Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged I

Rss Feed Group items tagged

Paul Merrell

World's Largest Barrier Reef to Disappear in 5 Years | News | teleSUR English - 0 views

  • .ng-hide:not(.ng-hide-animate){display:none !important}.shr-debug{font-weight:bolder;cursor:pointer;color:#008000}.shareaholic-canvas{clear:both}.shareaholic-ui button,.shareaholic-ui .shareaholic-ui-button{border:0;box-shadow:none;text-shadow:none;font-size:12px;padding:6px 10px !important;border-radius:3px;background:transparent;display:inline-block;margin:2px;border:1px solid transparent;line-height:16px;color:#555;cursor:pointer;height:initial;text-transform:initial;}.shareaholic-ui button:hover,.shareaholic-ui .shareaholic-ui-button:hover{color:#000;font-weight:inherit}.shareaholic-ui button.button-primary,.shareaholic-ui .shareaholic-ui-button.button-primary{background-color:#52a8e8;background-image:-webkit-linear-gradient(top,#52a8e8,#377ad0);border:1px solid #3f81ae;border-color:#3f81ae #2e68a1 #1f5496;box-shadow:inset 0 1px 0 0 #72baeb,0 1px 2px 0 #c3c3c3;color:#fff;font-weight:bold;text-shadow:0 -1px 1px #3275bb;-webkit-appearance:none}.shareaholic-ui button.ui-disabled,.shareaholic-ui .shareaholic-ui-button.ui-disabled{background-color:#ccc;background-image:none;border-color:#bbb;box-shadow:none;color:#999;cursor:default;opacity:.5;text-shadow:none}.shareaholic-ui button.icon-only,.shareaholic-ui .shareaholic-ui-button.icon-only{padding:0;}.shareaholic-ui button.icon-only.icon-16,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-16{padding:4px;}.shareaholic-ui button.icon-only.icon-16 i,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-16 i{height:16px;width:16px}.shareaholic-ui button.icon-only.icon-24,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-24{padding:0;}.shareaholic-ui button.icon-only.icon-24 i,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-24 i{height:24px;width:24px}.s
  • According to the report published in the journal Estuarine, Coastal and Shelf Science, saving the reef will take a huge amount of work and money. Poor water quality was seen as the major threat as well as global warming which is causing significant coral bleaching. Chief researcher of the report, John Brodie, told the Guardian, “The current spending is totally inadequate ... You either do it properly or you give up on the reef. It’s that bad.”
Gary Edwards

I Am a Peaceful AR-15 Assault Rifle Owner | Casey Research - 0 views

  •  
    ""Firearms stand next in importance to the constitution itself. They are the American people's liberty teeth and keystone under independence … from the hour the Pilgrims landed to the present day, events, occurances and tendencies prove that to ensure peace security and happiness, the rifle and pistol are equally indispensable … the very atmosphere of firearms anywhere restrains evil interference - they deserve a place of honor with all that's good." George Washington I can't think of any reason I need to own my AR-15 assault[1] rifle. I don't pretend to need it for self defense. I also own several handguns. Any one of my handguns would be adequate to allow me an opportunity to defend myself, or another person, from virtually any act of aggression by another individual. Indeed, I could have easily halted any of the recent gun based rampages, by any of those deranged lunatics, with just one of my handguns. I wish I had been there. I have needlessly and peacefully owned my AR-15 for many years. I keep my AR-15 securely locked in a gun safe in the very same home where my young children live. My children are aware of my AR-15. Like many other things in life, I have taught my children about guns. Recently, some of my kids attended a private gun safety class given by a highly experienced gun expert. I enjoyed watching my kids learn about my AR-15. I admit being a bit nostalgic about my AR-15. I spent lots of time learning about every aspect of the AR-15 when I was in Marine Corps boot camp at Parris Island, South Carolina. I also carried an AR-15 when I served my country in Operation Desert Storm in Saudi Arabia. I had it with me when I lived in a dirt hole on the border of Kuwait. It is the weapon I know better than any other. I own lots of dangerous things I don't need. I don't need my highly modified 600+ hp Z06 Corvette, or my Harley Davidson motorcycle, or that crazy looking knife I sometimes jokingly say was imported directly from the Klingon Empire.[2] Al
Paul Merrell

United States v. United States Dist. Court for Eastern Dist. of Mich., 407 US 297 - Sup... - 0 views

  • But a recognition of these elementary truths does not make the employment by Government of electronic surveillance a welcome development—even when employed with restraint and under judicial supervision. There is, understandably, a deep-seated uneasiness and apprehension that this capability will be used to intrude upon cherished privacy of law-abiding citizens.[13] We 313*313 look to the Bill of Rights to safeguard this privacy. Though physical entry of the home is the chief evil against which the wording of the Fourth Amendment is directed, its broader spirit now shields private speech from unreasonable surveillance. Katz v. United States, supra; Berger v. New York, supra; Silverman v. United States, 365 U. S. 505 (1961). Our decision in Katz refused to lock the Fourth Amendment into instances of actual physical trespass. Rather, the Amendment governs "not only the seizure of tangible items, but extends as well to the recording of oral statements . . . without any `technical trespass under . . . local property law.'" Katz, supra, at 353. That decision implicitly recognized that the broad and unsuspected governmental incursions into conversational privacy which electronic surveillance entails[14] necessitate the application of Fourth Amendment safeguards.
  • National security cases, moreover, often reflect a convergence of First and Fourth Amendment values not present in cases of "ordinary" crime. Though the investigative duty of the executive may be stronger in such cases, so also is there greater jeopardy to constitutionally protected speech. "Historically the struggle for freedom of speech and press in England was bound up with the issue of the scope of the search and seizure 314*314 power," Marcus v. Search Warrant, 367 U. S. 717, 724 (1961). History abundantly documents the tendency of Government—however benevolent and benign its motives —to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the Government attempts to act under so vague a concept as the power to protect "domestic security." Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent. Senator Hart addressed this dilemma in the floor debate on § 2511 (3):
  • "As I read it—and this is my fear—we are saying that the President, on his motion, could declare— name your favorite poison—draft dodgers, Black Muslims, the Ku Klux Klan, or civil rights activists to be a clear and present danger to the structure or existence of the Government."[15] The price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power. Nor must the fear of unauthorized official eavesdropping deter vigorous citizen dissent and discussion of Government action in private conversation. For private dissent, no less than open public discourse, is essential to our free society.
  • ...8 more annotations...
  • As the Fourth Amendment is not absolute in its terms, our task is to examine and balance the basic values at stake in this case: the duty of Government 315*315 to protect the domestic security, and the potential danger posed by unreasonable surveillance to individual privacy and free expression. If the legitimate need of Government to safeguard domestic security requires the use of electronic surveillance, the question is whether the needs of citizens for privacy and free expression may not be better protected by requiring a warrant before such surveillance is undertaken. We must also ask whether a warrant requirement would unduly frustrate the efforts of Government to protect itself from acts of subversion and overthrow directed against it. Though the Fourth Amendment speaks broadly of "unreasonable searches and seizures," the definition of "reasonableness" turns, at least in part, on the more specific commands of the warrant clause. Some have argued that "[t]he relevant test is not whether it is reasonable to procure a search warrant, but whether the search was reasonable," United States v. Rabinowitz, 339 U. S. 56, 66 (1950).[16] This view, however, overlooks the second clause of the Amendment. The warrant clause of the Fourth Amendment is not dead language. Rather, it has been
  • "a valued part of our constitutional law for decades, and it has determined the result in scores and scores of cases in courts all over this country. It is not an inconvenience to be somehow `weighed' against the claims of police efficiency. It is, or should 316*316 be, an important working part of our machinery of government, operating as a matter of course to check the `well-intentioned but mistakenly overzealous executive officers' who are a part of any system of law enforcement." Coolidge v. New Hampshire, 403 U. S., at 481. See also United States v. Rabinowitz, supra, at 68 (Frankfurter, J., dissenting); Davis v. United States, 328 U. S. 582, 604 (1946) (Frankfurter, J., dissenting). Over two centuries ago, Lord Mansfield held that common-law principles prohibited warrants that ordered the arrest of unnamed individuals who the officer might conclude were guilty of seditious libel. "It is not fit," said Mansfield, "that the receiving or judging of the information should be left to the discretion of the officer. The magistrate ought to judge; and should give certain directions to the officer." Leach v. Three of the King's Messengers, 19 How. St. Tr. 1001, 1027 (1765).
  • Lord Mansfield's formulation touches the very heart of the Fourth Amendment directive: that, where practical, a governmental search and seizure should represent both the efforts of the officer to gather evidence of wrongful acts and the judgment of the magistrate that the collected evidence is sufficient to justify invasion of a citizen's private premises or conversation. Inherent in the concept of a warrant is its issuance by a "neutral and detached magistrate." Coolidge v. New Hampshire, supra, at 453; Katz v. United States, supra, at 356. The further requirement of "probable cause" instructs the magistrate that baseless searches shall not proceed. These Fourth Amendment freedoms cannot properly be guaranteed if domestic security surveillances may be conducted solely within the discretion of the Executive 317*317 Branch. The Fourth Amendment does not contemplate the executive officers of Government as neutral and disinterested magistrates. Their duty and responsibility are to enforce the laws, to investigate, and to prosecute. Katz v. United States, supra, at 359-360 (DOUGLAS, J., concurring). But those charged with this investigative and prosecutorial duty should not be the sole judges of when to utilize constitutionally sensitive means in pursuing their tasks. The historical judgment, which the Fourth Amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and protected speech.[17]
  • It may well be that, in the instant case, the Government's surveillance of Plamondon's conversations was a reasonable one which readily would have gained prior judicial approval. But this Court "has never sustained a search upon the sole ground that officers reasonably expected to find evidence of a particular crime and voluntarily confined their activities to the least intrusive means consistent with that end." Katz, supra, at 356-357. The Fourth Amendment contemplates a prior judicial judgment,[18] not the risk that executive discretion may be reasonably exercised. This judicial role accords with our basic constitutional doctrine that individual freedoms will best be preserved through a separation of powers and division of functions among the different branches and levels of Government. Harlan, Thoughts at a Dedication: Keeping the Judicial Function in Balance, 49 A. B. A. J. 943-944 (1963). The independent check upon executive discretion is not 318*318 satisfied, as the Government argues, by "extremely limited" post-surveillance judicial review.[19] Indeed, post-surveillance review would never reach the surveillances which failed to result in prosecutions. Prior review by a neutral and detached magistrate is the time-tested means of effectuating Fourth Amendment rights. Beck v. Ohio, 379 U. S. 89, 96 (1964).
  • But we do not think a case has been made for the requested departure from Fourth Amendment standards. The circumstances described do not justify complete exemption of domestic security surveillance from prior judicial scrutiny. Official surveillance, whether its purpose be criminal investigation or ongoing intelligence gathering, risks infringement of constitutionally protected privacy of speech. Security surveillances are especially sensitive because of the inherent vagueness of the domestic security concept, the necessarily broad and continuing nature of intelligence gathering, and the temptation to utilize such surveillances to oversee political dissent. We recognize, as we have before, the constitutional basis of the President's domestic security role, but we think it must be exercised in a manner compatible with the Fourth Amendment. In this case we hold that this requires an appropriate prior warrant procedure. We cannot accept the Government's argument that internal security matters are too subtle and complex for judicial evaluation. Courts regularly deal with the most difficult issues of our society. There is no reason to believe that federal judges will be insensitive to or uncomprehending of the issues involved in domestic security cases. Certainly courts can recognize that domestic security surveillance involves different considerations from the surveillance of "ordinary crime." If the threat is too subtle or complex for our senior law enforcement officers to convey its significance to a court, one may question whether there is probable cause for surveillance.
  • Nor do we believe prior judicial approval will fracture the secrecy essential to official intelligence gathering. The investigation of criminal activity has long 321*321 involved imparting sensitive information to judicial officers who have respected the confidentialities involved. Judges may be counted upon to be especially conscious of security requirements in national security cases. Title III of the Omnibus Crime Control and Safe Streets Act already has imposed this responsibility on the judiciary in connection with such crimes as espionage, sabotage, and treason, §§ 2516 (1) (a) and (c), each of which may involve domestic as well as foreign security threats. Moreover, a warrant application involves no public or adversary proceedings: it is an ex parte request before a magistrate or judge. Whatever security dangers clerical and secretarial personnel may pose can be minimized by proper administrative measures, possibly to the point of allowing the Government itself to provide the necessary clerical assistance.
  • Thus, we conclude that the Government's concerns do not justify departure in this case from the customary Fourth Amendment requirement of judicial approval prior to initiation of a search or surveillance. Although some added burden will be imposed upon the Attorney General, this inconvenience is justified in a free society to protect constitutional values. Nor do we think the Government's domestic surveillance powers will be impaired to any significant degree. A prior warrant establishes presumptive validity of the surveillance and will minimize the burden of justification in post-surveillance judicial review. By no means of least importance will be the reassurance of the public generally that indiscriminate wiretapping and bugging of law-abiding citizens cannot occur.
  • As the surveillance of Plamondon's conversations was unlawful, because conducted without prior judicial approval, the courts below correctly held that Alderman v. United States, 394 U. S. 165 (1969), is controlling and that it requires disclosure to the accused of his own impermissibly intercepted conversations. As stated in Alderman, "the trial court can and should, where appropriate, place a defendant and his counsel under enforceable orders against unwarranted disclosure of the materials which they may be entitled to inspect." 394 U. S., at 185.[21]
Paul Merrell

US v. Warshak, 631 F. 3d 266 - Court of Appeals, 6th Circuit 2010 - Google Scholar - 0 views

