “Why America Slept,” author Gerald Posner claimed that Salman’s son Ahmed bin Salman also had ties to al-Qaida and even advance knowledge of the Sept. 11, 2001 attacks.
  • David Andrew Weinberg provides a superb round-up of Salman’s ties to terrorism and extremism: As former CIA official Bruce Riedel astutely pointed out, Salman was the regime’s lead fundraiser for mujahideen, or Islamic holy warriors, in Afghanistan in the 1980s, as well as for Bosnian Muslims during the Balkan struggles of the 1990s. In essence, he served as Saudi Arabia’s financial point man for bolstering fundamentalist proxies in war zones abroad. As longtime governor of Riyadh, Salman was often charged with maintaining order and consensus among members of his family. Salman’s half brother King Khalid (who ruled from 1975 to 1982) therefore looked to him early on in the Afghan conflict to use these family contacts for international objectives, appointing Salman to run the fundraising committee that gathered support from the royal family and other Saudis to support the mujahideen against the Soviets. Riedel writes that in this capacity, Salman “work[ed] very closely with the kingdom’s Wahhabi clerical establishment.” Another CIA officer who was stationed in Pakistan in the late 1980s estimates that private Saudi donations during that period reached between $20 million and $25 million every month. And as Rachel Bronson details in her book, Thicker Than Oil: America’s Uneasy Partnership With Saudi Arabia, Salman also helped recruit fighters for Abdul Rasul Sayyaf, an Afghan Salafist fighter who served as a mentor to both Osama bin Laden and 9/11 mastermind Khalid Sheikh Mohammed.
  • ...7 more annotations...
  • Reprising this role in Bosnia, Salman was appointed by his full brother and close political ally King Fahd to direct the Saudi High Commission for Relief of Bosnia and Herzegovina (SHC) upon its founding in 1992. Through the SHC, Salman gathered donations from the royal family for Balkan relief, supervising the commission until its until its recent closure in 2011. By 2001, the organization had collected around $600 million — nominally for relief and religious purposes, but money that allegedly also went to facilitating arms shipments, despite a U.N. arms embargo on Bosnia and other Yugoslav successor states from 1991 to 1996. And what kind of supervision did Salman exercise over this international commission? In 2001, NATO forces raided the SHC’s Sarajevo offices, discovering a treasure trove of terrorist materials: before-and-after photographs of al Qaeda attacks, instructions on how to fake U.S. State Department badges, and maps marked to highlight government buildings across Washington. The Sarajevo raid was not the first piece of evidence that the SHC’s work went far beyond humanitarian aid. Between 1992 and 1995, European officials tracked roughly $120 million in donations from Salman’s personal bank accounts and from the SHC to a Vienna-based Bosnian aid organization named the Third World Relief Agency (TWRA). Although the organization claimed to be focused on providing humanitarian relief, Western intelligence agencies estimated that the TWRA actually spent a majority of its funds arming fighters aligned with the Bosnian government.
  • A defector from al Qaeda called to testify before the United Nations, and who gave a deposition for lawyers representing the families of 9/11 victims, alleged that both Salman’s SHC and the TWRA provided essential support to al Qaeda in Bosnia, including to his 107-man combat unit. In a deposition related to the 9/11 case, he stated that the SHC “participated extensively in supporting al Qaida operations in Bosnia” and that the TWRA “financed, and otherwise supported” the terrorist group’s fighters. The SHC’s connection to terrorist groups has long been scrutinized by U.S. intelligence officials as well. The U.S. government’s Joint Task Force Guantanamo once included the Saudi High Commission on its list of suspected “terrorist and terrorist support entities.” The Defense Intelligence Agency also once accused the Saudi High Commission of shipping both aid and weapons to Mohamed Farrah Aidid, the al Qaeda-linked Somali warlord depicted as a villain in the movie Black Hawk Down. Somalia was subject to a United Nations arms embargo starting in January 1992. *** The board of trustees for the Prince Salman Youth Center, which Salman himself chairs, today includes Saleh Abdullah Kamel, a Saudi billionaire whose name showed up on a purported list of al Qaeda’s earliest supporters known as the “golden chain.” (The Wall Street Journal reported that Kamel “denies supporting terror.”) But as the United States sought to shut down Saudi charities with ties to terrorism in the aftermath of the 9/11 attacks, Kamel and Salman both condemned the effort as an anti-Islamic witch hunt.
  • In 1995, US aid worker William Jefferson is killed in Bosnia. One of the likely suspects, Ahmed Zuhair Handala, is linked to the SHC. He also is let go, despite evidence linking him to massacres of civilians in Bosnia. [Schindler, 2007, pp. 263-264] In 1997, a Croatian apartment building is bombed, and Handala and two other SHC employees are suspected of the bombing. They escape, but Handala will be captured after 9/11 and sent to Guantanamo prison. [Schindler, 2007, pp. 266] In 1997, SHC employee Saber Lahmar is arrested for plotting to blow up the US embassy in Saravejo. He is convicted, but pardoned and released by the Bosnian government two years later. He will be arrested again in 2002 for involvement in an al-Qaeda plot in Bosnia and sent to Guantanamo prison (see January 18, 2002). By 1996, NSA wiretaps reveal that Prince Salman is funding Islamic militants using charity fronts (Between 1994 and July 1996).
  • History Commons adds important details: By 1994, if not earlier, the NSA is collecting electronic intercepts of conversations between Saudi Arabian royal family members. Journalist Seymour Hersh will later write, “according to an official with knowledge of their contents, the intercepts show that the Saudi government, working through Prince Salman [bin Abdul Aziz], contributed millions to charities that, in turn, relayed the money to fundamentalists. ‘We knew that Salman was supporting all of the causes,’ the official told me.” By July 1996 or soon after, US intelligence “had more than enough raw intelligence to conclude… bin Laden [was] receiving money from prominent Saudis.” [Hersh, 2004, pp. 324, 329-330] One such alleged charity front linked to Salman is the Saudi High Commission in Bosnia (see 1996 and After). Prince Salman has long been the governor of Riyadh province. At the time, he is considered to be about fourth in line to be king of Saudi Arabia. His son Prince Ahmed bin Salman will later be accused of having connections with al-Qaeda leader Abu Zubaida (see Early April 2002). [PBS, 10/4/2004] It appears this surveillance of Saudi royals will come to an end in early 2001 (see (February-March 2001)).
  • Author Roland Jacquard will later claim that in 1996, al-Qaeda revives its militant network in Bosnia in the wake of the Bosnian war and uses the Saudi High Commission (SHC) as its main charity front to do so. [Jacquard, 2002, pp. 69] This charity was founded in 1993 by Saudi Prince Salman bin Abdul-Aziz and is so closely linked to and funded by the Saudi government that a US judge will later render it immune to a 9/11-related lawsuit after concluding that it is an organ of the Saudi government. [New York Law Journal, 9/28/2005] In 1994, British aid worker Paul Goodall is killed in Bosnia execution-style by multiple shots to the back of the head. A SHC employee, Abdul Hadi al-Gahtani, is arrested for the murder and admits the gun used was his, but the Bosnian government lets him go without a trial. Al-Gahtani will later be killed fighting with al-Qaeda and the Taliban in Afghanistan. [Schindler, 2007, pp. 143-144; Schindler is a professor at the U.S. Army War College] In 1995, the Bosnian Ministry of Finance raids SHC’s offices and discovers documents that show SHC is “clearly a front for radical and terrorism-related activities.” [Burr and Collins, 2006, pp. 145]
  • In November 2002, Prince Salman patronized a fundraising gala for three Saudi charities under investigation by Washington: the International Islamic Relief Organization, al-Haramain Foundation, and the World Assembly of Muslim Youth. Since 9/11, all three organizations have had branches shuttered or sanctioned over allegations of financially supporting terrorism. That same month, Salman cited his experience on the boards of charitable societies, asserting that “it is not the responsibility of the kingdom” if others exploit Saudi donations for terrorism. *** The new king has also embraced Saudi cleric Saleh al-Maghamsi, an Islamic supremacist who declared in 2012 that Osama bin Laden had more “sanctity and honor in the eyes of Allah,” simply for being a Muslim, than “Jews, Christians, Zoroastrians, apostates, and atheists,” whom he described by nature as “infidels.” That didn’t put an end to Salman’s ties to Maghamsi, however. The new Saudi king recently served as head of the supervisory board for a Medina research center directed by Maghamsi. A year after Maghamsi’s offensive comments, Salman sponsored and attended a large cultural festival organized by the preacher. Maghamsi also advises two of Salman’s sons ….
  • A 1996 CIA report mentions, “We continue to have evidence that even high ranking members of the collecting or monitoring agencies in Saudi Arabia, Kuwait, and Pakistan – such as the Saudi High Commission – are involved in illicit activities, including support for terrorists” (see January 1996). Jacquard claims that most of the leadership of the SHC supports bin Laden. The SHC, while participating in some legitimate charitable functions, uses its cover to ship illicit goods, drugs, and weapons in and out of Bosnia. In May 1997, a French military report concludes: ”(T)he Saudi High Commission, under cover of humanitarian aid, is helping to foster the lasting Islamization of Bosnia by acting on the youth of the country. The successful conclusion of this plan would provide Islamic fundamentalism with a perfectly positioned platform in Europe and would provide cover for members of the bin Laden organization.” [Jacquard, 2002, pp. 69-71] However, the US will take no action until shortly after 9/11, when it will lead a raid on the SHC’s Bosnia offices. Incriminating documents will be found, including information on how to counterfeit US State Department ID badges, and handwritten notes about meetings with bin Laden. Evidence of a planned attack using crop duster planes is found as well. [Schindler, 2007, pp. 129, 284]
  •  
    So the U.S. invades Afghanistan and Iraq instead of Saudi Arabia? 
Paul Merrell

Documents: FBI Spyware Has Been Snaring Extortionists, Hackers for Years | Threat Level... - 0 views

