Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged 2010

Rss Feed Group items tagged

Gary Edwards

RealClearMarkets - Yes, IRS Harassment Blunted The Tea Party Ground Game - 0 views

  • We found that the effect was huge: the movement brought the Republican Party some 3-6 million additional votes in House races.
  • The bottom line is that the Tea Party movement, when properly activated, can generate a huge number of votes-more votes in 2010, in fact, than the vote advantage Obama held over Romney in 2012.
    • Gary Edwards
       
      Wow!  So the IRS re-elected Obama?  This is a bureaucratic coup.  We are living in a cleptocracy where the citizens treasury is being systematically looted by Federal bureacracies who are in position and powerfully corrupt enough to elect the representatives who enable them to loot at will. 
  • The data show that had the Tea Party groups continued to grow at the pace seen in 2009 and 2010,
  • ...8 more annotations...
  • and had their effect on the 2012 vote been similar to that seen in 2010, they would have brought the Republican Party as many as 5 - 8.5 million votes compared to Obama's victory margin of 5 million.
  • Unfortunately for Republicans, the IRS slowed Tea Party growth before the 2012 election.
  • In March 2010, the IRS decided to single Tea Party groups out for special treatment when applying for tax-exempt status by flagging organizations with names containing "Tea Party," "patriot," or "9/12."
  • For the next two years, the IRS approved the applications of only four such groups, delaying all others while subjecting the applicants to highly intrusive, intimidating requests for information regarding their activities, membership, contacts, Facebook posts, and private thoughts.
  • As a consequence, the founders, members, and donors of new Tea Party groups found themselves incapable of exercising their constitutional rights, and the Tea Party's impact was muted in the 2012 election cycle.
  • it doesn't take a conspiracy theorist to note that the president's team was competent enough to recognize the threat from the Tea Party and take it seriously.
  • The Obama campaign has made no secret of its efforts to revolutionize turnout models for the most recent campaign.
  • Its remarkable competence turning out its own voters has been widely discussed, and it seems quite plausible that efforts to suppress the Republican vote would have been equally sophisticated.
  •  
    excerpt: .................... The controversy over the IRS's harassment of conservative groups continues. President Obama's team continues to blame low-level bureaucrats. Some conservatives suspect a more sinister explanation: that the levers of government were used to attack an existential threat to the president's 2012 reelection. The president and his party dismiss this as a paranoid fantasy. The evidence, however, is enough to make one believe that targeting Tea Party groups would have been an effective campaign strategy going into the 2012 election cycle. It is a well-known fact that the Tea Party movement dealt the president his famous "shellacking" in the 2010 mid-term election. Less well-known is the actual number of votes this new movement delivered-and the continuing effects these votes could have had in 2012 had the movement not been de-mobilized by the IRS. In a new research paper, Andreas Madestam (from Stockholm University), Daniel Shoag and David Yanagizawa-Drott (both from the Harvard Kennedy School), and I set out to find out how much impact the Tea Party had on voter turnout in the 2010 election. We compared areas with high levels of Tea Party activity to otherwise similar areas with low levels of Tea Party activity, using data from the Census Bureau, the FEC, news reports, and a variety of other sources. We found that the effect was huge: the movement brought the Republican Party some 3-6 million additional votes in House races. That is an astonishing boost, given that all Republican House candidates combined received fewer than 45 million votes. It demonstrates conclusively how important the party's newly energized base was to its landslide victory in those elections, and how worried Democratic strategists must have been about the conservative movement's momentum. The Tea Party movement's huge success was not the result of a few days of work by an elected official or two, but involved activists all over the country who spent the year and a hal
  •  
    One interesting facet of this scandal is that the IRS in its own regulations rewrote a law passed by Congress in the early 50s to permit non-profit corporations to devote part of their resources to political issues. As passed by Congress, it says that the non-profits must be "exclusively" charitable in nature. But when the IRS wrote its implementing regulations, it substituted "primarily" for "exclusively," thus allowing the non-profits to engage in political political campaigns to an undefined extent and getting the IRS into the business of looking at political credentials rather than a simpler review of whether the given non-profit's purpose is purely charitable. Thus, a question of what should be done about this. Roughly, the choices are: [i] amend the statute to read "primarily;" or [ii] leave the statute alone and have someone litigate to correct the IRS regulations. The latter path, if followed, should result in ending *all* non-profits' participation in political campaigns. The advantage of the latter path is that it gets the IRS out of the business of picking whose politics they like. The disadvantage is that it gores a huge number of non-profits' oxen across the political spectrum, so a major lobbying effort to rewrite the statute to maintain the status quo is predictable. But with a court decision holding that the IRS got it wrong, that non-profits must be "exclusively" charitable, presumably it would be illegal for non-profits to do that campaigning themselves.
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Gary Edwards

Replaying 1929: Longwave Economics and Predictive LInguistics - 0 views

  •  
    Urban Survival website.  George Ure & Clif High will discuss their Web Bot technology on Coast to Coast 4/01/2010, which has continued to give archetype descriptors of future events. They'll share predictions about world events and the U.S. economy, and what's in store for the summer of 2010. The WebBot predictions are based on a massive algorithm analyzing conversations and documents.  They focus on key words, basing their predictions on human intuition.  amazing stuff.  One of the terms that stuck out is that of "SKED", a Roman term used to describe the debating analysis of a opposing speakers where, the language and presentation style of the opponent was believed to reveal the reality of who they were, where they came from  and what was their heartfelt viewpoint. SKED istself could also stand for subjective knowledge escalated through global distribution. Great predictions.  Watch out for July 2010, where the revolution against the illuminati gets very real.  The dollar is being intentionally diminished and destroyed.  This will culminate in November of 2010, with something approaching civil war in the USA brought on by the collapse of the dollar.
Paul Merrell

Feds May Have To Reveal FISA Phone Records In Murder Case | Techdirt - 0 views

  • There's been a lot of focus elsewhere concerning the FISA rulings that were leaked, showing that the government is scooping up the details of pretty much every phone call. However, a case concerning some guys who were trying to rob an armored truck may lead to some interesting revelations related to what the government collects. Daryl Davis, Hasam Williams, Terrance Brown, Toriano Johnson, and Joseph K. Simmons were charged with trying to rob a bunch of armored Brink's trucks, in which one of the robberies went wrong and a Brink's employee was shot and killed. As part of the case against the group, the DOJ obtained call records. However, during discovery, the government refused to hand over call records for July of 2010, claiming that when they sought them from the telco, the DOJ was told that those records had been purged. Terrance Brown's lawyer is now claiming that since it appears the NSA has sucked up all of this data for quite some time, it would appear that the government should, in fact, already have the phone records from July 2010, which he argues would show that he was nowhere near the robbery when it happened. Defendant Brown urges that the records are important to his defense because cell-site records could be used to show that Brown was not in the vicinity of the attempted robbery that allegedly occurred in July 2010. And, relying on a June 5, 2013, Guardian newspaper article that published a FISA Court order relating to cellular telephone data collected by Verizon,1 Defendant Brown now suggests that the Government likely actually does possess the metadata relating to telephone calls made in July 2010 from the two numbers attributed to Defendant Brown.
  • The court agrees that, under the law, the government may need to produce those records. Here, Defendant asserts that, under Brady v. Maryland, 373 U.S. 83 (1963), due process requires the production of the July 2010 telephone records because they are anticipated to be exculpatory in that they are expected to show that Defendant Brown was not physically located at the scene of the alleged attempted Brink’s truck robbery in July 2010. In view of Defendant Brown’s Motion and the requirements of FISA, it is hereby ORDERED and ADJUDGED that the Government shall respond to Defendant Brown’s Motion and, if desired, shall file an affidavit of the Attorney General of the United States. That order was actually issued Monday, only giving the government until yesterday to comply. At the time of posting, the government's reply has not yet shown up in PACER, though it may pop up soon. I'm guessing that they'll try to either get some sort of extension or explain why those records are somehow inaccessible -- but it could get interesting.
  •  
    This is definitely one to watch. The Court's order is short but definitely enlightening. The defendant's trial is already under way, so the Court set a very short response time, and required the Feds to concurrently file the affidavit of the Attorney General if the Feds want to claim that disclosure would harm national security. She has also ordered that the Feds concurrently explain any belief that thre information was lawfully gathered, citing some specific portions of the FISA Act that are at the heart of the government's claim of right to compel telcos to disclose the information to the Feds.    Then the court decides whether the Feds must produce the records anyway. Tough position for the government because it would be extremely difficult to argue that the phone call metadata itself is classified, since they are by law "business records" of a private party, the telco.  And this sets the stage for a flood of habeas corpus petitions by persons already convicted seeking new trials with NSA surveillance records disclosed. Easiest way out for the Feds is to claim that the records do not exist, but someone will have to sign a statement under penalty of perjury file to that effect.  If the Court orders disclosure, the Feds have a right of immediate appeal. So this one could win up in the Supreme Court very quickly (days, not months). Reading the Court's order, the judge seems predisposed to order production of the records. So stay tuned to this channel. I'm reminded that about a week ago, an MSNBC reporter blogged that he didn't think that the PRISM story "has legs" that will keep it in the news very long. He was wrong. 
Gary Edwards