  • While a letter is in the mail, the police may not intercept it and examine its contents unless they first obtain a warrant based on probable cause. Ibid. This is true despite the fact that sealed letters are handed over to perhaps dozens of mail carriers, any one of whom could tear open the thin paper envelopes that separate the private words from the world outside. Put another way, trusting a letter to an intermediary does not necessarily defeat a reasonable expectation that the letter will remain private. See Katz, 389 U.S. at 351, 88 S.Ct. 507 ("[W]hat [a person] seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected."). Given the fundamental similarities between email and traditional forms of communication, it would defy common sense 286*286 to afford emails lesser Fourth Amendment protection. See Patricia L. Bellia & Susan Freiwald, Fourth Amendment Protection for Stored E-Mail, 2008 U. Chi. Legal F. 121, 135 (2008) (recognizing the need to "eliminate the strangely disparate treatment of mailed and telephonic communications on the one hand and electronic communications on the other"); City of Ontario v. Quon, ___ U.S. ___, 130 S.Ct. 2619, 2631, 177 L.Ed.2d 216 (2010) (implying that "a search of [an individual's] personal e-mail account" would be just as intrusive as "a wiretap on his home phone line"); United States v. Forrester, 512 F.3d 500, 511 (9th Cir.2008) (holding that "[t]he privacy interests in [mail and email] are identical"). Email is the technological scion of tangible mail, and it plays an indispensable part in the Information Age.
  • Over the last decade, email has become "so pervasive that some persons may consider [it] to be [an] essential means or necessary instrument[] for self-expression, even self-identification." Quon, 130 S.Ct. at 2630. It follows that email requires strong protection under the Fourth Amendment; otherwise, the Fourth Amendment would prove an ineffective guardian of private communication, an essential purpose it has long been recognized to serve. See U.S. Dist. Court, 407 U.S. at 313, 92 S.Ct. 2125; United States v. Waller, 581 F.2d 585, 587 (6th Cir.1978) (noting the Fourth Amendment's role in protecting "private communications"). As some forms of communication begin to diminish, the Fourth Amendment must recognize and protect nascent ones that arise. See Warshak I, 490 F.3d at 473 ("It goes without saying that like the telephone earlier in our history, e-mail is an ever-increasing mode of private communication, and protecting shared communications through this medium is as important to Fourth Amendment principles today as protecting telephone conversations has been in the past.").
  • If we accept that an email is analogous to a letter or a phone call, it is manifest that agents of the government cannot compel a commercial ISP to turn over the contents of an email without triggering the Fourth Amendment. An ISP is the intermediary that makes email communication possible. Emails must pass through an ISP's servers to reach their intended recipient. Thus, the ISP is the functional equivalent of a post office or a telephone company. As we have discussed above, the police may not storm the post office and intercept a letter, and they are likewise forbidden from using the phone system to make a clandestine recording of a telephone call—unless they get a warrant, that is. See Jacobsen, 466 U.S. at 114, 104 S.Ct. 1652; Katz, 389 U.S. at 353, 88 S.Ct. 507. It only stands to reason that, if government agents compel an ISP to surrender the contents of a subscriber's emails, those agents have thereby conducted a Fourth Amendment search, which necessitates compliance with the warrant requirement absent some exception. In Warshak I, the government argued that this conclusion was improper, pointing to the fact that NuVox contractually reserved the right to access Warshak's emails for certain purposes. While we acknowledge that a subscriber agreement might, in some cases, be sweeping enough to defeat a reasonable expectation of privacy in the contents of an email account, see Warshak I, 490 F.3d at 473; Warshak II, 532 F.3d at 526-27, we doubt that will be the case in most situations, and it is certainly not the case here.
  • ...1 more annotation...
  • Accordingly, we hold that a subscriber enjoys a reasonable expectation of privacy in the contents of emails "that are stored with, or sent or received through, a commercial ISP." Warshak I, 490 F.3d at 473; see Forrester, 512 F.3d at 511 (suggesting that "[t]he contents [of email messages] may deserve Fourth Amendment protection"). The government may not compel a commercial ISP to turn over the contents of a subscriber's emails without first obtaining a warrant based on probable cause. Therefore, because they did not obtain a warrant, the government agents violated the Fourth Amendment when they obtained the contents of Warshak's emails. Moreover, to the extent that the SCA purports to permit the government to obtain such emails warrantlessly, the SCA is unconstitutional.
  •  
    A 2010 decision by the U.S. 6th Circuit Court of Appeals that I had missed up to now. It finds the Stored Communications Act's section that excuses email in the possession of an ISP for more than 180 days from the 4th Amendment's judicial warrant clause. There may yet be hope for cloud computing in the U.S. 
Gary Edwards

James Madison and the States Natural Right of Nullification ; Publius-Huldah's Blog - 0 views

  • What are the Two Conditions Precedent for Nullification?
  • The act of the federal government must be unconstitutional –  usually a usurpation of a power not delegated to the federal government in the Constitution; and
  • The act must be something The States or The People can “nullify”- i.e., refuse to obey:  the act must order them to do something or not do something.
  • ...38 more annotations...
  • If the federal government should overpass the just bounds of its authority and make a tyrannical use of its powers, the people, whose creature it is, must appeal to the standard [the Constitution] they have formed, and take such measures to redress the injury done to the Constitution as the exigency may suggest and prudence justify.”
  • When the act of the federal government is unconstitutional and orders The States or The People to do – or not do – something, nullification is the proper form of interposition.
  • When the act of the federal government is unconstitutional, but doesn’t order The States or The People to do – or not do – something (the alien & sedition acts), nullification is not possible. The States may interpose by objecting, as in The Virginia & Kentucky Resolutions of 1798.
  • When the act of the federal government is constitutional, but unjust (the Tariff Act of 1828), the States may not nullify it; but may interpose by objecting and trying to get the Tariff Act changed.
  • Our Founding Principles in a Nutshell
  • Rights come from God;
  • People create governments;
  • The purpose of government is to secure the rights God gave us; and
  • When a government We created seeks to take away our God given rights, We have the Right – We have the Duty – to alter, abolish, or throw off such government.
  • The former will be exercised principally on external objects, as war, peace, negotiation, and foreign commerce; with which last the power of taxation will, for the most part, be connected.
  • The powers reserved to the several States will extend to all the objects which … concern the lives, liberties, and properties of the people, and the internal order, improvement, and prosperity of the State.”
  • These enumerated powers concern: Military defense, international commerce & relations; Control of immigration and naturalization of new citizens; Creation of a uniform commercial system: Weights & measures, patents & copyrights, money based on gold & silver, bankruptcy laws, mail delivery & some road building; and With some of the Amendments, protect certain civil rights and voting rights (for blacks, women, citizens who don’t pay taxes, and citizens 18 years and older).
  • It is only with respect to the enumerated powers that the federal government has lawful authority over the Country at large. All other powers are “reserved to the several States” and The People.
  • It is to secure our rights to life and liberty by:
  • Military defense (Art. I, Sec. 8, cl. 11-16); Laws against piracy and other felonies committed on the high seas (Art. I, Sec. 8, cl. 10); Protecting us from invasion (Art IV, Sec. 4); Prosecuting traitors (Art III, Sec. 3); and Restrictive immigration policies (Art. I, Sec. 9, cl. 1).
  • It is to secure our property rights by:
  • Regulating trade & commerce so we can produce, sell & prosper (Art. I, Sec. 8, cl.3). The original intent of the interstate commerce clause is to prohibit States from levying tolls & taxes on articles of commerce as they are transported thru the States for buying & selling. Establishing uniform weights & measures and a money system based on gold & silver (Art I, Sec. 8, cl. 5) – inflation via paper currency & fractional reserve lending is theft! Punishing counterfeiters (Art I, Sec. 8, cl. 6); Making bankruptcy laws to permit the orderly dissolution or reorganization of debtors’ estates with fair treatment of creditors (Art I, Sec 8, cl. 4); and Issuing patents & copyrights to protect ownership of intellectual labors (Art I, Sec 8, cl 8)
  • It is to secure our right to liberty by:
  • Laws against slavery (13th Amendment); Providing fair trials in federal courts (4th, 5th, 6th, 7th, and 8th Amendments); and          Obeying the Constitution!
  • The fourth Founding Principle in our Declaration is this: When government takes away our God given rights, We have the Right & the Duty to alter, abolish, or throw off such government. Nullification is thus a natural right of self-defense:
  • 1. As we have just seen, Jefferson, Madison, and Hamilton saw nullification of unconstitutional acts of the federal government as a “natural right” – not a “constitutional right”. And since Rights come from God, there is no such thing as a “constitutional right”!
  • 2. The Right of Nullification, transcending as it does, the Constitution; and being nowhere prohibited by the Constitution to the States, is a reserved power.
  • The 10th Amendment says: “The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.”
  • Madison’s Report on the Virginia Resolutions (1799-1800)
  • Now! Note Well:  Madison actually says, in the same Report Barnett cites, that it is “a plain principle, founded in common sense” that The States are the final authority on whether the federal government has violated our Constitution! Under his discussion of the 3rd Resolution, Madison says:
  • “It appears to your committee to be a plain principle, founded in common sense, illustrated by common practice, and essential to the nature of compacts; that where resort can be had to no tribunal superior to the authority of the parties, the parties themselves must be the rightful judges in the last resort, whether the bargain made, has been pursued or violated. The Constitution of the United States was formed by the sanction of the States, given by each in its sovereign capacity. It adds to the stability and dignity, as well as to the authority of the Constitution, that it rests on this legitimate and solid foundation. The States then being the parties to the constitutional compact, and in their sovereign capacity, it follows of necessity, that there can be no tribunal above their authority, to decide in the last resort, whether the compact made by them be violated; and consequently that as the parties to it, they must themselves decide in the last resort, such questions as may be of sufficient magnitude to require their interposition.” [emphasis mine]
  • Madison explains that if, when the federal government usurps power, the States cannot act so as to stop the usurpation, and thereby preserve the Constitution as well as the safety of The States; there would be no relief from usurped power. 
  • This would subvert the Rights of the People as well as betray the fundamental principle of our Founding:
  • …If the deliberate exercise, of dangerous power, palpably withheld by the Constitution, could not justify the parties to it, in interposing even so far as to arrest the progress of the evil, and thereby to preserve the Constitution itself as well as to provide for the safety of the parties to it; there would be an end to all relief from usurped power, and a direct subversion of the rights specified or recognized under all the State constitutions, as well as a plain denial of the fundamental principle on which our independence itself was declared.” [emphasis mine]
  • Madison answers the objection “that the judicial authority is to be regarded as the sole expositor of the Constitution, in the last resort”.
  • Madison explains that when the federal government acts outside the Constitution by usurping powers, and when the Constitution affords no remedy to that usurpation; then the Sovereign States who are the Parties to the Constitution must likewise step outside the Constitution and appeal to that original natural right of self-defense.
  • Madison goes on to say that all three Branches of the federal government obtain their delegated powers from the Constitution; and they may not annul the authority of their Creator.
  • but, where powers are assumed which have not been delegated, a nullification of the act is the rightful remedy: that every State has a natural right in cases not within the compact, (casus non foederis,) to nullify of their own authority all assumptions of power by others within their limits: that without this right, they would be under the dominion, absolute and unlimited, of whosoever might exercise this right of judgment for them…” [boldface mine]
  • Application Today
  • When WE THE PEOPLE ratified our Constitution, and thereby created the federal government, WE did not delegate to our “creature” power to control our medical care, restrict guns and ammunition, dictate what is done in the public schools, dictate how we use our lands, and all the thousands of things they do WE never gave them authority in our Constitution to do.
  • Accordingly, each State has a natural right to nullify these unconstitutional dictates within its borders.  These dictates are outside the compact The Sovereign States made with each other –WE never gave our “creature” power over these objects.
  • To sum this up:
  • Nullification is a natural right of self-defense. Rights don’t come from the Constitution. Like all Rights, the right of self-defense comes from God (The Declaration of Independence, 2nd para). Nullification is a reserved power within the meaning of the 10th Amendment. The Constitution doesn’t prohibit States from nullifying, and We reserved the power to do it. God requires us to disobey civil authorities when they violate God’s Law. That’s why the 2nd para of the Declaration of Independence says we have the duty to overthrow tyrannical government. See: The Biblical Foundation of our Constitution. Nullification is required by Oath of Office:  Article VI, cl. 3 requires all State officers and judges to “support” the federal Constitution. Therefore, when the federal government violates the Constitution, the States must smack them down.
  •  
    Incredible and passionate argument concerning the States natural God given right to nullify and render unenforceable un-Constitutional actions of the Federal Government.  As "creators" of the Federal Government, the States are obligated to nullify un-Constitutional actions and interpose Constitutional alternatives.  Huldah sites Jefferson, Madison and Hamilton as the primary Constitutional authorities for her rock solid argument.   If ever you want to learn about the Constitution, Publius Huldah is clearly the place to go.  
Gary Edwards

MAULDIN: It's All About The Jobs -- And Gold - 0 views

  •  
    But as I live in the real world, I buy gold, even though I am optimistic we'll get through this rough patch; because I simply don't trust the bas*%*ds who are driving this ship with 100% of my money in dollars, or any fiat currency, for that matter. Gold to me is a neutral currency. While the metal looks good over the last ten years (and I became bullish on it in 2002 in this letter), over the last 32 years it has not had all that much luster. Bonds have been much better as an investment. It is all about timing. If I wanted to buy gold for investment or trading, I would simply buy GLD. (It is an excellent vehicle for traders; however, GLD is not what I think of as insurance.) And if I were buying gold as a trade, I would buy it in terms of the euro or yen, which I think are both going down against the US dollar. For those who want to buy larger sums of gold, there is a program that I like backed/sponsored by the state government of Western Australia, called the Perth Mint. You can buy gold certificates that represent actual bullion in vaults in Perth at reasonable prices. While your gold is stored in Perth, you can take delivery if you want and leave the country with no taxes owed. Or you can sell the gold and get cash. You diversify your country risk, have excellent and safe storage facilities, diversify your currency risk (if, like me, you think of gold as a currency), and have a different asset class than traditional portfolios. You can learn more about the Perth Mint at www.perthmint.com. And one of their dealers is an old friend of mine, Mike Checkan of Asset Strategies International. I have known Mike for about 30 years, and he does what he says and shoots straight. He is well-known in the investment information world, with lots of endorsements. You can learn more about his outfit at www.assetstrategies.com or call them toll-free at (800) 831-0007 in the U.S. and Canada, or direct at (301) 881-8600. You can also email them from their web site. Where to buy
Paul Merrell