  • A sophisticated FBI-produced spyware program has played a crucial behind-the-scenes role in federal investigations into extortion plots, terrorist threats and hacker attacks in cases stretching back at least seven years, newly declassified documents show. As first reported by Wired.com, the software, called a "computer and internet protocol address verifier," or CIPAV, is designed to infiltrate a target’s computer and gather a wide range of information, which it secretly sends to an FBI server in eastern Virginia. The FBI’s use of the spyware surfaced in 2007 when the bureau used it to track e-mailed bomb threats against a Washington state high school to a 15-year-old student. But the documents released Thursday under the Freedom of Information Act show the FBI has quietly obtained court authorization to deploy the CIPAV in a wide variety of cases, ranging from major hacker investigations, to someone posing as an FBI agent online. Shortly after its launch, the program became so popular with federal law enforcement that Justice Department lawyers in Washington warned that overuse of the novel technique could result in its electronic evidence being thrown out of court in some cases. "While the technique is of indisputable value in certain kinds of cases, we are seeing indications that it is being used needlessly by some agencies, unnecessarily raising difficult legal questions (and a risk of suppression) without any countervailing benefit," reads a formerly-classified March 7, 2002 memo from the Justice Department’s Computer Crime and Intellectual Property Section.
  • The documents, which are heavily redacted, do not detail the CIPAV’s capabilities, but an FBI affidavit in the 2007 case indicate it gathers and reports a computer’s IP address; MAC address; open ports; a list of running programs; the operating system type, version and serial number; preferred internet browser and version; the computer’s registered owner and registered company name; the current logged-in user name and the last-visited URL. After sending the information to the FBI, the CIPAV settles into a silent "pen register" mode, in which it lurks on the target computer and monitors its internet use, logging the IP address of every server to which the machine connects. The documents shed some light on how the FBI sneaks the CIPAV onto a target’s machine, hinting that the bureau may be using one or more web browser vulnerabilities. In several of the cases outlined, the FBI hosted the CIPAV on a website, and tricked the target into clicking on a link. That’s what happened in the Washington case, according to a formerly-secret planning document for the 2007 operation. "The CIPAV will be deployed via a Uniform Resource Locator (URL) address posted to the subject’s private chat room on MySpace.com."
  • The software’s primary utility appears to be in tracking down suspects that use proxy servers or anonymizing websites to cover their tracks.
  • ...1 more annotation...
  • The documents appear to settle one of the questions the FBI declined to answer in 2007: whether the bureau obtains search warrants before using the CIPAV, or if it sometimes relies on weaker "pen register" orders that don’t require a showing of probable cause that a crime has been committed. In all the criminal cases described in the documents, the FBI sought search warrants. The records also indicate that the FBI obtained court orders from the Foreign Intelligence Surveillance Court, which covers foreign espionage and terrorism investigations, but the details are redacted. The FBI released 152 heavily-redacted pages in response to Threat Level’s FOIA request, and withheld another 623.
  •  
    The article summarizes many cases in which the CIPAV exploit was used by the FBI. But the article's closing observation that the released documents "whether the bureau obtains search warrants before using the CIPAV" stretches the evidence a bit too far, methinks. If they exist, the FBI very likely would not have produced records of incidents in which it used CIPAV without court authorization. 
Paul Merrell

Profiting from Your Thirst as Global Elite Rush to Control Water Worldwide :: The Marke... - 0 views

  • A disturbing trend in the water sector is accelerating worldwide. The new “water barons” --- the Wall Street banks and elitist multibillionaires --- are buying up water all over the world at unprecedented pace. Familiar mega-banks and investing powerhouses such as Goldman Sachs, JP Morgan Chase, Citigroup, UBS, Deutsche Bank, Credit Suisse, Macquarie Bank, Barclays Bank, the Blackstone Group, Allianz, and HSBC Bank, among others, are consolidating their control over water. Wealthy tycoons such as T. Boone Pickens, former President George H.W. Bush and his family, Hong Kong’s Li Ka-shing, Philippines’ Manuel V. Pangilinan and other Filipino billionaires, and others are also buying thousands of acres of land with aquifers, lakes, water rights, water utilities, and shares in water engineering and technology companies all over the world. The second disturbing trend is that while the new water barons are buying up water all over the world, governments are moving fast to limit citizens’ ability to become water self-sufficient (as evidenced by the well-publicized Gary Harrington’s case in Oregon, in which the state criminalized the collection of rainwater in three ponds located on his private land, by convicting him on nine counts and sentencing him for 30 days in jail). Let’s put this criminalization in perspective:
  • Billionaire T. Boone Pickens owned more water rights than any other individuals in America, with rights over enough of the Ogallala Aquifer to drain approximately 200,000 acre-feet (or 65 billion gallons of water) a year. But ordinary citizen Gary Harrington cannot collect rainwater runoff on 170 acres of his private land. It’s a strange New World Order in which multibillionaires and elitist banks can own aquifers and lakes, but ordinary citizens cannot even collect rainwater and snow runoff in their own backyards and private lands.
  • In 2008, Goldman Sachs called water “the petroleum for the next century” and those investors who know how to play the infrastructure boom will reap huge rewards, during its annual “Top Five Risks” conference. Water is a U.S.$425 billion industry, and a calamitous water shortage could be a more serious threat to humanity in the 21st century than food and energy shortages, according to Goldman Sachs’s conference panel. Goldman Sachs has convened numerous conferences and also published lengthy, insightful analyses of water and other critical sectors (food, energy). Goldman Sachs is positioning itself to gobble up water utilities, water engineering companies, and water resources worldwide. Since 2006, Goldman Sachs has become one of the largest infrastructure investment fund managers and has amassed a $10 billion capital for infrastructure, including water.
  • ...7 more annotations...
  • Citigroup’s top economist Willem Buitler said in 2011 that the water market will soon be hotter the oil market (for example, see this and this): “Water as an asset class will, in my view, become eventually the single most important physical-commodity based asset class, dwarfing oil, copper, agricultural commodities and precious metals.” In its recent 2012 Water Investment Conference, Citigroup has identified top 10 trends in the water sector, as follows:
  • Specifically, a lucrative opportunity in water is in hydraulic fracturing (or fracking), as it generates massive demand for water and water services. Each oil well developed requires 3 to 5 million gallons of water, and 80% of this water cannot be reused because it’s three to 10 times saltier than seawater. Citigroup recommends water-rights owners sell water to fracking companies instead of to farmers because water for fracking can be sold for as much as $3,000 per acre-foot instead of only $50 per acre/foot to farmers.
  • One of the world’s largest banks, JPMorgan Chase has aggressively pursued water and infrastructure worldwide. In October 2007, it beat out rivals Morgan Stanley and Goldman Sachs to buy U.K.’s water utility Southern Water with partners Swiss-based UBS and Australia’s Challenger Infrastructure Fund. This banking empire is controlled by the Rockefeller family; the family patriarch David Rockefeller is a member of the elite and secretive Bilderberg Group, Council on Foreign Relations, and Trilateral Commission.
  • Barclays PLC is a U.K.-based major global financial services provider operating in all over the world with roots in London since 1690; it operates through its subsidiary Barclays Bank PLC and its investment bank called Barclays Capital. Barclays Bank’s unit Barclays Global Investors manages an exchange-traded fund (ETF) called iShares S&P Global Water, which is listed on the London Stock Exchanges and can be purchased like any ordinary share through a broker. Touting the iShares S&P Global Water as offering “a broad based exposure to shares of the world’s largest water companies, including water utilities and water equipment stocks” of water companies around the world, this fund as of March 31, 2007 was valued at U.S.$33.8 million.
  • Deutsche Bank is one of the major players in the water sector worldwide. Its Deutsche Bank Advisors have identified water as a part of the climate investment strategies. In its presentation, “Global Warming: Implications for Investors,” they have identified the four following major areas for water investment: § Distribution and management: (1) Supply and recycling, (2) water distribution and sewage, (3) water management and engineering. § Water purification: (1) Sewage purification, (2) disinfection, (3) desalination, (4) monitoring. § Water efficiency (demand): (1) Home installation, (2) gray-water recycling, (3) water meters. § Water and nutrition: (1) Irrigation, (2) bottled water.
  • Moreover, Deutsche Bank has channeled €6 billion (U.S.$8.55 billion) into climate change funds, which will target companies with products that cut greenhouse gases or help people adapt to a warmer world, in sectors from agriculture to power and construction (Reuters, October 18, 2007). In addition to SCM, Deutsche Bank also has the RREEF Infrastructure, part of RREEF Alternative Investments, headquartered in New York with main hubs in Sydney, Singapore, and London. RREEF Infrastructure has more than €6.7 billion in assets under management. One of its main targets is utilities, including electricity networks, water-treatment or distribution operations, and natural-gas networks. In October 2007, RREEF partnered with Goldman Sachs, GE, Prudential, and Babcok & Brown Ltd. to bid unsuccessfully for U.K.’s water utility Southern Water. § Crediting the boom in European infrastructure investment, the RREEF fund by August 2007 had raised €2 billion (U.S.$2.8 billion); Europe’s infrastructure market is valued at between U.S.$4 trillion to U.S.$6 trillion (DowJones Financial News Online, August 7, 2007). § Bulgaria --- Deutsche Bank Bulgaria is planning to participate in large infrastructure projects, including public-private partnership projects in water and sewage worth up to €1 billion (Sofia Echo Media, February 26, 2008). § Middle East --- Along with Ithmaar Bank B.S.C. (an private-equity investment bank in Bahrain), Deutsche Bank co-managed a U.S.$2 billion Shari'a-compliant Infrastructure and Growth Capital Fund and plans to target U.S.$630 billion in regional infrastructure.
  • In my 2008 article, I overlooked the astonishingly large land purchases (298,840 acres, to be exact) by the Bush family in 2005 and 2006. In 2006, while on a trip to Paraguay for the United Nation’s children’s group UNICEF, Jenna Bush (daughter of former President George W. Bush and granddaughter of former President George H.W. Bush) reportedly bought 98,840 acres of land in Chaco, Paraguay, near the Triple Frontier (Bolivia, Brazil, and Paraguay). This land is said to be near the 200,000 acres purchased by her grandfather, George H.W. Bush, in 2005. The lands purchased by the Bush family sit over not only South America’s largest aquifer --- but the world’s as well --- Acuifero Guaraní, which runs beneath Argentina, Brazil, Paraguay, and Uruguay. This aquifer is larger than Texas and California combined. Online political magazine Counterpunch quoted Argentinean pacifist Adolfo Perez Esquivel, the winner of 1981 Nobel Peace Prize, who “warned that the real war will be fought not for oil, but for water, and recalled that Acuifero Guaraní is one of the largest underground water reserves in South America….”
  •  
     Like the land rush for Arctic lands soon to be bared of ice by global warming, banksters are also moving to capitalize on looming water shortages, aided by IMF privatization loan conditions the the dwindling of potable water supplies globally via pollution, deforestation, and aquifer depletion. All trace to the common problem over human overpopulation of the planet.  
Gary Edwards

