Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Federal-censorship

Rss Feed Group items tagged

Paul Merrell

Report on the Free Flow of Information Act - 0 views

  • 113th Congress Report SENATE 1st Session 113-118 ====================================================================== FREE FLOW OF INFORMATION ACT OF 2013 _______ November 6, 2013.--Ordered to be printed _______ Mr. Leahy, from the Committee on the Judiciary, submitted the following R E P O R T together with ADDITIONAL AND MINORITY VIEWS [To accompany S. 987]
  • Senator Cornyn offered an amendment (ALB13708) that would ensure that all persons or entities that are protected under the Free Press Clause of the First Amendment are covered by the bill's privilege. The Committee rejected the amendment by a roll call vote. The vote record is as follows: Tally: 4 Yeas, 13 Nays, 1 Pass Yeas (4): Cornyn (R-TX), Lee (R-UT), Cruz (R-TX), Flake (R- AZ) Nays (13): Leahy (D-VT), Feinstein (D-CA), Schumer (D-NY), Durbin (D-IL), Whitehouse (D-RI), Klobuchar (D-MN), Franken (D- MN), Coons (D-DE), Blumenthal (D-CT), Hirono (D-HI), Grassley (R-IA), Hatch (R-UT), Graham (R-SC) Pass (1): Feinstein (D-CA)
  • ADDITIONAL MINORITY VIEWS FROM SENATORS CORNYN, SESSIONS, LEE, AND CRUZ On December 15, 1791, the United States of America ratified the Bill of Rights--the first ten amendments to the U.S. Constitution. The first among them states: ``Congress shall make no law . . . abridging the freedom . . . of the press[.]'' United States Constitution, amend. I. The freedom of the press does not discriminate amongst groups or individuals--it applies to all Americans. As the Supreme Court has long recognized, it was not intended to be limited to an organized industry or professional journalistic elite. See Branzburg v. Hayes, 408 U.S. 665, 704 (1972) (the ``liberty of the press is the right of the lonely pamphleteer who uses carbon paper or a mimeograph just as much as of the large metropolitan publisher who utilizes the latest photocomposition methods. Freedom of the press is a fundamental personal right[.]''); Lovell v. Griffin, 303 U.S. 444, 452 (1938) (``The liberty of the press is not confined to newspapers and periodicals. It necessarily embraces pamphlets and leaflets. . . . The press in its historic connotation comprehends every sort of publication which affords a vehicle of information and opinion.''). The Founders recognized that selectively extending the freedom of the press would require the government to decide who was a journalist worthy of protection and who was not, a form of licensure that was no freedom at all. As Justice White observed in Branzburg, administering a privilege for reporters necessitates defining ``those categories of newsmen who qualified for the privilege.'' 408 U.S. at 704 That inevitably does violence to ``the traditional doctrine that liberty of the press is the right of the lonely pamphleteer who uses carbon paper or a mimeograph just as much as of the large metropolitan publisher who utilizes the latest photocomposition methods.'' Id.
  • ...2 more annotations...
  • The First Amendment was adopted to prevent--not further-- the federal government licensing of media. See Lovell, 303 U.S. at 451 (striking an ordinance ``that . . . strikes at the very foundation of the freedom of the press by subjecting it to license and censorship. The struggle for the freedom of the press was primarily directed against the power of the licensor.''). But federal government licensing is exactly what the Free Flow of Information Act would create. The bill identifies favored forms of media--``legitimate'' press--by granting them a special privilege. That selective grant of privilege is inimical to the First Amendment, which promises all citizens the ``freedom of the press.'' See Branzburg, 408 U.S. at 704 (``Freedom of the press is a fundamental personal right[.]'') (emphasis added). It also threatens the viability of any other form of press. The specially privileged press will gain easier access to news. That will tip the scales against its competitors and make it beholden to the government for that competitive advantage. A law enacted to protect the press from the state will, in fact, make that press dependent upon the federal government--anything but free.
  • Proponents of this bill suggest that, because the Constitution does not provide a reporter's privilege, Congress's provision of a limited privilege cannot raise any constitutional concerns. Those proponents misunderstand--and thus run afoul of--the First Amendment. The First Amendment was adopted to prevent press licensure. While it does not create a ``reporter's privilege'' on its own, it abhors the selective grant of privilege to one medium over another. The American Revolution was stoked by renegade pamphleteers and town criers who used unlicensed presses to overthrow tyranny. Today, ``any person with a phone line can become a town crier with a voice that resonates farther than it could from any soapbox. Through the use of Web pages, mail exploders, and newsgroups, the same individual can become a pamphleteer.'' Reno v. Am. Civil Liberties Union, 521 U.S. 844, 870 (1997). If today's town crier or pamphleteer must meet a test set by the federal government to avail themselves of liberty, we have gone less far from tyranny than any of us want to admit. This bill runs afoul of the First Amendment to the United States Constitution and amounts to de facto licensing. It would weaken the newly-illegitimate press, render the specially privileged press supplicant to the federal government and ultimately undermine liberty. This legislation also raises a number of serious national security concerns, as discussed in the minority views authored by Senator Sessions. For these reasons, we oppose this bill. John Cornyn. Jeff Sessions. Michael S. Lee. Ted Cruz.
  •  
    The Senate Committee on the Judiciary reports with a do-pass recommendation a bill to grant a "covered journalist" a limited testimonial privilege against revealing news sources. But the attempt to grant such a shield to mainstream media reporters not only runs afoul of the First Amendment as indicated by the quoted minority view, but also a denial of equal protection of the law for non-mainstream media investigators and lowly citizens. The core problem is the Supreme Court has invariably held that members of the press have no greater protection under the first amendment than the lowly pamphleteer, hence the denial of Equal Protection of the law in this legislation.  The legislation is in direct response to government surveillance of the press and reporters being required by the courts to reveal their sources of classified information. 
Gary Edwards