Edward Snowden: A 'Nation' Interview | The Nation - 0 views

  • Snowden: That’s the key—to maintain the garden of liberty, right? This is a generational thing that we must all do continuously. We only have the rights that we protect. It doesn’t matter what we say or think we have. It’s not enough to believe in something; it matters what we actually defend. So when we think in the context of the last decade’s infringements upon personal liberty and the last year’s revelations, it’s not about surveillance. It’s about liberty. When people say, “I have nothing to hide,” what they’re saying is, “My rights don’t matter.” Because you don’t need to justify your rights as a citizen—that inverts the model of responsibility. The government must justify its intrusion into your rights. If you stop defending your rights by saying, “I don’t need them in this context” or “I can’t understand this,” they are no longer rights. You have ceded the concept of your own rights. You’ve converted them into something you get as a revocable privilege from the government, something that can be abrogated at its convenience. And that has diminished the measure of liberty within a society.
  • From the very beginning, I said there are two tracks of reform: there’s the political and the technical. I don’t believe the political will be successful, for exactly the reasons you underlined. The issue is too abstract for average people, who have too many things going on in their lives. And we do not live in a revolutionary time. People are not prepared to contest power. We have a system of education that is really a sort of euphemism for indoctrination. It’s not designed to create critical thinkers. We have a media that goes along with the government by parroting phrases intended to provoke a certain emotional response—for example, “national security.” Everyone says “national security” to the point that we now must use the term “national security.” But it is not national security that they’re concerned with; it is state security. And that’s a key distinction. We don’t like to use the phrase “state security” in the United States because it reminds us of all the bad regimes. But it’s a key concept, because when these officials are out on TV, they’re not talking about what’s good for you. They’re not talking about what’s good for business. They’re not talking about what’s good for society. They’re talking about the protection and perpetuation of a national state system. I’m not an anarchist. I’m not saying, “Burn it to the ground.” But I’m saying we need to be aware of it, and we need to be able to distinguish when political developments are occurring that are contrary to the public interest. And that cannot happen if we do not question the premises on which they’re founded. And that’s why I don’t think political reform is likely to succeed. [Senators] Udall and Wyden, on the intelligence committee, have been sounding the alarm, but they are a minority.
  • The Nation: Every president—and this seems to be confirmed by history—will seek to maximize his or her power, and will see modern-day surveillance as part of that power. Who is going to restrain presidential power in this regard? Snowden: That’s why we have separate and co-equal branches. Maybe it will be Congress, maybe not. Might be the courts, might not. But the idea is that, over time, one of these will get the courage to do so. One of the saddest and most damaging legacies of the Bush administration is the increased assertion of the “state secrets” privilege, which kept organizations like the ACLU—which had cases of people who had actually been tortured and held in indefinite detention—from getting their day in court. The courts were afraid to challenge executive declarations of what would happen. Now, over the last year, we have seen—in almost every single court that has had this sort of national-security case—that they have become markedly more skeptical. People at civil-liberties organizations say it’s a sea change, and that it’s very clear judges have begun to question more critically assertions made by the executive. Even though it seems so obvious now, it is extraordinary in the context of the last decade, because courts had simply said they were not the best branch to adjudicate these claims—which is completely wrong, because they are the only nonpolitical branch. They are the branch that is specifically charged with deciding issues that cannot be impartially decided by politicians. The power of the presidency is important, but it is not determinative. Presidents should not be exempted from the same standards of reason and evidence and justification that any other citizen or civil movement should be held to.
  • ...14 more annotations...
  • The Nation: Explain the technical reform you mentioned. Snowden: We already see this happening. The issue I brought forward most clearly was that of mass surveillance, not of surveillance in general. It’s OK if we wiretap Osama bin Laden. I want to know what he’s planning—obviously not him nowadays, but that kind of thing. I don’t care if it’s a pope or a bin Laden. As long as investigators must go to a judge—an independent judge, a real judge, not a secret judge—and make a showing that there’s probable cause to issue a warrant, then they can do that. And that’s how it should be done. The problem is when they monitor all of us, en masse, all of the time, without any specific justification for intercepting in the first place, without any specific judicial showing that there’s a probable cause for that infringement of our rights.
  • Since the revelations, we have seen a massive sea change in the technological basis and makeup of the Internet. One story revealed that the NSA was unlawfully collecting data from the data centers of Google and Yahoo. They were intercepting the transactions of data centers of American companies, which should not be allowed in the first place because American companies are considered US persons, sort of, under our surveillance authorities. They say, “Well, we were doing it overseas,” but that falls under a different Reagan-era authority: EO 12333, an executive order for foreign-intelligence collection, as opposed to the ones we now use domestically. So this one isn’t even authorized by law. It’s just an old-ass piece of paper with Reagan’s signature on it, which has been updated a couple times since then. So what happened was that all of a sudden these massive, behemoth companies realized their data centers—sending hundreds of millions of people’s communications back and forth every day—were completely unprotected, electronically naked. GCHQ, the British spy agency, was listening in, and the NSA was getting the data and everything like that, because they could dodge the encryption that was typically used. Basically, the way it worked technically, you go from your phone to Facebook.com, let’s say—that link is encrypted. So if the NSA is trying to watch it here, they can’t understand it. But what these agencies discovered was, the Facebook site that your phone is connected to is just the front end of a larger corporate network—that’s not actually where the data comes from. When you ask for your Facebook page, you hit this part and it’s protected, but it has to go on this long bounce around the world to actually get what you’re asking for and go back. So what they did was just get out of the protected part and they went onto the back network. They went into the private network of these companies.
  • The Nation: The companies knew this? Snowden: Companies did not know it. They said, “Well, we gave the NSA the front door; we gave you the PRISM program. You could get anything you wanted from our companies anyway—all you had to do was ask us and we’re gonna give it to you.” So the companies couldn’t have imagined that the intelligence communities would break in the back door, too—but they did, because they didn’t have to deal with the same legal process as when they went through the front door. When this was published by Barton Gellman in The Washington Post and the companies were exposed, Gellman printed a great anecdote: he showed two Google engineers a slide that showed how the NSA was doing this, and the engineers “exploded in profanity.” Another example—one document I revealed was the classified inspector general’s report on a Bush surveillance operation, Stellar Wind, which basically showed that the authorities knew it was unlawful at the time. There was no statutory basis; it was happening basically on the president’s say-so and a secret authorization that no one was allowed to see. When the DOJ said, “We’re not gonna reauthorize this because it is not lawful,” Cheney—or one of Cheney’s advisers—went to Michael Hayden, director of the NSA, and said, “There is no lawful basis for this program. DOJ is not going to reauthorize it, and we don’t know what we’re going to do. Will you continue it anyway on the president’s say-so?” Hayden said yes, even though he knew it was unlawful and the DOJ was against it. Nobody has read this document because it’s like twenty-eight pages long, even though it’s incredibly important.
  • The big tech companies understood that the government had not only damaged American principles, it had hurt their businesses. They thought, “No one trusts our products anymore.” So they decided to fix these security flaws to secure their phones. The new iPhone has encryption that protects the contents of the phone. This means if someone steals your phone—if a hacker or something images your phone—they can’t read what’s on the phone itself, they can’t look at your pictures, they can’t see the text messages you send, and so forth. But it does not stop law enforcement from tracking your movements via geolocation on the phone if they think you are involved in a kidnapping case, for example. It does not stop law enforcement from requesting copies of your texts from the providers via warrant. It does not stop them from accessing copies of your pictures or whatever that are uploaded to, for example, Apple’s cloud service, which are still legally accessible because those are not encrypted. It only protects what’s physically on the phone. This is purely a security feature that protects against the kind of abuse that can happen with all these things being out there undetected. In response, the attorney general and the FBI director jumped on a soap box and said, “You are putting our children at risk.”
  • The Nation: Is there a potential conflict between massive encryption and the lawful investigation of crimes? Snowden: This is the controversy that the attorney general and the FBI director were trying to create. They were suggesting, “We have to be able to have lawful access to these devices with a warrant, but that is technically not possible on a secure device. The only way that is possible is if you compromise the security of the device by leaving a back door.” We’ve known that these back doors are not secure. I talk to cryptographers, some of the leading technologists in the world, all the time about how we can deal with these issues. It is not possible to create a back door that is only accessible, for example, to the FBI. And even if it were, you run into the same problem with international commerce: if you create a device that is famous for compromised security and it has an American back door, nobody is gonna buy it. Anyway, it’s not true that the authorities cannot access the content of the phone even if there is no back door. When I was at the NSA, we did this every single day, even on Sundays. I believe that encryption is a civic responsibility, a civic duty.
  • The Nation: Some years ago, The Nation did a special issue on patriotism. We asked about a hundred people how they define it. How do you define patriotism? And related to that, you’re probably the world’s most famous whistleblower, though you don’t like that term. What characterization of your role do you prefer? Snowden: What defines patriotism, for me, is the idea that one rises to act on behalf of one’s country. As I said before, that’s distinct from acting to benefit the government—a distinction that’s increasingly lost today. You’re not patriotic just because you back whoever’s in power today or their policies. You’re patriotic when you work to improve the lives of the people of your country, your community and your family. Sometimes that means making hard choices, choices that go against your personal interest. People sometimes say I broke an oath of secrecy—one of the early charges leveled against me. But it’s a fundamental misunderstanding, because there is no oath of secrecy for people who work in the intelligence community. You are asked to sign a civil agreement, called a Standard Form 312, which basically says if you disclose classified information, they can sue you; they can do this, that and the other. And you risk going to jail. But you are also asked to take an oath, and that’s the oath of service. The oath of service is not to secrecy, but to the Constitution—to protect it against all enemies, foreign and domestic. That’s the oath that I kept, that James Clapper and former NSA director Keith Alexander did not. You raise your hand and you take the oath in your class when you are on board. All government officials are made to do it who work for the intelligence agencies—at least, that’s where I took the oath.
  • The Nation: Creating a new system may be your transition, but it’s also a political act. Snowden: In case you haven’t noticed, I have a somewhat sneaky way of effecting political change. I don’t want to directly confront great powers, which we cannot defeat on their terms. They have more money, more clout, more airtime. We cannot be effective without a mass movement, and the American people today are too comfortable to adapt to a mass movement. But as inequality grows, the basic bonds of social fraternity are fraying—as we discussed in regard to Occupy Wall Street. As tensions increase, people will become more willing to engage in protest. But that moment is not now.
  • The Nation: You really think that if you could go home tomorrow with complete immunity, there wouldn’t be irresistible pressure on you to become a spokesperson, even an activist, on behalf of our rights and liberties? Indeed, wouldn’t that now be your duty? Snowden: But the idea for me now—because I’m not a politician, and I do not think I am as effective in this way as people who actually prepare for it—is to focus on technical reform, because I speak the language of technology. I spoke with Tim Berners-Lee, the guy who invented the World Wide Web. We agree on the necessity for this generation to create what he calls the Magna Carta for the Internet. We want to say what “digital rights” should be. What values should we be protecting, and how do we assert them? What I can do—because I am a technologist, and because I actually understand how this stuff works under the hood—is to help create the new systems that reflect our values. Of course I want to see political reform in the United States. But we could pass the best surveillance reforms, the best privacy protections in the history of the world, in the United States, and it would have zero impact internationally. Zero impact in China and in every other country, because of their national laws—they won’t recognize our reforms; they’ll continue doing their own thing. But if someone creates a reformed technical system today—technical standards must be identical around the world for them to function together.
  • As for labeling someone a whistleblower, I think it does them—it does all of us—a disservice, because it “otherizes” us. Using the language of heroism, calling Daniel Ellsberg a hero, and calling the other people who made great sacrifices heroes—even though what they have done is heroic—is to distinguish them from the civic duty they performed, and excuses the rest of us from the same civic duty to speak out when we see something wrong, when we witness our government engaging in serious crimes, abusing power, engaging in massive historic violations of the Constitution of the United States. We have to speak out or we are party to that bad action.
  • The Nation: Considering your personal experience—the risks you took, and now your fate here in Moscow—do you think other young men or women will be inspired or discouraged from doing what you did? Snowden: Chelsea Manning got thirty-five years in prison, while I’m still free. I talk to people in the ACLU office in New York all the time. I’m able to participate in the debate and to campaign for reform. I’m just the first to come forward in the manner that I did and succeed. When governments go too far to punish people for actions that are dissent rather than a real threat to the nation, they risk delegitimizing not just their systems of justice, but the legitimacy of the government itself. Because when they bring political charges against people for acts that were clearly at least intended to work in the public interest, they deny them the opportunity to mount a public-interest defense. The charges they brought against me, for example, explicitly denied my ability to make a public-interest defense. There were no whistleblower protections that would’ve protected me—and that’s known to everybody in the intelligence community. There are no proper channels for making this information available when the system fails comprehensively.
  • The government would assert that individuals who are aware of serious wrongdoing in the intelligence community should bring their concerns to the people most responsible for that wrongdoing, and rely on those people to correct the problems that those people themselves authorized. Going all the way back to Daniel Ellsberg, it is clear that the government is not concerned with damage to national security, because in none of these cases was there damage. At the trial of Chelsea Manning, the government could point to no case of specific damage that had been caused by the massive revelation of classified information. The charges are a reaction to the government’s embarrassment more than genuine concern about these activities, or they would substantiate what harms were done. We’re now more than a year since my NSA revelations, and despite numerous hours of testimony before Congress, despite tons of off-the-record quotes from anonymous officials who have an ax to grind, not a single US official, not a single representative of the United States government, has ever pointed to a single case of individualized harm caused by these revelations. This, despite the fact that former NSA director Keith Alexander said this would cause grave and irrevocable harm to the nation. Some months after he made that statement, the new director of the NSA, Michael Rogers, said that, in fact, he doesn’t see the sky falling. It’s not so serious after all.
  • The Nation: You also remind us of [Manhattan Project physicist] Robert Oppenheimer—what he created and then worried about. Snowden: Someone recently talked about mass surveillance and the NSA revelations as being the atomic moment for computer scientists. The atomic bomb was the moral moment for physicists. Mass surveillance is the same moment for computer scientists, when they realize that the things they produce can be used to harm a tremendous number of people. It is interesting that so many people who become disenchanted, who protest against their own organizations, are people who contributed something to them and then saw how it was misused. When I was working in Japan, I created a system for ensuring that intelligence data was globally recoverable in the event of a disaster. I was not aware of the scope of mass surveillance. I came across some legal questions when I was creating it. My superiors pushed back and were like, “Well, how are we going to deal with this data?” And I was like, “I didn’t even know it existed.” Later, when I found out that we were collecting more information on American communications than we were on Russian communications, for example, I was like, “Holy shit.” Being confronted with the realization that work you intended to benefit people is being used against them has a radicalizing effect.
  • The Nation: We have a sense, or certainly the hope, we’ll be seeing you in America soon—perhaps sometime after this Ukrainian crisis ends. Snowden: I would love to think that, but we’ve gone all the way up the chain at all the levels, and things like that. A political decision has been made not to irritate the intelligence community. The spy agencies are really embarrassed, they’re really sore—the revelations really hurt their mystique. The last ten years, they were getting the Zero Dark Thirty treatment—they’re the heroes. The surveillance revelations bring them back to Big Brother kind of narratives, and they don’t like that at all. The Obama administration almost appears as though it is afraid of the intelligence community. They’re afraid of death by a thousand cuts—you know, leaks and things like that.
  • The Nation: You’ve given us a lot of time, and we are very grateful, as will be The Nation’s and other readers. But before we end, any more thoughts about your future? Snowden: If I had to guess what the future’s going to look like for me—assuming it’s not an orange jumpsuit in a hole—I think I’m going to alternate between tech and policy. I think we need that. I think that’s actually what’s missing from government, for the most part. We’ve got a lot of policy people, but we have no technologists, even though technology is such a big part of our lives. It’s just amazing, because even these big Silicon Valley companies, the masters of the universe or whatever, haven’t engaged with Washington until recently. They’re still playing catch-up. As for my personal politics, some people seem to think I’m some kind of archlibertarian, a hyper-conservative. But when it comes to social policies, I believe women have the right to make their own choices, and inequality is a really important issue. As a technologist, I see the trends, and I see that automation inevitably is going to mean fewer and fewer jobs. And if we do not find a way to provide a basic income for people who have no work, or no meaningful work, we’re going to have social unrest that could get people killed. When we have increasing production—year after year after year—some of that needs to be reinvested in society. It doesn’t need to be consistently concentrated in these venture-capital funds and things like that. I’m not a communist, a socialist or a radical. But these issues have to be 
addressed.
  •  
    Remarkable interview. Snowden finally gets asked some questions about politics. 
Gary Edwards