NY Times Admits: Al-Qaeda Terror Threat Used to "Divert Attention" from NSA Uproar | A ... - 1 views

  •  
    Wag the Dog? Obama using terror threats to divert public attention from NSA illegal spying? No surprise here except for the admission to the NYT. excerpt: "Some analysts and Congressional officials suggested Friday that emphasizing a terrorist threat now was a good way to divert attention from the uproar over the N.S.A.'s data-collection programs, and that if it showed the intercepts had uncovered a possible plot, even better. - NY Times article from August 2, 2013: Qaeda Messages Prompt U.S. Terror Warning Nothing about the above quote should surprise any of my readers, we all know the sick, twisted mindset of those involved in the Military-Industrial-Wall Street complex. What's more shocking is the fact that these folks so openly admit it to the New York Times, albeit in a typical anonymous and cowardly fashion. Let's not forget what Robert Shapiro, former Clinton official and Obama supporter told the FT in July 2010: The bottom line here is that Americans don't believe in President Obama's leadership. He has to find some way between now and November of demonstrating that he is a leader who can command confidence and, short of a 9/11 event or an Oklahoma City bombing, I can't think of how he could do that. I discussed the above quote and related topics in my 2010 piece: The Dangers of a Failed Presidency. Well, if Mr. Shapiro thinks President Obama didn't have credibility in 2010, one can only imagine what he thinks today. That is precisely what makes the current moment so extraordinarily dangerous. From the New York Times: WASHINGTON - The United States intercepted electronic communications this week among senior operatives of Al Qaeda, in which the terrorists discussed attacks against American interests in the Middle East and North Africa, American officials said Friday. It is unusual for the United States to come across discussions among senior Qaeda operatives about operational planning - through informants, intercepted e-mails o
Gary Edwards

Articles of Impeachment Against Obama - 0 views

  •  
    Sarasota, FL ( August 12, 2013) - The National Black Republican Association (NBRA) based in Sarasota, FL, headed by Chairman Frances Rice, filed Articles of Impeachment against President Barack Obama with the following language.   We, black American citizens, in order to free ourselves and our fellow citizens from governmental tyranny, do herewith submit these Articles of Impeachment to Congress for the removal of President Barack H. Obama, aka, Barry Soetoro, from office for his attack on liberty and commission of egregious acts of despotism that constitute high crimes and misdemeanors.   On July 4, 1776, the founders of our nation declared their independence from governmental tyranny and reaffirmed their faith in independence with the ratification of the Bill of Rights in 1791.   Asserting their right to break free from the tyranny of a nation that denied them the civil liberties that are our birthright, the founders declared:   "When a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security."  -  Declaration of Independence, July 4, 1776.   THE IMPEACHMENT POWER   Article II, Section IV of the United States Constitution provides: "The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors."   THE ARTICLES OF IMPEACHMENT   In his conduct of the office of President of the United States, Barack H. Obama, aka Barry Soetoro, personally and through his subordinates and agents, in violation or disregard of the constitutional rights of citizens and in violation of his constitutional duty to take care that the laws be faithfully executed, has prevented, obstructed, and impeded the administration of justice, in that:   ARTICL
Gary Edwards

Office Productivity Software Is No Closer To Becoming A Commodity | Forrester Blogs - 0 views

  • We just published a report on the state of adoption of Office 2013 And Productivity Suite Alternatives based on a survey of 155 Forrester clients with responsibility for those investments. The sample does not fully represent the market, but lets us draw comparisons to the results of our previous survey in 2011. Some key takeaways from the data:   One in five firms uses email in the cloud. Another quarter plans to move at some point. More are using Office 365 (14%) than Google Apps (9%).  Just 22% of respondents are on Office 2013. Another 36% have plans to be on it. Office 2013's uptake will be slower than Office 2010 because fewer firms plan to combine the rollout of Office 2013 with Windows 8 as they combined Office 2010 with Windows 7. Alternatives to Microsoft Office show little traction. In 2011, 13% of respondents supported open source alternatives to Office. This year the number is just 5%. Google Docs has slightly higher adoption and is in use at 13% of companies. 
  • Microsoft continues to have a stranglehold on office productivity in the enterprise: Just 6% of companies in our survey give all or some employees an alternative instead of the installed version of Microsoft Office. Most surprising of all, multi-platform support is NOT a priority. Apps on iOS and Android devices were important to 16% of respondents, and support for non-Windows PCs was important to only 11%. For now, most technology decision-makers seem satisfied with leaving employees to self-provision office productivity apps on their smartphones and tablets if they really want them. 
  • Do you think we're getting closer to replacing Microsoft Office in the workplace?
  •  
    Wow, OpenOffice (3%) and Libre Office (2%) are actually losing gound!  In 2011 they had a combined marketshare of 13%.  Google Docs has a 13% marketshare, but i suspect most of those document originate in legacy MSOffice!!!!!  Making Google Drive - Apps a front end for mobile access and back-end backup.  In the middle of this mess, productivity workers struggle with shredded formats and the confusion of highly interactive and data intensive / time-sensitive compound documents going static (pdf) or otherwise disconnected. Intro: "We (Forrester) just published a report on the state of adoption of Office 2013 And Productivity Suite Alternatives based on a survey of 155 Forrester clients with responsibility for those investments. The sample does not fully represent the market, but lets us draw comparisons to the results of our previous survey in 2011. Some key takeaways from the data:   One in five firms uses email in the cloud. Another quarter plans to move at some point. More are using Office 365 (14%) than Google Apps (9%).  Just 22% of respondents are on Office 2013. Another 36% have plans to be on it. Office 2013's uptake will be slower than Office 2010 because fewer firms plan to combine the rollout of Office 2013 with Windows 8 as they combined Office 2010 with Windows 7. Alternatives to Microsoft Office show little traction. In 2011, 13% of respondents supported open source alternatives to Office. This year the number is just 5%. Google Docs has slightly higher adoption and is in use at 13% of companies. "
Paul Merrell

Multiple Polls: Americans Are More Afraid of the GOVERNMENT than TERRORISTS Washington'... - 0 views

