Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Kim

Rss Feed Group items tagged

Paul Merrell

Kim Dotcom: I Knew Seth Rich, He Was The Wikileaks Source - 0 views

  • Last week, Fox News dropped a bombshell report officially confirming, via anonymous FBI sources, what many had suspected for quite some time, that murdered DNC staffer Seth Rich was the WikiLeaks source for leaks which proved that the DNC was intentionally undermining the campaign of Bernie Sanders. In addition to exposing the corruption of the DNC, the leaks cost Debbie Wasserman In addition to exposing the corruption of the DNC, the leaks cost Debbie Wasserman Schultz her job as Chairwoman. Of course, if it’s true that WikiLeaks’ emails came from a DNC insider it would end the “Russian hacking” narrative that has been perpetrated by Democrats and the mainstream media for the past several months.
  • Moreover, it would corroborate the one confirmation that Julian Assange has offered regarding his source, namely that it was “not a state actor.” Meanwhile, the plot thickened a little more over the weekend when Kim Dotcom confirmed via Twitter that he was working with Seth Rich to get leaked emails to WikiLeaks.
  • Meanwhile, Kim Dotcom has promised more information will be released on his interaction with Seth Rich by tomorrow.
  • ...1 more annotation...
  • why is he just now coming forward with such information? Second, while Seth Rich may explain the DNC leaks we still don’t know who is responsible for the “Podesta Files” which we’re certain will continue to be attributed to “Russian hackers.” Which leads to the most important question of all: is this all just another fake news diversion, or is there more to the Seth Rich murder?
Paul Merrell

US intel chiefs said to tell Trump he might consider killing Kim Jong-un | The Times of... - 0 views

  • In its efforts to grapple with North Korea, the US might consider killing its leader Kin Jong-un or deploying nuclear weapons in South Korea, the National Security Council has reportedly suggested to President Donald Trump.
  • The NSC also presented Trump with the possibility of assassinating Kim, along with the option of infiltrating special forces into North Korea and then sabotaging key nuclear infrastructure. One option “is to target and kill North Korean leader Kim Jong-un and other senior leaders in charge of the country’s missiles and nuclear weapons and decision-making,” NBC news said. Such scenarios are part of an accelerated review of North Korea policy that were prepared in advance of Trump’s meeting with Chinese President Xi Jinping this week, NBC said, quoting multiple top-ranking intelligence and military officials.
  •  
    A war crime by any measure.
Paul Merrell

Petraeus Gets Leniency for Leaking - And Risen's CIA Source Should Too, His Lawyers Say... - 0 views

  • Lawyers for Jeffrey Sterling, convicted earlier this year of leaking classified information to New York Times reporter James Risen, urged today that Sterling “not receive a different form of justice” than David Petraeus, the former general and CIA director who has pleaded guilty to a misdemeanor for leaking classified information to his biographer. While Petraeus will not go to jail — yesterday a judge sentenced him to two years probation and a $100,000 fine — prosecutors have asked for a “severe” sentence against Sterling within federal guidelines of 19 to 24 years in prison. In January, a jury convicted Sterling, a former CIA agent, on nine counts related to leaking information to Risen, a Times reporter who in 2006 wrote a book that revealed the agency had mishandled a program to disrupt Iran’s nuclear weapons program. Sterling’s lawyers, Edward MacMahon Jr. and Barry Pollack, filed their sentencing memorandum today, arguing that their client “should be treated no more harshly than any other person who has been charged and convicted of ‘leaking’ to the press.” In addition to Petraeus, they cited the cases of John Kiriakou, a former CIA agent who was sentenced to 30 months in prison, and Stephen Kim, who received a 13-month sentence. Unlike Petraeus, Kiriakou and Kim, who reached plea agreements, Sterling took his case to a jury. He is scheduled to be sentenced on May 11.
  • “He should be treated similarly to others convicted for the same crimes and not singled out for a long prison sentence because he elected to exercise his right to trial,” the lawyers stated. “[T]he court cannot turn a blind eye to the positions the government has taken in similar cases.” The Petraeus and Sterling cases have highlighted another disparity in the government’s handling of leak cases: powerful officials like Petraeus are treated leniently while mid-level ones like Kiriakou, Kim and Sterling go to jail. In the Petraeus case, the government claims no harm was caused by his leak, because none of the information he leaked to Paula Broadwell, his biographer and onetime lover, was published, whereas the information published by Risen had caused “substantial damage” to national security. However, this characterization was called “overwrought hyperbole” by a former CIA official in a letter of support for Sterling released today by his lawyers. David J. Manners, a former station chief in Prague and Amman as well as chief of the agency’s Iran task force, described as “not credible” the prosecution’s claim that Risen’s book severely hurt the CIA’s ability to recruit spies. Manners, who first met Sterling when both worked at the agency, noted that the government itself has often disclosed the role of intelligence operatives.
  • “While such disclosures are never helpful, they happen all the time (and sometimes the United States quietly endorses the disclosure — read some of Bob Woodward’s books, or look at Agency collaboration on the film about the bin Laden raid),” Manners wrote. Sterling’s lawyers called attention to what they regard as another inequity in the treatment of Petraeus and their client. Petraeus admitted in his plea agreement that the classified information he leaked included highly sensitive names of covert operatives, war plans for U.S. forces, as well as details about his discussions with senior officials, including President Obama. Petraeus also admitted to lying to FBI agents about what he had done. Sterling, his lawyers noted, “revealed the names of no covert personnel and never lied about his actions to the FBI.” The prosecution appears to be trying to do more than put Sterling behind bars for two decades; it appears to be trying to rewrite history and put an end to leaks of information that embarrass the government.
  •  
    I read the two sentencing memorandums. Sterling's lawyer makes an excellent case that the government is attempting to punish Sterling for being a whistleblower and for his decision to go to trial rather than accept a deal. And the trial is already infamous for the government's failure to bring forward any direct proof of guilt. The light sentence meted to Gen. Petraeus is directly at issue in the sentencing. It will be interesting to see what Judge Berkema decides. 
Paul Merrell

DOJ confirms Holder OK'd search warrant for Fox News reporter's emails - Open Channel - 0 views

  • The Justice Department pledged Friday to to review its policies relating to the seizure of information from journalists after acknowledging that a controversial search warrant for a  Fox News reporter’s private emails  was approved “at the highest levels” of the Justice Department, including “discussions” with Attorney General  Eric Holder.
  • The statement, confirming an NBC News account of Holder’s role, defended the secret warrant to obtain reporter James Rosen’s emails as a legitimate step to obtain evidence as part of an investigation of Stephen Kim. A former intelligence analyst, Kim has since been indicted under the Espionage Act for leaking classified information to Rosen about North Korea. He has denied the charges.
  • Nevertheless, said the official, who spoke on condition of anonymity, Holder “understands the concerns that have been raised by the media and has initiated a re-evaluation of existing department policies and procedures.” The official said the department must strike “the appropriate balance” between preventing leaks of classified information and “First Amendment rights,”adding that passage of a new media shield law “and appropriate updates to the department”s internal guidelines” will help achieve that.   The statement comes  amid a firestorm of criticism from news media groups over the Rosen search warrant and a secret subpoena for the phone records of AP reporters. It also comes one day after President Obama addressed the issue in a major speech on counter-terrorism policy, saying "I am troubled by the possibility that leak investigations may chill the investigative journalism that holds government accountable," Obama said. "Journalists should not be at legal risk for doing their jobs."
  •  
    Re "President Obama addressed the issue in a major speech on counter-terrorism policy, saying "I am troubled by the possibility that leak investigations may chill the investigative journalism that holds government accountable," Obama said. "Journalists should not be at legal risk for doing their jobs." That's unless they're not working with a mainstream media company, of course. Witness continuing U.S. efforts to extradite and prosecute Wikileaks founder Julian Assange under the Espionage Act because of the massive leak of classified documents to Wikileaks for which Private Bradley Manning is being prosecuted.
Gary Edwards