Dangerous Minds | Dying vet's 'fuck you' letter to George Bush & Dick Cheney needs to b... - 0 views

  •  
    Chilling letter from Iraqi war veteran Tomas Young.  I'm not sure if there is a descriptive term for the odd mix of emotions where shame, soul searching regret, sadness and extreme anger collide in self loathing as the mistaken trust so many patriotic 911 Americans, myself included, had in our leaders came crashing down in Iraq.  Weep for Tomas.  Weep for America.  And never trust a Republican, a Democrat, a Bankster or fascist Corporatist again. excerpt: ........... "I write this letter, my last letter, to you, Mr. Bush and Mr. Cheney. I write not because I think you grasp the terrible human and moral consequences of your lies, manipulation and thirst for wealth and power. I write this letter because, before my own death, I want to make it clear that I, and hundreds of thousands of my fellow veterans, along with millions of my fellow citizens, along with hundreds of millions more in Iraq and the Middle East, know fully who you are and what you have done. You may evade justice but in our eyes you are each guilty of egregious war crimes, of plunder and, finally, of murder, including the murder of thousands of young Americans-my fellow veterans-whose future you stole. Your positions of authority, your millions of dollars of personal wealth, your public relations consultants, your privilege and your power cannot mask the hollowness of your character. You sent us to fight and die in Iraq after you, Mr. Cheney, dodged the draft in Vietnam, and you, Mr. Bush, went AWOL from your National Guard unit. Your cowardice and selfishness were established decades ago. You were not willing to risk yourselves for our nation but you sent hundreds of thousands of young men and women to be sacrificed in a senseless war with no more thought than it takes to put out the garbage. I joined the Army two days after the 9/11 attacks. I joined the Army because our country had been attacked. I wanted to strike back at those who had killed some 3,000 of my fellow citizens. I did not j
Gary Edwards

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
Paul Merrell

NSA Director Finally Admits Encryption Is Needed to Protect Public's Privacy - 0 views

  • NSA Director Finally Admits Encryption Is Needed to Protect Public’s Privacy The new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. By Carey Wedler | AntiMedia | January 22, 2016 Share this article! https://mail.google.com/mail/?view=cm&fs=1&to&su=NSA%20Director%20Finally%20Admits%20Encryption%20Is%20Needed%20to%20Protect%20Public%E2%80%99s%20Privacy&body=http%3A%2F%2Fwww.mintpress
  • At the same hearing, Comey and Attorney General Loretta Lynch declined to comment on whether they had proof the Paris attackers used encryption. Even so, Comey recently lobbied for tech companies to do away with end-to-end encryption. However, his crusade has fallen on unsympathetic ears, both from the private companies he seeks to control — and from the NSA. Prior to Rogers’ statements in support of encryption Thursday, former NSA chief Michael Hayden said, “I disagree with Jim Comey. I actually think end-to-end encryption is good for America.” Still another former NSA chair has criticized calls for backdoor access to information. In October, Mike McConnell told a panel at an encryption summit that the United States is “better served by stronger encryption, rather than baking in weaker encryption.” Former Department of Homeland Security chief, Michael Chertoff, has also spoken out against government being able to bypass encryption.
  • Rogers cited the recent Office of Personnel Management hack of over 20 million users as a reason to increase encryption rather than scale it back. “What you saw at OPM, you’re going to see a whole lot more of,” he said, referring to the massive hack that compromised the personal data about 20 million people who obtained background checks. Rogers’ comments, while forward-thinking, signify an about face in his stance on encryption. In February 2015, he said he “shares [FBI] Director [James] Comey’s concern” about cell phone companies’ decision to add encryption features to their products. Comey has been one loudest critics of encryption. However, Rogers’ comments on Thursday now directly conflict with Comey’s stated position. The FBI director has publicly chastised encryption, as well as the companies that provide it. In 2014, he claimed Apple’s then-new encryption feature could lead the world to “a very dark place.” At a Department of Justice hearing in November, Comey testified that “Increasingly, the shadow that is ‘going dark’ is falling across more and more of our work.” Though he claimed, “We support encryption,” he insisted “we have a problem that encryption is crashing into public safety and we have to figure out, as people who care about both, to resolve it. So, I think the conversation’s in a healthier place.”
  • ...2 more annotations...
  • Regardless of these individual defenses of encryption, the Intercept explained why these statements may be irrelevant: “Left unsaid is the fact that the FBI and NSA have the ability to circumvent encryption and get to the content too — by hacking. Hacking allows law enforcement to plant malicious code on someone’s computer in order to gain access to the photos, messages, and text before they were ever encrypted in the first place, and after they’ve been decrypted. The NSA has an entire team of advanced hackers, possibly as many as 600, camped out at Fort Meade.”
  • Rogers statements, of course, are not a full-fledged endorsement of privacy, nor can the NSA be expected to make it a priority. Even so, his new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. “So spending time arguing about ‘hey, encryption is bad and we ought to do away with it’ … that’s a waste of time to me,” Rogers said Thursday. “So what we’ve got to ask ourselves is, with that foundation, what’s the best way for us to deal with it? And how do we meet those very legitimate concerns from multiple perspectives?”
Paul Merrell

Fresno Police Roll Out Dystopian 'Threat Ranking' System - 0 views

  • “On 57 monitors that cover the walls of the center, operators zoomed and panned an array of roughly 200 police cameras perched across the city. They could dial up 800 more feeds from the city’s schools and traffic cameras, and they soon hope to add 400 more streams from cameras worn on officers’ bodies and from thousands from local businesses that have surveillance systems.” Though the intricate surveillance apparatus described above seems straight from a dystopic novel, it is actually the Washington Post’s recent description of the the visual data collection system employed by a local California police department. The police department in Fresno, California, has taken extreme measures to combat high rates of crime in the city. As the Post reports, Fresno’s Real Time Crime Center, buried deep in the police station’s headquarters, has developed as a response to what many police call increasing threats. The system, according to police officials, can “provide critical information that can help uncover terrorists or thwart mass shootings, ensure the safety of officers and the public, find suspects, and crack open cases” — a feature they say is increasingly important in the wake of events like the November terror attack in Paris and the San Bernardino shooting last month.
  • “Our officers are expected to know the unknown and see the unseen,” Fresno Chief of Police Jerry Dyer said. “They are making split-second decisions based on limited facts. The more you can provide in terms of intelligence and video, the more safely you can respond to calls.” Programs similar to the Real Time Crime Center have launched in New York, Houston, and Seattle over the course of the last decade. Nationwide, the use of Stingrays, data fusion centers, and aerial drone surveillance have broadened the access local police have to private information. In another example, the FBI is continually developing a comprehensive biometric database that local police access every day. “This is something that’s been building since September 11,” says Jennifer Lynch, a senior attorney at the Electronic Frontier Foundation. Like the problem of police militarization, Lynch traces the trend back to the Pentagon: “First funding went to the military to develop this technology, and now it has come back to domestic law enforcement. It’s the perfect storm of cheaper and easier-to-use technologies and money from state and federal governments to purchase it.”
  • While many of these programs may fail to shock Americans, one new software program takes police scrutiny of private citizens to a new level. Beware, a software tool produced by tech firm Intrado, not only surveils the data of the citizens of Fresno, the first city to test it — it calculates threat levels based on what it discovers. The software scours arrest records, property records, Deep Web searches, commercial databases, and social media postings. By this method, it was able to designate a man with a firearm and gang convictions involved in a real-time domestic violence dispute as the highest of three threat levels: a bright red ranking. Fresno police say the intelligence from Beware aided them, as the man eventually surrendered and officers found he was armed with a gun. Beware scours billions of data points to develop rankings for citizens, and though few recoil at the thought of catching criminals and miscreants, the program provides particular cause for concern because of both its invasiveness and its fallibility.
  • ...3 more annotations...
  • These shortcomings have sparked concern among Fresno’s city council members, who discussed the issue at a meeting in November. At that meeting, one council member cited an incident where a girl who posted on social media about a card game called “Rage” was consequently given an elevated threat ranking — all because “rage” could be a triggering keyword for Beware. At that same meeting, libertarian-leaning Republican councilman Clinton J. Olivier asked Chief Dyer to use the technology to calculate his threat level. In real-time, Olivier was given a green, or non-threatening ranking, but his home received a yellow, or medium, threat ranking. It was likely due to the record of his home’s prior occupant. “Even though it’s not me that’s the yellow guy, your officers are going to treat whoever comes out of that house in his boxer shorts as the yellow guy,” Olivier told Dyer. “That may not be fair to me.” He added later, “[Beware] has failed right here with a council member as the example.” “It’s a very unrefined, gross technique,” Fresno civil rights attorney, Rob Nabarro, has said of Beware’s color-coded levels. “A police call is something that can be very dangerous for a citizen,” he noted, echoing Olivier’s worries.
  • Further, though Fresno police use Beware, they are left in the dark about how it determines rankings. Intrado designates the method a “trade secret,” and as such, will not share it with the officers who use it. This element of the software’s implementation has concerned civil rights advocates like Nabarro. He believes the secrecy surrounding the technology may result in unfair, unchecked threat rankings. Nabarro cautioned that between the software’s secrecy and room for error, Beware could accidentally rank a citizen as dangerous based on, for example, posts on social media criticizing police. This potential carries with it the ability for citizens to be punished not for actual crimes, but for exercising basic constitutional rights. Further, it compromises the rights of individuals who have been previously convicted of crimes, potentially using past behavior to assume guilt in unrelated future incidents. Chief Dyer insists concerns are exaggerated and that a particular score does not guarantee a particular police response. Police maintain the tools are necessary to fight crime. Nevertheless, following the heated November meeting, Dyer suggested he would work to turn off the color-coded threat ranking due to citizens’ concerns. “It’s a balancing act,” he admitted.
  • It remains to be seen if Fresno police and residents will move forward with the technology or shut it down over privacy concerns. City officials in Oakland, California, for example, recently scaled back plans to establish a Real Time Crime Center after outraged citizens protested. At the very least, as Northern California ACLU attorney Matt Cagle said, “[W]henever these surveillance technologies are on the table, there needs to be a meaningful debate. There needs to be safeguards and oversight.”
  •  
    Claiming trade secrecy for the software's selection criteria for threat ranking actually constitutes policy policy, the trade secrecy claim would probably not survive judical review. It's at least arguably an unconstitutional delegation of a government function (ranking citizens as threats) to a private company. Police departments in Florida were sued to produce records of how a related surveillance device, the Stingray IMSI device that intercepts cell phone calls by mimicking a cell-phone tower, and only averted court-ordered disclosure of its trade secret workings by the FBI swooping in just before decision to remove all the software documentation from local police possession, custody, and control.    There is a long chain of case law holding that information that is legitimately trade secret and proprietary loses that protection if adopted by local or federal government as law. With a software program that classifies citizens as threats for governmental purposes if they meet the program's selection criteria, the software is performing a strictly governmental function that is in reality law. 
Gary Edwards