  • According to a pair of recent polls, for the first time since the 9/11 terrorist hijackings, Americans are more fearful their government will abuse constitutional liberties than fail to keep its citizens safe. Even in the wake of the April 15 Boston Marathon bombing – in which a pair of Islamic radicals are accused of planting explosives that took the lives of 3 and wounded over 280 – the polls suggest Americans are hesitant to give up any further freedoms in exchange for increased “security.” A Fox News survey polling a random national sample of 619 registered voters the day after the bombing found despite the tragic event, those interviewed responded very differently than following 9/11. For the first time since a similar question was asked in May 2001, more Americans answered “no” to the question, “Would you be willing to give up some of your personal freedom in order to reduce the threat of terrorism?”
  • Of those surveyed on April 16, 2013, 45 percent answered no to the question, compared to 43 percent answering yes. In May 2001, before 9/11, the balance was similar, with 40 percent answering no to 33 percent answering yes. But following the terrorist attacks of 9/11, the numbers flipped dramatically, to 71 percent agreeing to sacrifice personal freedom to reduce the threat of terrorism. Subsequent polls asking the same question in 2002, 2005 and 2006 found Americans consistently willing to give up freedom in exchange for security. Yet the numbers were declining from 71 percent following 9/11 to only 54 percent by May 2006. Now, it would seem, the famous quote widely attributed to Benjamin Franklin – “They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety” – is holding more sway with Americans than it has in over a dozen years.
  • A similar poll sampling 588 adults, conducted on April 17 and 18 for the Washington Post, also discovered the change in attitude. “Which worries you more,” the Post asked, “that the government will not go far enough to investigate terrorism because of concerns about constitutional rights, or that it will go too far in compromising constitutional rights in order to investigate terrorism?” The poll found 48 percent of respondents worry the government will go too far, compared to 41 percent who worry it won’t go far enough. And similar to the Fox News poll, the Post found the worry to be a fresh development, as only 44 percent worried the government would go too far in January 2006 and only 27 percent worried the government would go too far in January 2010.
  • ...5 more annotations...
  • The Fox News poll found that a bare majority of Democrats (51%) would give up more personal freedom to reduce the threat of terror, while only 47% of Republicans – and a mere 29% of independents – would do so. This is not entirely surprising. As we noted in February: For years, “conservative” pollsters have said that Americans are furious at the government: Rasmussen noted in 2010 that only a small minority of the American people think that the government has the consent of the governed, and that the sentiment was “pre-revolutionary” Gallup noted in 2011 that a higher percentage of American liked King George during the colonial days than currently like Congress
  • And last year, Gallup noted that trust was plummeting in virtually all institutions Liberals may be tempted to think that this is a slanted perspective. But non-partisan and liberal pollsters are saying the same thing: An NBC News/Wall Street Journal poll from 2011 found that 76% of Americans believe that the country’s current financial and political structures favor the rich over the rest of the country The Washington Post reported in 2011 that Congress was less popular than communism, BP during the Gulf oil spill or Nixon during Watergate
  • Public Policy Polling added last month that Congress is also less popular than cockroaches, lice, root canals, colonoscopies, traffic jams, used car salesman and Genghis Khan And the liberal Pew Charitable Trusts noted last week that – for the first time – a majority of the public says that the federal government threatens their personal rights and freedoms: The latest national survey by the Pew Research Center for the People & the Press, conducted Jan. 9-13 among 1,502 adults, finds that 53% think that the federal government threatens their own personal rights and freedoms while 43% disagree. In March 2010, opinions were divided over whether the government represented a threat to personal freedom; 47% said it did while 50% disagreed. In surveys between 1995 and 2003, majorities rejected the idea that the government threatened people’s rights and freedoms.
  • *** The survey finds continued widespread distrust in government. About a quarter of Americans (26%) trust the government in Washington to do the right thing just about always or most of the time; 73% say they can trust the government only some of the time or volunteer that they can never trust the government. *** Majorities across all partisan and demographic groups express little or no trust in government. Obviously, Democrats are currently more trusting in government than Republicans. For example: The Pew Research Center’s 2010 study of attitudes toward government found that, since the 1950s, the party in control of the White House has expressed more trust in government than the so-called “out party.”
  • But given that even a growing percentage of Dems believe that government is a threat to their freedom, things are indeed getting interesting … It doesn’t help that the government claims the power to assassinate American citizens living on U.S. soil, indefinitely detain Americans without trial, spy on everyone and otherwise intrude into every aspect of our lives. Postscript: What are the actual risks coming from government versus terrorism?  That’s an interesting question.
  •  
    From 2013, not long after the Boston Bombing. I never had much respect for those willing to surrender my liberties so they could feel a bit more secure. "Security is mostly a superstition. It does not exist in nature, nor do the children of men as a whole experience it. Avoiding danger is no safer in the long run than outright exposure. Life is either a daring adventure, or nothing." Helen Keller, The Open Door (1957).
Gary Edwards

Paul Albaugh: Death and Hillary Clinton - The Patriot Post - 0 views

  • Did Clinton’s emails seal this man’s fate? As National Review’s Jim Geraghty notes, “[I]t’s unnerving to see she was discussing such material on an insecure system. We don’t know for certain that the Iranians had successfully hacked into Clinton’s server — as FBI Director Comey said, hackers are good at covering their tracks — but it seems foolish to assume Tehran could not. Friendly references to Amiri in private email by Hillary and her staff would destroy his claims to his captors that he wasn’t voluntarily helping American intelligence.” More likely than Iran doing the hacking is that Russia is the culprit. The two nations are thick as thieves when it comes to Iran’s nuclear program, and it’s extremely likely that Moscow has some valuable dirt on Clinton, some of which was perhaps shared with the mullahs.
  • So what of Clinton’s emails? In 2010, Jake Sullivan sent two emails about a week apart to Hillary’s private server. Neither of the emails mentioned Amiri by name, but the first email notes that the videos were a “psychological” issue and that “our friend has to be given a way out.” The second email, sent two days before CNN reported a $5 million payout, warned of “problematic news stories” to come as a cover for Amiri’s return to Iran. So while the emails didn’t mention Amiri by name, Iranian intelligence could have no doubt figured out that the person she was referring to in these emails was indeed Amiri. This is what FBI Director James Comey meant when he called Hillary “extremely careless in the handling of very sensitive, highly classified information.”
  • There are other untimely, mysterious deaths in the last six weeks as well — all with ties to the Clintons. Last week, there were two deaths within two days. The first was a prominent Clinton critic, researcher and reporter for the American Free Press named Victor Thorn. He was found in his home, dead of a gunshot wound to the head, in what has been reported as a suicide. It was his 54th birthday. The second was a Bernie Sanders supporter named Shawn Lucas, who was serving the Democrat National Committee and former DNC chairwoman Debbie Wasserman Schultz with a class action lawsuit for alleged fraud and rigging the primary election in favor of Hillary Clinton. He was found dead on Aug. 2, on the floor of his bathroom. There are several others who have died strange and untimely deaths with unsatisfactory explanation. But the common denominator is that they were somehow tied to or knew something about the Clintons and had either reported or were about to blow the whistle on their wrongdoings.
  • ...1 more annotation...
  • It feels like the 1990s all over again, when Vince Foster and numerous others met an untimely and suspicious demise. This is the Hillary Clinton that the Leftmedia doesn’t want you to know about. The same woman who recently said that she may have “short circuited” her recent email explanation. Speaking of deaths and lies, the parents of two Benghazi victims — Patricia Smith, the mother of Sean Smith, and Charles Woods, the father of Tyrone Woods — filed a wrongful death lawsuit against Clinton Monday. The two allege that Clinton’s “reckless handling” of classified information contributed to their sons' deaths. And while the circumstances surrounding the Iranian scientist or the two Americans are mysterious, we know that Clinton is responsible for the deaths of Smith, Woods and two others in Benghazi. And then she lied about it for political gain. Indeed, she lied to the public and then has the audacity to lie and say that she didn’t lie. This woman is filled with corruption and lies yet she is the “most qualified person ever” to run for president? Too few seem to know about her wrongdoings and malicious behavior. Or they don’t care.
  •  
    "For as long as the Clintons have been in the national spotlight, people linked to them have turned up dead. We're sure that's only the stuff of mythology among the "vast right-wing conspiracy," but this week brings news of more of the same. Despite FBI and Leftmedia attempts to keep Americans as uninformed as possible about Hillary Clinton's history of corruption and lies, there is new information about the death of an Iranian nuclear scientist named Shahram Amiri. Normally, the death of a foreigner wouldn't catch the attention of many Americans. But in this case, Amiri was in contact with Clinton via email, and the circumstances and timing of his death are more than suspicious. Who was this man that was just publicly hanged shortly after returning to Iran? Amiri was one of Iran's nuclear scientists, and in 2009 he disappeared while on a pilgrimage to Saudi Arabia, and he reappeared in several online videos in the United States. The timing of his disappearance was at the height of Western efforts to disrupt Iran's nuclear program. In 2010, he returned to Iran, and was greeted with a hero's welcome. Soon after, he disappeared again. This past weekend, he was publicly tried and executed. According to an Iranian judiciary spokesman, Amiri had access to Iran's secret and classified information and was linked to Iran's number one enemy (and financier), America. He was also accused of providing the U.S. with vital and secret information about Iran. So what happened between his 2010 return to Iran and this past weekend? Well, the revelations of Hillary Clinton's email scheme and the release of her emails, which contained several references to Amiri. "
Paul Merrell

Court Grants Secrecy for Memo on Phone Data - NYTimes.com - 0 views

  • A federal appeals court on Friday ruled that the Obama administration may continue to withhold a Justice Department memo that apparently opened a loophole in laws protecting the privacy of consumer data.The memo establishes the legal basis for telephone companies to hand over customers’ calling records to the government without a subpoena or court order, even when there is no emergency, according to a 2010 report by the Justice Department’s inspector general. The details of the legal theory, and the circumstances in which it could be invoked, remain unclear. Related Coverage F.B.I. Made ‘Blanket’ Demands for Phone RecordsMARCH 13, 2008 F.B.I. Violated Rules in Obtaining Phone Records, Report SaysJAN. 20, 2010 C.I.A. Is Said to Pay AT&T for Call DataNOV. 7, 2013 The ruling, by the United States Court of Appeals for the District of Columbia Circuit, came down on the side of a broad conception of the executive branch’s power to keep secret its interpretation of what the law permits it to do. The ruling may make it easier for the government to shield other memos by the Justice Department’s powerful Office of Legal Counsel from disclosure under the Freedom of Information Act.
  • The document at issue is a classified memo issued by the Office of Legal Counsel on Jan. 8, 2010. A report later that year by the Justice Department’s inspector general at the time, Glenn A. Fine, disclosed the memo’s existence and its broad conclusion that telephone companies may voluntarily provide records to the government “without legal process or a qualifying emergency,” notwithstanding the Electronic Communications Privacy Act.
  • The F.B.I. had asked for the memo as part of an investigation by Mr. Fine into problems with the bureau’s use of so-called exigent letters to obtain telephone and financial records without following any legal procedures.
Gary Edwards

