Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Libertarians

Rss Feed Group items tagged

Gary Edwards

Google News - 0 views

  •  
    WOW!!! Incredible presentation concerning the history of Freedom vs. Tyranny. WOW!! If ever there's a MUST Watch, this is it. Very impressive and sweeping comparison of how authoritarian collectivist seize power in a free society and establish their tyrannies. My notes are listed below: How to recognize potential tyrants and keep them from seizing power. The urge to save humanity is always used to justify those who want to rule humanity. - ML Menken Daniel Webster on the Constitution Obstacles to Tyranny : Limited powers of government .... Due Process .... Presumption of Innocence .... Freedom to Dissent .... Armed Populace: The right to be Armed! Due Process .... 5th Amendment .... Emergency powers. there is no authorization in the US Constitution to suspend Due Process or any aspect of the Bill of Rights .... Asset Seizure Laws for criminal activities (alleged - without warrant or court order) .... Eminent Domain: seizure of private property for government uses: 2005 Kelo vs New London seizure based on jobs (economy) and tax revenue possibilities. .... 6th Amendment - right to trial by jury : plea bargaining admonition based on facing the awesome power of the government to prosecute no matter what - intimidation and threat of personal destruction. .... Forced confessions through plea bargaining. .... Indefinite detention without trial or charges: President has power to kill or issue orders without warrant, charges or trial .... Presumption of Innocence: Probable Cause .... Random stops at Border check points. 5th Amendment protections violated .... Sobriety Check Points: 4th and 5th Amendments violated - no presumption of innocence .... Random detention and questioning: airport security pat downs, housing projects, bus transportation .... The Right to Privacy: financial transactions and the IRS audit (without warrant or accusation) .... Warrant-less Spying .... Agents writing their own search warrants .... Snatch and Peek Freedom to Disse
Paul Merrell

Data-sharing among US law agencies amounts to 'organised chaos' - report | World news |... - 0 views

  • The sharing of crucial intelligence about counter-terrorism between the FBI, the Department of Homeland Security and local police departments takes place through a patchwork process that amounts to “organized chaos”, according to a new report. The report, released Tuesday by the Brennan Center for Justice, a public-policy institute at New York University law school that has a track record of being skeptical of government surveillance, found inconsistent rules, inadequate oversight, apparent wastefulness and insufficient regard for civil liberties nationwide. “This poorly organized system not only wastes time and resources; it also risks masking reliable intelligence that could be crucial to an investigation,” the report says, warning that a “din of data” is overwhelming law enforcement.
  • The Brennan Center report examined 16 major police departments across the US, along with 19 affiliated “fusion centers” – controversial data-sharing pools between federal, state and local agencies – and 14 of the FBI’s joint terrorism task force partnerships with police.
  • Despite efforts by the Department of Homeland Security, most of the fusion centers operate with “minimal oversight, or no oversight whatsoever”, the report found. Out of 19 centers reviewed, only five require independent audits of retained data.
  • ...3 more annotations...
  • Fusion centers have been the subject of criticism from both civil libertarians and powerful elected officials. A 2012 investigation by the bipartisan Senate permanent subcommittee on investigations of more than 80,000 fusion center documents could not find any contribution the centers had made to “disrupt[ing] an active terrorist plot”. DHS disputes the results of that investigation, as do several legislators on committees overseeing the department. Senator Tom Coburn, an Oklahoman who serves as the top Republican on the Senate government reform and homeland security committee, has emerged as a leading legislative critic of fusion centers and joint terrorism task forces, for many of the same reasons detailed in the Brennan Center report. After a government inquiry indicated many federal data-sharing efforts were duplicative, Coburn issued a statement in April calling them “a vital component of national security”, but adding, “that is not an excuse to waste taxpayer funds”.
  • And all that information is on top of the fruits of the NSA’s vast data collection efforts, which are not entirely off limits to federal law enforcement. The controversial bulk collection of Americans’ phone data has been repeatedly described by the NSA as a tool to aid the FBI in detecting domestic terrorism activity. NSA deputy director John C Inglis recently stated that the FBI cannot search directly through the NSA’s data troves, but the agency shares telephone metadata with the bureau following searches through its databases based on “reasonable articulable suspicion” of connections to specific terrorist organizations.
  • The Brennan Center report did not specifically analyze law enforcement tower dumps, but Price called the reports of them alarming. “This is another indication of the vast trove of information that state and local police are collecting about law abiding Americans,” Price said. “To date, that information does not appear to be particularly useful in preventing terror attacks.”
  •  
    The ongoing federalization of state and local law enforcement continues unabated. Today's "fusion centers" have antecedents in the regional "intelligence centers" begun under the guise of Reagan's War on Drugs™, but shifted into a much higher gear under the guise of Bush II's War on Terror™.
Paul Merrell