I Am a Peaceful AR-15 Assault Rifle Owner by Marc J. Victor - 0 views

  • "Firearms stand next in importance to the constitution itself. They are the American people's liberty teeth and keystone under independence … from the hour the Pilgrims landed to the present day, events, occurances and tendencies prove that to ensure peace security and happiness, the rifle and pistol are equally indispensable … the very atmosphere of firearms anywhere restrains evil interference – they deserve a place of honor with all that's good." ~ George Washington
  • I am an American. As such, none of my rights depend on a showing of need. I am a free man who has the right to define and pursue my happiness in any peaceful way I see fit. The government does not grant me rights. I was born free. The legitimate role of government is to act as my agent to protect my rights; which exist independent of government. Americans do not beg the government for rights nor are they required to demonstrate a "need" for rights.
  • Government never has a more tempting opportunity to increase its size, power and scope, and to curtail the liberties of free people, than during or immediately after a crisis. Indeed, crisis is so tempting an opportunity for government that governments invent crisis whenever possible. This is why "emergency acts" and "wars" on anyone and anything are so popular for governments. Nothing entices people to stop thinking, act impulsively, and to relinquish liberties so easily as a "crisis" or a "tragedy" or an "emergency." We need to be smarter if liberty is to survive.
  • ...31 more annotations...
  • Banning Guns is Un-American and Immoral "And that the said Constitution be never construed to authorize Congress to infringe the just liberty of the Press, or the rights of Conscience; or to prevent the people of the United States, who are peaceable citizens, from keeping their own arms; …" ~ Samuel Adams
  • The Idea of Banning Guns is Foolishness "They that give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." ~ Ben Franklin
  • The single biggest contributing factor to our culture of violence is that our society no longer adheres to the once basic notion that initiating force against non-aggressors is wrong
  • Although President Obama appears excited about the notion of banning guns, I have not heard him order a ban on the very guns used to protect him. Apparently, when it comes to his protection, President Obama prefers to be protected by people armed with guns. Indeed, I suspect none of these gun ban advocates would hesitate to call 911 and request help from people armed with guns if they were faced with an intruder in their homes in the middle of the night. I fail to understand why we can’t all agree that guns save lives.
  • Our Culture of Violence
  • "Democracy is two wolves and a lamb voting on what to have for lunch. Liberty is a well-armed lamb contesting the vote!" ~ Benjamin Franklin
  • Gun Regulations Never Reduce Gun Violence and Usually Increase Violent Crime "The constitutions of most of our States assert that all power is inherent in the people; that … it is their right and duty to be at all times armed; … " ~ Thomas Jefferson
  • Our laws are replete with instances of legal trespass against peaceful people.
  • I prefer that my children are no longer unprotected sitting ducks at a federally mandated gun free zone in school.
  • We no longer recognize the sovereignty of the individual.
  • democracy is akin to mob rule.
  • Our spending on the drug war will soon be approaching 100 billion dollars per year.
  • Not only do guns remain widely available in Mexico, but their gun related homicide rate outpaces ours. The same can be said of all these drug war countries.
  • Mexico has some of the strictest gun control laws in the world. Its laws effectively prohibit gun ownership.
  • Rather than living in a democratic republic where most decisions are left to the property owner, we now have an unfettered democracy where anything goes so long as the majority of voters agree
  • "To preserve liberty, it is essential that the whole body of the people always possess arms and be taught alike, especially when young, how to use them." ~ Richard Henry Lee
  • Indeed, this law may have encouraged Mr. Lanza to work his horrific violence at the Sandy Hook Elementary School knowing federal law provides that nobody could have the capacity to stop him.
  • One unintended consequence of this federal law has been to create a guaranteed victim zone, comprised of children, who are unprotected sitting ducks for any deranged lunatic such as Mr. Lanza.
  • Our culture of violence is more directly attributable to anti-freedom government policies which diminish and disrespect the rights of the individual.
  • Here is a short list of some notable examples compiled by the Libertarian Party:
  • A 1997 high school shooting in Pearl, Mississippi was halted by the school's vice principal after he retrieved the Colt .45 he kept in his truck. A 1998 middle school shooting ended when a man living next door heard gunfire and apprehended the shooter with his shotgun. A 2002 terrorist attack at an Israeli school was quickly stopped by an armed teacher and a school guard. A 2002 law school shooting in Grundy, Virginia came to an abrupt conclusion when students carrying firearms confronted the shooter. A 2007 mall shooting in Ogden, Utah ended when an armed off-duty police officer intervened. A 2009 workplace shooting in Houston, Texas was halted by two co-workers who carried concealed handguns. A 2012 church shooting in Aurora, Colorado was stopped by a member of the congregation carrying a gun. At the recent mall shooting in Portland, Oregon the gunman took his own life minutes after being confronted by a shopper carrying a concealed weapon.
  • Three Reasons Americans Have a Right to Own Guns "Are we at last brought to such humiliating and debasing degradation, that we cannot be trusted with arms for our defense? Where is the difference between having our arms in possession and under our direction and having them under the management of Congress? If our defense be the real object of having those arms, in whose hands can they be trusted with more propriety, or equal safety to us, as in our own hands?" ~ Patrick Henry
  • First, free people have a right to self defense.
  • The second reason for a right to keep and bear arms is to deter possible foreign invasions.
  • The founders of our nation believed people must always preserve their right to resistance and revolution against their own government. "And what country can preserve its liberties, if its rulers are not warned from time to time that their people preserve the spirit of resistance? Let them take arms....The tree of liberty must be refreshed from time to time, with the blood of patriots and tyrants." ~ Thomas Jefferson.
  • Japanese Admiral Isoroku Yamamoto
  • The third reason for a right to keep and bear arms is, as Thomas Jefferson stated, "The strongest reason for people to retain the right to keep and bear arms is, as a last resort, to protect themselves against tyranny in government."
  • "When the people fear the government, there is tyranny. When the government fears the people, there is liberty."
  • "You cannot invade the mainland United States. There would be a rifle behind every blade of grass"
  • In the 20th century alone, the death toll resulting from governments murdering their own disarmed citizens after guns were legally banned is estimated at 56 million.
  • "If ye love wealth greater than liberty, the tranquility of servitude greater than the animating contest for freedom, go home from us in peace. We seek not your counsel, nor your arms. Crouch down and lick the hand that feeds you; and may posterity forget that ye were our countrymen." ~ Samuel Adams
  •  
    Excellent article on the importance of gun ownership in America.  The author is a defense attorney practicing law in Arizona.  He's also a war veteran and well versed libertarian.   Excerpts: "I am an American. As such, none of my rights depend on a showing of need. I am a free man who has the right to define and pursue my happiness in any peaceful way I see fit. The government does not grant me rights. I was born free. The legitimate role of government is to act as my agent to protect my rights; which exist independent of government. Americans do not beg the government for rights nor are they required to demonstrate a "need" for rights." "Government never has a more tempting opportunity to increase its size, power and scope, and to curtail the liberties of free people, than during or immediately after a crisis. Indeed, crisis is so tempting an opportunity for government that governments invent crisis whenever possible. This is why "emergency acts" and "wars" on anyone and anything are so popular for governments. Nothing entices people to stop thinking, act impulsively, and to relinquish liberties so easily as a "crisis" or a "tragedy" or an "emergency." We need to be smarter if liberty is to survive." "Although President Obama appears excited about the notion of banning guns, I have not heard him order a ban on the very guns used to protect him. Apparently, when it comes to his protection, President Obama prefers to be protected by people armed with guns. "
  •  
    Excellent article other than the fact that the author erred in referring to the AR-15 as an "assault rifle." It is not. It is an "assault weapon," a semi-automatic rifle with only a cosmetic resemblance to the M-16 fully automatic "assault rifle." "Assault rifles" have been outlawed in the U.S. for decades. The U.S. had a complete ban on "assault weapon" rifles from 1994 to 2004. It did not affect gun violence rates at all, because semi-automatic rifles that lacked the cosmetic resemblance to "assault rifles" remained on the market. The distinction between the two terms is critical to understanding the current gun debate. Those who propose a ban on "assault weapons" are offering only a cosmetic sop to the anti-gun crowd, banning a sub-set of semi-automatic rifles whilst leaving equally capable semi-autos on the market. The correct question to ask is "why bother?" One might as well ban toy guns that bear a resemblance to assault weapons; other toy guns remain unaffected. For a more in depth discussion of "assault weapon" vs. "assault rifle" with references see http://en.wikipedia.org/wiki/Assault_weapon
Gary Edwards

The Daily Bell - What TARP Boss Neil Barofsky Told Me Yesterday Should Shock You - 1 views

  •  
    " The Daily Bell Newswire Editorial FRIDAY, MAY 17, 2013 What TARP Boss Neil Barofsky Told Me Yesterday Should Shock You By Bill Bonner 8 Bill Bonner The financial news is getting boring. The Dow goes only one way - up. But gold fell below $1,400 per ounce yesterday. Rather than trying to figure it out, yesterday evening we drove down to Zombietown. A friend in Washington had promised to introduce us to Neil Barofsky, inspector general of the TARP program. You remember TARP? It was the feds' $700 billion program to rescue the US economy from a correction. Neil Barofsky was in charge of it. So we decided to go down and ask him how it turned out... Meanwhile, in yesterday's International Herald Tribune was a small note: "Economists agree that spending cuts and tax increases have slowed the US recovery." Readers will recognize this as the usual claptrap. Government spending does not bring a genuine "recovery." C'mon... how many times do we have to explain? You take $5 worth of resources and give them to an armed 19-year-old in Afghanistan. He shoots a round or two into a mountainside... poof... the $5 is gone. Or you have an ATF official. He's idling his motor as he stakes out a house believed to be used by a cigarette smuggler. In a few minutes, or even seconds, the $5 has vanished. Or give the money to a disabled person; he buys a MoonPie and a Coke. Economists may record the spending as part of GDP... But how are you better off? You're $5 poorer, not $5 richer. But GDP growth is something economists feel they can control. So they go to work on it like a sex maniac strangling a prostitute. Nothing good comes of it. But at least they get results. And here comes Paul Krugman with more garroting wire! The New York Times Magazine: Keynesian economics rests fundamentally on the proposition that macroeconomics isn't a morality play - that depressions are essentially a technical malfunction. As the Great Depression deepened, Keynes famously declared
Paul Merrell

S/RES/487 (1981) of 19 June 1981 - 0 views

  • Resolution 487 (1981) Adopted by the Security Council at its 2288th meeting on 19 June 1981 The Security Council, Having considered the agenda contained in document S/Agenda/2280, Having noted the contents of the telegram dated 8 June 1981 from the Foreign Minister of Iraq (S/14509), Having heard the statements made to the Council on the subject at its 2280th through 2288th meetings, Taking note of the statement made by the Director-General of the International Atomic Emergency Agency (IAEA) to the Agency's Board of Governors on the subject on 9 June 1981 and his statement to the Council at its 2288th meeting on 19 June 1981,
  • Further taking note of the resolution adopted by the Board of Governors of the IAEA on 12 June 1981 on the "military attack on the Iraq nuclear research centre and its implications for the Agency" (S/14532), Fully aware of the fact that Iraq has been a party to the Treaty on the Non-Proliferation of Nuclear Weapons since it came into force in 1970, that in accordance with that Treaty Iraq has accepted IAEA safeguards on all its nuclear activities, and that the Agency has testified that these safeguards have been satisfactorily applied to date, Noting furthermore that Israel has not adhered to the non-proliferation Treaty, Deeply concerned about the danger to international peace and security created by the premeditated Israeli air attack on Iraqi nuclear installations on 7 June 1981, which could at any time explode the situation in the area, with grave consequences for the vital interests of all States,
  • Considering that, under the terms of Article 2, paragraph 4, of the Charter of the United Nations: "All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any State, or in any other manner inconsistent with the purposes of the United Nations", 1. Strongly condemns the military attack by Israel in clear violation of the Charter of the United Nations and the norms of international conduct; 2. Calls upon Israel to refrain in the future from any such acts or threats thereof; 3. Further considers that the said attack constitutes a serious threat to the entire IAEA safeguards regime which is the foundation of the non-proliferation Treaty;
  • ...1 more annotation...
  • 4. Fully recognizes the inalienable sovereign right of Iraq, and all other States, especially the developing countries, to establish programmes of technological and nuclear development to develop their economy and industry for peaceful purposes in accordance with their present and future needs and consistent with the internationally accepted objectives of preventing nuclear-weapons proliferation; 5. Calls upon Israel urgently to place its nuclear facilities under IAEA safeguards; 6. Considers that Iraq is entitled to appropriate redress for the destruction it has suffered, responsibility for which has been acknowledged by Israel; 7. Requests the Secretary-General to keep the Security Council regularly informed of the implementation of this resolutio
  •  
    In 1981, an Israeli air strike destroyed a nuclear reactor under construction in Iraq. http://en.wikipedia.org/wiki/Osirak The UN Security Council, where the U.S. had and has veto power, promptly issued Resolution 487 condemning Israel for violation of the U.N. Charter provision forbidding the use of force against the territorial integrity of another nation. The resolution also recognized Iraq and all other nations' right to nuclear development for peaceful purposes. Israel was instructed to never do such things in the future. Yet here we stand today with both Israel and the U.S. threatening military strikes against Iran's nuclear facilities.   
  •  
    But our Constitution commands in article VI: "This Constitution, and the laws of the United States which shall be made in pursuance thereof; *and all treaties made, or which shall be made, under the authority of the United States, shall be the supreme law of the land;* and the judges in every state shall be bound thereby, anything in the Constitution or laws of any State to the contrary notwithstanding,"  Thus, because the U.S. is still a member of the U.N. Treaty, our Constitution commands that we obey that Treaty and its prohibition against unilateral use of force. There is no applicable exception to the Treaty that would permit the U.S. or Israel to mount an attack on the Iranian nuclear facilities. Thus there is no such exception to the Constitution.
Paul Merrell