'Clinton death list': 33 spine-tingling cases - 0 views

  •  
    "(Editor's note: This list was originally published in August 2016 and has gone viral on the web. WND is running it again as American voters cast their ballots for the nation's next president on Election Day.) How many people do you personally know who have died mysteriously? How about in plane crashes or car wrecks? Bizarre suicides? People beaten to death or murdered in a hail of bullets? And what about violent freak accidents - like separate mountain biking and skiing collisions in Aspen, Colorado? Or barbells crushing a person's throat? Bill and Hillary Clinton attend a funeral Apparently, if you're Bill or Hillary Clinton, the answer to that question is at least 33 - and possibly many more. Talk-radio star Rush Limbaugh addressed the issue of the "Clinton body count" during an August show. "I swear, I could swear I saw these stories back in 1992, back in 1993, 1994," Limbaugh said. He cited a report from Rachel Alexander at Townhall.com titled, "Clinton body count or left-wing conspiracy? Three with ties to DNC mysteriously die." Limbaugh said he recalled Ted Koppel, then-anchor of ABC News' "Nightline," routinely having discussions on the issue following the July 20, 1993, death of White House Deputy Counsel Vince Foster. In fact, Limbaugh said, he appeared on Koppel's show. "One of the things I said was, 'Who knows what happened here? But let me ask you a question.' I said, 'Ted, how many people do you know in your life who've been murdered? Ted, how many people do you know in your life that have died under suspicious circumstances?' "Of course, the answer is zilch, zero, nada, none, very few," Limbaugh chuckled. "Ask the Clintons that question. And it's a significant number. It's a lot of people that they know who have died, who've been murdered. "And the same question here from Rachel Alexander. It's amazing the cycle that exists with the Clintons. [Citing Townhall]: 'What it
Paul Merrell

Forget Hillary Clinton's Emails, Here's Her Real Scandal That Nobody's Talking About - 0 views

  • Forget about the color of the dress for a minute, forget about Hillary Clinton’s unsecured email, hell! forget about Kanye and Kim too; let’s talk about Libya. And no, I’m not talking about Benghazi.
Paul Merrell

The Daily Dot - How a major bank and the U.S. government joined forces to spy on Anonymous - 0 views

  • New details have surfaced regarding the surveillance protocols used by Bank of America to keep tabs on social activists. Last year, Anonymous hacktivists published 14 gigabytes of private emails and spreadsheets which revealed that Bank of America was monitoring social media and other online services used by activists for basic communication. This time however, information about the bank’s recent surveillance activities were obtained legally through a public records request by a single petitioner. The newly published documents reveal a coordinated effort by Bank of America, the Washington State Patrol (WSP), and federal counterterrorism agencies, to monitor activists as they prepared for a public demonstration in Olympia, Wash. Over 230 people originally signed up to attend the “Million Mask March” event, which was organized by the Anonymous movement and took place on November 5, 2013. Although an official report by the WSP described the event as a “peaceful protest” being organized by activists who had made “no threats of violence,” those involved were still monitored by the department before the event took place. Information gathered about the potential protesters was then shared with Bank of America. Furthermore, Bank of America solicited information about activists from various federal agencies, including the Federal Bureau of Investigation.
  • According to Andrew Charles Hendricks, an activist who originally acquired the documents, the emails included the home address of a demonstration organizer. Hendricks claims he redacted the address before publishing the documents online. The relationship between Bank of America and the WSP, as well as their long-term investment in surveillance, is highlighted by an email sent on September 23, 2013. Kim Triplett-Kolerich, an intelligence analyst for Bank of America requested that WSP share any intelligence gathered on activists taking part in the Million Mask March with the bank. She began the email by identifying herself as a former officer and provided her former rank. “From time to time I will see items that I believe will be of use to my friends at WSP—especially during session,” she told the officer. “May Day I will pick your brain for intel and I will give you a lot also,” she wrote.
  • The next week, Triplett-Kolerich emailed the same WSP sergeant again about the march. “Sorry for not getting back to you sooner—hectic weeks lately with foreclosures and this MMM,” Triplett-Kolerich wrote. She then notified the sergeant that Bank of America has been in contact with “the Fusion Center and JTTF” regarding the Anonymous march. JTTF refers to the Joint Terrorism Task Force, which is a group comprised of local law enforcement agencies, the Federal Bureau of Investigation (with whom it shares a website) and the Homeland Security department. The Fusion Center is a state-level counterterrorism agency, which coordinates “national intelligence” between various local law enforcement and public safety departments. In addition, the Fusion Center provides for “the effective communication of locally generated threat-related information to the federal government.”
  • ...2 more annotations...
  • Triplett-Kolerich concluded her email by boasting that the surveillance tactics used by Bank of America to monitor activists online was superior to that of the WSP. “I will most likely find it first as social media trolling is not what WSP does best. Bank of America has a team of 20 people and that’s all they do all day and then pass it to us around the country!!!” On October 24, an email was sent by a sergeant at the WSP’s Special Operations Division to an executive aide at the Thurston County Sheriff’s Office. The sergeant notified the office that a large number of arrests may take place during the Million Mask March, which could impact the jail. Attached to the letter was a message written by an Anonymous activist, and a link to its Facebook event page where the names of those planning to attend the march could be seen.
  • Unbeknownst to the crowd, the supervisor of a local transit company had dropped off an Olympia city bus nearby at the request of the WSP. According to recently published emails, it was parked on the west side of an administration building close to the demonstration, just in case they needed to move in and haul a large group of disorderly protesters off to jail—but they didn’t. The Daily Dot reached out to Triplett-Kolerich and three Bank of America media relations contacts requesting a comment for this article, but received no response. 
  •  
    More evidence of the cozy relationship between the banksters and the "anti-terrorism" folk in the U.S. Of particular interest BofA has a 20-person unit that spends their days trolling social media for intelligence.
Paul Merrell