Voters Say "Yes" to the Republican Who Said "No" to Wall Street | The Nation - 0 views

  • House Speaker John Boehner and his cronies removed North Carolina Congressman Walter Jones from the House Financial Services Committee in late 2012, as part of a purge that removed Republicans who were not all in for Wall Street -- and for Boehner's brand of "service" to the industries that are supposed to be regulated by Congress -- from the one panel with the power to hold bankers and brokers to account. But Jones, who had opposed bank bailouts and favored Wall Street regulation, did not go quietly. He spoke up about the purge and made little secret of his sense that -- though he had split with Boehner on a number of issues -- his biggest "sin" in the eyes of the party leadership was his refusal to bow to the demands of big campaign donors. “This whole place is all about money. Money is more important than policy,” complained Jones, who has in recent years co-sponsored most major pieces of campaign-finance reform legislation in the House -- including a call for a constitutional amendment designed to restore the ability of federal, state and local officials to regulate campaign spending.
  • The congressman's bluntness did not go over well with the masters of the universe on Wall Street. So, this spring, they set out to purge Walter Jones from Congress altogether. They found a consummate DC insider with close ties to the financial-services industry, Taylor Griffin, and filled the challenger's campaign treasury with PAC checks from J.P. Morgan, Wells Fargo and Bank of America, as well as political powerbrokers like former Republican National Committee chairman Haley Barbour and Wayne Berman of the Blackstone Group. It did not stop there. Jones' independence extended far beyond debates over Wall Street bailouts and regulation. The Republican is a social and economic conservative -- make that a social and economic very conservative -- but he has repeatedly broken with the party establishment on issues of war and peace, privacy rights, trade policy and budgets. He even voted against proposals by the darling of Wall Street and the party establishment, Congressman Paul Ryan
  • Bush administration aides and apologists rushed in with public statements and "independent" expenditures to attack Jones for his opposition to wars in Iraq and Afghanistan, and for his refusal to go along with moves that might lead to wars with Iran and other countries. Former Bush White House spokesman Ari Fleischer gave his enthusiastic backing to Griffin, as did former national security adviser Juan Zarate. Sarah Palin, one of the party's most consistent militarists, came in big for Griffin, who hailed her as an "old friend." A neo-conservative group, the Emergency Committee For Israel, spent at least $250,000 on ads that claimed Jones "preaches American decline." What Jones actually said was that, “Lyndon Johnson’s probably rotting in hell right now because of the Vietnam War, and he probably needs to move over for Dick Cheney.” At the same time, the wealthy champions of Ryan's crony-capitalist approach to budgeting were in with big money for TV ads and direct mail from the "Ending Spending Action Fund" -- a super PAC backed by billionaire businessman Joe Ricketts. By a lot of DC measures, Jones should have been doomed.
  • ...1 more annotation...
  • But the ten-term congressman bet that the voters of eastern North Carolina would stick with him. “I’m not going to sacrifice my integrity for anyone or any party,” he said. “It’s the price you pay. I didn’t come (to Washington) to be a puppet for anyone. And I think the public back in my district, which is the most important, has seen I’m willing to do what I think is right.” It was the right bet. On Tuesday, Republican primary voters in eastern North Carolina decided to purge the Wall Street donors and the special interests. The reelected Walter Jones by a solid 51-45 margin.
Paul Merrell

Even the Former Director of the NSA Hates the FBI's New Surveillance Push - The Daily B... - 0 views

  • The head of the FBI has spent the last several months in something of a panic, warning anyone who will listen that terrorists are “going dark”—using encrypted communications to hide from the FBI—and insisting that the bureau needs some kind of electronic back door to get access to those chats.It’s an argument that civil libertarians and technology industry executives have largely rejected. And now, members of the national security establishment—veterans of both the Obama and Bush administrations—are beginning to speak out publicly against FBI Director Jim Comey’s call to give the government a skeleton key to your private talks.
  • The encryption issue was also one of several small, but telling, ways in which Comey seemed out of sync with some of his fellow members of the national security establishment here at the Aspen Security Forum.
  • This isn’t the first intra-government fight over encryption, Chertoff noted. The last time an administration insisted on a technological back door—in the 1990s—Congress shot down the idea. And despite cries of “going dark” back then, the government found all kinds of new ways to spy. “We collected more than ever. We found ways to deal with that issue,” Chertoff told the forum.
Paul Merrell

With court approval, NSA resumes bulk collection of phone data - The Washington Post - 0 views