Stop the Fed Takeover of the Internet! Citizens Petition to stop Obama and the FCC - 0 views

  •  
    The Issue:  President Obama and his liberal cohorts are set to takeover the Internet beginning November 20 unless freedom-loving Americans demand this illegal assault on Free Speech in America end. Back on December 21, 2009, a Federal Communications Commission (FCC) power-grab, illegally imposed strict, job-killing restrictions on the Internet. The move was no doubt fueled by Tea Party successes, and a growing fear among liberals that conservatives needed to be silenced. That said, the FCC move wasn't widely reported. In fact, many are unsure as to what the new Net Neutrality rules actually mean. What is certain, however, is that in seizing the Internet Obama has also muzzled the greatest mechanism of growth in our history (under the guise of promoting "freedom" for all), and taken one giant step closer to controlling the unfettered access to news and information that we read. The Action:  Without the support of the American people and requiring no votes in Congress, the so-called Net Neutrality rules didn't require any Congressional action. Now with the federal government seizing control, Grassfire Nation is moving quickly to amass at least 150,000 petitions demanding Congress to reverse the Net Neutrality ruling through legislation.  
Paul Merrell

Are US Academics Who Cite WikiLeaks Blackballed? - 0 views

  • Speaking to Germany’s Der Spiegel magazine in July 2015, Assange suggested that institutions within the international relations discipline have failed to understand the intersection between current geopolitical and technological developments. Specifically, Assange charged that the US journal International Studies Quarterly (ISQ), published by the prestigious International Studies Association (ISA), would not accept manuscripts based on WikiLeaks’ material. Professor of international politics Daniel W. Drezner hit back on July 30 in The Washington Post, arguing that there were other explanations for why the journal was not publishing WikiLeaks’ material. However, he did concede that it is possible that the “structural forces” opposing WikiLeaks were so powerful that a scholar would eschew WikiLeaks’ publications for “fear of being blackballed”. For the thousands of undergraduate to PhD students, fellows and academic researchers facing a precarious employment market, self-censorship for fear of freezing one’s career is not unlikely. One publicised incident from November 2010 concerning the office of career services at Columbia University’s School of International and Public Affairs (SIPA), which according to The New York Times “grooms future diplomats”, provides the perfect illustration. That year the office sent an email to students warning them against commenting on or posting WikiLeaks’ documents on social media because “engaging in these activities would call into question your ability to deal with confidential information, which is part of most positions with the federal government”. The warning came to the office through a SIPA alumnus working at the State Department.
  • Years later, the tone of the warning continued to reverberate through the halls of one of the most reputable universities in the world. In documenting human rights abuses in June 2013 a Columbia University graduate class produced the anonymous academic paper “WikiLeaks and Iraq Body Count: the sum of parts may not add up to the whole — a comparison of two tallies of Iraqi civilian deaths”. The acknowledgements section of their report refers to the 2010 warning email and states that in light of that email it would be “unwise and perhaps unethical to acknowledge all the participating students by name”. Others participating in a peer-review process have cited additional factors curtailing their use of comprehensive and illuminating WikiLeaks publications. Former US presidential candidate for the Green Party Cynthia McKinney, for example, says that she was forced to scrub her PhD dissertation from any reference of WikiLeaks material. However Drezner, who is an ISA member and on the ISQ’s web advisory board, claims that WikiLeaks’ published diplomatic cables “are not nearly as significant as Assange believes” and that the “academic universe is indifferent to WikiLeaks”. A surprising claim, given that international human rights courts have not been indifferent to evidence derived from WikiLeaks’ published cables, including cables that show the insidious ways in which European officials attempt to conceal CIA torture in secret prisons.
  • To help address the gap in scholarly analysis of the more than 2 million US diplomatic cables and State Department records published by WikiLeaks since 2010, WikiLeaks has produced a new book, The WikiLeaks Files: The World According to US Empire, published September 7, 2015. The book brings together journalists, researchers and experts on international law and foreign policy to examine the current cables and records. The documents are extensive. They expose US efforts —  across Bush and Obama administrations — to use bribes and threats to keep the US protected from facing war crimes allegations, conveying the fading effervescence of concepts such as “international justice” or “rule of law” in the face of a superpower that clearly believes that “might makes right”. Analysts review the efforts US diplomats take to maintain ties with dictators. They examine the meaning of human rights in the context of a global “War on Terror”. Like the cables they seek to illuminate, the 18 chapters of the book touch upon most major regions of the world. Experts on US foreign policy such as Robert Naiman, Stephen Zunes and Gareth Porter examine cables that reveal US meddling in Syria, US acceptance of Israeli violations of international law, and how the US dealt with the International Atomic Energy Agency in relation to Iranian nuclear development. The book offers a user guide written by WikiLeaks’ investigations editor Sarah Harrison on how to research WikiLeaks’ cables including meta data and content.
  • ...2 more annotations...
  • Writing in the book’s introduction, Assange proposes that the diplomatic cables provide “the vivisection of a living empire, showing what substance flowed from which state organ and when”. Assange notes in his introduction that academic disciplines outside international relations, and where career aspirations do not go hand in hand with patronage by government institutions, have voluminous coverage of the cables. But the ISA does not accept submissions citing WikiLeaks’ material. Although ISA executive director Mark Boyer denies that the association has a formal policy against publishing WikiLeaks’ material, he says that journal editors have discussed the implications of publishing material that is legally prohibited by the US government. According to Gabriel J. Michael, author of the Yale Law School paper Who’s Afraid of WikiLeaks? Missed Opportunities in Political Science Research, the ISQ has adopted a “provisional policy” against handling manuscripts that make use of leaked documents if such use could be interpreted as mishandling “classified” material. According to an ISQ editor quoted in Michael’s paper, this policy prohibits direct quotations as well as data mining, and was developed in consultation with legal counsel. Stating that editors are currently “in an untenable position”. According to the editor, ISQ’s policy will remain in place pending broader action from the ISA, which publishes several other disciplinary journals. The ISA and ISQ concerns about handling material that the US government forbids —  which include WikiLeaks’ cables —  amount to throwing the baby out with the bathwater. The cables go into the heart of an empire, and reflect on matters that affect everyone.
  • Without WikiLeaks, the public would still be in the dark about the Trans-Pacific Partnership “agreement” currently being negotiated. The treaty aims to rewrite the global rules on intellectual property rights and would create spheres of trade which would be protected from judicial oversight. Such agreements have the potential to change the fabric of how states operate, and the leaked cables shed light on how states negotiate significant treaties, aiming to keep citizenship participation in politics out. Where academia bans the use of important leaked documents the public loses out.
Paul Merrell