CURIA - Documents - 0 views

  • 37      It must be stated that the interference caused by Directive 2006/24 with the fundamental rights laid down in Articles 7 and 8 of the Charter is, as the Advocate General has also pointed out, in particular, in paragraphs 77 and 80 of his Opinion, wide-ranging, and it must be considered to be particularly serious. Furthermore, as the Advocate General has pointed out in paragraphs 52 and 72 of his Opinion, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance.
  • 43      In this respect, it is apparent from recital 7 in the preamble to Directive 2006/24 that, because of the significant growth in the possibilities afforded by electronic communications, the Justice and Home Affairs Council of 19 December 2002 concluded that data relating to the use of electronic communications are particularly important and therefore a valuable tool in the prevention of offences and the fight against crime, in particular organised crime. 44      It must therefore be held that the retention of data for the purpose of allowing the competent national authorities to have possible access to those data, as required by Directive 2006/24, genuinely satisfies an objective of general interest.45      In those circumstances, it is necessary to verify the proportionality of the interference found to exist.46      In that regard, according to the settled case-law of the Court, the principle of proportionality requires that acts of the EU institutions be appropriate for attaining the legitimate objectives pursued by the legislation at issue and do not exceed the limits of what is appropriate and necessary in order to achieve those objectives (see, to that effect, Case C‑343/09 Afton Chemical EU:C:2010:419, paragraph 45; Volker und Markus Schecke and Eifert EU:C:2010:662, paragraph 74; Cases C‑581/10 and C‑629/10 Nelson and Others EU:C:2012:657, paragraph 71; Case C‑283/11 Sky Österreich EU:C:2013:28, paragraph 50; and Case C‑101/12 Schaible EU:C:2013:661, paragraph 29).
  • 67      Article 7 of Directive 2006/24, read in conjunction with Article 4(1) of Directive 2002/58 and the second subparagraph of Article 17(1) of Directive 95/46, does not ensure that a particularly high level of protection and security is applied by those providers by means of technical and organisational measures, but permits those providers in particular to have regard to economic considerations when determining the level of security which they apply, as regards the costs of implementing security measures. In particular, Directive 2006/24 does not ensure the irreversible destruction of the data at the end of the data retention period.68      In the second place, it should be added that that directive does not require the data in question to be retained within the European Union, with the result that it cannot be held that the control, explicitly required by Article 8(3) of the Charter, by an independent authority of compliance with the requirements of protection and security, as referred to in the two previous paragraphs, is fully ensured. Such a control, carried out on the basis of EU law, is an essential component of the protection of individuals with regard to the processing of personal data (see, to that effect, Case C‑614/10 Commission v Austria EU:C:2012:631, paragraph 37).69      Having regard to all the foregoing considerations, it must be held that, by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter.
  • ...13 more annotations...
  • 58      Directive 2006/24 affects, in a comprehensive manner, all persons using electronic communications services, but without the persons whose data are retained being, even indirectly, in a situation which is liable to give rise to criminal prosecutions. It therefore applies even to persons for whom there is no evidence capable of suggesting that their conduct might have a link, even an indirect or remote one, with serious crime. Furthermore, it does not provide for any exception, with the result that it applies even to persons whose communications are subject, according to rules of national law, to the obligation of professional secrecy. 59      Moreover, whilst seeking to contribute to the fight against serious crime, Directive 2006/24 does not require any relationship between the data whose retention is provided for and a threat to public security and, in particular, it is not restricted to a retention in relation (i) to data pertaining to a particular time period and/or a particular geographical zone and/or to a circle of particular persons likely to be involved, in one way or another, in a serious crime, or (ii) to persons who could, for other reasons, contribute, by the retention of their data, to the prevention, detection or prosecution of serious offences.
  • 1        These requests for a preliminary ruling concern the validity of Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC (OJ 2006 L 105, p. 54).
  • Digital Rights Ireland Ltd (C‑293/12)vMinister for Communications, Marine and Natural Resources,Minister for Justice, Equality and Law Reform,Commissioner of the Garda Síochána,Ireland,The Attorney General,intervener:Irish Human Rights Commission, andKärntner Landesregierung (C‑594/12),Michael Seitlinger,Christof Tschohl and others,
  • JUDGMENT OF THE COURT (Grand Chamber)8 April 2014 (*)(Electronic communications — Directive 2006/24/EC — Publicly available electronic communications services or public communications networks services — Retention of data generated or processed in connection with the provision of such services — Validity — Articles 7, 8 and 11 of the Charter of Fundamental Rights of the European Union)In Joined Cases C‑293/12 and C‑594/12,
  • 34      As a result, the obligation imposed by Articles 3 and 6 of Directive 2006/24 on providers of publicly available electronic communications services or of public communications networks to retain, for a certain period, data relating to a person’s private life and to his communications, such as those referred to in Article 5 of the directive, constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter. 35      Furthermore, the access of the competent national authorities to the data constitutes a further interference with that fundamental right (see, as regards Article 8 of the ECHR, Eur. Court H.R., Leander v. Sweden, 26 March 1987, § 48, Series A no 116; Rotaru v. Romania [GC], no. 28341/95, § 46, ECHR 2000-V; and Weber and Saravia v. Germany (dec.), no. 54934/00, § 79, ECHR 2006-XI). Accordingly, Articles 4 and 8 of Directive 2006/24 laying down rules relating to the access of the competent national authorities to the data also constitute an interference with the rights guaranteed by Article 7 of the Charter. 36      Likewise, Directive 2006/24 constitutes an interference with the fundamental right to the protection of personal data guaranteed by Article 8 of the Charter because it provides for the processing of personal data.
  • 65      It follows from the above that Directive 2006/24 does not lay down clear and precise rules governing the extent of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter. It must therefore be held that Directive 2006/24 entails a wide-ranging and particularly serious interference with those fundamental rights in the legal order of the EU, without such an interference being precisely circumscribed by provisions to ensure that it is actually limited to what is strictly necessary.66      Moreover, as far as concerns the rules relating to the security and protection of data retained by providers of publicly available electronic communications services or of public communications networks, it must be held that Directive 2006/24 does not provide for sufficient safeguards, as required by Article 8 of the Charter, to ensure effective protection of the data retained against the risk of abuse and against any unlawful access and use of that data. In the first place, Article 7 of Directive 2006/24 does not lay down rules which are specific and adapted to (i) the vast quantity of data whose retention is required by that directive, (ii) the sensitive nature of that data and (iii) the risk of unlawful access to that data, rules which would serve, in particular, to govern the protection and security of the data in question in a clear and strict manner in order to ensure their full integrity and confidentiality. Furthermore, a specific obligation on Member States to establish such rules has also not been laid down.
  • 60      Secondly, not only is there a general absence of limits in Directive 2006/24 but Directive 2006/24 also fails to lay down any objective criterion by which to determine the limits of the access of the competent national authorities to the data and their subsequent use for the purposes of prevention, detection or criminal prosecutions concerning offences that, in view of the extent and seriousness of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter, may be considered to be sufficiently serious to justify such an interference. On the contrary, Directive 2006/24 simply refers, in Article 1(1), in a general manner to serious crime, as defined by each Member State in its national law.61      Furthermore, Directive 2006/24 does not contain substantive and procedural conditions relating to the access of the competent national authorities to the data and to their subsequent use. Article 4 of the directive, which governs the access of those authorities to the data retained, does not expressly provide that that access and the subsequent use of the data in question must be strictly restricted to the purpose of preventing and detecting precisely defined serious offences or of conducting criminal prosecutions relating thereto; it merely provides that each Member State is to define the procedures to be followed and the conditions to be fulfilled in order to gain access to the retained data in accordance with necessity and proportionality requirements.
  • 55      The need for such safeguards is all the greater where, as laid down in Directive 2006/24, personal data are subjected to automatic processing and where there is a significant risk of unlawful access to those data (see, by analogy, as regards Article 8 of the ECHR, S. and Marper v. the United Kingdom, § 103, and M. K. v. France, 18 April 2013, no. 19522/09, § 35).56      As for the question of whether the interference caused by Directive 2006/24 is limited to what is strictly necessary, it should be observed that, in accordance with Article 3 read in conjunction with Article 5(1) of that directive, the directive requires the retention of all traffic data concerning fixed telephony, mobile telephony, Internet access, Internet e-mail and Internet telephony. It therefore applies to all means of electronic communication, the use of which is very widespread and of growing importance in people’s everyday lives. Furthermore, in accordance with Article 3 of Directive 2006/24, the directive covers all subscribers and registered users. It therefore entails an interference with the fundamental rights of practically the entire European population. 57      In this respect, it must be noted, first, that Directive 2006/24 covers, in a generalised manner, all persons and all means of electronic communication as well as all traffic data without any differentiation, limitation or exception being made in the light of the objective of fighting against serious crime.
  • 62      In particular, Directive 2006/24 does not lay down any objective criterion by which the number of persons authorised to access and subsequently use the data retained is limited to what is strictly necessary in the light of the objective pursued. Above all, the access by the competent national authorities to the data retained is not made dependent on a prior review carried out by a court or by an independent administrative body whose decision seeks to limit access to the data and their use to what is strictly necessary for the purpose of attaining the objective pursued and which intervenes following a reasoned request of those authorities submitted within the framework of procedures of prevention, detection or criminal prosecutions. Nor does it lay down a specific obligation on Member States designed to establish such limits. 63      Thirdly, so far as concerns the data retention period, Article 6 of Directive 2006/24 requires that those data be retained for a period of at least six months, without any distinction being made between the categories of data set out in Article 5 of that directive on the basis of their possible usefulness for the purposes of the objective pursued or according to the persons concerned.64      Furthermore, that period is set at between a minimum of 6 months and a maximum of 24 months, but it is not stated that the determination of the period of retention must be based on objective criteria in order to ensure that it is limited to what is strictly necessary.
  • 52      So far as concerns the right to respect for private life, the protection of that fundamental right requires, according to the Court’s settled case-law, in any event, that derogations and limitations in relation to the protection of personal data must apply only in so far as is strictly necessary (Case C‑473/12 IPI EU:C:2013:715, paragraph 39 and the case-law cited).53      In that regard, it should be noted that the protection of personal data resulting from the explicit obligation laid down in Article 8(1) of the Charter is especially important for the right to respect for private life enshrined in Article 7 of the Charter.54      Consequently, the EU legislation in question must lay down clear and precise rules governing the scope and application of the measure in question and imposing minimum safeguards so that the persons whose data have been retained have sufficient guarantees to effectively protect their personal data against the risk of abuse and against any unlawful access and use of that data (see, by analogy, as regards Article 8 of the ECHR, Eur. Court H.R., Liberty and Others v. the United Kingdom, 1 July 2008, no. 58243/00, § 62 and 63; Rotaru v. Romania, § 57 to 59, and S. and Marper v. the United Kingdom, § 99).
  • 26      In that regard, it should be observed that the data which providers of publicly available electronic communications services or of public communications networks must retain, pursuant to Articles 3 and 5 of Directive 2006/24, include data necessary to trace and identify the source of a communication and its destination, to identify the date, time, duration and type of a communication, to identify users’ communication equipment, and to identify the location of mobile communication equipment, data which consist, inter alia, of the name and address of the subscriber or registered user, the calling telephone number, the number called and an IP address for Internet services. Those data make it possible, in particular, to know the identity of the person with whom a subscriber or registered user has communicated and by what means, and to identify the time of the communication as well as the place from which that communication took place. They also make it possible to know the frequency of the communications of the subscriber or registered user with certain persons during a given period. 27      Those data, taken as a whole, may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained, such as the habits of everyday life, permanent or temporary places of residence, daily or other movements, the activities carried out, the social relationships of those persons and the social environments frequented by them.
  • 32      By requiring the retention of the data listed in Article 5(1) of Directive 2006/24 and by allowing the competent national authorities to access those data, Directive 2006/24, as the Advocate General has pointed out, in particular, in paragraphs 39 and 40 of his Opinion, derogates from the system of protection of the right to privacy established by Directives 95/46 and 2002/58 with regard to the processing of personal data in the electronic communications sector, directives which provided for the confidentiality of communications and of traffic data as well as the obligation to erase or make those data anonymous where they are no longer needed for the purpose of the transmission of a communication, unless they are necessary for billing purposes and only for as long as so necessary.
  • On those grounds, the Court (Grand Chamber) hereby rules:Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC is invalid.
  •  
    EU Court of Justice decision in regard to a Directive that required communications data retention by telcos/ISPs, finding the Directive invalid as a violation of the right of privacy in communications. Fairly read, paragraph 59 outlaws bulk collection of such records, i.e., it requires the equivalent of a judge-issued search warrant in the U.S. based on probable cause to believe that the particular individual's communications are a legitimate object of a search.  Note also that paragraph 67 effectively forbids transfer of any retained data outside the E.U. So a barrier for NSA sharing of data with GCHQ derived from communications NSA collects from EU communications traffic. Bye-bye, Big Data for GCHQ in the E.U. 
Paul Merrell