  • The National Security Agency on Tuesday restarted its bulk collection of Americans’ phone records for a temporary period, following a federal court ruling this week that gave it the green light, U.S. officials said. The Foreign Intelligence Surveillance Court on Monday ruled that the NSA could resume gathering millions of Americans’ phone metadata — call times, dates and durations — to scan for links to foreign terrorists. [Here’s the court’s opinion] But the resumption is good for only 180 days — or until Nov. 29, in compliance with the USA Freedom Act. That law, which President Obama signed June 2 after a contentious congressional debate, will end the government’s bulk collection of metadata. It provided, however, for a transition period to allow the NSA time to set up an alternative system in which the data is stored by the phone companies.
  • After the law took effect, the government immediately applied to the surveillance court to restart its collection. Because Congress passed the bill a day after the underlying statute authorizing the NSA program had expired, there was a question as to whether lawmakers had authorized the government’s temporary harvesting of phone records. “In passing the USA Freedom Act, Congress clearly intended to end bulk data collection of business records and other tangible things,” Judge Michael W. Mosman wrote in his opinion. “But what it took away with one hand, it gave back — for a limited time — with the other. . . . It chose to allow a 180-day transitional period during which such [bulk] collection could continue.”
  • Sen. Ron Wyden (D-Ore.) said he saw no reason to resume collection, even on a temporary basis. “This illegal dragnet surveillance violated Americans’ rights for 14 years without making our country any safer,” he said. Mosman also ruled that FreedomWorks, a grass-roots libertarian organization, and its attorney, Ken Cuccinelli II, could submit “friend of the court” briefs that argue against the lawfulness of the metadata program. In May, a federal appeals court in New York held that the program was unlawful. The U.S. Court of Appeals for the 2nd Circuit ruled that the program stretched the meaning of the statute — Section 215 of the USA Patriot Act — to enable data collection in “staggering” volumes in the chance that “at some future point” there might be a need to search for terrorist links.
Paul Merrell

Justice Dept. to Require Warrants for Some Cellphone Tracking - The New York Times - 0 views

  • The Justice Department will regularly require federal agents to seek warrants before using secretive equipment that can locate and track cellphones, the agency announced Thursday, the first regulations on an increasingly controversial technology.The new policy, which also limits what information may be collected and how long it can be stored, puts a measure of judicial oversight on a technology that was designed to hunt terrorists overseas but has become a popular tool among federal agents and local police officers for fighting crime.Civil libertarians have expressed grave privacy concerns about the technology’s proliferation, but the new Justice Department policies do not apply to local police forces.
  • The device, commonly called a cell-site simulator or StingRay, tricks cellphones into connecting with it by acting like a cell tower, allowing the authorities to determine the location of a tracked phone. In doing so, however, the equipment also connects with all other phones in the area, allowing investigators to collect information on people not suspected of any crime.The device is also capable of capturing calls, text messages, emails and other data. Until Thursday’s regulations, the rules for the use of that information and the duration it could be kept had not been detailed and varied across the department’s offices and agencies.
  •  
    A policy is not a law. DoJ is trying to spread some tanglefoot for civil liberties organizations that are prepping litigation over unfettered abuse of Stingray devices by federal, state, and local officials. Warrantless use of Stingrays has been severely undermined by recent Supreme Court rulings, notably U.S. v. Jones and Riley v. California.
Gary Edwards

Obama's assault on capitalism is killing the Dow: Moving to a European-Style Social Wel... - 0 views

  • Increasing the top tax rates on earnings to 39.6% and on capital gains and dividends to 20% will reduce incentives for our most productive citizens and small businesses to work, save and invest -- with effective rates higher still because of restrictions on itemized deductions and raising the Social Security cap. As every economics student learns, high marginal rates distort economic decisions, the damage from which rises with the square of the rates (doubling the rates quadruples the harm).
  • New and expanded refundable tax credits would raise the fraction of taxpayers paying no income taxes to almost 50% from 38%. This is potentially the most pernicious feature of the president's budget, because it would cement a permanent voting majority with no stake in controlling the cost of general government.
    • Gary Edwards
       
      Maybe this change in the tax base will make it impossible in the future to assemble another Reagan coalition? Libertarians, patriotic repubicans, and patriotic blue collar democrats?
  • Unfortunately, our history suggests new government programs, however noble the intent, more often wind up delivering less, more slowly, at far higher cost than projected, with potentially damaging unintended consequences. The most recent case, of course, was the government's meddling in the housing market to bring home ownership to low-income families, which became a prime cause of the current economic and financial disaster.
  •  
    President Obama is returning to Jimmy Carter's higher taxes and Mr. Clinton's draconian defense drawdown. Mr. Obama's $3.6 trillion budget blueprint, by his own admission, redefines the role of government in our economy and society. The budget more than doubles the national debt held by the public, adding more to the debt than all previous presidents -- from George Washington to George W. Bush -- combined. It reduces defense spending to a level not sustained since the dangerous days before World War II, while increasing nondefense spending (relative to GDP) to the highest level in U.S. history. And it would raise taxes to historically high levels (again, relative to GDP). And all of this before addressing the impending explosion in Social Security and Medicare costs.
Gary Edwards