IRS Lawyer Carter Hull Confirms Tea Party Targeting Ordered By Washington - Investors.com - 0 views

  • Hull has confirmed the premeditated targeting of Tea Party groups went even higher than him or Lerner.
  • Apparently not only Tea Party groups were targeted but actual candidates as well. On March 9, 2010, the day Tea Party candidate Christine O'Donnell revealed her plan to run for Vice President Joe Biden's former Delaware Senate seat , an IRS tax lien was placed on a house purported to be hers, an action that was quickly publicized by those who did not wish her well.
  • Earlier this year, Dennis Martel, special agent with the Department of Treasury in Baltimore, left a message on O'Donnell's cell phone telling her that an official in Delaware state government had improperly accessed her records on that very same day. The problem was that the house was not hers in the first place and the IRS eventually blamed the lien on a computer glitch and withdrew it.
  • ...1 more annotation...
  • To us it is inconceivable that one of only two political appointees was directly involved in targeting of Tea Party groups without White House knowledge and consent. It is said the fish rots from the head, and this one is really beginning to stink.
  •  
    This has gone way too far.  The 2012 elections must be nullified and rescheduled.  Tens of millions of American citizens have been systematically targeted, their civil and Constitutional rights destroyed, and their voices and votes politically eliminated by a massive government conspiracy.  The 2012 election is a fraud.  And nothing short of complete nullification and recall, and the termination of the IRS will do the great Republic justice. excerpt: Scandal: A retiring IRS lawyer implicates the IRS chief counsel's office, headed by an Obama appointee, as well as the head of the IRS' exempt organizations office. The targeting included a Tea Party Senate candidate. In Thursday's hearing before the House Oversight Committee, 72-year-old retiring IRS lawyer Carter Hull implicated the IRS chief counsel's office headed by William J. Wilkins, who attended at least nine White House meetings, and Lois Lerner, head of the exempt-organizations office, in the IRS scandal. In so doing, he made clear the targeting of Tea Party groups started in Washington and was directed from Washington. A tax-law specialist with 48 years of IRS experience, Hull testified that Lerner, the former head of the exempt organizations division, demanded that he send some of the reviews of Tea Party groups to the IRS chief counsel's office in Washington. The chief counsel is one of two political appointees in the IRS. According to Hull's testimony, Lerner, who famously pleaded her Fifth Amendment rights before the same committee, gave an atypical instruction that the Tea Party applications undergo special scrutiny that included an uncommon multilayer review that involved a top adviser to Lerner as well as the chief counsel's office. Hull's name came up earlier in the testimony of Holly Paz, a D.C.-based supervisor in the IRS's tax-exempt status division, who reported to Lerner. It was on May 22, the day after Paz was interviewed by investigators, that Lerner refused to answer questions from
Paul Merrell

In U.S., Four in 10 Say Party Control of Congress Matters - 0 views

  • Two months ahead of the midterm elections that may very well change the balance of power in Congress, four in 10 Americans say the specific party that controls Congress matters a great deal to them, while 29% say it matters a moderate amount and another 30% say it generally doesn't matter to them.
  • The 40% of national adults now highly concerned about control of Capitol Hill equals what Gallup found a month before the 2002 midterms, but is lower than the 49% seen in late October 2010. While the views of Democrats (including independents who lean Democratic) on this question have been steady across the three midterms -- roughly 45% each year have said the party in control mattered a great deal to them -- Republicans' concern has varied. Currently, 43% of Republicans (including Republican leaners) say party control matters a great deal. It was a whopping 61% in 2010, but that was up from 42% in 2002.
  • The 2002 and 2010 elections were favorable to Republicans, as the GOP retained majority control of the U.S. House of Representatives and regained control of the Senate in 2002, and recaptured control of the House in 2010 with an enormous seat gain. Thus, while rank-and-file Republicans' concern about party control is not nearly as high today as it was in 2010, when Democrats controlled both houses, it is comparable to 2002 -- which could suggest that conditions are still favorable for the GOP. Missing from this midterm trend, however, is 2006, which was a strong Democratic year. Therefore, it is not entirely clear how levels of concern on this question relate to each party's performance.
  • ...4 more annotations...
  • The same poll asked respondents to identify the party currently holding a majority of seats in the U.S. Senate as well as in the U.S. House of Representatives. About half of Americans can correctly identify the majority party for each: 49% say the Democrats control the Senate, and 51% say the Republicans control the House. Somewhat fewer -- 36% -- can correctly identify the majority in both chambers, although this knowledge is somewhat higher, at 41%, among registered voters. Another 14% of Americans are aware that party control of Congress is divided, but match each party to the wrong chamber, believing Republicans control the Senate and Democrats control the House.
  • A relatively large subset of Americans, 28%, can correctly identify the majority party for only one chamber (while being wrong or unsure about the other), while 22% are either unsure about both, or name the wrong party for one chamber and are unsure about the other.
  • Americans who are knowledgeable about who controls each house of Congress are significantly more likely than others to say party control of Congress matters greatly to them: 55% of the well-informed group say this, versus about a third or less of those who can't properly identify party control. This highlights the divide in midterm politics between the politically concerned and informed subset of Americans -- a proportion similar to the typical midterm turnout rate, near 40% -- and the rest of the population that is less engaged politically.
  • For results based on the total sample of national adults, the margin of sampling error is ±4 percentage points at the 95% confidence level.
Gary Edwards

What 1946 Can Tell Us About 2010 - The American, A Magazine of Ideas - 0 views

  • In both cases a Democratic president was proposing and a Democratic Congress was considering proposals to substantially increase the size and scope of government beyond previous peacetime limits.
  • The second similarity is that the Democrats in 1945–1946 were closely allied with labor unions, which were deeply involved in politics and were avidly seeking more members and more bargaining power.
  • The Wagner Act passed in 1935 stimulated the growth of Congress of Industrial Organizations (CIO) unions, which through sitdown strikes (which were plainly illegal) and other tactics organized the major auto, steel, and tire manufacturers between 1937 and 1941.
  • ...3 more annotations...
  • Unions also emerged as a political force in the war years—and as a political force entangled with the Communist Party.
  • the stimulus package passed in February 2009 allotted one-third of its funds to state and local governments, which helped preserve the jobs of many public sector union members—and the flow of dues money to public-sector union leaders.
  • 1946. The Republican slogan was “Had enough?”—enough inflation, enough high taxes, enough price controls, enough coddling of unions with their frequent strikes and their entanglement with Communists. The Republicans promised to end controls, lower taxes, and restrict labor unions—an unusually coherent program for a party out of power.
  •  
    There are some intriguing similarities between the political situation in 1946 and the political situation today. In the off-year election of 1946, Republicans gained 13 seats in the Senate and emerged with a 51-45 majority there, the largest majority that they enjoyed between 1930 and 1980. They gained 55 seats in the House, giving them a 246-188 majority in that body, the largest majority they have held since 1930. First, Democrats were promising (or threatening) to vastly increase the size and scope of government. Government's share of gross domestic product had risen to over 40% in World War II, and it was obvious that there would be some scaling back. At the same time, the Allied victory in World War II had enhanced the prestige of the state, just as the 1930s Depression weakened faith in free markets. In Britain, the 1942 Beveridge Report urged creating a welfare state after the war, and the Labour Party won a resounding victory in the July 1945 election and promptly proceeded to adopt the Beveridge recommendations and more. In the United States, Franklin Roosevelt in his January 1944 State of the Union address echoed the Beveridge Report. As I pointed out in my 1990 book Our Country: The Shaping of America from Roosevelt to Reagan, he called for "steeply graduated taxes, government controls on crop prices and food prices [and] continued controls on wages . . . Government should guarantee everyone a job, an education, and clothing, housing, medical care, and financial security against the risks of old age and sickness." "True individual freedom," Roosevelt said, "cannot exist without economic security and independence." The similarities between the policy choices facing Congress in 1945-1946 and those facing it in 2009-2010 are obviously far from exact. Nevertheless, there are some. In both cases a Democratic president was proposing and a Democratic Congress was considering proposals to substantially increase the size and scope of gov
Paul Merrell