Partnership between Facebook and police could make planning protests impossible - RT USA - 0 views

  • A partnership between police departments and social media sites discussed at a convention in Philadelphia this week could allow law enforcement to keep anything deemed criminal off the Internet—and even stop people from organizing protests. A high-ranking official from the Chicago Police Department told attendees at a law enforcement conference on Monday that his agency has been working with a security chief at Facebook to block certain users from the site “if it is determined they have posted what is deemed criminal content,” reports Kenneth Lipp, an independent journalist who attended the lecture. Lipp reported throughout the week from the International Association of Chiefs of Police conference, and now says that a speaker during one of the presentations suggested that a relationship exists between law enforcement and social media that that could be considered a form of censorship. According to Lipp, the unnamed CPD officer said specifically that his agency was working with Facebook to block users’ by their individual account, IP address or device, such as a cell phone or computer.
  •  
    Here's a First Amendment conspiracy civil rights case waiting to happen. Prior restraints on speech are a very big constitutional no-no. When private actors such as Facebook staff conspire with government officials to violate federal rights, they are just as susceptible to a civil rights lawsuit as the government officials are. Query, does Mark Zuckerberg now know how to hire and effectively use competent lawyers? 
Paul Merrell

The American Deep State, Deep Events, and Off-the-Books Financing | Global Research - 0 views