Ron Paul Dropping a Reality Bomb on the GOP Field - By Kevin D. Williamson - The Corner... - 0 views

  • Paul isn't going to cut the military. He's going to cut the Militarism. That's why Paul gets more political contributions from active duty military personnel than all the other candidates COMBINED.
  • here is the actual plan. Looks pretty good: External Link 
  •  
    $1 Trillion in Spending Cuts!  Ron Paul has announced his financial and budgetary plan.  The details have yet to be released, but the summary came out today an dimmediately got the full support of ruxh Limbaugh! summary:  He'll propose immediately freezing spending by numerous government agencies at 2006 levels, the last time Republicans had complete control of the federal budget, and drastically reducing spending elsewhere. The EPA would see a 30 percent cut, the Food and Drug Administration would see one of 40 percent and foreign aid would be zeroed out immediately. He'd also take an ax to Pentagon funding for wars. Medicaid, the children's health insurance program, food stamps, family support programs and the children's nutrition program would all be block-granted to the states and removed from the mandatory spending column of the federal budget. Some functions of eliminated departments, such as Pell Grants, would be continued elsewhere in the federal bureaucracy. And in a noticeable nod to seniors during an election year when Social Security's become an issue within the Republican primary, the campaign says that plan "honors our promise to our seniors and veterans, while allowing young workers to opt out." The federal workforce would be reduced by 10 percent, and the president's pay would be cut to $39,336 - a level that the Paul document notes is "approximately equal to the median personal income of the American worker."
Gary Edwards

Ron Paul Proposes Fiscal Reform Plan With Full Support of Rush Limbaugh - Daily Rush Li... - 0 views

  •  
    Audio of one very incredible moment.  On the Monday Oct 17th, 2011 show, Rush Limbaugh declared his full support of the Ron Paul Fiscal Plan that includes $1 Trillion in budgetary spending cuts, bringing home the troops, and the full neutering of the EPA.
Paul Merrell

After almost 13 years, it's time to end Congress' blanket authorization of force | Wash... - 0 views

  • t may sound hard to believe, but Senate Majority Leader Harry Reid, D-Nev., isn't always wrong -- at least when he states the obvious: “9/11 is a long time ago,” he said Wednesday, “and it's something that needs to be looked at again.” The “it” is the post-9/11 Authorization for Use of Military Force resolution, or AUMF, adopted three days after the terror attacks, and now going on its lucky 13th year. It's been in effect nearly twice as long as the Gulf of Tonkin resolution authorizing Vietnam, what was “America's Longest War” -- until the 21st century, that is.
  • On Sept. 14, 2001, Congress authorized the president to use “all necessary and appropriate force” against the perpetrators of the 9/11 attacks and those who “harbored” them. Two successive administrations have since turned the 60 words of the AUMF's operative clause into what journalist Gregory Johnsen calls “the most dangerous sentence in U.S. history” -- a writ for a war without temporal or spatial limits. The last time the Senate held hearings on the AUMF, Sen. Lindsey Graham, R-S.C., asked the Pentagon's civilian special operations chief, Michael Sheehan, “does [the president] have the authority to put boots on the ground in the Congo?” Answer: “Yes, sir, he does.” Predictably, the hawkish Graham was totally okay with that. “The battlefield is wherever the enemy chooses to make it,” right? Right, said Sheehan: “from Boston to the [Federally Administered Tribal Areas of Pakistan]."
  • Asked how much longer the war on terrorism will last, Sheehan replied, “at least 10 to 20 years.” So presumably the AUMF can serve as the basis for Chelsea Clinton's “kill list” in 2033, after she trounces George P. Bush. Lyndon Johnson once compared the Gulf of Tonkin resolution to “Grandma’s nightshirt” because “it covers everything.” Even LBJ might have marveled at how the last two administrations have stretched the post-9/11 AUMF. Under the theory that “the United States is a battlefield in the war on terror,” the Bush administration invoked it to justify warrantless wiretapping and military detention of American citizens on American soil. The Obama administration cites it as legal authority for the extrajudicial killing of Americans via remote-control.
  • ...2 more annotations...
  • The Senate Foreign Relations Committee will be taking another look at the AUMF this week. The hearing's title, “Authorization For Use Of Military Force After Iraq And Afghanistan,” hints at a preordained conclusion: that an updated authorization is needed. Ranking Republican Sen. Bob Corker of Tennessee wants to be sure the executive branch has “all the tools and capabilities” it needs to address “threats that did not exist in 2001.” Rep. Barbara Lee, D-Calif., the sole member of Congress to vote “no” on the original AUMF, has a better idea: end it, don't mend it. Joined by libertarian-leaning, antiwar Republicans like Reps. Justin Amash and Walter Jones, she's introduced legislation to repeal the AUMF. Two imperial presidents in a row have treated that authorization like a permanent delegation of congressional war power to the president. Their successors would no doubt do the same with any new “tools and capabilities” they’re given.
  • Without the AUMF, presidents still retain the constitutional power to “repel sudden attacks,” as James Madison put it. And if they think groups like al-Shabaab or Boko Haram demand a more sustained military response, they'll be free to make that case to Congress. But delegating new authorities in advance might permanently change our constitutional default setting from peace to war. Madison also said that “No nation could preserve its freedom in the midst of continual warfare.” We're now into our second decade running that experiment; how much longer do we want to risk proving him right?
  •  
    I looked at Barbara Lee's bill. It requires a report from the Executive on all actions currently undertaken pursuant to the AUMF and requires that each action identified be terminated 60 days after the report unless Congress reauthorizes the action. It also repeals the AUMF. It's a good approach, but should require a sunset provision for each re-authorization so the Executive is blocked from maintaining us in a perpetual state of war as it has done with the AUMF itself. We're a long way from 9/11 and we are now fighting multiple wars in multiple nations against organizations that had nothing to do with 9/112, ostensibly to retaliate against those responsible for 9/11. No more open ended authorizations for war. 
Gary Edwards