Asia Times Online :: Middle East News, Iraq, Iran current affairs - 2 views

  • There is nothing tragic about the Obama presidency, capable of drawing the analytical talents of a neo-Plutarch or a neo-Gibbon. This is more like a Pirandello farce, a sort of Character in Search of An Author. Candidates to Author are well documented - from the Israel lobby to the House of Saud, from a select elite of the industrial-military-security complex to, most of all, the rarified banking/financial elite, the real Masters of the Universe. Poor Barack is just a cipher, a <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> functionary of empire, whose ''deciding'' repertoire barely extends to what trademark smile to flash at the requisite photo-ops. There's nothing ''tragic'' about the fact that during this week - marking the 12th anniversary of 9/11 - this presidency will be fighting for its bombing ''credibility'' trying to seduce Republican hawks in the US Congress while most of the warmongers du jour happen to be Democrats.
  • Republicans are torn between supporting the president they love to hate and delivering him a stinging rebuke - as much as they are aching to follow the orders of their masters, ranging from the American Israel Public Affairs Committee to military contractors. Once again, this is farce - caused by the fact that a man elected to finish off wars is eager to start yet another one. And once again without a United Nations vote. The White House ''strategy'' in this crucial negotiating week boils down to this; to convince the US Congress that the United States must start a war on Syria to punish an ''evil dictator'' - once again, as bad as Hitler - for gassing children. The evidence? It's ''indisputable''. Well, it's not ''irrefutable''. It's not even ''beyond-a-reasonable-doubt''. As Obama's Chief of Staff Denis McDonough admitted, with a straight face, it boils down to ''a quite strong common sense test, irrespective of the intelligence, that suggests that the regime carried this out''. So if this is really about ''common sense'', the president is obviously not being shown by his close coterie of sycophants this compendium of common sense, compiled by a group of top, extremely credible former US intelligence officials, which debunks all the ''evidence'' as flawed beyond belief. To evoke a farce from 12 years ago, this clearly seems to be a case of ''facts being fixed around the policy''.
  • The Arab street doesn't buy it because they clearly see through the hypocrisy; the desperate rush to ''punish'' the Bashar al-Assad government in Syria while justifying everything the apartheid state of Israel perpetrates in occupied Palestine. The Muslim world doesn't buy it because it clearly sees the demonization only applies to Muslims - from Arafat to bin Laden to Saddam to Gaddafi and now Assad. It would never apply to the military junta in Myanmar, which was clever enough to engineer an ''opening''; the next day Westerners were lining up to kiss the hem of Burmese longyis. It would never apply to the Islam Karimov dictatorship in Uzbekistan because ''we'' always need to seduce him as one of our bastards away from Russia and China. It eventually applies, on and off, to the Kim dynasty in North Korea, but with no consequences - because these are badass Asians who can actually respond to an US attack. Informed public opinion across the developing world does not buy it because they clearly see, examining the historical record, that Washington would never really be bothered with the sorry spectacle of Arabs killing Arabs, or Muslims killing Muslims, non-stop. The 1980-1988 Iran-Iraq war is a prime piece of evidence.
  • ...4 more annotations...
  • Then there's the ''credibility'' farce. The Obama administration has convoluted the whole world in its own self-spun net, insisting that the responsibility for the ''red line'' recklessly drawn by the president is in fact global. Yet the pesky ''world'' is not buying it.
  • At the Group of 20 summit last week, the BRICS group of emerging powers - Brazil, Russia, India, China and South Africa - as well as Indonesia and Argentina, clearly stressed that a war on Syria without UN Security Council approval would qualify Obama as a war criminal. Even among the European poodles ''support'' for the White House is extremely qualified. Germany's Angela Merkel and even France's attack dog Francois Hollande said the primacy is with the UN. The European Union as a whole wants a political solution. It's enlightening to remember that the EU in Brussels can issue arrest warrants for heads of EU governments guilty of war crimes. Someone in Paris must have warned attack dog Hollande that he would not welcome the prospect of slammer time. ''Evil'' as a political category is something worthy of the brain dead. The key question now revolves around the axis of warmongers - Washington, Israel and the House of Saud. Will the Israel lobby, the more discreet but no less powerful Saudi lobby, and the Return of the Living Dead neo-cons convince the US Congress to fight their war?
  • And then there's the curioser and curioser case of al-Qaeda - essentially the Arabic denomination for a CIA database of US-Pakistani-Saudi trained mujahideen during the 1980s: the oh so convenient transnational bogeyman that ''legitimized'' the Global War On Terror (GWOT) of the George W Bush years; the ''opening'' for al-Qaeda to move to Iraq; and now, no middle men; the CIA and the Obama administration fighting side-by-side with al-Qaeda in Syria. No wonder the denomination ''al-CIAeda'' has gone viral. With farce after farce after farce piling up in their own Tower of Babel, the much-vaunted ''US credibility'' is in itself the biggest farce of all. Politically, no one knows how the vacuum will be filled. It won't be via the UN. It won't be via the BRICS. It won't be via the G-20 - which is seriously divided; at least new multipolar players are carrying way more weight than US poodles. Much would be made to restore ''US credibility'' if the Obama administration had the balls to force both the House of Saud and Qatar (''300 people and a TV station'', in the epic definition of Saudi Arabia's Prince Bandar Sultan - aka Bandar Bush) to end once and for all their weaponizing of hardcore ''rebels'' and ultimately hardcore jihadis, and accept Iran in the negotiating table for a real Geneva II peace process in Syria. It won't happen because this bypasses farce. Once again; helpless Barack is just a paperboy. The plutocrats in charge are getting extremely nervous. The system is melting - and they need to act fast.
  • They need a Syria as docile as the Arab petro-monarchies. They want to hit Russia bad - and then discuss missile defense and Russian influence in Eastern Europe from a position of force. They want to hit Iran bad - and then continue to issue ultimatums from a position of force. They want to facilitate yet another Israeli attempt to capture southern Lebanon (it's the water, stupid). They want a monster gas pipeline from Qatar for European customers bypassing Iran and Syria as well as Gazprom. Most of all, this is all about control of natural resources and channels of distribution. These are real motives - and they have nothing to do with farce. Farce is only deployed to kill any possibility of real diplomacy and real political discussion. Farce is a theatrical mask - as in ''humanitarian'' imperialism - the ''acceptable'' version of the Dick Cheney-run years. It's as if Dick Cheney had never left the building; paperboy Barack is Dick Cheney with a ''human'' face. The only good outcome in this multi-sorrowful tale is that the real ''international community'', all around the world, has seen the naked Emperor in all its (farcical) glory.
  •  
    What can I say? The iconoclastic Pepe Escobar strikes again. 
  •  
    Outstanding article Paul. Wow! Watching the 911 link now. But here's one for you: Massimo Mazzucco's new 5-hour documentary "September 11- The New Pearl Harbor" summarizes 12 years of public debate on 9-11, looking at the events from all sides. Watch a trailer for the film here: http://goo.gl/M5c0dj Full five hours available here: http://www.luogocomune.net/site/modules/sections/index.php?op=viewarticle&artid=167 I listened to a two hour interview with Massimo last night. Awesome stuff.
  •  
    A 5-hour documentary will have to wait for tomorrow. I'm about 7 hours away from a deadline for the current development cycle's Help file. :-) I do think Pepe is a off on a couple of details in this article. The Neocons were mostly silent on this one and Rumsfeld came out against the intervention, saying that Obama hadn't made a valid case for war. That's most likely because the Neocons are joined at the hip with Israeli government and that government is a house divided this time around, with only factions supporting the military strike. The current thinking in Tel Aviv/Jerusalem is, in line with the Israeli right's long term strategy, that it's just fine with them to have Muslims running around killing each other in Syria. That long-term strategy is to destabilize Israel's Arab neighbor states while Israel builds its economic empire and military hegemony in the region. Israeli government isn't exactly thrilled by the prospect of Obama delivering fulfillment of the Saudi goal of transforming Syria from a secular state into a non-secular Islamic state run by Wahabi extremists. Such a state, armed to the teeth by the U.S. and/or the Saudi-Qatari zillionaires could be very bad news for Israel. Notably, the very strongest case thus far that the August 21 chemical attack was conducted by the opposition forces with the U.S. and Syria in on it to create a false flag attack, has been delivered in installments by Yossef Bodansky, an Israeli-American uber-scholar of Islamic "terrorism" and Soviet/Russian weaponry who is incapable of criticising Israel's decades-long terrorism inflicted on the Palestinian people and Israel's continuing unlawful occupation of Palestine plus parts of Jordan, Syria, and Lebanon. Bodanysky sits at the center of an intelligence web of intelligence professionals from nations worried about Islamic "terrorism." In other words, he's extremely pro-Israeli and to boot, very close to Mossad and Israel's IDF intelligence forces. Israel's AIPAC lobby d
Paul Merrell