  • It is alleged that some of the bail money that released Sturgis and the other Watergate burglars was drug money from the CIA asset turned drug trafficker, Manuel Artime, and delivered by Artime’s money-launderer, Ramón Milián Rodríguez. After the Iran-Contra scandal went public, Milián Rodríguez was investigated by a congressional committee – not for Watergate, but because, in support of the Contras, he had managed two Costa Rican seafood companies, Frigorificos and Ocean Hunter, that laundered drug money.6
  • In the 1950s Wall Street was a dominating complex. It included not just banks and other financial institutions but also the oil majors whose cartel arrangements were successfully defended against the U.S. Government by the Wall Street law firm Sullivan and Cromwell, home to the Dulles brothers. The inclusion of Wall Street conforms with Franklin Roosevelt’s observation in 1933 to his friend Col. E.M. House that “The real truth … is, as you and I know, that a financial element in the larger centers has owned the Government ever since the days of Andrew Jackson.”18 FDR’s insight is well illustrated by the efficiency with which a group of Wall Street bankers (including Nelson Rockefeller’s grandfather Nelson Aldrich) were able in a highly secret meeting in 1910 to establish the Federal Reserve System – a system which in effect reserved oversight of the nation’s currency supply and of all America’s banks in the not impartial hands of its largest.19 The political clout of the quasi-governmental Federal Reserve Board was clearly demonstrated in 2008, when Fed leadership secured instant support from two successive administrations for public money to rescue the reckless management of Wall Street banks: banks Too Big To Fail, and of course far Too Big To Jail, but not Too Big To Bail.20
  • since its outset, the CIA has always had access to large amounts of off-the books or offshore funds to support its activities. Indeed, the power of the purse has usually worked in an opposite sense, since those in control of deep state offshore funds supporting CIA activities have for decades also funded members of Congress and of the executive – not vice versa. The last six decades provide a coherent and continuous picture of historical direction being provided by this deep state power of the purse, trumping and sometimes reversing the conventional state. Let us resume some of the CIA’s sources of offshore and off-the-books funding for its activities. The CIA’s first covert operation was the use of “over $10 million in captured Axis funds to influence the [Italian] election [of 1948].”25 (The fundraising had begun at the wealthy Brook Club in New York; but Allen Dulles, then still a Wall Street lawyer, persuaded Washington, which at first had preferred a private funding campaign, to authorize the operation through the National Security Council and the CIA.)26 Dulles, together with George Kennan and James Forrestal, then found a way to provide a legal source for off-the-books CIA funding, under the cover of the Marshall Plan. The three men “helped devise a secret codicil [to the Marshall Plan] that gave the CIA the capability to conduct political warfare. It let the agency skim millions of dollars from the plan.”27
  • ...18 more annotations...
  • The international lawyers of Wall Street did not hide from each other their shared belief that they understood better than Washington the requirements for running the world. As John Foster Dulles wrote in the 1930s to a British colleague, The word “cartel” has here assumed the stigma of a bogeyman which the politicians are constantly attacking. The fact of the matter is that most of these politicians are highly insular and nationalistic and because the political organization of the world has under such influence been so backward, business people who have had to cope realistically with international problems have had to find ways for getting through and around stupid political barriers.21
  • In the 1960s and especially the 1970s America began to import more and more oil from the Middle East. But the negative effect on the U.S. balance of payments was offset by increasing arms and aviation sales to Iran and Saudi Arabia. Contracts with companies like Northrop and especially Lockheed (the builder of the CIA’s U-2) included kickbacks to arms brokers, like Kodama Yoshio in Japan and Adnan Khashoggi in Saudi Arabia, who were also important CIA agents. Lockheed alone later admitted to the Church Committee that it had provided $106 million in commissions to Khashoggi between 1970 and 1975, more than ten times what it had paid to the next most important connection, Kodama.31 These funds were then used by Khashoggi and Kodama to purchase pro-Western influence. But Khashoggi, advised by a team of ex-CIA Americans like Miles Copeland and Edward Moss, distributed cash, and sometimes provided women, not just in Saudi Arabia but around the world – including cash to congressmen and President Nixon in the United States.32 Khashoggi in effect served as a “cutout,” or representative, in a number of operations forbidden to the CIA and the companies he worked with. Lockheed, for one, was conspicuously absent from the list of military contractors who contributed illicitly to Nixon’s 1972 election campaign. But there was no law prohibiting, and nothing else to prevent their official representative, Khashoggi, from cycling $200 million through the bank of Nixon’s friend Bebe Rebozo.33
  • The most dramatic use of off-the-books drug profits to finance foreign armies was seen in the 1960s CIA-led campaign in Laos. There the CIA supplied airstrips and planes to support a 30,000-man drug-financed Hmong army. At one point Laotian CIA station chief Theodore Shackley even called in CIA aircraft in support of a ground battle to seize a huge opium caravan on behalf of the larger Royal Laotian Army.30
  • At the time of the Marshall Plan slush fund in Europe, the CIA also took steps which resulted in drug money to support anti-communist armies in the Far East. In my book American War Machine I tell how the CIA, using former OSS operative Paul Helliwell, created two proprietary firms as infrastructure for a KMT army in Burma, an army which quickly became involved in managing and developing the opium traffic there. The two firms were SEA Supply Inc. in Bangkok and CAT Inc. (later Air America) in Taiwan. Significantly, the CIA split ownership of CAT Inc.’s plane with KMT bankers in Taiwan – this allowed the CIA to deny responsibility for the flights when CAT planes, having delivered arms from Sea Supply to the opium-growing army, then returned to Taiwan with opium for the KMT. Even after the CIA officially severed its connection to the KMT Army in 1953, its proprietary firm Sea Supply Inc. supplied arms for a CIA-led paramilitary force, PARU, that also was financed, at least in part, by the drug traffic.28 Profits from Thailand filtered back, in part through the same Paul Helliwell, as donations to members from both parties in Congress. Thai dictator Phao Sriyanon, a drug trafficker who was then alleged to be the richest man in the world, hired lawyer Paul Helliwell…as a lobbyist in addition to [former OSS chief William] Donovan [who in 1953-55 was US Ambassador to Thailand]. Donovan and Helliwell divided the Congress between them, with Donovan assuming responsibility for the Republicans and Helliwell taking the Democrats.29
  • The power exerted by Khashoggi was not limited to his access to funds and women. By the 1970s, Khashoggi and his aide Edward Moss owned the elite Safari Club in Kenya.34 The exclusive club became the first venue for another and more important Safari Club: an alliance between Saudi and other intelligence agencies that wished to compensate for the CIA’s retrenchment in the wake of President Carter’s election and Senator Church’s post-Watergate reforms.35
  • As former Saudi intelligence chief Prince Turki bin Faisal once told Georgetown University alumni, In 1976, after the Watergate matters took place here, your intelligence community was literally tied up by Congress. It could not do anything. It could not send spies, it could not write reports, and it could not pay money. In order to compensate for that, a group of countries got together in the hope of fighting Communism and established what was called the Safari Club. The Safari Club included France, Egypt, Saudi Arabia, Morocco, and Iran.36 Prince Turki’s candid remarks– “your intelligence community was literally tied up by Congress. …. In order to compensate for that, a group of countries got together … and established what was called the Safari Club.” – made it clear that the Safari Club, operating at the level of the deep state, was expressly created to overcome restraints established by political decisions of the public state in Washington (decisions not only of Congress but also of President Carter).
  • Specifically Khashoggi’s activities involving corruption by sex and money, after they too were somewhat curtailed by Senator Church’s post-Watergate reforms, appear to have been taken up quickly by the Bank of Credit and Commerce International (BCCI), a Muslim-owned bank where Khashoggi’s friend and business partner Kamal Adham, the Saudi intelligence chief and a principal Safari Club member, was a part-owner.37 In the 1980s BCCI, and its allied shipping empire owned by the Pakistani Gokal brothers, supplied financing and infrastructure for the CIA’s (and Saudi Arabia’s) biggest covert operation of the decade, support for the Afghan mujahedin. To quote from a British book excerpted in the Senate BCCI Report: “BCCI’s role in assisting the U.S. to fund the Mujaheddin guerrillas fighting the Soviet occupation is drawing increasing attention. The bank’s role began to surface in the mid-1980′s when stories appeared in the New York Times showing how American security operatives used Oman as a staging post for Arab funds. This was confirmed in the Wall Street Journal of 23 October 1991 which quotes a member of the late General Zia’s cabinet as saying ‘It was Arab money that was pouring through BCCI.’ The Bank which carried the money on from Oman to Pakistan and into Afghanistan was National Bank of Oman, where BCCI owned 29%.”38