Civil Unrest Ahead - LewRockwell.com - 0 views

  • The Victimized Inner Cities
  • This social disruption has motivated the enthusiastic growth and militarization of our local police departments. The law and order crowd thrives on excessive laws and regulations that no US citizen can escape. The out-of-control war on drugs is the worst part, and it generates the greatest danger in poverty-ridden areas via out-of-control police. It is estimated that these conditions have generated up to 80,000 SWAT raids per year in the United States. Most are in poor neighborhoods and involve black homes and businesses being hit disproportionately. This involves a high percentage of no-knock attacks. As can be expected many totally innocent people are killed in the process. Property damage is routine and compensation is rare. The routine use of civil forfeiture of property has become an abomination, totally out of control, which significantly contributes to the chaos. It should not be a surprise to see resentment building up against the police under these conditions. The violent reaction against local merchants in retaliation for police actions further aggravates the situation —hardly a recipe for a safe neighborhood.
  • Civil liberties are ignored by the police, and the private property of innocent bystanders is disregarded by those resenting police violence.
  • ...50 more annotations...
  • The entitlement mentality is a source of much anger and misunderstanding. It leads people who see themselves as victims to one conclusion: they are entitled to be taken care of.
  • If one trillion dollars per year doesn’t do the job, then make it $2 trillion. If the war on poverty’s $16 trillion hasn’t worked, make it $32 trillion.
  • The wealthy special interests, such as banks, the military-industrial complex, the medical industry, the drug industry, and many other corporatists, quickly gain control of the system.
  • Honest profits of successful entrepreneurs are quite different than profits of the corporate elite who gain control of the government and, as a consequence, accumulate obscene wealth by “robbing” the middle class.
  • Crumbs may be thrown to the poor, but the principle of wealth transfer is hijacked and used for corporate and foreign welfare instead of wealth transfers to the poor.
  • To blame and destroy those who make an honest living by satisfying consumers without the use of special benefits from the government is destructive to liberty and wealth.
  • True satisfaction comes from productive effort and self-reliance and not from a government transferring wealth in an effort to bring about an egalitarian society.
  • The people have too little confidence that most problems can be solved in a voluntary manner in a society that cherishes civil liberties. There’s never an admission that government problem-solving doesn’t work. Government-created problems are a road to poverty and resentment. Too many people believe that “free stuff” from the government can solve our problems. They mistakenly believe that deficits don’t matter and that wealth can come from a printing press.
  • The high profile episodes of police violence and overreaction are a consequence of conditions that in many ways were generated by government policy.
  • equal justice requires the end of welfare redistribution
  • Redistribution is a process that is always destined to help a small minority, whether in an economy like ours that endorses central economic planning or in one run by radical fascists or communists.
  • Retraining the police won’t touch the complex problems that pit the police against the victims of complex social conditions generated by hate, violence and bad economic policies.
  • Under an authoritarian regime, those in power take care of themselves. This always leads to poverty and discrepancy in wealth distribution.
  • Eventually the social strife that is predictable leads to an overthrow of the government.
  • The strife that we are witnessing is a reflection of a growing number of people who are recognizing the discrepancy between rich and poor, the weak and the powerful, Wall Street and Main Street.
  • Both political parties are financed by Wall Street, the big banks, and the military-industrial complex. Getting rich by being part of the government class is the problem.
  • Indeed the rich are getting richer and the poor poorer. The extreme current inequality is not a consequence of free markets and true liberty. Rather it results from the welfare state that, as always, morphs into a system that provides excesses for the powerful few.
  • The economic interventionist system under which we live today rewards those who benefit from government economic planning by the Federal Reserve, access to government contracts, and targeted special regulations to help one group over the other
  • We must limit the government’s role to protecting equal justice in defense of life, liberty, and property.
  • Police brutality and militarization may well induce a violent event far beyond what we have seen in Ferguson. It also can serve as an excuse. But it is not the root cause of turmoil. The real cause is poverty, the entitlement mentality, and the breakdown of the rule of law. Moral decay and the national police state are the real culprits.
  • There are two problems. First is conceding the principle that government has the moral authority to redistribute wealth. Second is believing the redistribution will be managed wisely and without corruption.
  • We have too many police, too many laws, and too much exemption of government officials from the crimes they commit.
  • There has to be an understanding that productive effort and self-reliance on the part of everyone is required for a free society to thrive.
  • Welfare, for the rich or poor, cannot exist without the sacrifice of the principal of property ownership.
  • The loss of our liberty has sharply accelerated since the 9/11 attacks. We have done to ourselves what no foreign enemy could have possibly accomplished.
  • The national police are made up of over 100,000 bureaucrats and police officials who carry guns to enforce federal law on the American citizens.