Senate goes for 'nuclear option' - Burgess Everett and Seung Min Kim - POLITICO.com - 0 views

  • The Senate approved a historic rules change on Thursday by eliminating the use of the filibuster on all presidential nominees except those to the U.S. Supreme Court.Invoking the long-threatened “nuclear option” means that most of President Barack Obama’s judicial and executive branch nominees no longer need to clear a 60-vote threshold to reach the Senate floor and get an up-or-down vote.
  • Senate Majority Leader Harry Reid (D-Nev.) used the nuclear option Thursday morning, meaning he called for a vote to change the Senate rules by a simple majority vote. It passed, 52 to 48. Three Democrats voted against changing the rules — Sen. Carl Levin of Michigan, Joe Manchin of West Virginia and Mark Pryor of Arkansas. “It’s time to change the Senate before this institution becomes obsolete,” Reid said in a lengthy floor speech on Thursday morning. A furious Senate Minority Leader Mitch McConnell (R-Ky.), who tried to recess the Senate for the day before the rules change could get a vote, said after the minority’s power was limited by Democrats: “I don’t think this is a time to be talking about reprisal. I think it’s a time to be sad about what has been done to the United States Senate.”
  • The debate over the filibuster — and specifically its use on D.C. Circuit nominees — has been raging for nearly a decade, stretching back to when George W. Bush was president and Democrats were in the minority. But changing the Senate rules has always been avoided through a piecemeal deal, a gentleman’s agreement or a specific solution, not a historic change to the very fabric of the Senate.
  • ...2 more annotations...
  • But since Obama’s nomination, the “nuclear option” has reared its head three times in less than a year — each time getting closer to the edge. Many in the Senate privately expected that this go-round would be yet another example of saber rattling, but Reid said pressure was increasing within his own party to change the rules. The blockade of three consecutive nominees to a powerful appellate court was too much for Democrats to handle — and Reid felt compelled to pull the trigger, explaining that “this is the way it has to be.”
  • Senate Democrats were quick to use their newfound powers, voting in the early afternoon to end the filibuster on Patricia Millett’s nomination to the D.C. Circuit Court of Appeals. The vote was 55-43, with two senators voting present. Before the change earlier Thursday, Millett would have needed 60 votes to clear the procedural hurdle and move on to a confirmation vote. But now, she needed just 51 to advance.
  •  
    The Senate's filibuster rule, particularly since abandonment of the requirement that the filibustering Senator must keep talking so long as the filibuster continues, has seemed more and more an anachronism to me as I age. Its use to indefinitely block an up or down vote on a legislative measure -- in essence granting each Senator veto power over proposed measures seems fundamentally at odds with democratic principles to me. Certainly during my lifetime, the filibuster rule has been abused by both major parties, transforming a mere rule of procedure into an individual veto power nowhere set forth in the Constitution, in effect requiring a 60 per cent super-majority to pass a controversial measure. The Constitution is not silent on the subject of super-majorities in the Senate, specifying a super-majority to override a presidential veto and to remove a federal official from office by impeachment. Therefore, one might argue that the Founders knew how to write a super-majority requirement but did not see fit to require a supermajority to close debate and bring a measure to a vote. In other words, I favor abolishing the filibuster rule entirely and making "the nuclear option" standard procedure except where the Constitution establishes a super-majority requirement. To me it is not important that this limitation of the filibuster rule occurred when the Democrats had the majority in the Senate; whenever it were to happen, some party would be in the minority. And I do not believe that the People of this nation will be disadvantaged by up or down votes on Senate measures.  Now can we please get rid of the filibuster rule entirely?
Paul Merrell

Warrantless airport seizure of laptop "cannot be justified," judge rules | Ars Technica - 0 views

  • The US government's prosecution of a South Korean businessman accused of illegally selling technology used in aircraft and missiles to Iran was dealt a devastating blow by a federal judge. The judge ruled Friday that the authorities illegally seized the businessman's computer at Los Angeles International Airport as he was to board a flight home. The authorities who were investigating Jae Shik Kim exercised the border exception rule that allows the authorities to seize and search goods and people—without court warrants—along the border and at airport international terminals. US District Court judge Amy Berman Jackson of the District of Columbia noted that the Supreme Court has never directly addressed the issue of warrantless computer searches at an international border crossing, but she ruled (PDF) the government used Kim's flight home as an illegal pretext to seize his computer. Authorities then shipped it 150 miles south to San Diego where the hard drive was copied and examined for weeks, but the judge said the initial seizure "surely cannot be justified." After considering all of the facts and authorities set forth above, then, the Court finds, under the totality of the unique circumstances of this case, that the imaging and search of the entire contents of Kim’s laptop, aided by specialized forensic software, for a period of unlimited duration and an examination of unlimited scope, for the purpose of gathering evidence in a pre-existing investigation, was supported by so little suspicion of ongoing or imminent criminal activity, and was so invasive of Kim’s privacy and so disconnected from not only the considerations underlying the breadth of the government’s authority to search at the border, but also the border itself, that it was unreasonable.
  • "The government points to its plenary authority to conduct warrantless searches at the border. It posits that a laptop computer is simply a 'container' that was examined pursuant to this authority, and it submits that the government’s unfettered right to search cargo at the border to protect the homeland is the beginning and end of the matter," the judge wrote. Evidence discovered on his computer of his alleged involvement in the conspiracy that won an indictment is now suppressed, and it cannot be used against him according to the ruling. The authorities took the man's computer in 2012 for national security reasons but allowed him to board his flight home. The government did not comment on the decision. Judge Berman Jackson questioned whether the border search exception should apply to laptops because they carry much more private information than, say, a briefcase. Judge Jackson cited last year's Supreme Court case, known as Riley, in which the justices ruled unanimously that the authorities generally may not search the mobile phones of those they arrest unless they have a court warrant.
  • The Supreme Court said that "Modern cell phones, as a category, implicate privacy concerns far beyond those implicated by the search of a cigarette pack, a wallet, or a purse. A conclusion that inspecting the contents of an arrestee’s pockets works no substantial additional intrusion on privacy beyond the arrest itself may make sense as applied to physical items, but any extension of that reasoning to digital data has to rest on its own bottom." Seizing on that high court opinion, Judge Berman Jackson wrote: Applying the Riley framework, the national security concerns that underlie the enforcement of export control regulations at the border must be balanced against the degree to which Kim’s privacy was invaded in this instance. And as was set forth above, while the immediate national security concerns were somewhat attenuated, the invasion of privacy was substantial: the agents created an identical image of Kim’s entire computer hard drive and gave themselves unlimited time to search the tens of thousands of documents, images, and emails it contained, using an extensive list of search terms, and with the assistance of two forensic software programs that organized, expedited, and facilitated the task. Based upon the testimony of both Special Agent Hamako and Special Agent Marshall, the Court concludes that wherever the Supreme Court or the Court of Appeals eventually draws the precise boundary of a routine border search, or however either Court ultimately defines a forensic – as opposed to a conventional – computer search, this search was qualitatively and quantitatively different from a routine border examination, and therefore, it was unreasonable given the paucity of grounds to suspect that criminal activity was in progress.
  •  
    The court's decision indicates that the Feds can still do a border search of a laptop but that they cross the line when they seize the computer for later forensic examination without a warrant. In this case, the government conducted the forensic examination before obtaining a warrant.
Paul Merrell