  • In 1981 Vice-president Bush and Saudi Prince Bandar, working together, won congressional approval for massive new arms sales of AWACS (airborne warning and control system) aircraft to Saudi Arabia. In the $5.5 billion package, only ten percent covered the cost of the planes. Most of the rest was an initial installment on what was ultimately a $200 billion program for military infrastructure through Saudi Arabia.41 It also supplied a slush fund for secret ops, one administered for over a decade in Washington by Prince Bandar, after he became the Saudi Ambassador (and a close friend of the Bush family, nicknamed “Bandar Bush”). In the words of researcher Scott Armstrong, the fund was “the ultimate government-off-the-books.” Not long after the AWACS sale was approved, Prince Bandar thanked the Reagan administration for the vote by honoring a request by William Casey that he deposit $10 million in a Vatican bank to be used in a campaign against the Italian Communist Party. Implicit in the AWACS deal was a pledge by the Saudis to fund anticommunist guerrilla groups in Afghanistan, Angola, and elsewhere that were supported by the Reagan Administration.42 The Vatican contribution, “for the CIA’s long-time clients, the Christian Democratic Party,” of course continued a CIA tradition dating back to 1948.
  • The activities of the Safari Club were exposed after Iranians in 1979 seized the records of the US Embassy in Tehran. But BCCI support for covert CIA operations, including Iran-Contra, continued until BCCI’s criminality was exposed at the end of the decade. Meanwhile, with the election of Ronald Reagan in 1980, Washington resumed off-budget funding for CIA covert operations under cover of arms contracts to Saudi Arabia. But this was no longer achieved through kickbacks to CIA assets like Khashoggi, after Congress in 1977 made it illegal for American corporations to make payments to foreign officials. Instead arrangements were made for payments to be returned, through either informal agreements or secret codicils in the contracts, by the Saudi Arabian government itself. Two successive arms deals, the AWACS deal of 1981 and the al-Yamamah deal of 1985, considerably escalated the amount of available slush funds.
  • It is reported in two books that the BCCI money flow through the Bank of Oman was handled in part by the international financier Bruce Rappaport, who for a decade, like Khashoggi, kept a former CIA officer on his staff.39 Rappaport’s partner in his Inter Maritime Bank, which interlocked with BCCI, was E.P. Barry, who earlier had been a partner in the Florida money-laundering banks of Paul Helliwell.40
  • After a second proposed major U.S. arms sale met enhanced opposition in Congress in 1985 from the Israeli lobby, Saudi Arabia negotiated instead a multi-billion pound long-term contract with the United Kingdom – the so-called al-Yamamah deal. Once again overpayments for the purchased weapons were siphoned off into a huge slush fund for political payoffs, including “hundreds of millions of pounds to the ex-Saudi ambassador to the US, Prince Bandar bin Sultan.”43 According to Robert Lacey, the payments to Prince Bandar were said to total one billion pounds over more than a decade.44 The money went through a Saudi Embassy account in the Riggs Bank, Washington; according to Trento, the Embassy’s use of the Riggs Bank dated back to the mid-1970s, when, in his words, “the Saudi royal family had taken over intelligence financing for the United States.”45 More accurately, the financing was not for the United States, but for the American deep state.
  • This leads me to the most original and important thing I have to say. I believe that these secret funds from BCCI and Saudi arms deals – first Khashoggi’s from Lockheed and then Prince Bandar’s from the AWACS and al-Yamamah deals – are the common denominator in all of the major structural deep events (SDEs) that have afflicted America since the supranational Safari Club was created in l976. I am referring specifically to 1) the covert US intervention in Afghanistan (which started about 1978 as a Safari Club intervention, more than a year before the Russian invasion), 2) the 1980 October Surprise, which together with an increase in Saudi oil prices helped assure Reagan’s election and thus give us the Reagan Revolution, 3) Iran-Contra in 1984-86, 4) and – last but by no means least – 9/11. That is why I believe it is important to analyze these events at the level of the supranational deep state. Let me just cite a few details.
  • 1) the 1980 October Surprise. According to Robert Parry, Alexandre de Marenches, the principal founder of the Safari Club, arranged for William Casey (a fellow Knight of Malta) to meet with Iranian and Israeli representatives in Paris in July and October 1980, where Casey promised delivery to Iran of needed U.S. armaments, in exchange for a delay in the return of the U.S. hostages in Iran until Reagan was in power. Parry suspects a role of BCCI in both the funding of payoffs for the secret deal and the subsequent flow of Israeli armaments to Iran.46 In addition, John Cooley considers de Marenches to be “the Safari Club player who probably did most to draw the US into the Afghan adventure.”47 2) the Iran-Contra scandal (including the funding of the Contras, the illegal Iran arms sales, and support for the Afghan mujahideen There were two stages to Iran-Contra. For twelve months in 1984-85, after meeting with Casey, King Fahd of Saudi Arabia, in the spirit of the AWACS deal, supported the Nicaraguan Contras via Prince Bandar through a BCCI bank account in Miami. But in April 1985, after the second proposed arms sale fell through, McFarlane, fearing AIPAC opposition, terminated this direct Saudi role. Then Khashoggi, with the help of Miles Copeland, devised a new scheme in which Iranian arms sales involving Israel would fund the contras. The first stage of Iran-Contra was handled by Prince Bandar through a BCCI account in Miami; the second channel was handled by Khashoggi through a different BCCI account in Montecarlo. The Kerry-Brown Senate Report on BCCI also transmitted allegations from a Palestinian-American businessman, Sam Bamieh, that Khashoggi’s funds from BCCI for arms sales to Iran came ultimately from King Fahd of Saudi Arabia, who “was hoping to gain favor with Ayatollah Ruhollah Khomeini.”48
  • 3) 9/11 When the two previously noted alleged hijackers or designated culprits, al-Mihdhar and al-Hazmi, arrived in San Diego, a Saudi named Omar al-Bayoumi both housed them and opened bank accounts for them. Soon afterwards Bayoumi’s wife began receiving monthly payments from a Riggs bank account held by Prince Bandar’s wife, Princess Haifa bint Faisal.49 In addition, Princess Haifa sent regular monthly payments of between $2,000 and $3,500 to the wife of Osama Basnan, believed by various investigators to be a spy for the Saudi government. In all, “between 1998 and 2002, up to US $73,000 in cashier cheques was funneled by Bandar’s wife Haifa … – to two Californian families known to have bankrolled al-Midhar and al-Hazmi.”50 Although these sums in themselves are not large, they may have been part of a more general pattern. Author Paul Sperry claims there was possible Saudi government contact with at least four other of the alleged hijackers in Virginia and Florida. For example, “9/11 ringleader Mohamed Atta and other hijackers visited s home owned by Esam Ghazzawi, a Saudi adviser to the nephew of King Fahd.”51
  • But it is wrong to think of Bandar’s accounts in the Riggs Bank as uniquely Saudi. Recall that Prince Bandar’s payments were said to have included “a suitcase containing more than $10 million” that went to a Vatican priest for the CIA’s long-time clients, the Christian Democratic Party.52 In 2004, the Wall Street Journal reported that the Riggs Bank, which was by then under investigation by the Justice Department for money laundering, “has had a longstanding relationship with the Central Intelligence Agency, according to people familiar with Riggs operations and U.S. government officials.”53 Meanwhile President Obiang of Equatorial Guinea “siphoned millions from his country’s treasury with the help of Riggs Bank in Washington, D.C.”54 For this a Riggs account executive, Simon Kareri, was indicted. But Obiang enjoyed State Department approval for a contract with the private U.S. military firm M.P.R.I., with an eye to defending offshore oil platforms owned by ExxonMobil, Marathon, and Hess.55 Behind the CIA relationship with the Riggs Bank was the role played by the bank’s overseas clients in protecting U.S. investments, and particularly (in the case of Saudi Arabia and Equatorial Guinea), the nation’s biggest oil companies.
  • The issue of Saudi Embassy funding of at least two (and possibly more) of the alleged 9/11 hijackers (or designated culprits) is so sensitive that, in the 800-page Joint Congressional Inquiry Report on 9/11, the entire 28-page section dealing with Saudi financing was very heavily redacted.56 A similar censorship occurred with the 9/11 Commission Report: According to Philip Shenon, several staff members felt strongly that they had demonstrated a close Saudi government connection to the hijackers, but a senior staff member purged almost all of the most serious allegations against the Saudi government, and moved the explosive supporting evidence to the report’s footnotes.57 It is probable that this cover-up was not designed for the protection of the Saudi government itself, so much as of the supranational deep state connection described in this essay, a milieu where American, Saudi, and Israeli elements all interact covertly. One sign of this is that Prince Bandar himself, sensitive to the anti-Saudi sentiment that 9/11 caused, has been among those calling for the U.S. government to make the redacted 28 pages public.58
  • This limited exposure of the nefarious use of funds generated from Saudi arms contracts has not created a desire in Washington to limit these contracts. On the contrary, in 2010, the second year of the Obama administration, The Defense Department … notified Congress that it wants to sell $60 billion worth of advanced aircraft and weapons to Saudi Arabia. The proposed sale, which includes helicopters, fighter jets, radar equipment and satellite-guided bombs, would be the largest arms deal to another country in U.S. history if the sale goes through and all purchases are made.59 The sale did go through; only a few congressmen objected.60 The deep state, it would appear, is alive and well, and impervious to exposures of it. It is clear that for some decades the bottom-upwards processes of democracy have been increasingly supplanted by the top-downwards processes of the deep state.
  • But the deeper strain in history, I would like to believe, is in the opposite direction: the ultimate diminution of violent top-down forces by the bottom-up forces of an increasingly integrated civil society.61 In the last months we have had Wikileaks, then Edward Snowden, and now the fight between the CIA and its long-time champion in Congress, Dianne Feinstein. It may be time to see a systemic correction, much as we did after Daniel Ellsberg’s release of the Pentagon Papers, which was followed by Watergate and the Church Committee reforms. I believe that to achieve this correction there must be a better understanding of deep events and of the deep state. Ultimately, however, whether we see a correction or not will depend, at least in part, on how much people care.
Paul Merrell