  • Today every American is a suspect. Our president has established a policy that an American citizen can be assassinated without even being charged with a crime.
  • The Founders and our Constitution intended that policing powers would be the responsibility of the individual states. That was forgotten a long time ago
  • the Feds are there taking charge over all local officials and property owners,
  • The Founders did not even want a standing army. They wanted only a militia.
  • Old-fashioned colonialism was deemed necessary by various European powers to secure natural resources along with control over sea lanes and markets for selling manufactured goods.
  • European-style colonialism — supporting a mercantilistic economy — came to be seen as politically unrealistic and unnecessary.
  • We are now subject to an out-of-control domestic police force while the US military maintains our Empire overseas.
  • When free-trade principles were utilized, colonialism did not die; it only changed form. Mercantilism in various forms and degrees drove trade policies of nations with strong economies and militaries.
  • The United States military presence around the world provides a “private” police force to protect US and other international companies against any local resistance or leaders that turn unfriendly. Our military presence overseas has nothing to do with protecting our freedoms and defending our Constitution.
  • The international monetary system is a powerful tool for the select few.
  • In fact, the real heroes are the ones who expose the truth and refuse to fight foreign wars for the international corporations.
  • The “one percenters,” generally speaking, are internationalists who are not champions of individual liberty and free trade. They are supporters of managed trade and international institutions like the WTO where the interests of the one percent can influence the rulings that frequently have little to do with advancing advertised goals of low tariffs and free trade.
  • Disengaging our troops from around the world and refusing to defend American neocolonialism is pursuing a course compatible with the qualities that Americans claim to stand for.
  • The obsession with continuing all the same policies has increased our poverty, increased violence between the classes, and lowered the standard of living for all except the elite one percent. And worst of all, the sacrifice of liberty was for naught.
  • Losing both liberty and the right to truly own property undermines the ability to create wealth.
  • Tax revenues will continue to rise, aiding the policy of the government spending the people’s money rather than those who earned it.
  • When this process gets out-of-control the economy goes into a death spiral, in the beginning of which we currently find ourselves. Without a correction to the basic understanding of the proper role of government, the downward spiral will continue.
  • Wall Street will be protected, and the trillions of dollars of big banks derivatives will be absorbed by the Fed, the FDIC, and ultimately by the American taxpayers in the next financial crisis.
  • Authoritarianism has overtaken our economic system as the welfare mentality takes over at every level of government.
  • There’s no doubt the poor will get poorer and the rich richer until the spirit of revolution in the people calls a halt to the systematic destruction of freedom in America.
  • Once the initiation of force by government is accepted by the people, even minimally, it escalates and involves every aspect of society. The only question that remains is just who gets to wield the power to distribute the largess to their friends and chosen beneficiaries.
  • It’s a recipe for steady growth of the government at the expense of liberties, even if official documents and laws written to limit government power are in place.
  • Restraining the few who thrive on the use of force to rule over us is the challenge. Fortunately they are outnumbered by those who would choose liberty yet lack the will to challenge the humanitarian monsters who gain support from naive and apathetic citizens.
  • The sentiments supporting secession, jury nullification, nullification of federal laws by state legislatures, and a drive for more independence from larger governments will continue.
  •  
    "If Americans were honest with themselves they would acknowledge that the Republic is no more. We now live in a police state. If we do not recognize and resist this development, freedom and prosperity for all Americans will continue to deteriorate. All liberties in America today are under siege. It didn't happen overnight. It took many years of neglect for our liberties to be given away so casually for a promise of security from the politicians. The tragic part is that the more security was promised - physical and economic - the less liberty was protected. With cradle-to-grave welfare protecting all citizens from any mistakes and a perpetual global war on terrorism, which a majority of Americans were convinced was absolutely necessary for our survival, our security and prosperity has been sacrificed. It was all based on lies and ignorance. Many came to believe that their best interests were served by giving up a little freedom now and then to gain a better life. The trap was set. At the beginning of a cycle that systematically undermines liberty with delusions of easy prosperity, the change may actually seem to be beneficial to a few. But to me that's like excusing embezzlement as a road to leisure and wealth - eventually payment and punishment always come due. One cannot escape the fact that a society's wealth cannot be sustained or increased without work and productive effort. Yes, some criminal elements can benefit for a while, but reality always sets in. Reality is now setting in for America and for that matter for most of the world. The piper will get his due even if "the children" have to suffer. The deception of promising "success" has lasted for quite a while. It was accomplished by ever-increasing taxes, deficits, borrowing, and printing press money. In the meantime the policing powers of the federal government were systematically and significantly expanded. No one cared much, as there seemed to be enough "gravy" for the rich, th
Gary Edwards