Fellow soldiers call Bowe Bergdahl a deserter, not a hero - CNN.com - 0 views

  • The sense of pride expressed by officials of the Obama administration at the release of Army Sgt. Bowe Bergdahl is not shared by many of those who served with him: veterans and soldiers who call him a deserter whose "selfish act" ended up costing the lives of better men.
  •  
    I've been disgusted with American mainstream media and our political class for a very long time. Every now and then I get super-disgusted.  I'll begin with the Obama Administration. They tried to make political hay with something that should not have been made public other than notifying the released American prisoners' parents before the prisoner had been debriefed. Moreover, while I have no problems with swapping Taliban prisoners to get the American prisoner back even if it meant not giving Congress the full 30-day notice required by statute, the Administration certainly could have done a better job of it, notifying key committee members earlier that the deal might be pulled off. Waiting until the Taliban prisoners were up to the steps of the airplane bound for the exchange was not the way this should have happened. Next up, we have the members of Congress who have done their level best to turn the situation into a partisan issue. Obama may have deserved criticism given that he tried to make political hay with the release. But prisoner swaps during wartime have been a feature of most U.S. wars. It is an ancient custom of war and procedures for doing so are even enshrined in the Geneva Conventions governing warfare. So far, I have not heard any war veteran member of Congress scream about releasing terrorists. During my 2+ years in a Viet Nam combat role, the thought of being captured was horrifying. Pilots shot down over North Viet Nam were the lucky ones. No American soldier captured in South Viet Nam was ever released. The enemy was fighting a guerrilla war in the South. They had no means to confine and care for prisoners. So captured American troops were questioned for intelligence and then killed.  Truth be told, American combat troops were prone to killing enemy who surrendered. War is a very ugly situation and feelings run high. It is perhaps a testament to the Taliban that they kept Sgt. Berdahl alive. Certainly that fact clashes irreconcilably with
Gary Edwards

REVEALING QUOTES ON THE GOALS OF PSYCHIATRY AND PSYCHOLOGY - 0 views

  • Psychiatry's Views on Conservatives "In August 2003, the National Institute of Mental Health (NIMH) and the National Science Foundation (NSF) announced the results of their $1.2 million taxpayer-funded study. It stated, essentially, that traditionalists are mentally disturbed. Scholars from the Universities of Maryland, California at Berkeley, and Stanford had determined that social conservatives, in particular, suffer from ‘mental rigidity,’ ‘dogmatism,’ and ‘uncertainty avoidance,’ together with associated indicators for mental illness."
  • Psychiatry's Views on Education "Every child in America entering school at the age of five is insane because he comes to school with certain allegiances to our founding fathers, toward our elected officials, toward his parents, toward a belief in a supernatural being, and toward the sovereignty of this nation as a separate entity. It’s up to you as teachers to make all these sick children well – by creating the international child of the future"
  • Teaching school children to read was a "perversion" and high literacy rate bred "the sustaining force behind individualism."
  • ...59 more annotations...
  • You see, one of the effects of self-esteem (Values Clarification) programs is that you are no longer obliged to tell the truth if you don’t feel like it. You don’t have to tell the truth because if the truth you have to tell is about your own failure then your self-esteem will go down and that is unthinkable."
  • The social psychologist of the future will have a number of classes of school children on whom they will try different methods of producing an unshakable conviction that snow is black. Various results will soon be arrived at: first, that influences of the home are 'obstructive' and verses set to music and repeatedly intoned are very effective ..
  • When the technique has been perfected, every government that has been in charge of education for more than one generation will be able to control its subjects securely without the need of armies or policemen."
  • "…through schools of the world we shall disseminate a new conception of government – one that will embrace all of the collective activities of men; one that will postulate the need for scientific control and operation of economic activities in the interests of all people."
  • "Education does not mean teaching people to know what they do not know – it means teaching them to behave as they do not behave." 
  • "This is the idea where we drop subject matter and we drop Carnegie Unites (grading from A-F) and we just let students find their way, keeping them in school until they manifest the politically correct attitudes.
  • "I regard myself as one of the most dangerous enemies of religion" Sigmund Freud
  • "Education is thus a most power ally of humanism, and every public school is a school of humanism. What can the theistic Sunday school, meeting for an hour once a week, and teaching only a fraction of the children, do to stem the tide of a five-day program of humanistic teachings?"
  • "Despite rapid progress in the right direction, the program of the average elementary school has been primarily devoted to teaching the fundamental subjects, the three R’s, and closely related disciplines… Artificial exercises, like drills on phonetics, multiplication tables, and formal writing movements, are used to a wasteful degree. Subjects such as arithmetic, language, and history include content that is intrinsically of little value. Nearly every subject is enlarged unwisely to satisfy the academic ideal of thoroughness… Elimination of the unessential by scientific study, then, is one step in improving the curriculum."
  • "We can therefore justifiably stress our particular point of view with regard to the proper development of the human psyche, even though our knowledge be incomplete. We must aim to make it permeate every educational activity in our national life…. We have made a useful attack upon a number of professions. The two easiest of them naturally are the teaching profession and the Church: the two most difficult are law and medicine."
  • "...a student attains 'higher order thinking' when he no longer believes in right or wrong"
  • "A large part of what we call good teaching is a teacher´s ability to obtain affective objectives by challenging the student's fixed beliefs.  …a large part of what we call teaching is that the teacher should be able to use education to reorganize a child's thoughts, attitudes, and feelings."  
  • "Education should aim at destroying free will so that after pupils are thus schooled they will be incapable throughout the rest of their lives of thinking or acting otherwise than as their school masters would have wished
  • Psychiatry's Views on Religion "Religion (is) a universal obsessional neurosis." Sigmund Freud, defining spiritual belief
  • "The educational system should be a sieve, through which all the children of a country are passed. It is highly desirable that no child escape inspection."
  • "The soul or consciousness, which played the leading part in the past, now is of very little importance; in any case both are deprived of their main functions and glory to such an extent that only the names remain. Behaviorism sang their funeral dirge while materialism – the smiling heir – arranges a suitable funeral for them.
  • "…humanists still believe that traditional theism, especially faith in the prayer-hearing God, assumed to love and care for persons, to hear and understand their prayers, and to be able to do something about them, is an unproved and outmoded faith." "
  • "We can therefore justifiably stress our particular point of view with regard to the proper development of the human psyche, even though our knowledge be incomplete. We must aim to make it permeate every educational activity in our national life…. We have made a useful attack upon a number of professions. The two easiest of them naturally are the teaching profession and the Church: the two most difficult are law and medicine."
  • We shall not solve the problems of alcoholism and juvenile delinquency by increasing a sense of responsibility. It is the environment which is 'responsible' for the objectionable behavior, and it is the environment, not some attribute of the individual, which must be changed.
  • Psychiatry's Views on Creating a Slave Society "We can choose to use our growing knowledge to enslave people in ways never dreamed of before, depersonalizing them, controlling them by means so carefully selected that they will perhaps never be aware of their loss of personhood."
  • Teaching school children to read was a "perversion" and high literacy rate bred "the sustaining force behind individualism."
  • "It will of course, be understood that directly or indirectly, soon or late, every advance in the sciences of human nature will contribute to our success in controlling human nature and changing it to the advantage of the common wheel." Edward Thorndike, Key Psychology Theorist, member of the "Eugenics Committee of the USA"
  • "We need a program of psychosurgery for political control of our society. The purpose is physical control of the mind. Everyone who deviates from the given norm can be surgically mutilated.
  • The individual may think that the most important reality is his own existence, but this is only his personal point of view. . . Man does not have the right to develop his own mind. . . . We must electronically control the brain. Someday armies and generals will be controlled by electronic stimulation of the brain." 
  • "Education should aim at destroying free will so that after pupils are thus schooled they will be incapable throughout the rest of their lives of thinking or acting otherwise than as their school masters would have wished
  • "One of the least understood strategies of the world revolution now moving rapidly toward its goal is the use of mind control as a major means of obtaining the consent of the people who will be subjects of the New World Order."
  • "Those of us who work in this field see a developing potential for nearly a total control of human emotional status, mental functioning, and will to act. These human phenomena can be started, stopped or eliminated by the use of various types of chemical substances. What we can produce with our science now will affect the entire society." A "utopia" could be found – providing "a sense of stability and certainty, whether realistic or not."
  • "To achieve world government, it is necessary to remove from the minds of men their individualism, loyalty to family traditions, national patriotism and religious dogmas..."
  • Some packages even include instructions on how to deal with parents and others who object. Stripping away psychological defenses can be done through assignments to keep diaries to be discussed in group sessions, and through role-playing assignments, both techniques used in the original brainwashing programs in China under Mao. Thomas Sowell, writing in Forbes, 1991
  • "The State is the absolute reality and the individual himself has objective existence, truth and morality only in his capacity as a member of the State." Hegel (who influenced Karl Marx)
  • Psychiatry's Views on America "America is a mistake, admittedly a gigantic mistake, but a mistake nevertheless." Sigmund Freud America is the most grandiose experiment the world has seen, but, I am afraid, it is not going to be a success. Sigmund Freud
  • "To achieve world government, it is necessary to remove from the minds of men their individualism, loyalty to family traditions, national patriotism and religious dogmas...
  • "One of the least understood strategies of the world revolution now moving rapidly toward its goal is the use of mind control as a major means of obtaining the consent of the people who will be subjects of the New World Order."
  • Freud on Marxism "The strength of Marxism obviously does not lie in its view of history or in the prophecies about the future which it bases upon that view, but in its clear insight into the determining influence which is exerted by the economic conditions of man upon his intellectual, ethical and artistic reactions." Sigmund Freud
  • Basically, all that is necessary to revoke all the constitutional rights of any citizen is to accuse him of being mentally-ill."
  • John A. Stormer, "None Dare Call it Treason"
  • "Old conventions, customs and values… to be challenged… The aim should be to control not only nature, but human nature." He recommended two slogans for "spreading world-wide the gospel of mental hygiene": "To learn to think internationally" and "The necessity to disarm the mind." Dr. J.R. Lord, psychiatrist
  • "Public life, politics and industry should all of them be within our sphere of influence…. If we are to infiltrate the professional and social activities of other people I think we must imitate the Totalitarians and organize some kind of fifth column activity!  If better ideas on mental health are to progress and spread we, as the salesmen, must lose our identity… Let us all, therefore, very secretly be ‘fifth columnists.’"
  • The techniques of brainwashing developed in totalitarian countries are routinely used in psychological conditioning programs imposed on school children.
  • These include emotional shock and desensitization, psychological isolation from sources of support, stripping away defenses, manipulative cross-examination of the individual’s underlying moral values by psychological rather than rational means. These techniques are not confined to separate courses or programs...they are not isolated idiosyncracies of particular teachers. They are products of numerous books and other educational materials in programs packaged by organizations that sell such curricula to administrators and teach the techniques to teachers.
  • "If all else fails, punishable behavior may be made less likely by changing physiological conditions. Hormones may be used to change sexual behavior, surgery (as in lobotomy) to control violence, tranquilizers to control aggression, and appetite depressants to control overeating." Harvard psychologist B.F. Skinner in "Beyond Freedom and Dignity"
  • We must learn to recognize them for what they are - possessors of no special knowledge of the human psyche, who have, nonetheless, chosen to earn their living from the dissemination of the myth that they do indeed know how the mind works". Psychiatrist Garth Wood, M.D., in "The Myth of Neurosis", 1986
  • These terms indicate only approval or disapproval of some aspect of a person's mentality (thinking, emotions, or behavior). Psychiatrist E. Fuller Torrey, in "The Death of Psychiatry", 1974
  • "The very term ['mental disease'] is nonsensical, a semantic mistake. The two words cannot go together except metaphorically; you can no more have a mental 'disease' than you can have a purple idea or a wise space". Similarly, there can no more be a "mental illness" than there can be a "moral illness." The words "mental" and "illness" do not go together logically. Mental "illness" does not exist, and neither does mental "health."
  • By calling the harmless 'insane', (who statistics prove to be no more violence-prone than the average citizen, unless hopelessly deranged by damaging psychiatric 'treatment'), dangerous and justifying their own existence by the 'need' to deal with that inflated 'danger', the mad-doctors themselves pose the greatest threat to liberty, property and democracy in our times."
  • Citizens for Higher Ethical Standards in Medicine
  • "Mental illness is often used as an ad homonym to discredit the individual. This has been a common use of psychiatric diagnosis in psychiatry in Russia. " ... there are two main groups [of schizophrenia patients] ... 1) people admitted to the mental hospital long before they had been political dissenters ... 2. others who ... have put forward complex social and economic theories as alternatives to orthodox Marxism..."  Wing, cited in "Pseudoscience in Psychology", by Dr. Szasz, p. 126
  • "It is no measure of health to be well adjusted to a profoundly sick society.." J. Krishnamurti
  • "...the subject which will be of most importance politically is Mass Psychology.... The populace will not be allowed to know how its convictions were generated. When the technique has been perfected, every government that has been in charge of education for a generation will be able to control its subjects securely without the need of armies or policemen. As yet there is only one country which has succeeded in creating this politician’s paradise."   The Impact of Science on Society by Bertrand Russell
  • "A Trojan horse full of dangerous psycho-fantasies has been professionally prepared for us by Christian psychiatrists and psychologists...  At the base, such therapies stand upon dogma, not scientific observations, and the dogma is the odious one of Freud and his followers who were some of the century's most anti-Christ teachers.  No amount of well-intentioned refinement of deadly doctrines will make them clean for Christians." Dr. Hilton P. Terrell, M.D
  • "Contrary to the popular public conception, this happenstance is NOT a form of health care, but the result of a fraudulent system being granted police powers by the State.
  • "Psychotherapy may be known in the future as the greatest hoax of the twentieth century."
  • "Nearly half a century has passed since Watson proclaimed his manifesto. Today, apart from a few minor reservations, the vast majority of psychologists, both in this country and in America, still follow his lead. The result, as a cynical onlooker might be tempted to say, is that psychology, having first bargained away its soul and then gone out of its mind, seems now, as it faces an untimely end, to have lost all consciousness." 
  • "Advocates of psychiatric drugs often claim that the medications improve learning and the ability to benefit from psychotherapy, but the contrary is true.  There are no drugs that improve mental function, self-understanding, or human relations.  Any drug that affects mental processes does so by impairing them."
  • "In the 14-year period between 1950 and 1964, more American deaths occurred in state and county mental institutions than in all of the nation's armed conflicts beginning with the Revolutionary War and ending with the Persian Gulf War.  Between 1965 and 1990, the total number of mental-hospital inpatient deaths exceeded the number of battle deaths in the same wars by 70 percent.  Inpatient deaths topped out at 1,103,000 during this 25-year period, compared with 650,563 recorded deaths in battles."
  • Kelly Patricia O’Meara: "The Forgotten Dead of St. Elizabeth's", Insight Magazine, June 16, 2001
  • "The similarities between street drug abuse and psychotropic prescription drug use are disturbing. Both types are toxic. Both can cause psychosis, damage the brain and other organs, and even cause death. And neither type of mind-altering drugs, legal or illegal, treats disease. It's important to recognize that the only significant difference between many prescription psychotropic drugs and street drugs such as "speed" and "downers" is that prescription drugs are legal."
  • Neuro-psychiatrist Sydney Walker in "Dose of Sanity"
  • "Clearly this business of treating minds, particularly this big business of treating young minds, has not policed itself, and has no incentive to put a stop to the kinds of fraudulent and unethical practices that are going on."
Gary Edwards