THE 9/11 READER. The September 11, 2001 Terror Attacks | Global Research - 0 views

  • GLOBAL RESEARCH ONLINE INTERACTIVE READER SERIES GR I-BOOK No.  7  THE 9/11 READER The September 11, 2001 Terror Attacks 9/11 Truth: Revealing the Lies,  Commemorating the 9/11 Tragedy
  • August 2012 The 911/ Reader is part of Global Research’s Online Interactive I-Book Reader, which brings together, in the form of chapters, a collection of Global Research feature articles, including debate and analysis, on a broad theme or subject matter.  To consult our Online Interactive I-Book Reader Series, click here.
  • Table of Contents of the 9/11 Reader In Part I, the 911 Reader provides a review of what happened on the morning of 9/11, at the White House, on Capitol Hill, the Pentagon, at Strategic Command Headquarters (USSTRATCOM), What was the response of the US Air Force in the immediate wake of the attacks?  Part II focusses on “What Happened on the Planes” as described in the 9/11 Commission Report. Part III sheds light on what caused the collapse of the World Trade Center buildings. It also challenges the official narrative with regard to the attack on the Pentagon. Part IV reviews and refutes the findings of the 9/11 Commission Report. Part V focusses on the issue of foreknowledge by Western intelligence agencies. Part VI examines the issue of how foreknowledge of the attacks was used as an instrument of insider trading on airline stocks in the days preceding September 11, 2001. The bonanza financial gains resulting from insurance claims to the leaseholders of the WTC buildings is also examined.
  • ...15 more annotations...
  • Part VII focusses on the history and central role of Al Qaeda as a US intelligence asset. Since the Soviet-Afghan war, US intelligence has supported the formation of various jihadist organizations. An understanding of this history is crucial in refuting the official 9/11 narrative which claims that Al Qaeda, was behind the attacks. Part VIII centers on the life and death of 9/11 “Terror Mastermind” Osama bin Laden, who was recruited by the CIA in the heyday of the Soviet Afghan war. This section also includes an analysis of the mysterious death of Osama bin Laden, allegedly executed by US Navy Seals in a suburb of Islamabad in May 2011. Part  IX  focusses on “False Flags” and the Pentagon’s “Second 9/11″. Part X examines the issue of “Deep Events” with contributions by renowned scholars Peter Dale Scott and Daniele Ganser. Part XI  examines the structure of 9/11 propaganda which consists in “creating” as well “perpetuating” a  “9/11 Legend”. How is this achieved? Incessantly, on a daily basis, Al Qaeda, the alleged 9/11 Mastermind is referred to by the Western media, government officials, members of the US Congress, Wall Street analysts, etc. as an underlying cause of numerous World events. Part XII focusses on the practice of 9/11 Justice directed against the alleged culprits of the 9/11 attacks. The legitimacy of 9/11 propaganda requires fabricating “convincing evidence” and “proof” that those who are accused actually carried out the attacks. Sentencing of Muslims detained in Guantanamo is part of war propaganda. It depicts innocent men who are accused of the 9/11 attacks, based on confessions acquired through systematic torture throughout their detention. Part  XIII focusses on 9/11 Truth.  The objective of 9/11 Truth is to ultimately dismantle the propaganda apparatus which is manipulating the human mindset. The 9/11 Reader concludes with a retrospective view of 9/11 ten years later.
  • PART  I Timeline: What Happened on the Morning of September 11, 2001 Nothing Urgent: The Curious Lack of Military Action on the Morning of September. 11, 2001 - by George Szamuely – 2012-08-12 Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 Contradictions: Bush in the Classroom - by Dr. David Ray Griffin – 2008-04-04 9/11 Contradictions: When Did Cheney Enter the Underground Bunker? - by David Ray Griffin – 2008-04-24 VIDEO: Pilots For 9/11 Truth: Intercepted Don’t miss this important documentary, now on GRTV - 2012-05-16
  • PART II What Happened on the Planes “United 93″: What Happened on the Planes? - by Michel Chossudovsky – 2006-05-01   Phone Calls from the 9/11 Airliners Response to Questions Evoked by My Fifth Estate Interview - by Prof David Ray Griffin – 2010-01-12 Given the cell phone technology available in 2001, cell phone calls from airliners at altitudes of more than a few thousand feet, were virtually impossible Ted Olson’s Report of Phone Calls from Barbara Olson on 9/11: Three Official Denials - by David Ray Griffin – 2008-04-01 Ted Olson’s report was very important. It provided apparent “evidence” that American 77 had struck the Pentagon.
  • PART III What Caused the Collapse of The WTC Buildings and the Pentagon? The Destruction of the World Trade Center: Why the Official Account Cannot Be True - by Dr. David Ray Griffin – 2006-01-29 The official theory about the Twin Towers says that they collapsed because of the combined effect of the impact of the airplanes and the resulting fires Evidence Refutes the Official 9/11 Investigation: The Scientific Forensic Facts - by Richard Gage, Gregg Roberts – 2010-10-13 VIDEO: Controlled Demolitions Caused the Collapse of the World Trade Center (WTC) buildings on September 11, 2001 - by Richard Gage – 2009-09-20 VIDEO: 9/11: The Myth and The Reality Now on GRTV - by Prof. David Ray Griffin – 2011-08-30 Undisputed Facts Point to the Controlled Demolition of WTC 7 - by Richard Gage – 2008-03-28 VIDEO: 9/11 Explosive Evidence: Experts Speak Out See the trailer for this ground-breaking film on GRTV - 2011-08-03 9/11: “Honest Mistake” or BBC Foreknowledge of Collapse of WTC 7? Jane Standley Breaks Her Silence - by James Higham – 2011-08-18 The Collapse of WTC Building Seven. Interview. Comment by Elizabeth Woodworth - by David Ray Griffin – 2009-10-17   Building What? How SCADs Can Be Hidden in Plain Sight: The 9/11 “Official Story” and the Collapse of WTC Building Seven - by Prof David Ray Griffin – 2010-05-30 Besides omitting and otherwise falsifying evidence, NIST also committed the type of scientific fraud called fabrication, which means simply “making up results.” VIDEO; Firefighters’ Analysis of the 9/11 Attacks Refutes the Official Report - by Erik Lawyer – 2012-08-27 VIDEO: Pentagon Admits More 9/11 Remains Dumped in Landfill - by James Corbett – 2012-03-01 The Pentagon revealed that some of the unidentifiable remains from victims at the Pentagon and Shanksville sites on September 11, 2001 were disposed of in a landfill. 9/11: The Attack on the Pentagon on September 11, 2001 The Official Version Amounts to an Enormous Lie - by Thierry Meyssan – 2012-08-16
  • PART IV Lies and Fabrications: The 9/11 Commission Report A National Disgrace: A Review of the 9/11 Commission Report - by David Ray Griffin – 2005-03-24 The 9/11 Commission Report: A 571 Page Lie - by Dr. David Ray Griffin – 2005-09-08 September 11, 2001: 21 Reasons to Question the Official Story about 9/11 - by David Ray Griffin – 2008-09-11 911 “Conspiracy Theorists” Vindicated: Pentagon deliberately misled Public Opinion Military officials made false statements to Congress and to the 911 Commission - by Michel Chossudovsky – 2006-08-02 The 9/11 Commission’s Incredible Tales Flights 11, 175, 77, and 93 - by Prof. David Ray Griffin – 2005-12-13 9/11 and the War on Terror: Polls Show What People Think 10 Years Later - by Washington’s Blog – 2011-09-10
  • PART  V Foreknowledge of 9/11   VIDEO: The SECRET SERVICE ON 9/11: What did the Government Know? Learn more on this week’s GRTV Feature Interview - by Kevin Ryan, James Corbett – 2012-04-10 9/11 Foreknowledge and “Intelligence Failures”: “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Prof. Michel Chossudovsky – 2011-09-14 “Foreknowledge” and “Failure to act” upholds the notion that the terrorist attacks (“act of war”) “waged by Muslims against America” are real, when all the facts and findings point towards coverup and complicity at the highest levels of the US government. Foreknowledge of 9/11 by Western Intelligence Agencies - by Michael C. Ruppert – 2012-08-21