PETER SCHIFF: The Housing Bust Was Just A Preview For The Coming Catastrophe - Business... - 0 views

  •  
    Peter Schiff talks about his new book "The Real Crash: America's Coming Bankruptcy, How to Save Yourself and Your Country".  I caught the Coast-to-Coast "Financial Crisis Special" interview with Peter earlier this week where he spoke on the "Real Crash" issues.  Stunning stuff.  His hour on Coast was followed by Lindsey Williams who pointed out that the New World Order - Illuminati - Bankster trigger point would be signaled by a collapse in the derivatives market. The derivatives market is now over a quadrillion dollars of  casino style gambling.  This is where Banksters make huge bets on things like whether or not interest rates will go up or down.  Then they take out insurance to cover their bets, which further compounds the cost.  Recent events like the Jon Corzine MF Global gamble that the Federal Reserve Bankster Cartel would backstop explosive European sovereign bankster debt are the first indications of collapse in the derivatives market.  We now know that JP Morgan placed similar bets on a European bailout by the Federal Reserve and World Bank, and lost big.  The only difference is that Corzine robbed his clients personal accounts to cover his bets. While Schiff argues the facts on the table, the "what", Lindsay argued the "why"; claiming that this escalating debt mess is all by design.  Lindsay claims that an operational fundamental of the New World Order elites is to first overturn the USA Constitution.  Using a Machiavellian Principle known as, "out of chaos comes order", they seek to de-stabilize and overthrow the USA Constitutional Republic using massive and crushing debt to first destroy the dollar currency.  This will create massive chaos requiring martial law and government seizure of private property and production. Peter Schiff warns that the government is driving us deeper into debt at exactly the time we should be saving and investing those savings in future private sector productivity.  Lindsay argues that this is all by desig
Paul Merrell

Feds confirm Bush-era e-mail surveillance - POLITICO.com - 0 views

  • The U.S. government has acknowledged that it swept up huge volumes of data from emails in the U.S. for several years without any court approval, based solely on the orders of former President George W. Bush. In a court filings on Monday, government lawyers said that the Internet program ran in parallel with a program gathering so-called metadata about telephone calls. The counterterrorism efforts operated under presidential authority before a judge approved them in July 2004, said a 2007 court filing made public Monday by the Justice Department (and posted here.)
  • "After the 9/11 attacks and pursuant to an authorization of the President, [redacted] the NSA [redacted] the bulk collection of non-content information about  telephone calls and Internet communications (hereafter 'metadata') activities that enable the NSA to uncover the contacts [redacted] of members or agents of al Qaeda or affiliated terrorist organizations," a senior NSA official wrote in an October 2007 declaration originally filed under seal as part of an effort to defeat litigation about the snooping Bush ordered. "Specifically, the President authorized the the NSA to collect metadata related to Internet communications for the purpose of conducting targeted analysis to track Al Qaeda-related networks. Internet metadata is header/router/addressing information, such as the 'to,' 'from,' 'cc,' and 'bcc' lines, as opposed to the body or 're' lines, of a standard e-mail. Since July 2004, the collection of Internet metadata has been conducted pursuant to an Order of the Foreign Intelligence Surveillance Court," the still-unidentified official from NSA's Signals Intelligence Directorate continued. The email program was effectively public since June of last year, after contractor Edward Snowden leaked a top-secret National Security Agency inspector general report that described the program.
  • FISC Judge Colleen Kollar-Kotelly's opinion approving the surveillance was officially released in November 2013. However, the date she issued it was redacted. Many surmised that her opinion followed a dust-up in March 2004, when then-Deputy Attorney General James Comey questioned the legality of some aspect of Bush's post-9/11 surveillance programs and refused to reauthorize that portion of the surveillance. Comey's refusal is said to have put the program into turmoil for a period of months, until officials sought and won the order from Kollar-Kotelly blessing the gathering of both the email and telephone metadata. The publicly released version of Kollar-Kotelly's opinion does not discuss the operation of the program during the period before the application for court approval. The filings Monday came in continuing legal wrangling over obligations pending lawsuits may create for the NSA to hang on to aging metadata that it would ordinarily have been required to erase under FISC orders. A federal judge in San Francisco has required that the NSA preserve that data, at least for now, rather than erasing it.
Gary Edwards

Peter J. Wallison: The Price for Fannie and Freddie Keeps Going Up - WSJ.com - 0 views

  •  
    Whoa.  This is bad stuff.  The facts, the numbers, the players.  They all point to our Federal government, the Clinton Administration in 1993, Democrat obstruction of much needed reform, and a Democratic Congress in 2007 as the catalist that blew an $18 Trillion dollar hole in our economy.  Miserable socialist bastardos!! excerpt:  Fannie and Freddie's congressional sponsors-some of whom are now leading the administration's effort to "reform" the financial system-have a lot to answer for. Rep. Barney Frank (D., Mass.), chairman of the House Financial Services Committee, sponsored legislation adopted in 2008 that established a new regulatory structure for the GSEs. But by then it was far too late. The GSEs had begun buying risky loans in 1993 to meet the "affordable housing" requirements established under congressional direction by the Department of Housing and Urban Development (HUD). Most of the damage was done from 2005 through 2007, when Fannie and Freddie were binging on risky mortgages. Back then, Mr. Frank was the bartender, denying that there was any cause for concern, and claiming that he wanted to "roll the dice" on subsidized housing support. View Full Image Associated Press In 2005, the Senate Banking Committee, then controlled by Republicans, adopted tough regulatory legislation that would have established more auditing and oversight of the two agencies. But it was passed out of committee on a partisan vote, and with no Democratic support it never came to a vote. By the end of 2008, Fannie and Freddie held or guaranteed approximately 10 million subprime and Alt-A mortgages and mortgage-backed securities (MBS)-risky loans with a total principal balance of $1.6 trillion. These are now defaulting at unprecedented rates, accounting for both their 2008 insolvency and their growing losses today. Since 2008, under government control, the two agencies have continued to buy dicey mortgages in order to stabilize housing prices. There is more to th
Paul Merrell

Libya Coming Full Circle. When A Deemed "Conspiracy Theory" Becomes Reality | Global Re... - 0 views