PATRIOT Act spying programs on death watch - Seung Min Kim and Kate Tummarello - POLITICO - 0 views

  • With only days left to act and Rand Paul threatening a filibuster, Senate Republicans remain deeply divided over the future of the PATRIOT Act and have no clear path to keep key government spying authorities from expiring at the end of the month. Crucial parts of the PATRIOT Act, including a provision authorizing the government’s controversial bulk collection of American phone records, first revealed by Edward Snowden, are due to lapse May 31. That means Congress has barely a week to figure out a fix before before lawmakers leave town for Memorial Day recess at the end of the next week. Story Continued Below The prospects of a deal look grim: Senate Majority Leader Mitch McConnell on Thursday night proposed just a two-month extension of expiring PATRIOT Act provisions to give the two sides more time to negotiate, but even that was immediately dismissed by critics of the program.
  •  
    A must-read. The major danger is that the the Senate could pass the USA Freedom Act, which has already been passed by the House. Passage of that Act, despite its name, would be bad news for civil liberties.  Now is the time to let your Congress critters know that you want them to fight to the Patriot Act provisions expire on May 31, without any replacement legislation.  Keep in mind that Section 502 does not apply just to telephone metadata. It authorizes the FBI to gather without notice to their victims "any tangible thing", specifically including as examples "library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records containing information that would identify a person." The breadth of the section is illustrated by telephone metadata not even being mentioned in the section.  NSA going after your medical records souand far fetched? Former NSA technical director William Binney says they're already doing it: "Binney alludes to even more extreme intelligence practices that are not yet public knowledge, including the collection of Americans' medical data, the collection and use of client-attorney conversations, and law enforcement agencies' "direct access," without oversight, to NSA databases." https://consortiumnews.com/2015/03/05/seeing-the-stasi-through-nsa-eyes/ So please, contact your Congress critters right now and tell them to sunset the Patriot Act NOW. This will be decided in the next few days so the sooner you contact them the better. 
Paul Merrell

Prospects dim for 11th-hour PATRIOT Act deal - Burgess Everett and Seung Min Kim - POLI... - 0 views

  • The PATRIOT Act is going to need a miracle to survive the weekend unscathed. Backers of the post-9/11 anti-terror measure are scrambling this week to prevent the law’s key surveillance programs from lapsing at midnight Sunday. But with the Senate not slated to return to Washington until just hours before that deadline, opponents like Sens. Rand Paul (R-Ky.) and Ron Wyden (D-Ore.) showing no signs of budging, and the House so far unwilling to bail out the upper chamber, the prospects for an eleventh-hour breakthrough look slim.
  • “Our options are a lot more limited” given the time constraints, said Utah Sen. Mike Lee, the chief Republican backer of the bill in the Senate. “We can either let the provisions at issue expire, or we can pass the House-passed USA Freedom Act.” The problem is that doing anything ahead of the midnight deadline would take the cooperation of all 100 senators. That’s hardly a given since Paul is still insisting that McConnell allow votes on privacy-related amendments, and Wyden has vowed to block any clean extension of what he calls a “bad law.”
  • n an appearance in Kentucky on Tuesday, McConnell acknowledged the strong support for the USA Freedom Act “makes it pretty challenging to extend the law as it is.” In Washington, top Republican aides could not — or would not — explain how the Senate will escape the fix beyond the possibility that Senate leaders can somehow persuade Paul and Wyden to stop blocking a PATRIOT Act extension with the promise of a robust Senate debate to follow.
  • ...3 more annotations...
  • The 57-42 vote in the Senate on the USA Freedom Act has its backers tasting victory. Sen. Mark Kirk (R-Ill.) switched his vote on the floor to “no” but indicated afterward that he had been “inclined” to let the House bill proceed. Sen. Mike Enzi (R-Wyo.) missed the late-night votes but signaled in a statement released by his office that he would support changes to bulk collection. Backers have also eyed Republican Sens. Bill Cassidy of Louisiana and John Boozman (R-Ark.) as potential votes in favor. Aides to the two lawmakers didn’t return requests seeking comment on Tuesday. “Some of those members voted ‘no’ on Friday night,” Lee said. “I suspect that now that we’re in this posture, some of those might flip.”
  • The reform bill stalled, yet there appears to be a path to 60 if McConnell allows another vote and stops advocating against it. Sen. Steve Daines (R-Mont.), for one, said he expects another attempt Sunday to break a filibuster on the USA Freedom Act.
  • The more immediate question is what happens on Sunday. If the Senate passes anything other than the USA Freedom Act as it stands, the House would need to agree to go along — which might be impossible given that the chamber isn’t scheduled to return until Monday. Some privacy advocates have a backup plan for Congress: Don’t do anything at all. “If Congress can’t coalesce around far-reaching changes,” said Neema Singh Guliani, the legislative counsel for the American Civil Liberties Union, “they should allow the expiring provisions of the PATRIOT Act to sunset.”
Paul Merrell

Obama slaps Kim Jong Un with new sanctions - Tal Kopan - POLITICO - 0 views

  • President Barack Obama on Friday took the first declared U.S. action against North Korea in response to the crippling cyberattack on Sony Pictures Entertainment over Thanksgiving, ordering a fresh set of financial sanctions against the authoritarian regime. Senior administration officials told reporters it was the first time the U.S. has sanctioned a country as a direct result of a cyberattack on an American business, though in the past sanctions have been imposed for human rights abuses by cyber means. Story Continued Below The president signed an executive order Friday afternoon authorizing the action, and the Treasury Department immediately sanctioned a North Korean government agency, two trading companies and 10 individuals affiliated with them under the new powers.
  • The FBI announced it had concluded North Korea was behind the attack, which wiped out Sony’s servers and computer network for a week and dumped massive amounts of sensitive company data, emails and other intellectual property on the Internet, on Dec. 19. Obama reiterated the government’s determination of North Korea’s responsibility at a press conference that day before leaving for his Hawaiian trip, and pledged a “proportionate response.” Friday’s sanctions are the U.S. government’s first declared response since that day. In the interim, the cybersecurity community has expressed skepticism of North Korea’s culpability based on the indicators the FBI cited as evidence for its conclusion, but officials and the FBI have remained firm that there is no evidence suggesting any other entity is behind the attack. In Friday’s call an official said the FBI is “standing by our assessment” and has access to channels for intelligence that private security firms do not.
  •  
    Notably, the Obama Administration has to date supplied no evidence whatsoever that North Korea had any involvement in the Sony hack. 
Paul Merrell