  • PART XII Post 9/11 “Justice” IRAN ACCUSED OF BEING BEHIND 9/11 ATTACKS. U.S. Court Judgment, December 2011 (Havlish v. Iran) - by Julie Lévesque – 2012-05-11 U.S. Court Judgment, December 2011 (Havlish v. Iran) “American Justice”: The Targeted Assassination of Osama Bin Laden Extrajudicial executions are unlawful - by Prof. Marjorie Cohn – 2011-05-10 ALLEGED “MASTERMIND” OF 9/11 ON TRIAL IN GUANTANAMO: Military Tribunals proceed Despite Evidence of Torture - by Tom Carter – 2012-05-30 U.S. Military Drugged Detainees to Obtain FALSE Confessions Self-confessed 9/11 “mastermind” falsely confessed to crimes he didn’t commit - by Washington’s Blog – 2012-07-15 911 MILITARY TRIAL: Pentagon Clears Way for Military Trial of Five charged in 9/11 Attacks - by Bill Van Auken – 2012-04-06 Khalid Sheikh Mohammed’s trial will convict us all - by Paul Craig Roberts – 2009-11-25
  • PART VII 9/11 and the “Global War on Terrorism” (GWOT) Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 ANALYSIS: From Ronald Reagan and the Soviet-Afghan War to George W Bush and September 11, 2001 - by Michel Chossudovsky – 2010-09-09 Osama bin Laden was recruited by the CIA in 1979. The US spent millions of dollars to supply Afghan schoolchildren with textbooks filled with violent images and militant Islamic teachings.     The Central Role of Al Qaeda in Bush’s National Security Doctrine “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Michel Chossudovsky – 2007-07-12 September 11, 2001: America and NATO Declare War on Afghanistan NATO’s Doctrine of Collective Security - by Michel Chossudovsky – 2009-12-21   America’s Holy Crusade against the Muslim World. - by Michel Chossudovsky – 2010-08-30 What is now unfolding is a generalized process of demonization of an entire population group
  • Osamagate - by Michel Chossudovsky – 2001-10-09 The main justification for waging this war has been totally fabricated. The American people have been deliberately and consciously misled by their government into supporting a major military adventure which affects our collective future. The “Demonization” of Muslims and the Battle for Oil - by Michel Chossudovsky – 2007-01-04 Muslim countries possess three quarters of the World’s oil reserves. In contrast, the United States of America has barely 2 percent of total oil reserves.   Was America Attacked by Muslims on 9/11? - by David Ray Griffin – 2008-09-10 Much of US foreign policy since 9/11 has been based on the assumption that America was attacked by Muslims on 9/11.   New Documents Detail America’s Strategic Response to 9/11 Rumsfeld’s War Aim: “Significantly Change the World’s Political Map” - by National Security Archive – 2011-09-12
  • PART VIII The Alleged 9/11 Mastermind: The Life and Death of  Osama bin Laden Who Is Osama Bin Laden? - by Michel Chossudovsky – 2001-09-12   VIDEO: The Last Word on Osama Bin Laden - by James Corbett – 2011-05-24 Osama bin Laden: A Creation of the CIA - by Michel Chossudovsky – 2011-05-03 Interview with Osama bin Laden. Denies his Involvement in 9/11 Full text of Pakistani paper’s Sept 01 “exclusive” interview - 2011-05-09 Where was Osama on September 11, 2001? - by Michel Chossudovsky – 2008-09-11 On September 10. 2001, Osama was in a Pakistan military hospital in Rawalpindi, courtesy of America’s indefectible ally Pakistan Osama bin Laden, among the FBI’s “Ten Most Wanted Fugitives”: Why was he never indicted for his alleged role in 9/11? - by Michel Chossudovsky – 2006-09-17 Osama bin Laden: Already Dead… Evidence that Bin Laden has been Dead for Several Years - by Prof. David Ray Griffin – 2011-05-02 The Mysterious Death of Osama bin Laden: Creating Evidence Where There Is None - by Dr. Paul Craig Roberts – 2011-08-04 The Assassination of Osama bin Laden: Glaring Anomalies in the Official Narrative Osama was Left Handed… - by Felicity Arbuthnot – 2011-05-11 The Assassination of Osama Bin Laden - by Fidel Castro Ruz – 2011-05-07 Dancing on the Grave of 9/11. Osama and “The Big Lie” - by Larry Chin – 2011-05-05
  • PART  IX  ”False Flags”: The Pentagon’s Second 9/11 The Pentagon’s “Second 911″ “Another [9/11] attack could create both a justification and an opportunity to retaliate against some known targets” - by Michel Chossudovsky – 2006-08-10 The presumption of this military document, is that a Second 911 attack “which is lacking today” would usefully create both a “justification and an opportunity” to wage war on “some known targets Crying Wolf: Terror Alerts based on Fabricated Intelligence - by Michel Chossudovsky – 2006-08-20 This is not the first time that brash and unsubstantiated statements have been made regarding an impending terror attack, which have proven to be based on “faulty intelligence”.
  • PART X “Deep Events” and State Violence The Doomsday Project and Deep Events: JFK, Watergate, Iran-Contra, and 9/11 - by Prof. Peter Dale Scott – 2011-11-22 The Doomsday Project is the Pentagon’s name for the emergency planning “to keep the White House and Pentagon running during and after a nuclear war or some other major crisis.” JFK and 9/11 Insights Gained from Studying Both - by Dr. Peter Dale Scott – 2006-12-20 In both 9/11 and the JFK assassination, the US government and the media immediately established a guilty party. Eventually, in both cases a commission was set up to validate the official narrative. Able Danger adds twist to 9/11 9/11 Ringleader connected to secret Pentagon operation - by Dr. Daniele Ganser – 2005-08-27 Atta was connected to a secret operation of the Pentagon’s Special Operations Command (SOCOM) in the US. A top secret Pentagon project code-named Able Danger identified Atta and 3 other 9/11 hijackers as members of an al-Qaida cell more than a year before the attacks. 9/11, Deep State Violence and the Hope of Internet Politics - by Prof. Peter Dale Scott – 2008-06-11 The unthinkable – that elements inside the state would conspire with criminals to kill innocent civilians – has become thinkable… Al Qaeda: The Database. - by Pierre-Henri Bunel – 2011-05-12
  • PART XI Propaganda: Creating and Perpetuating the 9/11 Legend September 11, 2001: The Propaganda Preparation for 9/11: Creating the Osama bin Laden “Legend” - by Chaim Kupferberg – 2011-09-11 THE 9/11 MYTH: State Propaganda, Historical Revisionism, and the Perpetuation of the 9/11 Myth - by Prof. James F. Tracy – 2012-05-06   Al Qaeda and Human Consciousness: Al Qaeda, Al Qaeda…. An Incessant and Repetitive Public Discourse - by Prof. Michel Chossudovsky – 2012-03-24 9/11 Truth, Inner Consciousness and the “Public Mind” - by James F. Tracy – 2012-03-18
  • PART VI Insider Trading and the 9/11 Financial Bonanza 9/11 Attacks: Criminal Foreknowledge and Insider Trading lead directly to the CIA’s Highest Ranks CIA Executive Director “Buzzy” Krongard managed Firm that handled “Put” Options on UAL - by Michael C. Ruppert – 2012-08-13 The 9/11 Attacks on the World Trade Center (WTC): Unspoken Financial Bonanza - by Prof Michel Chossudovsky – 2012-04-27 SEPTEMBER 11, 2001: Insider Trading 9/11 … the Facts Laid Bare - by Lars Schall – 2012-03-20 Osama Bin Laden and The 911 Illusion: The 9/11 Short-Selling Financial Scam - by Dean Henderson – 2011-05-09
  • PART XIII 9/11 Truth Revealing the Lies,  Commemorating the 9/11 Tragedy VIDEO: Commemorating the 10th Anniversary of 9/11 - by Prof. Michel Chossudovsky – 2011-09-01 VIDEO: AFTER 9/11: TEN YEARS OF WAR Special GRTV Feature Production - by James Corbett – 2011-09-08
  •  
    Wow!
Paul Merrell