  • In the duration of the “revolutionary frenzy” that categorized western media coverage of the Libyan Civil War in 2011, public audiences were captivated with both tales of rebels aspiring for “democracy” and with complimenting stories of unabated brutality by Gaddafi forces. Without any serious mainstream criticism, an imperialist mythology centered on the interventionist doctrine of the “Responsibility to Protect” was cemented in public consciousness with even usually non-mainstream and “anti-imperialist” figures such as Juan Cole deliberately misrepresenting the situation in Libya. In Cole’s perspective, no reference to armed militants from the start of the conflict or the role of extremism and western premeditation found its way into the narrative and he predicted a simplistic narrative where the overthrow of Gaddafi would lead the region into an era of unity, prosperity and freedom. Libya Today How is Libya today? If one denied the existence of hell, they need not look further than Libya to observe a case of hell on Earth. Libya as a functioning, cohesive state has virtually ceased to exist, having been replaced by a myriad of conflicting factions divided on tribal and religious lines. While mainstream media tends to obscure the identity of these factions and their connection to western imperialists, Eric Draitser in his analysis, “Benghazi, the CIA, and the War in Libya” shows the beyond the fractious infighting, both primary factions engaging in direct combat have been beneficiaries of the NATO imperialist powers in their systematic aggression against the Libyan state.
  • “Confirmed: U.S. Armed Al Qaeda to Topple Libya’s Gaddaffi” with a very astonishing admission by “top military officers, CIA insiders and think-tankers” confirming the obvious truth that “conspiracy theorists” have been saying since 2011. The US backed Al Qaeda in Libya and that the Benghazi attack was a byproduct of this. Washington’s Blog notes that in 2012, it documented that: The U.S. supported opposition which overthrew Libya’s Gadaffi was largely comprised of Al Qaeda terrorists. According to a 2007 report by West Point’s Combating Terrorism Center’s center, the Libyan city of Benghazi was one of Al Qaeda’s main headquarters – and bases for sending Al Qaeda fighters into Iraq – prior to the overthrow of Gaddafi: The Hindustan Times reported last year: “There is no question that al Qaeda’s Libyan franchise, Libyan Islamic Fighting Group, is a part of the opposition,” Bruce Riedel, former CIA officer and a leading expert on terrorism, told Hindustan Times. It has always been Qaddafi’s biggest enemy and its stronghold is Benghazi. Al Qaeda is now largely in control of Libya.  Indeed, Al Qaeda flags were flown over the Benghazi courthouse once Gaddafi was toppled. What was once deemed conspiracy theory became confirmed reality when the Daily Mail reported as Washington’s Blog subsequently pointed out:
  • A self-selected group of former top military officers, CIA insiders and think-tankers, declared Tuesday in Washington that a seven-month review of the deadly 2012 terrorist attack has determined that it could have been prevented – if the U.S. hadn’t been helping to arm al-Qaeda militias throughout Libya a year earlier. ‘The United States switched sides in the war on terror with what we did in Libya, knowingly facilitating the provision of weapons to known al-Qaeda militias and figures,’ Clare Lopez, a member of the commission and a former CIA officer, told MailOnline. She blamed the Obama administration for failing to stop half of a $1 billion United Arab Emirates arms shipment from reaching al-Qaeda-linked militants. ‘Remember, these weapons that came into Benghazi were permitted to enter by our armed forces who were blockading the approaches from air and sea,’ Lopez claimed. ‘They were permitted to come in. … [They] knew these weapons were coming in, and that was allowed.. ‘The intelligence community was part of that, the Department of State was part of that, and certainly that means that the top leadership of the United States, our national security leadership, and potentially Congress – if they were briefed on this – also knew about this.’
  • ...4 more annotations...
  • ‘The White House and senior Congressional members,’ the group wrote in an interim report released Tuesday, ‘deliberately and knowingly pursued a policy that provided material support to terrorist organizations in order to topple a ruler [Muammar Gaddafi] who had been working closely with the West actively to suppress al-Qaeda.’ ‘Some look at it as treason,’ said Wayne Simmons, a former CIA officer who participated in the commission’s research. While Wayne Simmons’ characterization of such actions by the globalist, imperialist establishment in the United States as “treason” is correct in the sense that it was a clear violation of not only the Constitution, but the public interest of America, there is a rather disingenuous factor involved when some people, especially on the Neo-Con right, attempt to play the “treason card.”
  • Clearly the Neo-Con agenda has been coming full circle since the first Gulf War in the 1990s. The US “gun-walking” to jihadis in Syria from Libya, noted by the Washington Times and New York Times (albeit with partisan spin and distortion), was actually planned under Bush in 2007 as noted by Seymour Hersh in “The Redirection.” It has continued under Obama, influenced by Council on Foreign Relations figures throughout both administrations from Dick Cheney to Hillary Clinton. Consider the following points from “The Redirection”: To undermine Iran, which is predominantly Shiite, the Bush Administration has decided, in effect, to reconfigure its priorities in the Middle East. In Lebanon, the Administration has coöperated with Saudi Arabia’s government, which is Sunni, in clandestine operations that are intended to weaken Hezbollah, the Shiite organization that is backed by Iran. The U.S. has also taken part in clandestine operations aimed at Iran and its ally Syria. A by-product of these activities has been the bolstering of Sunni extremist groups that espouse a militant vision of Islam and are hostile to America and sympathetic to Al Qaeda.
  • To dispel critics’ notions that this is passive, uncontrollable, and indirect support, consider: [Saudi Arabia's] Bandar and other Saudis have assured the White House that “they will keep a very close eye on the religious fundamentalists. Their message to us was ‘We’ve created this movement, and we can control it.’ It’s not that we don’t want the Salafis to throw bombs; it’s who they throw them at—Hezbollah, Moqtada al-Sadr, Iran, and at the Syrians, if they continue to work with Hezbollah and Iran. Neo-Conservative writer Gary Gambill would ride on this wave of terrorist aggression and pen an article for the Neo-Con “Middle East Forum” titled “Two Cheers for Syrian Islamists.” As noted in the analysis of the piece by Tony Cartalucci titled “Globalist Rag Gives ‘Two Cheers’ for Terrorism”, one can see how terrorism is a useful piece of capital of globalist imperialism that is easy to hide in the sight of inattentive masses with easy ploys of political spin and plausible deniability.
  • Libyan terrorists are invading Syria. They have been doing so since the influx of jihadis began, enabled by outside powers. These are not simply rogue networks operating independently but rather include state-sponsorship, especially of NATO-member Turkey and NATO’s criminal proxy government in Tripoli, Libya. We are told by the media that the regime in Tripoli under the auspice of the National Transitional Council, and populated with puppets like Mustapha Abdul Jalil, is a moderate regime distinct from the “marginal Islamist forces.” However, even in mainstream accounts, one can note that these “official, moderate” groups are involved with funding terrorism themselves as many geopolitical analysts have noted. Tony Cartalucci notes that, “In November 2011, the Telegraph in their article, “Leading Libyan Islamist met Free Syrian Army opposition group,” would report”: Abdulhakim Belhadj, head of the Tripoli Military Council and the former leader of the Libyan Islamic Fighting Group, “met with Free Syrian Army leaders in Istanbul and on the border with Turkey,” said a military official working with Mr Belhadj. “Mustafa Abdul Jalil (the interim Libyan president) sent him there.”
  •  
    Lots of documentation on the tawdry moves by the War Party in Libya and Benghazi, now blowing up in their faces. 
Paul Merrell

Federal Chief Information Officers (CIO) Council Wins Rosemary Award - 0 views

  • Hillary Clinton E-Mail Controversy Illuminates Government-Wide Failure National Security Archive Lawsuit Established E-Mails as Records in 1993 CIO Council Repeats as Rosemary "Winner" for Doubling Down On "Lifetime Failure" Only White House Saves Its E-Mail Electronically, Agencies No Deadline Until 2016
  • The Federal Chief Information Officers (CIO) Council has won the infamous Rosemary Award for worst open government performance of 2014, according to the citation published today by the National Security Archive at www.nsarchive.org. The National Security Archive had hoped that awarding the 2010 Rosemary Award to the Federal Chief Information Officers Council for never addressing the government's "lifetime failure" of saving its e-mail electronically would serve as a government-wide wakeup call that saving e-mails was a priority. Fallout from the Hillary Clinton e-mail debacle shows, however, that rather than "waking up," the top officials have opted to hit the "snooze" button. The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Justice Department, and Director of National Intelligence James Clapper.
  • Chief Information Officer of the United States Tony Scott was appointed to lead the Federal CIO Council on February 5, 2015, and his brief tenure has already seen more references in the news media to the importance of maintaining electronic government records, including e-mail, and the requirements of the Federal Records Act, than the past five years. Hopefully Mr. Scott, along with Office of Management & Budget Deputy Director for Management Ms. Beth Cobert will embrace the challenge of their Council being named a repeat Rosemary Award winner and use it as a baton to spur change rather than a cross to bear.
  • ...9 more annotations...
  • Many on the Federal CIO Council could use some motivation, including the beleaguered State Department CIO, Steven Taylor. In office since April 3, 2013, Mr. Taylor is in charge of the Department's information resources and IT initiatives and services. He "is directly responsible for the Information Resource Management (IRM) Bureau's budget of $750 million, and oversees State's total IT/ knowledge management budget of approximately one billion dollars." Prior to his current position, Taylor served as Acting CIO from August 1, 2012, as the Department's Deputy Chief Information Officer (DCIO) and Chief Technology Officer of Operations from June 2011, and was the Program Director for the State Messaging and Archival Retrieval Toolset (SMART). While Hillary Clinton repeatedly claimed that because she sent her official e-mail to "government officials on their State or other .gov accounts ... the emails were immediately captured and preserved," a recent State Department Office of Inspector General report contradicts claims that DOS' e-mail archiving system, ironically named SMART, did so.
  • The report found that State Department "employees have not received adequate training or guidance on their responsibilities for using those systems to preserve 'record emails.'" In 2011, while Taylor was State's Chief Technology Officer of Operations, State Department employees only created 61,156 record e-mails out of more than a billion e-mails sent. In other words, roughly .006% of DOS e-mails were captured electronically. And in 2013, while Taylor was State's CIO, a paltry seven e-mails were preserved from the Office of the Secretary, compared to the 4,922 preserved by the Lagos Consulate in Nigeria. Even though the report notes that its assessments "do not apply to the system used by the Department's high-level principals, the Secretary, the Deputy Secretaries, the Under Secretaries, and their immediate staffs, which maintain separate systems," the State Department has not provided any estimation of the number of Clinton's e-mails that were preserved by recipients through the Department's anachronistic "print and file" system, or any other procedure.
  • The unfortunate silver lining of Hillary Clinton inappropriately appropriating public records as her own is that she likely preserved her records much more comprehensively than her State Department colleagues, most of whose e-mails have probably been lost under Taylor's IT leadership. 2008 reports by CREW, right, and the GAO, left, highlighted problems preserving e-mails. Click to enlarge. The bigger issue is that Federal IT gurus have known about this problem for years, and the State Department is not alone in not having done anything to fix it. A 2008 survey by Citizens for Responsibility and Ethics in Washington (CREW) and OpenTheGovernment.org did not find a single federal agency policy that mandates an electronic record keeping system agency-wide. Congressional testimony in 2008 by the Government Accountability Office indicted the standard "print and file" approach by pointing out:
  • 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).
  • Troublingly, current Office of Management and Budget guidance does not require federal agencies to manage "all email records in an electronic format" until December 31, 2016. The only part of the federal government that seems to be facing up to the e-mail preservation challenge with any kind of "best practice" is the White House, where the Obama administration installed on day one an e-mail archiving system that preserves and manages even the President's own Blackberry messages. The National Security Archive brought the original White House e-mail lawsuit against President Reagan in early 1989, and continued the litigation against Presidents George H.W. Bush and Bill Clinton, until court orders compelled the White House to install the "ARMS" system to archive e-mail. The Archive sued the George W. Bush administration in 2007 after discovering that the Bush White House had junked the Clinton system without replacing its systematic archiving functions. CREW subsequently joined this suit and with the Archive negotiated a settlement with the Obama administration that included the recovery of as many as 22 million e-mails that were previously missing or misfiled.
  • s a result of two decades of the Archive's White House e-mail litigation, several hundred thousand e-mails survive from the Reagan White House, nearly a half million from the George H.W. Bush White House, 32 million from the Clinton White House, and an estimated 220 million from the George W. Bush White House. Previous recipients of the Rosemary Award include: 2013 - Director of National Intelligence James Clapper (for his "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?") 2012 - the Justice Department (in a repeat performance, for failing to update FOIA regulations to comply with the law, undermining congressional intent, and hyping its open government statistics)
  • Rogue Band of Federal E-mail Users and Abusers Compounds Systemic Problems Former Secretary of State Hillary Clinton and other federal officials who skirt or even violate federal laws designed to preserve electronic federal records compound e-mail management problems. Top government officials who use personal e-mail for official business include: Clinton; former U.S. Ambassador to Kenya Scott Gration; chairman of the U.S. Chemical Safety Board Rafael Moure-Eraso; and former Secretary of State Colin Powell, who told ABC's This Week "I don't have any to turn over. I did not keep a cache of them. I did not print them off. I do not have thousands of pages somewhere in my personal files." Others who did not properly save electronic federal records include Environmental Protection Agency former administrator Lisa Jackson who used the pseudonym Richard Windsor to receive email; current EPA administrator Gina McCarthy, who improperly deleted thousands of text messages (which also are federal records) from her official agency cell phone; and former Internal Revenue Service official Lois Lerner, whose emails regarding Obama's political opponents "went missing or became destroyed."
  • "agencies recognize that devoting significant resources to creating paper records from electronic sources is not a viable long-term strategy;" yet GAO concluded even the "print and file" system was failing to capture historic records "for about half of the senior officials."
  • The destruction of other federal records was even more blatant. Jose Rodriguez, the former CIA official in charge of the agency's defunct torture program ordered the destruction of key videos documenting it in 2005, claiming that "the heat from destroying [the torture videos] is nothing compared to what it would be if the tapes ever got into the public domain;" Admiral William McRaven, ordered the immediate destruction of any emails about Operation Neptune Spear, including any photos of the death of Osama bin Laden ("destroy them immediately"), telling subordinates that any photos should have already been turned over to the CIA — presumably so they could be placed in operational files out of reach of the FOIA. These rogues make it harder — if not impossible — for agencies to streamline their records management, and for FOIA requesters and others to obtain official records, especially those not exchanged with other government employees. The US National Archives currently trusts agencies to determine and preserve e-mails which agencies have "deemed appropriate for preservation" on their own, often by employing a "print and file" physical archiving process for digital records. Any future reforms to e-mail management must address the problems of outdated preservation technology, Federal Records Act violators, and the scary fact that only one per cent of government e-mail addresses are saved digitally by the National Archive's recently-initiated "Capstone" program.
  •  
    Complete with photos, names, titles, of the 41 federal department and independent agency CIOs. The March 2015 Insopector General report linked from the article belies Hillary Clinton's claim that all emails she sent to State Department staff had been preserved by the Department.   
Paul Merrell