The Precinct Project's Blog | Want to really "do something?" Take back the Republican P... - 0 views

  •  
    "Where do the candidates on our primary ballots come from? An estimated 95 per cent of the candidates of the Republican and Democrat parties who win the primary election are those who are endorsed by the leadership of those parties. Do You Know Who Elects The Party Leaders? Did You Elect Them? Who elects the leadership of the parties? Do you know? Are you a registered Republican? Guess what? As a "mere" registered Republican voter, without more, you did not have a vote in the election of the present leadership of the Republican Party. Sorry, but those are the facts. Only elected precinct committeemen get to vote for the leadership of the Party. Do I yet have your attention? Ponder the fact that only elected precinct committeemen get to elect the Party leadership. Don't you want to have a vote in those elections? Getting into position to have that right is easy. About 3,141 counties exist in the United States. Almost all have a county party organization. And, those county organizations almost always endorse candidates in the party primaries. And, usually, those party-endorsed candidates win. Tired of the kind of Republican In Name Only Republicans who are winning the primaries? Then do something real and become a Republican Party precinct committeeman! Guess what? About half of the Republican Party precinct committeeman slots, nationwide, are unfilled! There's about 400,000 slots nationwide and about 200,000 of those slots are vacant. If conservatives filled up all the empty slots they OWN the Party. Precinct Committeemen are the Party. Do I yet have your attention? Has the light bulb above your head clicked on yet? In some counties, like the one where I reside, Maricopa County, Arizona, within which Phoenix sits, TWO-THIRDS of the precinct committeeman slots in the Republican Party sat unfilled on Election Day, 2008. [Well, it's now November, 2012, and we're now at 52 per cent strength instead of where we were back in 2008 at 31 per cent.] Spend a few
Paul Merrell

"The machiavelian threefold game of the neoconservatives" - 0 views

  • To realize their fantasies of world domination, the neocons resorted to a triple discourse, as Laurent Guyénot shows in this study, i.e. a cynical political philosophy developed by their mentor Leo Strauss for domestic consumption; a cold analysis of Israeli strategic interests for the benefit of the leaders in Tel Aviv, and a fear-mongering warning against imaginary dangers besetting U.S. public opinion.
  • The neoconservative movement, which is generally perceived as a radical (rather than “conservative”) Republican right, is, in reality, an intellectual movement born in the late 1960s in the pages of the monthly magazine Commentary, a media arm of the American Jewish Committee, which had replaced the Contemporary Jewish Record in 1945. The Forward, the oldest American Jewish weekly, wrote in a January 6th, 2006 article signed Gal Beckerman: “If there is an intellectual movement in America to whose invention Jews can lay sole claim, neoconservatism is it. It’s a thought one imagines most American Jews, overwhelmingly liberal, will find horrifying. And yet it is a fact that as a political philosophy, neoconservatism was born among the children of Jewish immigrants and is now largely the intellectual domain of those immigrants’ grandchildren”. The neoconservative apologist Murray Friedman explains that Jewish dominance within his movement by the inherent benevolence of Judaism, “the idea that Jews have been put on earth to make it a better, perhaps even a holy, place” (The Neoconservative Revolution: Jewish Intellectuals and the Shaping of Public Policy, 2006).
  • Just as we speak of the “Christian Right” as a political force in the United States, we could also therefore speak of the neoconservatives as representing the “Jewish Right”. However, this characterization is problematic for three reasons. First, the neoconservatives are a relatively small group, although they have acquired considerable authority on and within Jewish representative organizations, including the Conference of Presidents of Major American Jewish Organizations. In 2003, journalist Thomas Friedman of the New York Times counted twenty-five members saying, “if you had exiled them to a desert island a year and half ago, the Iraq war would not have happened”. The neoconservatives compensate for their small number by multiplying their Committees, Projects, and other think tanks, which certainly give them a kind of ubiquity.
  • ...2 more annotations...
  • unlike evangelical Christians who openly proclaim their unifying religious principles, neoconservatives do not display their Judaism. Whether they’d been Marxists or not, they appear mostly non-religious. It is well-know that their major influence is the philosophy of Leo Stauss, so much so that they are sometimes referred to as “the straussians”;
  • The thinking of Leo Strauss is difficult to capture, and certainly beyond the purview of this work. Moreover, Strauss is often elliptic because he believes that Truth is harmful to the common man and the social order and should be reserved for superior minds. For this reason, Strauss rarely speaks in his own name, but rather expressed himself as a commentator on classical authors, in whom he discovers many of his own thoughts. Moreover, much like his disciples Allan Bloom (The Closing of the American Mind, 1988) and Samuel Huntington, he is careful to clothe his most radical ideas in ostensibly humanist principles. Despite the apparent difficulty, three basic ideas can easily be extracted from his political philosophy, no different from Schmitt. First, nations derive their strength from their myths, which are necessary for government and governance. Second, national myths have no necessary relationship with historical reality: they are socio-cultural constructions that the State has a duty to disseminate. Third, to be effective, any national myth must be based on a clear distinction between good and evil; it derives its cohesive strength from the hatred of an enemy nation. As recognized by Abram Shulsky and Gary Schmitt in an article “Leo Strauss and the World of Intelligence” (1999), for Strauss, “deception is the norm in political life” – the rule they applied to fabricating the lie of weapons of mass destruction by Saddam Hussein when working inside the Office of Special Plans.
  •  
    Toward a deeper understanding of Neoconservatism, which has ruled U.S. foreign and military policy in the Mideast almost without interruption since the election of George W. Bush. 
Paul Merrell

Defending Dissent » New Docs Show Army Coordinated Spy Ring - 1 views

  • Army illegally supplied  intelligence on nonviolent antiwar protesters to FBI and police in multiple states Tacoma, WA – Recently obtained public records confirm an Army-led, multi-agency spy network that targeted “leftists/anarchists” as domestic terrorists. The Army used illegal infiltration to gather information on nonviolent antiwar protesters, disseminate it to the FBI and police departments in multiple states, and in some cases used it to disrupt planned protests by preemptively and falsely arresting activists. Public records obtained last month by Olympia activist Paul French reveal new evidence in the widely-watched Army spying case Panagacos v. Towery. An email from November 2007, in particular, shows that intelligence analyst John J. Towery was paid by the Army to infiltrate political groups and share unlawfully obtained intelligence with a growing network of law enforcement agencies, including the FBI, and police departments in Los Angeles, Portland, Eugene, Everett, and Spokane. The Towery email not only represents a broader spying program than previously thought, it also confirms the program was led by the Army, a fact contradicted by Towery’s 2009 sworn statements.
  • “The latest revelations show how the Army not only engaged in illegal spying on political dissidents, it led the charge and tried to expand the counterintelligence network targeting leftists and anarchists,” said Larry Hildes, a National Lawyers Guild attorney who filed the Panagacos lawsuit in 2010. “By targeting activists without probable cause, based on their ideology and the perceived political threat they represent, the Army clearly broke the law and must be held accountable.” Previously obtained public records indicate that absent such accountability, the Army will continue to spy on and target protesters, which it did until at least 2010, long after Towery’s identity was exposed. Public records previously obtained in 2009 already established that over a two-year period beginning in 2006, Towery (under the alias “John Jacob”) spied on the Olympia antiwar group Port Militarization Resistance (PMR) as well as several other organizations, including Students for a Democratic Society, the Industrial Workers of the World, and Iraq Veterans Against the War. It has also already been established that Towery’s intelligence was passed on to the Washington State Fusion Center, a communications hub of  local, state and federal law enforcement, and then used by local police to target activists for repeated harassment, preemptive and false arrest, excessive use of force, and malicious prosecution
  • The recently disclosed Towery email was a follow-up to a 2007 Domestic Terrorism Conference he attended in Spokane, during which “domestic terrorist” dossiers on some of the Panagacos plaintiffs were distributed. The Towery email shows the development of a multi-agency spying apparatus in intimate detail. “I thought it would be a good idea to develop a leftist/anarchist mini-group for intel sharing and distro,” wrote the Army analyst to several law enforcement officials. Towery references books, “zines and pamphlets,” and a “comprehensive web list” as source material, but cautions the officials on file sharing “because it might tip off groups that we are studying their techniques, tactics and procedures.” Towery, who worked at Joint Base Lewis-McChord, not only coordinated his actions with local, state and federal law enforcement agencies, many of whom are named defendants in the Panagacos case, he also admitted to eavesdropping on a confidential, privileged attorney-client email listserv of criminal defendants and their legal counsel. Such conduct is considered a constitutional violation, but Towery also took sensitive information from the listserv vital to a pending criminal trial in 2007 and passed it on to fusion center officials who then transmitted it to prosecutors, forcing a mistrial in a case the defense was winning handily. The case was later dismissed for prosecutorial misconduct.
  • ...2 more annotations...
  • The public records disclosure comes as government spying and criticism of the National Security Agency’s surveillance program has reached a fever pitch. However, a little-known and rarely, if ever, enforced law from 1878 distinguishes the spying under Panagacos from that of the NSA. The Posse Comitatus Act prohibits the military from enforcing domestic laws on U.S. soil by making such actions a Gross Misdemeanor, yet to-date no official has been prosecuted under the Act. Instead of conceding to the violations, the Army is currently using the Panagacos case to try to seal nearly 10,000 pages of documents, many of which are incriminating and embarrassing to the government. The legal effort to unseal those documents will play out over the next few weeks. The Obama Administration tried to dismiss the Panagacos lawsuit, but in a Ninth Circuit decision from December 2012 the court rejected the government’s arguments, ruling that allegations of First and Fourth Amendment violations were “plausible,” and ordered the case to proceed to trial. The lawsuit was filed on behalf of seven PMR members who sought to oppose the wars in Iraq and Afghanistan through nonviolent civil disobedience and is being heard by U.S. District Court Judge Ronald B. Leighton. In addition to Towery, named defendants in Panagacos include Thomas Rudd, one of Towery’s superiors at Joint Base Lewis-McChord, the U.S. Army, Navy, and Coast Guard, as well as certain officials within its ranks, the City of Olympia and its police department, the City of Tacoma and its police department, Pierce County, and various personnel from those jurisdictions.
  • Panagacos v. Towery is currently in the discovery stage and is scheduled to go to trial in June 2014. Further information: Recently disclosed Towery email Panagacos lawsuit complaint Domestic terrorism dossiers on plaintiffs
  •  
    One I had missed from February, 2014. I believe I had bookmarked something about this before the lawsuit was filed. Now not only has the case been filed but the alleged grounds for the lawsuit have been greenlighted by the 9th U.S. Circuit Court of Appeals. If you click through the link to the court's opinion, you'll find one of the Ninth Circuit's shorter opinions, less than five pages, which does not even mention that the defendants were employed by the U.S. Army or any branch of government, while still rejecting their claim of government officials' qualified immunity from suit for the alleged First and Fourth Amendment violations. The third amended complaint sufficiently alleged facts to support claims that had been clearly established as violative of the First and Fourth Amendments.   It's clear that the plaintiffs have smoking gun evidence and that the National Lawyers' Guild is all over this one. Trial is scheduled next month, according to the article. It's just under 300 miles from here to Seattle, but I just might make the trip to watch a few days of this trial. Strong First Amendment cases for damages that survive appellate review of the qualified immunity nearly always settle before trial. But this one smells like it is going to trial for publicity purposes even if not for the vindication of rights, considering the nature of the organizations involved both as targets of the surveillance and their lawyers. It's great entertainment watching government guys and gals squirm on the witness stand when they've been caught violating civil rights. In criminal cases, invoking the Fifth Amendment right against self-incrimination cannot be taken as evidence of guilt. But in a federal civil rights case, that entitles the plaintiffs to have the jury instructed that it can infer liability from the resort to the Fifth Amendment to refuse answering questions.  Better back in the day when I was the lawyer asking the questions. But it's still great fun just to watch
1 - 20 of 2044 Next › Last »
Showing 20 items per page