Lawsuit for 2010 Gaza Flotilla Deaths Filed in US Court Against former Israeli Prime Mi... - 0 views

  • A lawsuit in the United States has been filed against former Israeli Prime Minister and Defense Minister Ehud Barak for his role in the 2010 Israeli commando attack upon the Gaza Freedom Flotilla in which 8 Turkish citizens and one American citizen were executed by Israeli forces and over fifty Turkish passengers were wounded.  The trial will be the first time a former Israeli Prime Minister will be put on trial for reasons of international terrorism. The family of Furkan Doğan, the American citizen who was assassinated in the attack, filed the lawsuit in the Central District Court of California and notice of the trial was handed to Barak last night, October 20, in Los Angeles when he spoke in the Distinguished Speaker series of Southern California  (http://speakersla.com/speakers/ehud-barak/).  According to a press release (http://mavi-marmara.ihh.org.tr/en/main/news/0/case-opened-against-former-israeli-pm-ehud-ba/2969) from the Turkish International Humanitarian organization that sponsored the Mavi Marmara ship,  charges against Barak include his planning and leadership in the murder of Furkan Doğan and others in international waters, Willful killing, attempted willful killing, intentionally causing serious injury to body or health, international terrorism, plundering, intentionally causing damage to property, restriction of people's freedom and instigating violent crimes. 
  • American attorneys Hydee Dijsktal and Dan Stormer, the British law firm, Stoke & White, British Professor Dr. Geoffrey Nice and UK attorney Rodney Dixon are the legal team for the Dogan family. Ehud Barak was almost arrested in France in 2010 when he went to a weapons expo. by hopping off the plane last minute with the trial opened against him by the wives of martyrs in France. Other legal proceedings against Barak and other senior members of the Israeli government are in the works.  In 2010 in France, the widows of Cevdet Kılıçlar and Necdet Yıldırım, two others executed by Israeli commandos, brought a lawsuit against Barak which he evaded when he was informed of the French lawsuit as he was about to deplane in Paris to attend a weapons expo in France. In the case brought in the International Criminal Court (ICC), the ICC prosecutor has ruled that the attack by Israeli commandos upon the Mavi Marmara in the Gaza Freedom Flotilla was a war crime. Additionally, the 7th High Criminal Court in Istanbul, Turkey has issued a “red notice” for the arrest of four senior Israeli government officials in a lawsuit filed in Turkey http://www.incanews.net/en/turkey/313/turkish-court-orders-arrest-of-4-israeli-officials . The Israeli officials named by the court are Israel's former Chief of Staff Gabi Ashkenazi, former navy chief Eliezer Marom, former military intelligence head Amos Yadlin and former air force intelligence chief Avishai Levy.
  • Due to political considerations dealing with the State of Israel, the Ministry of Justice of Turkey has delayed sending to Interpol the “red notice” much to the consternation of those seeking justice.
Paul Merrell

Are US Academics Who Cite WikiLeaks Blackballed? - 0 views

  • Speaking to Germany’s Der Spiegel magazine in July 2015, Assange suggested that institutions within the international relations discipline have failed to understand the intersection between current geopolitical and technological developments. Specifically, Assange charged that the US journal International Studies Quarterly (ISQ), published by the prestigious International Studies Association (ISA), would not accept manuscripts based on WikiLeaks’ material. Professor of international politics Daniel W. Drezner hit back on July 30 in The Washington Post, arguing that there were other explanations for why the journal was not publishing WikiLeaks’ material. However, he did concede that it is possible that the “structural forces” opposing WikiLeaks were so powerful that a scholar would eschew WikiLeaks’ publications for “fear of being blackballed”. For the thousands of undergraduate to PhD students, fellows and academic researchers facing a precarious employment market, self-censorship for fear of freezing one’s career is not unlikely. One publicised incident from November 2010 concerning the office of career services at Columbia University’s School of International and Public Affairs (SIPA), which according to The New York Times “grooms future diplomats”, provides the perfect illustration. That year the office sent an email to students warning them against commenting on or posting WikiLeaks’ documents on social media because “engaging in these activities would call into question your ability to deal with confidential information, which is part of most positions with the federal government”. The warning came to the office through a SIPA alumnus working at the State Department.
  • Years later, the tone of the warning continued to reverberate through the halls of one of the most reputable universities in the world. In documenting human rights abuses in June 2013 a Columbia University graduate class produced the anonymous academic paper “WikiLeaks and Iraq Body Count: the sum of parts may not add up to the whole — a comparison of two tallies of Iraqi civilian deaths”. The acknowledgements section of their report refers to the 2010 warning email and states that in light of that email it would be “unwise and perhaps unethical to acknowledge all the participating students by name”. Others participating in a peer-review process have cited additional factors curtailing their use of comprehensive and illuminating WikiLeaks publications. Former US presidential candidate for the Green Party Cynthia McKinney, for example, says that she was forced to scrub her PhD dissertation from any reference of WikiLeaks material. However Drezner, who is an ISA member and on the ISQ’s web advisory board, claims that WikiLeaks’ published diplomatic cables “are not nearly as significant as Assange believes” and that the “academic universe is indifferent to WikiLeaks”. A surprising claim, given that international human rights courts have not been indifferent to evidence derived from WikiLeaks’ published cables, including cables that show the insidious ways in which European officials attempt to conceal CIA torture in secret prisons.
  • To help address the gap in scholarly analysis of the more than 2 million US diplomatic cables and State Department records published by WikiLeaks since 2010, WikiLeaks has produced a new book, The WikiLeaks Files: The World According to US Empire, published September 7, 2015. The book brings together journalists, researchers and experts on international law and foreign policy to examine the current cables and records. The documents are extensive. They expose US efforts —  across Bush and Obama administrations — to use bribes and threats to keep the US protected from facing war crimes allegations, conveying the fading effervescence of concepts such as “international justice” or “rule of law” in the face of a superpower that clearly believes that “might makes right”. Analysts review the efforts US diplomats take to maintain ties with dictators. They examine the meaning of human rights in the context of a global “War on Terror”. Like the cables they seek to illuminate, the 18 chapters of the book touch upon most major regions of the world. Experts on US foreign policy such as Robert Naiman, Stephen Zunes and Gareth Porter examine cables that reveal US meddling in Syria, US acceptance of Israeli violations of international law, and how the US dealt with the International Atomic Energy Agency in relation to Iranian nuclear development. The book offers a user guide written by WikiLeaks’ investigations editor Sarah Harrison on how to research WikiLeaks’ cables including meta data and content.
  • ...2 more annotations...
  • Writing in the book’s introduction, Assange proposes that the diplomatic cables provide “the vivisection of a living empire, showing what substance flowed from which state organ and when”. Assange notes in his introduction that academic disciplines outside international relations, and where career aspirations do not go hand in hand with patronage by government institutions, have voluminous coverage of the cables. But the ISA does not accept submissions citing WikiLeaks’ material. Although ISA executive director Mark Boyer denies that the association has a formal policy against publishing WikiLeaks’ material, he says that journal editors have discussed the implications of publishing material that is legally prohibited by the US government. According to Gabriel J. Michael, author of the Yale Law School paper Who’s Afraid of WikiLeaks? Missed Opportunities in Political Science Research, the ISQ has adopted a “provisional policy” against handling manuscripts that make use of leaked documents if such use could be interpreted as mishandling “classified” material. According to an ISQ editor quoted in Michael’s paper, this policy prohibits direct quotations as well as data mining, and was developed in consultation with legal counsel. Stating that editors are currently “in an untenable position”. According to the editor, ISQ’s policy will remain in place pending broader action from the ISA, which publishes several other disciplinary journals. The ISA and ISQ concerns about handling material that the US government forbids —  which include WikiLeaks’ cables —  amount to throwing the baby out with the bathwater. The cables go into the heart of an empire, and reflect on matters that affect everyone.
  • Without WikiLeaks, the public would still be in the dark about the Trans-Pacific Partnership “agreement” currently being negotiated. The treaty aims to rewrite the global rules on intellectual property rights and would create spheres of trade which would be protected from judicial oversight. Such agreements have the potential to change the fabric of how states operate, and the leaked cables shed light on how states negotiate significant treaties, aiming to keep citizenship participation in politics out. Where academia bans the use of important leaked documents the public loses out.
Paul Merrell

Under Intense Pressure to Silence Wikileaks, Secretary of State Hillary Clinton Propose... - 0 views