Seize First, Question Later: The Institute for Justice's New Report on the IRS' Abusive... - 0 views

  •  
    "Federal civil forfeiture laws give the Internal Revenue Service the power to clean out bank accounts without charging their owners with any crime. Making matters worse, the IRS considers a series of cash deposits or withdrawals below $10,000 enough evidence of "structuring" to take the money, without any other evidence of wrongdoing. Structuring-depositing or withdrawing smaller amounts to evade a federal law that requires banks to report transactions larger than $10,000 to the federal government-is illegal, but more importantly, structured funds are also subject to civil forfeiture. Civil forfeiture is the government's power to take property suspected of involvement in a crime. Unlike criminal forfeiture, no one needs to be convicted of-or even a charged with-a crime for the government to take the property. Lax civil forfeiture standards enable the IRS to "seize first and ask questions later," taking money without serious investigation and forcing owners into a long and difficult legal battle to try to stop the forfeiture. Any money forfeited is then used to fund further law enforcement efforts, giving agencies like the IRS an incentive to seize. Data provided by the IRS indicate that its civil forfeiture activities for suspected structuring are large and growing…"
Paul Merrell

Senate committee adopts cybersecurity bill opposed by NSA critics | World news | thegua... - 0 views

  • The Senate intelligence committee voted Tuesday to adopt a major cybersecurity bill that critics fear will give the National Security Agency even wider access to American data than it already has.Observers said the bill, approved by a 12 to 3 vote in a meeting closed to the public, would face a difficult time passing the full Senate, considering both the shortened legislative calendar in an election year and the controversy surrounding surveillance.But the bill is a priority of current and former NSA directors, who warn that private companies’ vulnerability to digital sabotage and economic data exfiltration will get worse without it.Pushed by Dianne Feinstein and Saxby Chambliss, the California Democrat and Georgia Republican who lead the committee, the bill would remove legal obstacles that block firms from sharing information "in real time" about cyber-attacks and prevention or mitigation measures with one another and with the US government.
  • Worrying civil libertarians is that the NSA and its twin military command, US Cyber Command, would receive access to vast amounts of data, and privacy guidelines for the handling of that data are yet to be developed.A draft of the bill released in mid-June would permit government agencies to share, retain and use the information for "a cybersecurity purpose" – defined as "the purpose of protecting an information system or information that is stored on, processed by or transiting an information system from a cybersecurity threat or security vulnerability" – raising the prospect of the NSA stockpiling a catalogue of weaknesses in digital security, as a recent White House data-assurance policy permits.It would also prevent participating companies from being sued for sharing data with each other and the government, even though many companies offer contract terms of service prohibiting the sharing of client or customer information without explicit consent.
  • But digital rights advocates warn that the measure will give the government, including the NSA, access to more information than just that relating to cyberthreats, potentially creating a new avenue for broad governmental access to US data even as Congress and the Obama administration contemplate restricting the NSA's domestic collection.The bill contains "catch-all provisions that would allow for the inclusion of a lot more than malicious code. It could include the content of communications. That's one of the biggest concerns," said Gabriel Rottman, an attorney with the American Civil Liberties Union.Provisions in the bill are intended to protect American privacy on the front end by having participating companies strike "indicators … known to be personal information of or identifying a United States person" before the government sees it, but the draft version leaves specific guidelines for privacy protection up to the attorney general."Nobody knows whether the flow from the private sector will be a trickle or a river or an ocean. The bill contemplates an ocean, and that's what worries us," said Greg Nojeim of the Center for Democracy and Technology.
Gary Edwards