Lawmaker Says There More To NSA Spying - Business Insider - 0 views

  • A House Democrat said information revealed about the National Security Agency's secret surveillance programs are "the tip of the iceberg," Daniel Strauss of The Hill reports. "I think it's just broader than most people even realize, and I think that's, in one way, what astounded most of us, too," Rep. Loretta Sanchez (D-Calif.) told C-SPAN's "Washington Journal" after a classified briefing with national security officials. Rep. Joe Barton (R-Texas), who also attended the meeting, said that the NSA "violated the spirit of the law when it started collecting data from everyone in the country just because technology now makes that possible.” Barton added that "in America ... You don’t target everyone and violate their 4th Amendment rights just because of a handful of threats. But that is exactly what is happening at the NSA ... it is wrong and it needs to stop now.” More from Sanchez: "I don't know if there are other leaks, if there's more information somewhere, if somebody else is going to step up, but I will tell you that I believe it's the tip of the iceberg."
  • A House Democrat said information revealed about the National Security Agency's secret surveillance programs are "the tip of the iceberg," Daniel Strauss of The Hill reports. "I think it's just broader than most people even realize, and I think that's, in one way, what astounded most of us, too," Rep. Loretta Sanchez (D-Calif.) told C-SPAN's "Washington Journal" after a classified briefing with national security officials. Rep. Joe Barton (R-Texas), who also attended the meeting, said that the NSA "violated the spirit of the law when it started collecting data from everyone in the country just because technology now makes that possible.” Barton added that "in America ... You don’t target everyone and violate their 4th Amendment rights just because of a handful of threats. But that is exactly what is happening at the NSA ... it is wrong and it needs to stop now.”
  • Glenn Greenwald of the Guardian, who has served as a conduit for Snowden's leaks, recently said that there will me many more "significant revelations that have not yet been heard." Greenwald told The New York Times that he received “thousands” of classified documents — “dozens” of which are newsworthy — from the the 29-year-old ex-Booz Allen employee who was contracted by the NSA. Sanchez said that what lawmakers learned "is significantly more than what is out in the media today," which is interesting when considering previous reports by journalists and whistleblowers.
  • ...2 more annotations...
  • Here's a rundown of the reports and the allegations: In 2006 NSA insiders told Leslie Cauley of USA Today that the NSA has been collecting almost all U.S. phone records since shortly after 9/11. In 2010 Dana Priest and William Arkin of The Washington Post reported that "collection systems at the [NSA] intercept and store 1.7 billion emails, phone calls, and other types of communications" every day. According to a 2007 lawsuit, Verizon built a fiber optic cable to give the "access to all communications flowing through the carrier’s operations center." In April 2012 Wired's James Bamford reported how the U.S. government hired two secretive Israeli companies to wiretap AT&T. AT&T engineer Mark Klein discovered the "secret room" at AT&T central office in San Francisco, through which the NSA actively "vacuumed up Internet and phone-call data from ordinary Americans with the cooperation of AT&T" through the wiretapping rooms, emphasizing that "much of the data sent through AT&T to the NSA was purely domestic." Former NSA executive and whistleblower Thomas Drake testified that the NSA is using Israeli-made hardware to "seize and save all personal electronic communications."
  • A classified program called Prism, leaked by Snowden, appears to acquire information from the servers of nine of the biggest internet companies. The Washington Post reported that the government's orders "serve as one-time blanket approvals for data acquisition and surveillance on selected foreign targets for periods of as long as a year." NSA Whistleblower William Binney that the NSA began using the program he built (i.e. ThinThread) to use communications data for creating, in real time, profiles of nearly all Americans so that the government is "able to monitor what people are doing" and who they are doing it with. In July the Foreign Intelligence Surveillance Court (FISC), established to "hear applications for and grant orders approving electronic surveillance," found that the NSA violated the Fourth Amendment's restriction against unreasonable searches and seizures "on at least one occasion." BONUS: In March CIA Chief Technology Officer Ira "Gus" Hunt said: "It is really very nearly within our grasp to be able to compute on all human generated information." If there is "significantly more" to the NSA's domestic snooping, then we're all ears and eyes.
Paul Merrell

Half of Federal Agencies Still Use Outdated Freedom of Information Regulations - 0 views

  • Nearly half (50 out of 101) of all federal agencies have still not updated their Freedom of Information Act regulations to comply with Congress's 2007 FOIA amendments, and even more agencies (55 of 101) have FOIA regulations that predate and ignore President Obama's and Attorney General Holder's 2009 guidance for a "presumption of disclosure," according to the new National Security Archive FOIA Audit released today to mark Sunshine Week. Congress amended the Freedom of Information Act in 2007 to prohibit agencies from charging processing fees if they missed their response deadlines, to include new online journalists in the fee waiver category for the media, to order agencies to cooperate with the new FOIA ombudsman (the Office of Government Information Services, OGIS), and to require reports of specific data on their FOIA output, among other provisions co-authored by Senators Patrick Leahy (D-VT) and John Cornyn (R-TX). But half the government has yet to incorporate these changes in their regulations, according to the latest National Security Archive FOIA Audit. After President Obama's "Day One" commitments to open government, Attorney General Eric Holder issued new FOIA guidance on March 19, 2009, declaring that agencies should adopt a "presumption of disclosure," encourage discretionary releases if there was no foreseeable harm (even if technically covered by an exemption), proactively post the records of greatest public interest online, and remove "unnecessary bureaucratic hurdles" from the FOIA process. But five years later, the Archive found a majority of agencies have old regulations that simply ignore this guidance.
  • The Archive's FOIA Audit also highlights some good news this Sunshine Week: New plans from both the House of Representatives and White House have the potential to compel delinquent agencies to update their regulations. "Both Congress and the White House now recognize the problem of outdated FOIA regulations, and that is something to celebrate," said Archive director Tom Blanton. "But new regs should not follow the Justice Department's terrible lead, they must follow the best practices already identified by the FOIA ombuds office and FOIA experts." "If and when this important FOIA reform occurs, open government watchdogs must be vigilant to ensure that the agencies' updated regulations are progressive, rather than regressive, and embrace best practices to ensure that more documents are released to requesters, more quickly" said Nate Jones, the Archive's FOIA coordinator.
  • In 2011, the back-to-back Rosemary Award-winning Department of Justice proposed FOIA regulations that would have — among many other FOIA setbacks — allowed the Department to lie to FOIA requesters, eliminated online-only publications from receiving media fee status, and made it easier to destroy records. After intense pushback by openness advocates, the DOJ temporarily pulled these regulations, and Pustay claimed, "some people misinterpreted what we were trying to do, misconstrued some of the provisions, and didn't necessarily understand some of the fee guidelines." Pustay also claimed — to an incredulous Senate Judiciary Committee — that updating FOIA regulations to conform with the 2007 OPEN Government Act was merely optional and "not required." National Security Archive director Tom Blanton warned in his own 2013 Senate testimony that these terrible "vampire" regulations were not gone for good. This year, Pustay testified that the Department of Justice has indeed resubmitted its FOIA regulations for OMB approval; their content is unknown to the public.
  • ...4 more annotations...
  • The House of Representatives recently unanimously passed the bipartisan Freedom of Information Act Implementation Act (H.R. 1211), which includes a provision compelling agencies to update their FOIA regulations. The House bill — which now awaits Senate approval — would require each agency to update its FOIA regulations "not later than 180 days after the enactment of this Act." The White House is also addressing the problem of outdated FOIA regulations, albeit in a different manner. In its latest Open Government Partnership National Action Plan, the White House has committed (on paper, at least) to creating one "core FOIA regulation and common set of practices [that] would make it easier for requesters to understand and navigate the FOIA process and easier for the Government to keep regulations up to date." Transparency watchdogs went on alert this week after the Department of Justice's Director of Information Policy Melanie Pustay announced during her Senate testimony on March 11, 2014 that, "My office is leading that project" to create the White House-backed common regulation which, she estimated will be, "a one or two year project." Despite Pustay's pledge that she would accept input from OGIS and the requester community, her Department's history of crafting FOIA regulations has been anything but stellar.
  • As the Department of Justice and other agencies have demonstrated, new regulations do not necessarily make good regulations. As such, the National Security Archive has recommended that any updated FOIA regulations must: mandate that FOIA officers embrace direct communications with requesters; require agencies to receive requests by e-mail and post all responses and documents online; direct agencies to update their FOIA processing software so documents can be posted to any online repository, including the government-sponsored FOIAonline; encourage agencies to join FOIAonline to make their FOIA processing more cost-effective and efficient; stream-line inter and intra-agency "referral" black holes — and keep requesters abreast of where their requests are if the agency does have to refer them; include language encouraging use of the OGIS, which can help requesters and agencies mediate disputes to avoid animosity and costly litigation; end the practice of using fees to discourage FOIA requesters. The Office of Government Information Services — which reviews and comments on agency regulations as they are proposed — has also compiled a list of best practices for agencies to consider while crafting regulations. These include: "let the Freedom of Information Act itself" — and its presumption for disclosure — "be your guide;" bring attorneys, FOIA processors, records managers and IT pros to the table; include your plan for records management and preservation; and alert requesters of their option to contact OGIS for mediation and dispute resolution services.
  • A useful compilation of current agency FOIA regulation language — already on the books — put together by the Center of Effective Government also includes helpful guidelines on preventing the destruction of requested records; narrowly interpreting claims of confidential business information; and clarifying fee waivers and procedures. FOIA experts are currently working to craft model, pro-transparency, CFR-ready language that agencies — or the drafters of government-wide common regulations — can use to bring agencies' Freedom of Information Act regulations up to standard. Watch this space, and then watch the Code of Federal Regulations (CFR). "As the staffer who waded through every single federal agencies' FOIA website and CFR chapter to locate their — sometimes hidden — regulations, I learned FOIA officials often say they view their FOIA requesters as customers," said Archive researcher Lauren Harper, "I think easy to find, updated model FOIA regulations are the best way for agencies to demonstrate they truly value their customer service, and the spirit of the FOIA."
  • The National Security Archive has conducted thirteen FOIA audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  •  
    Article includes tables indicating which agencies are out of compliance with which FOIA directives. 
Paul Merrell