Here Are All the Sketchy Government Agencies Buying Hacking Team's Spy Tech | Motherboard - 0 views

  • They say what goes around comes around, and there's perhaps nowhere that rings more true than in the world of government surveillance. Such was the case on Monday morning when Hacking Team, the Italian company known for selling electronic intrusion tools to police and federal agencies around the world, awoke to find that it had been hacked itself—big time—apparently exposing its complete client list, email spools, invoices, contracts, source code, and more. Those documents show that not only has the company been selling hacking tools to a long list of foreign governments with dubious human rights records, but it’s also establishing a nice customer base right here in the good old US of A. The cache, which sources told Motherboard is legitimate, contains more than 400 gigabytes of files, many of which confirm previous reports that the company has been selling industrial-grade surveillance software to authoritarian governments. Hacking Team is known in the surveillance world for its flagship hacking suite, Remote Control System (RCS) or Galileo, which allows its government and law enforcement clients to secretly install “implants” on remote machines that can steal private emails, record Skype calls, and even monitor targets through their computer's webcam. Hacking Team in North America
  • According to leaked contracts, invoices and an up-to-date list of customer subscriptions, Hacking Team’s clients—which the company has consistently refused to name—also include Kazakhstan, Azerbaijan, Oman, Saudi Arabia, Uzbekistan, Bahrain, Ethiopia, Nigeria, Sudan and many others. The list of names matches the findings of Citizen Lab, a research lab at the University of Toronto's Munk School of Global Affairs that previously found traces of Hacking Team on the computers of journalists and activists around the world. Last year, the Lab's researchers mapped out the worldwide collection infrastructure used by Hacking Team's customers to covertly transport stolen data, unveiling a massive network comprised of servers based in 21 countries. Reporters Without Borders later named the company one of the “Enemies of the Internet” in its annual report on government surveillance and censorship.
  • we’ve only scratched the surface of this massive leak, and it’s unclear how Hacking Team will recover from having its secrets spilling across the internet for all to see. In the meantime, the company is asking all customers to stop using its spyware—and likely preparing for the worst.
Paul Merrell

UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights - ... - 0 views

  • The United Nations’ top official for counter-terrorism and human rights (known as the “Special Rapporteur”) issued a formal report to the U.N. General Assembly today that condemns mass electronic surveillance as a clear violation of core privacy rights guaranteed by multiple treaties and conventions. “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether,” the report concluded. Central to the Rapporteur’s findings is the distinction between “targeted surveillance” — which “depend[s] upon the existence of prior suspicion of the targeted individual or organization” — and “mass surveillance,” whereby “states with high levels of Internet penetration can [] gain access to the telephone and e-mail content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites.” In a system of “mass surveillance,” the report explained, “all of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every Internet user are potentially open for inspection by intelligence and law enforcement agencies in the States concerned.”
  • Mass surveillance thus “amounts to a systematic interference with the right to respect for the privacy of communications,” it declared. As a result, “it is incompatible with existing concepts of privacy for States to collect all communications or metadata all the time indiscriminately.” In concluding that mass surveillance impinges core privacy rights, the report was primarily focused on the International Covenant on Civil and Political Rights, a treaty enacted by the General Assembly in 1966, to which all of the members of the “Five Eyes” alliance are signatories. The U.S. ratified the treaty in 1992, albeit with various reservations that allowed for the continuation of the death penalty and which rendered its domestic law supreme. With the exception of the U.S.’s Persian Gulf allies (Saudi Arabia, UAE and Qatar), virtually every major country has signed the treaty. Article 17 of the Covenant guarantees the right of privacy, the defining protection of which, the report explained, is “that individuals have the right to share information and ideas with one another without interference by the State, secure in the knowledge that their communication will reach and be read by the intended recipients alone.”
  • The report’s key conclusion is that this core right is impinged by mass surveillance programs: “Bulk access technology is indiscriminately corrosive of online privacy and impinges on the very essence of the right guaranteed by article 17. In the absence of a formal derogation from States’ obligations under the Covenant, these programs pose a direct and ongoing challenge to an established norm of international law.” The report recognized that protecting citizens from terrorism attacks is a vital duty of every state, and that the right of privacy is not absolute, as it can be compromised when doing so is “necessary” to serve “compelling” purposes. It noted: “There may be a compelling counter-terrorism justification for the radical re-evaluation of Internet privacy rights that these practices necessitate. ” But the report was adamant that no such justifications have ever been demonstrated by any member state using mass surveillance: “The States engaging in mass surveillance have so far failed to provide a detailed and evidence-based public justification for its necessity, and almost no States have enacted explicit domestic legislation to authorize its use.”
  • ...5 more annotations...
  • Instead, explained the Rapporteur, states have relied on vague claims whose validity cannot be assessed because of the secrecy behind which these programs are hidden: “The arguments in favor of a complete abrogation of the right to privacy on the Internet have not been made publicly by the States concerned or subjected to informed scrutiny and debate.” About the ongoing secrecy surrounding the programs, the report explained that “states deploying this technology retain a monopoly of information about its impact,” which is “a form of conceptual censorship … that precludes informed debate.” A June report from the High Commissioner for Human Rights similarly noted “the disturbing lack of governmental transparency associated with surveillance policies, laws and practices, which hinders any effort to assess their coherence with international human rights law and to ensure accountability.” The rejection of the “terrorism” justification for mass surveillance as devoid of evidence echoes virtually every other formal investigation into these programs. A federal judge last December found that the U.S. Government was unable to “cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack.” Later that month, President Obama’s own Review Group on Intelligence and Communications Technologies concluded that mass surveillance “was not essential to preventing attacks” and information used to detect plots “could readily have been obtained in a timely manner using conventional [court] orders.”
  • Three Democratic Senators on the Senate Intelligence Committee wrote in The New York Times that “the usefulness of the bulk collection program has been greatly exaggerated” and “we have yet to see any proof that it provides real, unique value in protecting national security.” A study by the centrist New America Foundation found that mass metadata collection “has had no discernible impact on preventing acts of terrorism” and, where plots were disrupted, “traditional law enforcement and investigative methods provided the tip or evidence to initiate the case.” It labeled the NSA’s claims to the contrary as “overblown and even misleading.” While worthless in counter-terrorism policies, the UN report warned that allowing mass surveillance to persist with no transparency creates “an ever present danger of ‘purpose creep,’ by which measures justified on counter-terrorism grounds are made available for use by public authorities for much less weighty public interest purposes.” Citing the UK as one example, the report warned that, already, “a wide range of public bodies have access to communications data, for a wide variety of purposes, often without judicial authorization or meaningful independent oversight.”
  • The report was most scathing in its rejection of a key argument often made by American defenders of the NSA: that mass surveillance is justified because Americans are given special protections (the requirement of a FISA court order for targeted surveillance) which non-Americans (95% of the world) do not enjoy. Not only does this scheme fail to render mass surveillance legal, but it itself constitutes a separate violation of international treaties (emphasis added): The Special Rapporteur concurs with the High Commissioner for Human Rights that where States penetrate infrastructure located outside their territorial jurisdiction, they remain bound by their obligations under the Covenant. Moreover, article 26 of the Covenant prohibits discrimination on grounds of, inter alia, nationality and citizenship. The Special Rapporteur thus considers that States are legally obliged to afford the same privacy protection for nationals and non-nationals and for those within and outside their jurisdiction. Asymmetrical privacy protection regimes are a clear violation of the requirements of the Covenant.
  • That principle — that the right of internet privacy belongs to all individuals, not just Americans — was invoked by NSA whistleblower Edward Snowden when he explained in a June, 2013 interview at The Guardian why he disclosed documents showing global surveillance rather than just the surveillance of Americans: “More fundamentally, the ‘US Persons’ protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it’s only victimizing 95% of the world instead of 100%.” The U.N. Rapporteur was clear that these systematic privacy violations are the result of a union between governments and tech corporations: “States increasingly rely on the private sector to facilitate digital surveillance. This is not confined to the enactment of mandatory data retention legislation. Corporates [sic] have also been directly complicit in operationalizing bulk access technology through the design of communications infrastructure that facilitates mass surveillance. ”
  • The latest finding adds to the growing number of international formal rulings that the mass surveillance programs of the U.S. and its partners are illegal. In January, the European parliament’s civil liberties committee condemned such programs in “the strongest possible terms.” In April, the European Court of Justice ruled that European legislation on data retention contravened EU privacy rights. A top secret memo from the GCHQ, published last year by The Guardian, explicitly stated that one key reason for concealing these programs was fear of a “damaging public debate” and specifically “legal challenges against the current regime.” The report ended with a call for far greater transparency along with new protections for privacy in the digital age. Continuation of the status quo, it warned, imposes “a risk that systematic interference with the security of digital communications will continue to proliferate without any serious consideration being given to the implications of the wholesale abandonment of the right to online privacy.” The urgency of these reforms is underscored, explained the Rapporteur, by a conclusion of the United States Privacy and Civil Liberties Oversight Board that “permitting the government to routinely collect the calling records of the entire nation fundamentally shifts the balance of power between the state and its citizens.”
Paul Merrell