  • Clinton’s State Department was getting pressure from President Obama and his White House inner circle, as well as heads of state internationally, to try and cutoff Assange’s delivery of the cables and if that effort failed, then to forge a strategy to minimize the administration’s public embarrassment over the contents of the cables. Hence, Clinton’s early morning November meeting of State’s top brass who floated various proposals to stop, slow or spin the Wikileaks contamination. That is when a frustrated Clinton, sources said, at some point blurted out a controversial query. “Can’t we just drone this guy?” Clinton openly inquired, offering a simple remedy to silence Assange and smother Wikileaks via a planned military drone strike, according to State Department sources. The statement drew laughter from the room which quickly died off when the Secretary kept talking in a terse manner, sources said. Clinton said Assange, after all, was a relatively soft target, “walking around” freely and thumbing his nose without any fear of reprisals from the United States. Clinton was upset about Assange’s previous 2010 records releases, divulging secret U.S. documents about the war in Afghanistan in July and the war in Iraq just a month earlier in October, sources said. At that time in 2010, Assange was relatively free and not living cloistered in in the embassy of Ecuador in London. Prior to 2010, Assange focused Wikileaks’ efforts on countries outside the United States but now under Clinton and Obama, Assange was hammering America with an unparalleled third sweeping Wikileaks document dump in five months. Clinton was fuming, sources said, as each State Department cable dispatched during the Obama administration was signed by her.
  • Following Clinton’s alleged drone proposal, another controversial remedy was floated in the State Department to place a reward or bounty for Assange’s capture and extradition to the United States, sources said. Numbers were discussed in the realm of a $10 million bounty. A State Department source described that staff meeting as bizarre. One minute staffers were inquiring about the Secretary’s blue and black checkered knit sweater and the next minute, the room was discussing the legalities of a drone strike on Assange and financial bounties, sources said. Immediately following the conclusion of the wild brainstorming session, one of Clinton’s top aides, State Department Director of Policy Planning Ann-Marie Slaughter, penned an email to Clinton, Chief of Staff Cheryl Mills, and aides Huma Abebin and Jacob Sullivan at 10:29 a.m. entitled “an SP memo on possible legal and nonlegal strategies re Wikileaks.” “Nonlegal strategies.” How did that phrasing make it into an official State Department email subject line dealing with solving Wikileaks and Assange? Why would the secretary of state and her inner circle be discussing any “nonlegal strategies” for anything whatsoever? Against anyone? Shouldn’t all the strategies discussed by the country’s top diplomat be strictly legal only? And is the email a smoking gun to confirm Clinton was actually serious about pursuing an obvious “nonlegal strategy” proposal to allegedly assassinate Assange? Numerous attempts were made to try and interview and decipher Slaughter’s choice of email wording, however, she could not be reached for comment.
  • Slaughter’s cryptic email also contained an attached document called “SP Wikileaks doc final11.23.10.docx.” That attachment portion of Slaughter’s “nonlegal strategies” email has yet to be recovered by federal investigators and House committee investigators probing Clinton’s email practices while at State. Even Wikileaks does not have the document. Slaughter, however, shed some light on the attachment: “The result is the attached memo, which has one interesting legal approach and I think some very good suggestions about how to handle our public diplomacy.” But did it also include details on the “nonlegal strategies” teased in the subject line? Sources confirm Clinton took the email and attachment with her to the White House for an afternoon meeting with Secretary of Defense Bob Gates and National Security Advisor Tom Donilon prior to an additional evening meeting at the White House. President Obama, sources said, did not attend the early meeting with Gates as he was traveling with Vice President Joe Biden. President Obama did attend the second meeting, however, and Wikileaks and Assange’s planned release of secret cables were discussed at length, sources said. Attending this meeting were President Obama, Clinton, Gates, Donilon, Director of National Intelligence James Clapper, Deputy Secretary of State James Steinberg, Under Secretary of Defense for Policy Michele Flournoy, Chairman of the Joint Chiefs of Staff Admiral “Mike” Mullen, Vice Chairman of the Joint Chiefs of Staff Gen. James Cartwright as well as a half dozen or more various policy aides, sources confirmed. Did Clinton also share her alleged morning query of droning Assange with the members of the National Security Council and the President? Was it discussed among the top secret subjects in the meeting? Or was Clinton planning to conduct or hatch her own secret foreign policy in defiance of the President, a likely violation of the Logan Act?
  • ...3 more annotations...
  • The FBI’s 302 report from Clinton’s email investigation interview, again, specified that Clinton had “many discussions” related to “nominating” drone strikes on individuals: “Clinton could not recall a specific process for nominating a target for a drone strike and recalled much debate pertaining to the concurrence process. Clinton knew there was a role for DOD, State and the CIA but could not provide specifics as to what it was. Due to a disagreement between these agencies, Clinton recalled having many discussions related to nominating an individual for a drone strike. When Clinton exchanged classified information pertaining to the drone program internally at State, it was in her office or on a secure call. When Clinton exchanged classified information pertaining to the drone program externally it was at the White House. Clinton never had a concern with how classified information pertaining to the drone program was handled.” Sources said Clinton’s comments on neutralizing Assange fits a pattern of callousness when combined with the FBI testimony that she often considered droning individuals and then coupled with her reaction to Libyan leader Moammar Gaddafi’s death in Oct. 2011.
  • Unable to legally counter or stop Wikileaks, and likely abandoning any and all legal and “nonlegal strategies,” Clinton and her staff were forced to weather the collateral damage of CableGate. In fact, just five days after Clinton’s meetings on Mahogany Row in the State Department and the White House, Wikileaks began releasing cables to news outlets globally on Sunday November 28, 2010. Shortly after CableGate, the WikiLeaks founder sought refuge from authorities and threats by hiding at the Ecuadorian Embassy in London. Now 45, Assange is in his fifth year living quarantined inside the embassy. Clinton remains the Democratic nominee for the presidency of the United States.
  • Perhaps Democratic political operative Bob Beckel wasn’t a party outlier during this controversial Fox broadcast. Likely, Beckel was projecting what others, including Clinton, had already privately proposed.
Gary Edwards

'Clinton death list': 33 spine-tingling cases - 0 views

  •  
    "(Editor's note: This list was originally published in August 2016 and has gone viral on the web. WND is running it again as American voters cast their ballots for the nation's next president on Election Day.) How many people do you personally know who have died mysteriously? How about in plane crashes or car wrecks? Bizarre suicides? People beaten to death or murdered in a hail of bullets? And what about violent freak accidents - like separate mountain biking and skiing collisions in Aspen, Colorado? Or barbells crushing a person's throat? Bill and Hillary Clinton attend a funeral Apparently, if you're Bill or Hillary Clinton, the answer to that question is at least 33 - and possibly many more. Talk-radio star Rush Limbaugh addressed the issue of the "Clinton body count" during an August show. "I swear, I could swear I saw these stories back in 1992, back in 1993, 1994," Limbaugh said. He cited a report from Rachel Alexander at Townhall.com titled, "Clinton body count or left-wing conspiracy? Three with ties to DNC mysteriously die." Limbaugh said he recalled Ted Koppel, then-anchor of ABC News' "Nightline," routinely having discussions on the issue following the July 20, 1993, death of White House Deputy Counsel Vince Foster. In fact, Limbaugh said, he appeared on Koppel's show. "One of the things I said was, 'Who knows what happened here? But let me ask you a question.' I said, 'Ted, how many people do you know in your life who've been murdered? Ted, how many people do you know in your life that have died under suspicious circumstances?' "Of course, the answer is zilch, zero, nada, none, very few," Limbaugh chuckled. "Ask the Clintons that question. And it's a significant number. It's a lot of people that they know who have died, who've been murdered. "And the same question here from Rachel Alexander. It's amazing the cycle that exists with the Clintons. [Citing Townhall]: 'What it
Gary Edwards

Obama Stimulus Dollars Funded Soros Empire | The Soros Files - 1 views

  •  
    excerpt: Newly recently released tax documents reveal how billionaire "philanthropist" George Soros expanded his U.S.-based empire by using funds from the American Recovery and Reinvestment Act of 2009, also known as the Obama stimulus. Soros and Obama worked hand-in-glove through the stimulus, which has been called the largest single partisan wealth transfer in American history. In 2010, tax records show that Soros, a convicted inside trader with extensive knowledge of the American financial system and government policies under Obama, deployed grantees from his Open Society Foundations1 to lobby for and acquire federal contracts for job training, green energy, and community redevelopment programs.  By gaining control over those resources, Soros advanced his agenda for "green economics," open borders, and increased government handouts. In short, he grew his empire, which includes much of the "progressive" movement in the U.S., as the federal government and Obama's political constituencies grew in power and influence. This report analyzes George Soros's grants to organizations in 2010.  The records show massive coordination of non-profit networks in the states and nationally.  Four powerful organizations and coalitions - The STAR Coalition, The Gamaliel Foundation, the Apollo Alliance, and Green for All - are given detailed scrutiny in this regard, with the involvement of Van Jones getting special mention. Jones is the former Obama "Green Jobs Czar" fired after information about his communist past surfaced through the work of anti-communist blogger Trevor Loudon and then-Fox News personality Glenn Beck.  The lobbying power of such efforts ensured that stimulus funds flowed from taxpayers into union coffers and into the hands of other activists who had been instrumental in putting President Obama into office. This report, "Obama Stimulus Dollars Funded Soros Empire," includes an analysis of how Soros-funded organizations and networks
1 - 20 of 450 Next › Last »
Showing 20 items per page