China Steps In as World's New Bank - Bloomberg View - 0 views

  • Thanks to China, Christine Lagarde of the International Monetary Fund, Jim Yong Kim of the World Bank and Takehiko Nakao of the Asian Development Bank may no longer have much meaningful work to do. Beijing's move to bail out Russia, on top of its recent aid for Venezuela and Argentina, signals the death of the post-war Bretton Woods world. It’s also marks the beginning of the end for America's linchpin role in the global economy and Japan's influence in Asia. What is China's new Asian Infrastructure Investment Bank if not an ADB killer? If Japan, ADB's main benefactor, won't share the presidency with Asian peers, Beijing will just use its deep pockets to overpower it. Lagarde's and Kim’s shops also are looking at a future in which crisis-wracked governments call Beijing before Washington. 
  • China stepping up its role as lender of last resort upends an economic development game that's been decades in the making. The IMF, World Bank and ADB are bloated, change-adverse institutions.  When Ukraine received a $17 billion IMF-led bailout this year it was about shoring up a geopolitically important economy, not geopolitical blackmail. Chinese President Xi Jinping's government doesn't care about upgrading economies, the health of tax regimes or central bank reserves. It cares about loyalty. The quid pro quo: For our generous assistance we expect your full support on everything from Taiwan to territorial disputes to deadening the West’s pesky focus on human rights.
  • This may sound hyperbolic; Russia, Argentina and Venezuela are already at odds with the U.S. and its allies. But what about Europe? In 2011 and 2012, it looked to Beijing to save euro bond markets through massive purchases. Expect more of this dynamic in 2015 should fresh turmoil hit the euro zone, at which time Beijing will expect European leaders to pull their diplomatic punches. What happens if the Federal Reserve’s tapering slams economies from India to Indonesia and governments look to China for help? Why would Cambodia, Laos or Vietnam bother with the IMF’s conditions when China writes big checks with few strings attached? Beijing’s $24 billion currency swap program to help Russia is a sign of things to come. Russia, it's often said, is too nuclear to fail. As Moscow weathers the worst crisis since the 1998 default, it’s tempting to view China as a good global citizen. But Beijing is just enabling President Vladimir Putin, who’s now under zero pressure to diversify his economy away from oil. The same goes for China’s $2.3 billion currency swap with Argentina and its $4 billion loan to Venezuela. In the Chinese century, bad behavior has its rewards.
  •  
    Note that this article is in a Bloomberg publication. Is economic reality beginning to dent the MSM propaganda on Wall Street?
Paul Merrell

M of A - Sony Hack - NYT Editors Find New Iraq WMD - 0 views

  • A Japanese company with some offices in California was hacked. Several terrabytes of data were copied off its internal networks and some of it was put on file sharing sites. One of the items copied was a film produced in Canada that depicts as comedy the terror act of killing of a current head of state. The U.S. State Department applauded that movie scene. But there were tons of other data like social security numbers, payroll data, and internal emails stolen all of which that might have been the real target of the hackers. The tools to hack the company are well known and in the public domain. The company, Sony, had lousy internal network security and had been hacked before. The hackers probably had some inside knowledge. They used servers in Bolivia, China and South Korea to infiltrate. There is zero public evidence in the known that the hack was state sponsored.
  • But the U.S. is claiming that the event is a "national security matter". Who's national security? Japan's? Canada's? Why? A private Japanese entertainment(!) company left the doors open and had some equipment vandalized and some of its private property stolen. Why, again, is that of U.S. "national interest"? Why would the U.S. even consider some "proportional response"? The White House is anonymously accusing the state of North Korea of having done the hack. It provides no evidence to support that claim and the government of North Korea denied any involvement. The FBI and Sony say they have no evidence for such a claim. Still the New York Times editors eat it all up:
  • North Korean hackers, seeking revenge for the movie, stole millions of documents, including emails, health records and financial information that they dished out to the world. How do the editors know that these were "North Korean hackers"? The same way the knew about Iraq's weapons of mass destruction? Make believe and anonymous claims by U.S. government officials? Yeah - those folks never lie. Right?
  •  
    What bothers me most here is that there are no voices calling for Obama to refrain from a "proportional response" until there is a Congressional authorization for use of military force. Cyberwarfare is warfare, after all.
Paul Merrell

FBI Director: Sony's 'Sloppy' North Korean Hackers Revealed Their IP Addresses | WIRED - 0 views

  • The Obama administration has been tightlipped about its controversial naming of the North Korean government as the definitive source of the hack that eviscerated Sony Pictures Entertainment late last year. But FBI director James Comey is standing by the bureau’s conclusion, and has offered up a few tiny breadcrumbs of the evidence that led to it. Those crumbs include the claim that Sony hackers sometimes failed to use the proxy servers that masked the origin of their attack, revealing IP addresses that the FBI says were used exclusively by North Korea. Speaking at a Fordham Law School cybersecurity conference Wednesday, Comey said that he has “very high confidence” in the FBI’s attribution of the attack to North Korea. And he named several of the sources of his evidence, including a “behavioral analysis unit” of FBI experts trained to psychologically analyze foes based on their writings and actions. He also said that the FBI compared the Sony attack with their own “red team” simulations to determine how the attack could have occurred. And perhaps most importantly, Comey now says that the hackers in the attack failed on multiple occasions to use the proxy servers that bounce their Internet connection through an obfuscating computer somewhere else in the world, revealing IP addresses that tied them to North Koreans.
  • “In nearly every case, [the Sony hackers known as the Guardians of Peace] used proxy servers to disguise where they were coming from in sending these emails and posting these statements. But several times they got sloppy,” Comey said. “Several times, either because they forgot or because of a technical problem, they connected directly and we could see that the IPs they were using…were exclusively used by the North Koreans.” “They shut it off very quickly once they saw the mistake,” he added. “But not before we saw where it was coming from.” Comey’s brief and cryptic remarks—with no opportunity for followup questions from reporters—respond to skepticism and calls for more evidence from cybersecurity experts unsatisfied with the FBI’s vague statements tying the hack to North Korean government. In a previous public announcement the FBI had said only that it found “similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks,” as well as IP addresses that matched prior attacks it knows to have originated in North Korea. At that time, the FBI also said it had further evidence matching the tools used in the attack to a North Korean hacking attack that hit South Korean banks and media outlets.
  • Following those elliptical statements, the cybersecurity community demanded more information be released to prove North Korea’s involvement. Some have even signed a petition on the White House website calling for more transparency in the investigation. Well-known security blogger and author Bruce Schneier has compared the FBI’s “trust us” mentality to the claims of the Bush administration about Saddam Hussein’s nonexistent weapons of mass destruction in the run-up to the Iraq War. Without more information, security experts themselves have remained deeply divided in their conclusions about who hacked Sony.
  • ...1 more annotation...
  • That pseudo-explanation will likely do little to quell the security community’s doubts. Even if the hackers appeared to fail to use proxies on some occasions, it could still be very difficult to be sure those “real” IP addresses weren’t proxies themselves designed to serve as further misdirection. And a nagging loose thread remains that the Guardians of Peace hackers in their initial statements to Sony tried to extort money from the company before making any political demands. Sony’s Kim Jong-un assassination comedy “The Interview,” the suppression of which is believed by many to be the North Korean government’s motive in the hack, wasn’t even mentioned by the hackers until long after the intrusion was underway. Comey didn’t address that plot hole in the North Korean explanation in his speech.
Paul Merrell