Failure of the US coup d'État in Macedonia , by Thierry Meyssan - 0 views

  • Macedonia has just neutralised an armed group whose sponsors had been under surveillance for at least eight months. By doing so, it has prevented a new attempt at a coup d’État, planned by Washington for the 17th of May. The aim was to spread the chaos already infecting Ukraine into Macedonia in order to stall the passage of a Russian gas pipeline to the European Union.
  • n the 9th of May, 2015, the Macedonian police launched a dawn operation to arrest an armed group which had infiltrated the country and which was suspected of preparing a number of attacks. The police evacuated the civilian population before launching the assault.
  • The suspects opened fire, which led to a bitter firefight, leaving 14 terrorists and 8 members of the police forces dead. 30 people were taken prisoner. There were a large number of wounded
  • ...7 more annotations...
  • The Macedonian police were clearly well-informed before they launched their operation. According to the Minister for the Interior, Ivo Kotevski, the group was preparing a very important operation for the 17th May (the date of the demonstration organised by the Albanophone opposition in Skopje). The identification of the suspects has made it possible to determine that they were almost all ex-members of the UÇK (Kosovo Liberation Army) [1].
  • Among them were : • Sami Ukshini, known as « Commandant Sokoli », whose family played a historic rôle in the UÇK. • Rijai Bey, ex-bodyguard of Ramush Haradinaj (himself a drug trafficker, military head of the UÇK, then Prime Minister of Kosovo. He was twice condemned for war crimes by the International Penal Tribunal for ex-Yugoslavia, but was acquitted because 9 crucial witnesses were murdered during the trial). • Dem Shehu, currently bodyguard for the Albanophone leader and founder of the BDI party, Ali Ahmeti. • Mirsad Ndrecaj, known as the « NATO Commandant », grandson of Malic Ndrecaj, who is commander of the 132nd Brigade of the UÇK. The principal leaders of this operation, including Fadil Fejzullahu (killed during the assault), are close to the United States ambassador in Skopje, Paul Wohlers.
  • To eliminate any doubt about the identity of the operation’s sponsors, the General Secretary of NATO, Jens Stoltenberg, intervened even before the assault was over - not to declare his condemnation of terrorism and his support for the constitutional government of Macedonia, but to paint a picture of the terrorist group as a legitimate ethnic opposition : « I am following the events in Kumanovo with deep concern. I would like to express my sympathy to the families of those who were killed or wounded. It is important that all polititcal and community leaders work together to restore order and begin a transparent investigation in order to find out what happened. I am calling for everyone to show reserve and avoid any new escalation of violence, in the intersts of the nation and also the whole region. » You would have to be blind not to understand.
  • In January 2015, Macedonia foiled an attempted coup d’état organised for the head of the opposition, the social-democrat Zoran Zaev. Four peole were arrested, and Mr. Zaev had his passport confiscated, while the Atlantist press began its denunciation of an « authoritarian drift by the régime » (sic). Zoran Zaev is publicly supported by the embassies of the United States, the United Kingdom, Germany and Holland. But the only trace left of this attempted coup d’état indicates the repsponsibility of the US. On the 17th May, Zoran Zaev’s social-democrat party (SDSM) [2] was supposed to organise a demonstration. It intended to distribute 2,000 masks in order to prevent the police from identifying the terrorists taking part in the march. During the demonstration, the armed group, concealed behind their masks, were supposed to attack several institutions and launch a pseudo-« revolution » comparable to the events in Maidan Square, Kiev.
  • This coup d’État was coordinated by Mile Zechevich, an ex-employee of one of George Soros’ foundations. In order to understand Washington’s urgency to overthrow the Macedonian government, we have to go back and look at the gas pipeline war. Because international politics is a huge chess-board on which every move by any piece causes consequences for all the others.
  • The United States have been attempting to sever communications between Russia and the European Union since 2007. They managed to sabotage the projet South Stream by obliging Bulgaria to cancel its participation, but on the 1st December 2014, to everyone’s surprise, Russian President Vladimir Putin launched a new project when he succeeded in convincing his Turkish opposite number, Recep Tayyip Erdoğan, to sign an agreement with him, despite the fact that Turkey is a member of NATO [3]. It was agreed that Moscow would deliver gas to Ankara, and that in return, Ankara would deliver gas to the European Union, thus bypassing the anti-Russian embargo by Brussels. On the 18th of April 2015, the new Greek Prime Minister, Alexis Tsípras, gave his agreement that the pipeline could cross his country [4] . As for Macedonian Prime Minister Nikola Gruevski, he had already conluded discrete negotiations last March [5]. Finally, Serbia, which had been a partner in the South Stream project, indicated to the Russian Minister for Energy Aleksandar Novak, during his reception in Belgrade in April, that Serbia was ready to switch to the Turkish Stream project [6].
  • To halt the Russian project, Washington has multiplied its initiatives :  in Turkey, it is supporting the CHP against President Erdoğan, hoping this will cause him to lose the elections;  in Greece, on the 8th May, it sent Amos Hochstein, Directeur of the Bureau of Energy Ressources, to demand that the Tsípras government give up its agreement with Gazprom;  it plans – just in case – to block the route of the pipeline by placing one of its puppets in power in Macedonia;  and in Serbia, it has restarted the project for the secession of the small piece of territory - Voïvodine - which allows the junction with Hungary [7]. Last comment, but not the least: Turkish Stream will also supply Hungary and Austria, thus ending the alternative project negotiated by the United States with President Hassan Rohani (against the advice of the Revolutionary Guards) for supplying them with Iranian gas [8].
Paul Merrell

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
Paul Merrell

Venezuela's Maduro Granted Decree Powers by Parliament to Confront Imperialism | venezu... - 0 views

  • Venezuelan President Nicolas Maduro looks set to pass landmark legislation aimed at shielding the country from continued US aggression, after the Venezuelan parliament approved his request for temporary decree powers on Sunday.  Officially submitted to parliament last week, the petition was a response to the release of an Executive Order from the White House which classified Venezuela as an “extraordinary threat to U.S. national security”. The designation was preceded by a series of sanctions against Venezuelan officials enacted by the Obama administration, which cited unsubstantiated allegations of human rights abuses.  Venezuela and almost all countries in the Latin American region have interpreted the move as an act of interference and aggression. 
  • Venezuelans Mobilize in Marches and Military Exercises in Defense of Sovereignty Against U.S. Aggression
  • Entitled the "Anti-Imperialist Enabling Law for Peace", the latest decree powers will last for a period of nine months and allow the president to pass legislation in pre-established areas without parliamentary debate and consent - a process which can take several years.  According to the draft presented by Maduro to parliament, the four articles which make up the law are designed to “prepare the country for any eventuality”. 
  • ...4 more annotations...
  • UNASUR Rejects US Aggressions on Venezuela Mar 16th Venezuelan Social Movements Take to the Streets to Oppose U.S. Aggression Mar 13th Venezuelan Assembly Grants Executive Powers while Military Drills in Defensive Exercises
  • Initially written into Venezuela’s Constitution in 1961, the enabling laws are often used when the president is deemed to be responding to a situation which requires immediate action. Nonetheless, they require at least 60% approval from the National Assembly and consent from a designated specialist commission.  The laws have subsequently been used by several Venezuelan presidents, including former president Hugo Chavez in 1999, 2000, 2007 and 2010.  President Maduro last made use of the laws in 2013 in order to pass a slew of anti-corruption legislation, for which he was condemned by the Obama administration for allegedly overstepping his boundaries as chief executive. However, critics have fired back that Obama's own executive orders targetting Venezuela with sanctions do not, by contrast, require legislative approval.
  • Although few details are known about the prospective laws, on Sunday Cabello confirmed that the government was looking to create a norm in order to “repatriate all Venezuelan capital” being held in the U.S. 
  • While legislators from the ruling United Socialist Party of Venezuela (PSUV) voted unanimously in favour of the law, its use was opposed by all but one opposition legislator. A dissident from the opposition coalition, the Roundtable of Democratic Unity, Ricardo Sanchez, stated that his defence of the law came down to “whether we are prepared to defend the sacred soil or whether we will be collaborators with foreign boots."  “If this (executive order) isn’t the preamble to a military intervention, then it certainly looks like one,” stated the legislator to private press.  Many opposition politicians have longstanding ties to the United States, and some parties such as Voluntad Popular (The Popular Will party) have received funding from US "democracy promotion" organisations such as the NED (National Endowment Democracy) and USAID (U.S. Agency for International Development). 
  •  
    Fears of a U.S. invasion have become widespread in Venezuela after two failed U.S.-instigated coup attempts, sanctions issued by Obama, and bellicose statements by prominent War Party members of the U.S. Congress.   
Paul Merrell