No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn | WIRED - 0 views

  • The debate over online anonymity, and all the whistleblowers, trolls, anarchists, journalists and political dissidents it enables, is messy enough. It doesn’t need the US government making up bogus statistics about how much that anonymity facilitates child pornography.
  • he debate over online anonymity, and all the whistleblowers, trolls, anarchists, journalists and political dissidents it enables, is messy enough. It doesn’t need the US government making up bogus statistics about how much that anonymity facilitates child pornography. At the State of the Net conference in Washington on Tuesday, US assistant attorney general Leslie Caldwell discussed what she described as the dangers of encryption and cryptographic anonymity tools like Tor, and how those tools can hamper law enforcement. Her statements are the latest in a growing drumbeat of federal criticism of tech companies and software projects that provide privacy and anonymity at the expense of surveillance. And as an example of the grave risks presented by that privacy, she cited a study she said claimed an overwhelming majority of Tor’s anonymous traffic relates to pedophilia. “Tor obviously was created with good intentions, but it’s a huge problem for law enforcement,” Caldwell said in comments reported by Motherboard and confirmed to me by others who attended the conference. “We understand 80 percent of traffic on the Tor network involves child pornography.” That statistic is horrifying. It’s also baloney.
  • In a series of tweets that followed Caldwell’s statement, a Department of Justice flack said Caldwell was citing a University of Portsmouth study WIRED covered in December. He included a link to our story. But I made clear at the time that the study claimed 80 percent of traffic to Tor hidden services related to child pornography, not 80 percent of all Tor traffic. That is a huge, and important, distinction. The vast majority of Tor’s users run the free anonymity software while visiting conventional websites, using it to route their traffic through encrypted hops around the globe to avoid censorship and surveillance. But Tor also allows websites to run Tor, something known as a Tor hidden service. This collection of hidden sites, which comprise what’s often referred to as the “dark web,” use Tor to obscure the physical location of the servers that run them. Visits to those dark web sites account for only 1.5 percent of all Tor traffic, according to the software’s creators at the non-profit Tor Project. The University of Portsmouth study dealt exclusively with visits to hidden services. In contrast to Caldwell’s 80 percent claim, the Tor Project’s director Roger Dingledine pointed out last month that the study’s pedophilia findings refer to something closer to a single percent of Tor’s overall traffic.
  • ...1 more annotation...
  • So to whoever at the Department of Justice is preparing these talking points for public consumption: Thanks for citing my story. Next time, please try reading it.
Paul Merrell

9/11 judge: War court can't order Guantánamo healthcare | Miami Herald Miami ... - 0 views

  • A​ military judge has rejected a request for war court intervention in the healthcare of an alleged 9/11 plotter who, according to his lawyer, still suffers from wounds inflicted at a CIA “black site” where agents subjected him to rectal rehydration.Army Col. James L. Pohl wrote in a two-page order released by the Pentagon Friday that the court “does not have the authority to address issues concerning medical care.” It was dated March 10.In February, the attorney for Saudi captive Mustafa al Hawsawi asked the judge to intervene in the case, referring to a recently released portion of the Senate Intelligence Committee's “Torture Report,” and saying that the 46-year-old man had been rectally abused while in CIA custody — and that he continues to bleed now, at least eight years later. “Some would call that sodomy,” said attorney Walter Ruiz, adding that “those acts caused longstanding chronic medical conditions that have yet to be resolved.”
  • Hawsawi is accused of helping the Sept. 11 hijackers with travel and money. He is awaiting a death-penalty trial with the alleged mastermind, Khalid Sheik Mohammed, and three others, all of whom were subjected to “enhanced interrogation techniques” before they got to Guantánamo in September 2006.Hawsawi has sat on a pillow over years of pretrial hearings. The February hearing was the first time that Ruiz was permitted to explain it under a loosening of censorship at the court that lets lawyers talk about the released, redacted 524-page portion of the 6,200-page Senate report.Guantánamo’s prison spokesmen say war-on-terror captives get the same level of medical care as U.S. service members.Ruiz specifically cited a reference to an investigation of allegations that CIA agents conducted medically unnecessary rectal exams with excessive force on two detainees, one of them Hawsawi, who afterward suffered an anal fissure, rectal prolapse and hemorrhoids. 
  • Ruiz said that guards sometimes find blood in Hawsawi’s clothes. The lawyer asked the judge to order prison legal and medical staff to speak with him, as Hawsawi’s healthcare proxy, and to let him see Hawsawi’s secret medical records. Prosecutors urged the Army judge to stay out of the issue. “No doctor should be treating with a lawyer looking over his shoulder,” said federal attorney Ed Ryan.The Sept. 11 hearings are in recess until April 20.
  •  
    Whereas if he were facing trial in an Article III court, the court would have jurisdiction to protect a prisoner's health and conditons of confinement. This is disgusting.
1 - 9 of 9
Showing 20 items per page