Federal Bureau of Investigation - Cincinnati [...] (via noodls) / Former Columbus Polic... - 0 views

  • COLUMBUS, OH-Former Columbus Police Officer Steven Edward Dean, 49, of Columbus, was sentenced in U.S. District Court to 30 months in prison for misappropriating and selling heavy equipment and other property the Columbus Division of Police received through a Department of Defense surplus program. Carter M. Stewart, U.S. Attorney for the Southern District of Ohio; Kevin Cornelius, Special Agent in Charge, Federal Bureau of Investigation (FBI); Brian Reihms, Special Agent in Charge, Defense Criminal Investigative Service (DCIS); and Columbus Police Chief Kim Jacobs announced the sentence handed down today by U.S. District Judge Michael H. Watson. According to court documents, an investigation by the Columbus Division of Police, the FBI and DCIS concluded that between October 1, 2005 and June 1, 2012, Dean diverted property with a fair market value of $251,570.94 the police department had received from the Defense Reutilization Marketing Office (DRMO) program. The embezzled items included $133,554.59 of heavy equipment, construction equipment, and vehicles; restaurant equipment; $94,163.25 of materials sold for scrap; and $16,353.15 worth of items, including diesel generators, sold to private persons. This conclusion was based on records obtained from the U.S. Department of Defense DRMO program, the state of Ohio offices involved with the DRMO program, scrapyard receipts, Craigslist online point-of-sale website records, restaurant supply records of sold equipment, and by viewing the items of property themselves.
  • Federal Bureau of Investigation - Cincinnati Field Office 08/13/2014 | Press release Former Columbus Police Officer Sentenced for Embezzling from Defense Department Surplus Program
  • "This is a major theft and embezzlement case involving a uniformed police officer stealing from his own department and involving property which should have otherwise been used to assist law enforcement, and all the equipment and vehicles were originally purchased with taxpayer dollars," Assistant U.S. Attorneys Doug Squires and Deborah Solove told the court prior to sentencing. "Today's sentencing demonstrates the Defense Criminal Investigative Service's ongoing commitment to combating fraud and corruption that impacts the Department of Defense's vital programs and operations," said Brian Reihms, Special Agent in Charge, Defense Criminal Investigative Service (DCIS), "DCIS, with our partner agencies, will continue to work tirelessly to investigate fraud involving the DoD's DRMO Law Enforcement Support Office which transfers excess property to law enforcement organizations across the United States." Dean pleaded guilty in February to one count of embezzlement from a program receiving federal funds and one count of theft of public property. Under terms of the plea agreement, Dean will forfeit $251,570.94 less the value of the recovered equipment. Dean was also sentenced to three years of supervised released following inprisonment. U.S. Attorney Stewart commended the investigation by DCIS, the FBI, and CPD, as well as Assistant U.S. Attorneys Doug Squires and Deborah Solove, who prosecuted the case.
  •  
    Thanks for keeping us safe, Officer Dean. Related: http://www.dispositionservices.dla.mil/leso/Pages/default.aspx (DoD section1033 law enforcement donation program) and http://www.law.cornell.edu/uscode/text/10/2576a ("Notwithstanding any other provision of law and subject to subsection (b), the Secretary of Defense may transfer to Federal and State agencies personal property of the Department of Defense, including small arms and ammunition, that the Secretary determines is- (A) suitable for use by the agencies in law enforcement activities, including counter-drug and counter-terrorism activities; and (B) excess to the needs of the Department of Defense.") 
Paul Merrell

News Roundup and Notes: September 12, 2014 | Just Security - 0 views

  • Iraq and Syria The Pentagon has begun rolling out the expanded campaign against the Islamic State, although operations will increase gradually over a number of months [Wall Street Journal’s Julian E. Barnes]. Retired Marine general, John R. Allen, has been chosen to coordinate the international coalition against ISIS, according to a senior administration official [New York Times’ Michael R. Gordon]. In an interview with NPR (Eyder Peralta), Obama’s national security advisor Susan Rice emphasized that the operation against ISIS would not be “Iraq war redux” and that the U.S. is not going to deploy ground troops with a combat role.
  • Democratic senators are reportedly unnerved by President Obama’s attempt to gain swift authority from Congress to arm and train Syrian rebels [Politico’s Burgess Everett and Seung Min Kim]. House Republicans are said to be split on their views, with some, including Intelligence Chairman Mike Rogers speaking out in favor, whereas others showed more caution [The Hill’s Scott Wong et al]. The New York Times (Jonathan Weisman) reports that House Republican leaders will call members back to the Capitol early next week, in “a rare show of unity” with President Obama, to authorize the arming and training of rebels in Syria. Arab states remained reserved about the extent of their commitment to military efforts to combat the Islamic State yesterday, even as Secretary of State John Kerry succeeded in obtaining their support at a meeting in Saudi Arabia [Wall Street Journal’s Maria Abi-Habib and Jay Solomon].   Al Jazeera reports that French President Francois Hollande is travelling to Iraq in an act of visible support ahead of possible airstrikes with the U.S.-led coalition against the Islamic State.
  • The Syrian deputy foreign minister has said that Syria has “no reservations” about airstrikes in the territory, but said that “it is a must” for Obama to call Syrian President Assad [NBC News]. Anne Bernard [New York Times] writes that the prospect of U.S. strikes in Syria “captivated” the people on Thursday, with debate over whether the strikes would help or hinder President Assad. The New York Times (Ben Hubbard et al.) explores the complexities faced by the U.S. in using decentralized and diverse Syrian rebels to counter the Islamic State in Syria. Tom Perry and Alexander Dziadosz [Reuters] explore the impact that U.S. support for the Syrian opposition against the Islamic State will have on the Assad regime.
  • ...3 more annotations...
  • In Politico Magazine, Mary Ellen O’Connell argues that President Obama’s strategy against the Islamic State in Syria has no basis in international law, drawing comparison in legal terms between Obama and Russian President Vladimir Putin in Ukraine: “arming rebels and conducting airstrikes.” The New York Times editorial board discusses the legal basis for U.S. action against ISIS, accusing Congress of “outrageous” cowardice and allowing President Obama a “free reign to set a dangerous precedent that will last well past this particular military campaign.” The Washington Post editorial board calls President Obama’s strategy “incomplete,” suggesting that airstrikes alone are insufficient and that the U.S. must assist Iraq and Syria to develop so that “terrorist organizations do not emerge again as soon as Americans look away.” Dan Froomkin [The Intercept] discusses media coverage of Obama’s strategy, which indicates that news organizations have realized the plan is a “hot mess.”
  • In other developments, the new UN special envoy to Syria met with President Bashar al-Assad yesterday, pressing for more truces in the country and saying the UN’s first priority was to “facilitate reduction of the violence” [Wall Street Journal’s Sam Dagher]. The CIA has estimated that the number of fighters with the Islamic State in Iraq and Syria may have reached 31,000, a number three times their previous calculation [BBC]. The German interior ministry is working on banning the Islamic State terrorist group due to concerns over returning ISIS fighters and public expressions of sympathy with the group [Wall Street Journal’s Andrea Thomas and Harriet Torry]. The Australian government has raised the terror alert level to the second highest, as Prime Minister Tony Abbott warned that a terrorist attack on home soil was likely, though no specific plots were known of [Wall Street Journal’s Rob Taylor].
  • The head of Homeland Security has warned that while ISIS is the most apparent threat to the U.S. currently, officials must stay vigilant to other threats to the United States [Associated Press]. Dennis B. Ross [New York Times] cautions that “Islamists are not our friends,” noting that the “new fault line” in the Middle East is defined by Islamists who “subordinate national identities to an Islamic identity.” The New York Times (David E. Sanger) discusses how President Obama’s decision to take on the Islamic State in Iraq and Syria shifts his focus in the Middle East away from his previous objective of preventing Iran from obtaining nuclear weapons.
Paul Merrell