IMF's Lagarde guilty of 'negligence' but avoids sentence over 2008 payout - France 24 - 0 views

  • A French court on Monday convicted International Monetary Fund chief Christine Lagarde of "negligence" for her role in a controversial €400 million payout to a French tycoon in 2008 while she was finance minister. The Court of Justice did not hand down a sentence, a decision welcomed by her lawyer, Patrick Maisonneuve, as a "partial" victory. “We wanted a complete acquittal, instead we got a partial one,” said Maisonneuve. “The court has decided to not to penalise her – in fact, the court even decided this should not go on Madame Lagarde’s criminal record.” Lagarde, 60, was accused of approving a controversial €400 million ($425 million) payout to businessman Bernard Tapie in an out-of-court settlement when she was finance minister under former president Nicolas Sarkozy.
  • An arbitration panel ordered the payout to Tapie in connection with his sale of sportswear company Adidas. The panel upheld Tapie's claim that the Crédit Lyonnais bank had defrauded him by intentionally undervaluing Adidas at the time of the sale and that the state – as the bank's principal shareholder – should compensate him. It was Lagarde who, in her role as French finance minister, ordered the case to be heard by an arbitration panel instead of proceeding through the regular courts. Critics say that Lagarde ensured Tapie received preferential treatment by referring the matter to arbitration as a quid pro quo for his financial support for Sarkozy during his 2007 presidential bid. They also argue that the state should not have paid compensation to a convicted criminal who was bankrupt at the time and would not have been able to pursue the case in court. Tapie spent six months in prison in 1997 for match-fixing during his time as president of popular French football club, Olympique Marseille.
  • Tapie was placed under formal investigation for committing fraud in late June of 2013. He was ordered to pay back the money starting in December of last year. The "Tapie affair" has entangled several other high-profile figures, including Sarkozy’s ex-chief of staff Claude Guéant and Stéphane Richard, Lagarde’s former chief of staff at the finance ministry and now chief executive of Orange. Lagarde was appointed managing director of the IMF in July 2011. Lagarde served as French finance minister from June 2007 and also served as minister of foreign trade for two years. Before entering politics she worked as an anti-trust and labour lawyer, and was a partner with the international law firm of Baker & McKenzie.
Paul Merrell

Al Jazeera once again removes Joseph Massad article on Palestine | The Electronic Intifada - 0 views

  • Al Jazeera English has once again removed an article by Columbia University professor Joseph Massad hours after publishing it. The article, “The Dahlan Factor,” appeared for several hours on the Qatar-based broadcaster’s website this morning at this link, but was later removed without explanation (the full article is republished below). The article had been extremely popular, appearing in the fifth spot on the website’s “What’s Hot” section.
  • Massad’s article: The Dahlan factor The Israeli and US betting on the Dahlan horse will only increase the resolve of the Palestinians and their supporters
  • The recent resurrection of Mohammad Dahlanby several Arab governments, Israel and the US is a most important development for the future of the Palestinian cause, Palestinian Authority (PA)-Israel negotiations, and Hamas-ruled Gaza. Dahlan is viewed, by many Palestinians, as the most corrupt official in the history of the Palestinian national movement (and there are many contenders for that title). Dahlan, it would be recalled, was the PA man in charge of Gaza after the Oslo Accords were signed, where he commanded 20,000 Palestinian security personnel who were answerable to the CIA and to Israeli intelligence. His forces would torture Hamas members in PA dungeons throughout the 1990s. His corruption, at the time, was such that he allegedly diverted over 40 percent of taxes levied against the Palestinians to his personal account in what became known as the Karni Crossing Scandal in 1997. Dahlan, who has been accused repeatedly by both Hamas and Fatah of being an agent of US, Israeli, Egyptian, and Jordanian intelligence, would attempt to stage a US-organised coup against the democratically elected Hamas government in 2007 in Gaza, an attempt that backfired on him and ended with his eviction from the Strip (I had forewarned about the coup several months before it occurred).
  • ...6 more annotations...
  • A simultaneous coup led by Abbas and his Israeli- and US-backed security forces in the West Bank was successful in dislodging the elected Hamas from power. Dahlan retreated to that mainstay of US and Israeli power, namely the PA-controlled West Bank, where he began to hatch new plots with his multiple patrons to undermine not only Hamas but also Abbas, whose position he begrudged and coveted. Indeed the Americans and the European Union (the latter on US orders) began to pressure Abbas to appoint Dahlan as his deputy, making it clear that they would like to see Dahlan succeed Abbas. Abbas resisted the pressure and refused. In the meantime, Dahlan, has been accused by Hamas and the PA of allegedly plotting several assassination attempts that targeted several Palestinian officials, including Hamas Prime Minister Ismail Haniyyah and Fatah ministers in the PA. Accusations that he persistently denied. His involvement in the 2010 Mossad assassination of a Hamas official in Dubai included having two of his Palestinian death squad hit men (later arrested by Dubai authorities) assist in the operation, a charge he also denied. His personal wealth was conservatively estimated in 2005 by an Israeli think tank at $120m.
  • Just as George Bush Jr and Bill Clinton terminated the services of Arafat after the latter proved unable to sign off on the final Palestinian surrender demanded of him at Camp David in the summer of 2000 (an inability that would arguably cost him his life at the hands of Abbas or Dahlan - depending on which of the two you talk to - acting at the behest of the Israelis, and very likely the Americans), Obama will terminate the services of Abbas should he fail to sign the US-sponsored surrender. Indeed, even if Abbas does sign such a deal, as he is approaching his 80th birthday, Dahlan will be needed and ready to take over after his death. It is in this context that Egyptian army top brass recently visited Israel for a whole week while the Egyptian private TV station Dream (owned by a Mubarak businessman ally, Ahmad Bahgat) aired an interview with Dahlan in which he attacked Abbas, in yet another effort to delegitimise the latter. Dahlan was offered the support of the rightwing Egyptian businessman Naguib Sawiris (infamous for his cutting off cellular phone lines in Cairo during the Egyptian uprising in January 2011 on the orders of Mubarak’s security apparatus), who sang Dahlan’s praises (as well as those of Mohammad Rashid, aka Khaled Salam, a former Arafat aide and another allegedly corrupt embezzling fugitive) as one of the most honest businessmen he ever worked with and then proceeded to denounce Abbas as a “liar”.
  • Dahlan’s power lies in his ability to serve the agenda of multiple patrons. For the Israelis, he is a ruthless, corrupt power-grubbing man who would do their bidding obediently were he to come to power in Gaza or the West Bank. Both the Americans and the Israelis see him as especially willing to sign on an American-sponsored Netanyahu deal without equivocation. For the Egyptians and the Gulf monarchies (and he is said to be a business partner with a Gulf ruler), he would look after their interests and obey their orders by eliminating any resistance to a US-imposed Palestinian final surrender to Israel and by eliminating Hamas once and for all. For the Egyptian coup leaders, whose coup replicated Dahlan’s 2007 Gaza coup, except successfully, he could rid them of Hamas, which they see as an extension of the power of the Muslim Brotherhood (MB), and render their relations with Israel even closer than they already are. Dahlan’s most important role, however, is the one that the Americans need him for, namely, to replace Abbas should the latter fail to sign on to the final surrender that Barack Obama and John Kerry have been cooking at the behest of Netanyahu in the past few months.
  • Once Dahlan’s schemes became too obvious to ignore, Abbas stripped him of power and chased him out of the Ramallah Green Zone in 2010. He moved to Mubarak’s Egypt and later, following the ouster of Mubarak, to Dubai (and on occasion Europe) where he remained until his more recent resurrection by the heirs of Mubarak who now sit on Egypt’s throne.
  • As an Egyptian court has recently joined Israel and the US in banning Hamas from the country and considering it a terrorist organisation and as the Israelis have threatened openly this week that an invasion of Gaza will be necessary, the plan for a Dahlan take-over is hatching slowly but surely. This is viewed as such a threat that Abbas dispatched his supporters and cronies to the streets of Ramallah to prove to the Americans and the Israelis that he still commands much support in the West Bank. The competition between Abbas and Dahlan is essentially one where each of them wants to prove that he can be more servile to Israeli, US, Egyptian, and Gulf interests while maintaining legitimacy and full control of the Palestinian population. The details of the plot are not clear. They could involve an invasion of Gaza from the Egyptian and the Israeli sides (and Egyptian officials have already threatened to carry out such an invasion a few weeks ago), a coup of sorts in the West Bank, and even assassinations of Haniyyah and/or Abbas. All bets are off at the moment, as Abbas, like Arafat before him, is offering complete obedience to US and Israeli diktat and will go much farther than Arafat did, but he understands too well that he would lose all legitimacy and control were he to sign the final humiliating surrender that the US and Israel are insisting on. Dahlan of course will have no such worries.
  • As for Hamas, which, unlike the MB, is a resistance movement and not a political party, it cannot be rounded up or crushed so easily, and the entry of Dahlan into Gaza, let alone the West Bank, will usher in a civil war that could likely end in his defeat yet again, short of a full Israeli invasion of Gaza to return him to power (Dahlan has also been accused by the PA of collaborating with the Israelis in their 2008 invasion of Gaza and has recently been accused in aiding the ongoing counter-revolution in Egypt). The same scenario would be repeated in the West Bank. The future of the Palestinian people is in danger and the enemies of the Palestinians surround them inside and outside Palestine. The Obama-Israeli-Egyptian-Gulf plans for liquidating their cause and their rights continue afoot. However, just like past corrupt Palestinian leaders were unsuccessful in liquidating the rights of the Palestinians and their cause, the Israeli and US betting on the Dahlan horse will only increase the resolve of the Palestinian people and their supporters that Palestinian resistance will only cease after the final liquidation of Israeli state racism and colonialism in all its manifestations throughout historic Palestine.
Paul Merrell

Morris Davis: Here's why I resigned as the chief prosecutor at Guantanamo - LA Times - 0 views

  • en years ago today, I informed Gordon England, then the Deputy Secretary of Defense, that I could no longer serve as chief prosecutor for the military commissions at Guantanamo Bay. I requested immediate reassignment to another post and, within an hour, my request was approved. Soon after, I received an order not to speak to anyone about why I quit.Here’s why I quit. Earlier that day, I had been handed an order, signed by England, that reorganized the chain of command, effective immediately. The order had placed Air Force Brig. Gen. Thomas W. Hartmann above me, and it had placed William J. Haynes II, the general counsel of the Department of Defense, above Hartmann.Haynes, you might recall, signed the infamous torture memo — the one authorizing enhanced interrogation at Guantanamo that was approved by former Defense Secretary Donald Rumsfeld.
  • Hartmann had arrived a few months before, in July 2007, to serve as chief counsel to the official overseeing the military commissions. He was anxious to get convictions and wanted me to use all evidence, regardless of how it was acquired. For two years, my policy had been that the prosecution would not use evidence obtained by torture, because evidence obtained by torture is tainted. By the end of his first month, Hartmann had already tried to challenge this well-established fact. When I learned that two men who sanctioned torture were above me in the chain of command, I concluded that I could not ensure fair trials for the detainees at Guantanamo. Nor could I put my head down and ignore the fact that the United States employed a practice it had long condemned.I wish I could say that, in the following decade, the U.S. recovered from the shock of the Sept. 11 terrorist attacks, recognized the errors it made and regained its legal and moral standing on the issue of torture. That would be fake news.
Paul Merrell

WikiLeaks: US Government Plotted To Kill Bolivian President Evo Morales - 0 views

  • Cables leaked by U.S. Army whistleblower Chelsea Manning reveal an apparent plot by the U.S. government to assassinate Bolivian President Evo Morales and overthrow his administration. The cables in question were published in August in “The WikiLeaks Files: The World According to US Empire,” a book in which multiple journalists along with Julian Assange analyze the contents of the treasure trove of cables Manning provided to WikiLeaks in 2010. The book devotes a section to what “The WikiLeaks Files” contributors Alexander Main and Dan Beeton call “the day-to-day mechanics of Washington’s political intervention in Latin America.” According to the cables, the plot to orchestrate a coup or carry out an assassination against Morales came after years of resistance by the Morales government to the United States’ Latin American agenda. TeleSUR, a Latin American TV network, reported last week that the Bolivian government is continuing a formal investigation into the allegations, despite denials by U.S. government officials:
  • “In a strongly worded statement the U.S. Embassy in Bolivia said, ‘The government of the United States was not involved in any conspiracy, attempt to overthrow the government of Bolivia or assassinate President Morales. This kind of unfounded allegations does not contribute to improving bilateral relations.’” These allegations of a U.S. plot mirror recent revelations that the DEA is targeting the Morales government with secret drug indictments after his administration kicked the U.S. agency out of Bolivia to pursue their own, locally-oriented and highly successful cocaine-reduction strategies. Contrary to the official denials, the WikiLeaks cables show how the U.S. escalated attempts to put pressure on Morales and his government over several years. According to Main and Beeton’s analysis of the cables, pressure on Morales began soon after his 2005 election as part of a wave of left-leaning candidates winning elections in Latin America. But Morales resisted U.S. directives and continued with his plans to nationalize the fossil fuels industry and move away from dependence on foreign aid and international loans. The cables suggest that starting from 2007 the U.S. government began providing aid to the “Media Luna” region of Bolivia, which is controlled by Morales’ opposition:
  • “A USAID report from 2007 stated that its Office of Transition Initiatives (OTI) ‘ha[d] approved 101 grants for $4,066,131 to help departmental governments operate more strategically.’ Funds also went to local indigenous groups that were ‘opposed to Evo Morales’ vision for indigenous communities.’” A year later, the residents of Media Luna were rebelling against the Morales government in clashes that led to 20 deaths. A coup seemed imminent, and the opposition had the support of U.S. officials: “[T]he United States was in regular communication with the leaders of the separatist opposition movement, even as they spoke openly of ‘blow[ing] up gas lines’ and ‘violence as a probability to force the government to . . . take seriously any dialogue.’” While officially supporting the Morales administration in public statements, the cables show the U.S. government preparing “a plan for immediate response in the event of a sudden emergency, i.e. a coup attempt or President Morales’ death.” Tensions only eased as other South American governments declared their support for Bolivia’s democratically-elected government.
  • ...1 more annotation...
  • Juan Ramon Quintana, Bolivia’s minister of the presidency, emphasized the U.S. Embassy in Bolivia’s direct role in the plot, according to teleSUR: “In 2007 the embassy of the United States installed a Center of Operations in order to execute a civil-prefectural coup to apply plan A, which was the coup, and plan B, which was the assassination.” TeleSUR noted that, “Relations between the U.S. and Bolivia have been strained since 2009, when President Morales expelled the U.S. ambassador from the country for supporting [an] opposition-led conspiracy against him,” a move that led then-Secretary of State Hillary Clinton to accuse the president of “fear-mongering.”
Paul Merrell

Annals of National Security: The Redirection : The New Yorker - 0 views

  • In the past few months, as the situation in Iraq has deteriorated, the Bush Administration, in both its public diplomacy and its covert operations, has significantly shifted its Middle East strategy. The “redirection,” as some inside the White House have called the new strategy, has brought the United States closer to an open confrontation with Iran and, in parts of the region, propelled it into a widening sectarian conflict between Shiite and Sunni Muslims. To undermine Iran, which is predominantly Shiite, the Bush Administration has decided, in effect, to reconfigure its priorities in the Middle East. In Lebanon, the Administration has coöperated with Saudi Arabia’s government, which is Sunni, in clandestine operations that are intended to weaken Hezbollah, the Shiite organization that is backed by Iran. The U.S. has also taken part in clandestine operations aimed at Iran and its ally Syria. A by-product of these activities has been the bolstering of Sunni extremist groups that espouse a militant vision of Islam and are hostile to America and sympathetic to Al Qaeda.
  • Jumblatt said, “We told Cheney that the basic link between Iran and Lebanon is Syria—and to weaken Iran you need to open the door to effective Syrian opposition.” There is evidence that the Administration’s redirection strategy has already benefitted the Brotherhood. The Syrian National Salvation Front is a coalition of opposition groups whose principal members are a faction led by Abdul Halim Khaddam, a former Syrian Vice-President who defected in 2005, and the Brotherhood. A former high-ranking C.I.A. officer told me, “The Americans have provided both political and financial support. The Saudis are taking the lead with financial support, but there is American involvement.” He said that Khaddam, who now lives in Paris, was getting money from Saudi Arabia, with the knowledge of the White House. (In 2005, a delegation of the Front’s members met with officials from the National Security Council, according to press reports.) A former White House official told me that the Saudis had provided members of the Front with travel documents.
  • Jumblatt then told me that he had met with Vice-President Cheney in Washington last fall to discuss, among other issues, the possibility of undermining Assad. He and his colleagues advised Cheney that, if the United States does try to move against Syria, members of the Syrian Muslim Brotherhood would be “the ones to talk to,” Jumblatt said.
  • ...5 more annotations...
  • Partition would leave Israel surrounded by “small tranquil states,” he said. “I can assure you that the Saudi kingdom will also be divided, and the issue will reach to North African states. There will be small ethnic and confessional states,” he said. “In other words, Israel will be the most important and the strongest state in a region that has been partitioned into ethnic and confessional states that are in agreement with each other. This is the new Middle East.”
  • Fourth, the Saudi government, with Washington’s approval, would provide funds and logistical aid to weaken the government of President Bashir Assad, of Syria. The Israelis believe that putting such pressure on the Assad government will make it more conciliatory and open to negotiations.
  • Nasrallah said he believed that America also wanted to bring about the partition of Lebanon and of Syria. In Syria, he said, the result would be to push the country “into chaos and internal battles like in Iraq.” In Lebanon, “There will be a Sunni state, an Alawi state, a Christian state, and a Druze state.” But, he said, “I do not know if there will be a Shiite state.”
  • Flynt Leverett, a former Bush Administration National Security Council official, told me that “there is nothing coincidental or ironic” about the new strategy with regard to Iraq. “The Administration is trying to make a case that Iran is more dangerous and more provocative than the Sunni insurgents to American interests in Iraq, when—if you look at the actual casualty numbers—the punishment inflicted on America by the Sunnis is greater by an order of magnitude,” Leverett said. “This is all part of the campaign of provocative steps to increase the pressure on Iran. The idea is that at some point the Iranians will respond and then the Administration will have an open door to strike at them.”
  • “It seems there has been a debate inside the government over what’s the biggest danger—Iran or Sunni radicals,” Vali Nasr, a senior fellow at the Council on Foreign Relations, who has written widely on Shiites, Iran, and Iraq, told me. “The Saudis and some in the Administration have been arguing that the biggest threat is Iran and the Sunni radicals are the lesser enemies. This is a victory for the Saudi line.”
  •  
    Propaganda issued by the U.S. government has it that the war in Syria began with peaceful protesters seeking reform of the Syrian government. This Seymour Hersh article from 2007 gives us a better glimpse of the truth, that the Neocon-led Bush II Administration worked with Saudi Arabia to undermine the Syrian government using radical Sunnis as their vehicle. That is in line with the Israeli/Zionist long-term plan to Balkanize other nations in the Mideast while expanding Israeli territory and influence. 
1 - 20 of 82 Next › Last »
Showing 20 items per page