Jim Crow returns | Al Jazeera America - 0 views

  • Election officials in 27 states, most of them Republicans, have launched a program that threatens a massive purge of voters from the rolls. Millions, especially black, Hispanic and Asian-American voters, are at risk. Already, tens of thousands have been removed in at least one battleground state, and the numbers are expected to climb, according to a six-month-long, nationwide investigation by Al Jazeera America. At the heart of this voter-roll scrub is the Interstate Crosscheck program, which has generated a master list of nearly 7 million names. Officials say that these names represent legions of fraudsters who are not only registered but have actually voted in two or more states in the same election — a felony punishable by 2 to 10 years in prison. Until now, state elections officials have refused to turn over their Crosscheck lists, some on grounds that these voters are subject to criminal investigation. Now, for the first time, three states — Georgia, Virginia and Washington — have released their lists to Al Jazeera America, providing a total of just over 2 million names.
  • The Crosscheck list of suspected double voters has been compiled by matching names from roughly 110 million voter records from participating states. Interstate Crosscheck is the pet project of Kansas’ controversial Republican secretary of state, Kris Kobach, known for his crusade against voter fraud. The three states’ lists are heavily weighted with names such as Jackson, Garcia, Patel and Kim — ones common among minorities, who vote overwhelmingly Democratic. Indeed, fully 1 in 7 African-Americans in those 27 states, plus the state of Washington (which enrolled in Crosscheck but has decided not to utilize the results), are listed as under suspicion of having voted twice. This also applies to 1 in 8 Asian-Americans and 1 in 8 Hispanic voters. White voters too — 1 in 11 — are at risk of having their names scrubbed from the voter rolls, though not as vulnerable as minorities.If even a fraction of those names are blocked from voting or purged from voter rolls, it could alter the outcome of next week’s electoral battle for control of the U.S. Senate — and perhaps prove decisive in the 2016 presidential vote count.
  • Based on the Crosscheck lists, officials have begun the process of removing names from the rolls — beginning with 41,637 in Virginia alone. Yet the criteria used for matching these double voters are disturbingly inadequate.
  • ...8 more annotations...
  • In practice, all it takes to become a suspect is sharing a first and last name with a voter in another state. Typical “matches” identifying those who may have voted in both Georgia and Virginia include:Kevin Antonio Hayes of Durham, North Carolina, is a match for a man who voted in Alexandria, Virginia, as Kevin Thomas Hayes.John Paul Williams of Alexandria is supposedly the same man as John R. Williams of Atlanta, Georgia.Robert Dewey Cox of Marietta, Georgia is matched with Robert Glen Cox of Springfield, Virginia.
  • That was the sales pitch. But the actual lists show that not only are middle names commonly mismatched and suffix discrepancies ignored, even birthdates don’t seem to have been taken into account. Moreover, Crosscheck deliberately ignores Social Security mismatches, in the few instances when the numbers are even collected. The Crosscheck instructions for county election officers state, “Social Security numbers are included for verification; the numbers might or might not match.”
  • There are 6,951,484 names on the target list of the 28 states in the Crosscheck group; each of them represents a suspected double voter whose registration has now become subject to challenge and removal. According to a 2013 presentation by Kobach to the National Association of State Election Directors, the program is a highly sophisticated voter-fraud-detection system. The sample matches he showed his audience included the following criteria: first, last and middle name or initial; date of birth; suffixes; and Social Security number, or at least its last four digits.
  • Al Jazeera America visited these and several other potential double voters. John Paul Williams of Alexandria insists he has never used the alias “John R. Williams.” “I’ve never lived in Georgia,” he says.Jo Cox, wife of suspected double voter Robert Glen Cox of Virginia, says she has a solid alibi for him. Cox “is 85 years old and handicapped. He wasn’t in Georgia. Never voted there,” she says. He has also never used the middle name “Dewey.” Twenty-three percent of the names — nearly 1.6 million of them — lack matching middle names. “Jr.” and “Sr.” are ignored, potentially disenfranchising two generations in the same family. And, notably, of those who may have voted twice in the 2012 presidential election, 27 percent were listed as “inactive” voters, meaning that almost 1.9 million may not even have voted once in that race, according to Crosscheck’s own records.
  • Mark Swedlund is a specialist in list analytics whose clients have included eBay, AT&T and Nike. At Al Jazeera America’s request, he conducted a statistical review of Crosscheck’s three lists of suspected double voters. According to Swedlund, “It appears that Crosscheck does have inherent bias to over-selecting for potential scrutiny and purging voters from Asian, Hispanic and Black ethnic groups. In fact, the matching methodology, which presumes people in other states with the same name are matches, will always over-select from groups of people with common surnames.” Swedlund sums up the method for finding two-state voters — simply matching first and last name — as “ludicrous, just crazy.”
  • elen Butler is the executive director of Georgia’s Coalition for the Peoples’ Agenda, which conducts voter drives in minority communities. Any purge list that relies on name matches will contain a built-in racial bias against African-Americans, she says, because “We [African-Americans] took our slave owners’ names.” The search website PeopleSmart notes that 86,020 people in the United States have the name John Jackson. And according to the 2000 U.S. Census, which is the most recent data set, 53 percent of Jacksons are African-American.
  • In North Carolina, state officials have hired former FBI agent Charles W. “Chuck” Stuber, who played a major role in the campaign finance fraud case brought against former North Carolina Sen. John Edwards, to, in the words of their press release, “investigate cases of possible voter fraud identified by an interstate cross-check comparing election records from 28 states.”
  • But despite knowing the names and addresses of 192,207 supposed double voters in the state, Stuber has not nabbed a single one in his five months on the job. Josh Lawson, a spokesman for the board of elections, says, “This agency has made no determination as to which portion of these [lists] represent data error or voter fraud.” In fact, to date, Lawson admits that Stuber has found only errors and not one verified fraudulent voter.
1 - 20 of 23 Next ›
Showing 20 items per page