Great Privacy Essay: Fourth Amendment Doctrine in the Era of Total Surveillance | CIO - 0 views

  •  
    "'Failing Expectations: Fourth Amendment Doctrine in the Era of Total Surveillance' is a thought-provoking essay written by a Fordham University law professor about how the reasonable expectation test for privacy is failing to protect us. Add into our networked world the third-party doctrine and we have little protection against unreasonable searches and seizures."
  •  
    It doesn't detract substantially from the essay's central thesis, but an important part of the learned professor's heartfelt desires were delivered in a Supreme Court decision just decided, after the essay was published, Reilly v. California, http://www.supremecourt.gov/opinions/13pdf/13-132_8l9c.pdf The Court held in relevant part: "We also reject the United States' final suggestion that officers should always be able to search a phone's call log, as they did in Wurie's case. The Government relies on Smithv. Maryland, 442 U. S. 735 (1979), which held that no warrant was required to use a pen register at telephone company premises to identify numbers dialed by a particular caller. The Court in that case, however, concluded that the use of a pen register was not a "search" at all under the Fourth Amendment. See id., at 745-746. There is no dispute here that the officers engaged in a search of Wurie's cell phone. Moreover, call logs typically contain more than just phone numbers; they include any identifying information that an individual might add, such as the label "my house" in Wurie's case." The effect there was to confine Smith v. Maryland, the foundation of the third-party doctrine, to its particular facts. In other words, the third-party doctrine is now confined to connected telephone numbers, the connect time, and the duration of the call. If any other metadata is gathered, such as location data, the third-party doctrine no longer applies. When you read the rest of the Reilly decision, you see a unanimous Supreme Court shooting down one government defense after another that have been used in the NSA's defense to mass telecommunications surveillance. But most interestingly, the Court unmistakably has laid the groundwork for a later decision drastically cutting back on digital surveillance without a search warrant based on particularized probable cause to believe that evidence of a specific crime has occurred and that the requested sear
Paul Merrell

A coming crackdown on Federal Reserve power? - Jennifer Liberto - POLITICO - 0 views

  • A move to shift power away from the New York Federal Reserve Bank is finding some powerful friends in Congress amid lingering worries that a key part of the central bank is too cozy with Wall Street. Two Republicans running the banking committees have both said they plan to explore proposals from the outspoken, former Dallas Federal Reserve Bank President Richard Fisher that would roll back a long-standing provision that gives the president of the New York Federal Reserve Bank an automatic position as vice chairman of a powerful committee and weaken New York’s oversight of Wall Street banks. Story Continued Below The politics may be ripe for chipping away at the power of the Federal Reserve, uniting liberals who want to crack down on Wall Street, Republicans who don’t like the Fed’s easy money policies and libertarians who are suspicious of the Fed altogether.
  • Fisher, who retired Thursday after 10 years at the Dallas Fed, wants to yank the New York Fed’s permanent position as vice chair of the all-powerful Federal Open Market Committee, the panel charged with making monetary policy decisions, which met Wednesday. While the New York Fed president could still participate in monetary policy discussions, he or she would no longer always get a vote. Fisher suggested the job should rotate among the regional Federal Reserve Banks every two years.
  • The move would upend the current structure, as the New York Fed has had a lock on that spot since 1936, thanks largely to its role as the infrastructure, which supplies the trading desk that carries out the Fed’s monetary policy decisions. Fisher is also proposing that other regional Fed banks oversee some of the Wall Street giants in a move aimed at addressing criticism the New York Fed missed warning signs of the financial crisis, is too soft on Wall Street and holds too much power and influence at the Fed. “The greatest concern appears to be the problem of regulatory capture by the largest and most powerful institutions,” Fisher said in a February speech in New York laying out his plan. Wall Street critics have been suspicious of the New York Fed since it and its then leader, Timothy Geithner, played a key role in responding to the 2008 financial crisis and the bailouts that entailed.
  • ...1 more annotation...
  • Late last year its current president, William Dudley, was hauled before the Senate Banking Committee after reports from ProPublica and NPR’s This American Life that focused on a New York Fed examiner who said her warnings about certain business practices and deals at Goldman Sachs were ignored or brushed aside by her superiors. She provided recordings of her dealings with Fed officials to back up her case. “We’ve got on tape higher-ups at the New York Fed calling off the regulators,” Warren told Dudley at the November hearing. “And I’m just asking the same kind of question — is there a cultural problem at the New York Fed? I think the evidence suggests that there is.”
Paul Merrell

How Edward Snowden Changed Everything | The Nation - 0 views

  • Ben Wizner, who is perhaps best known as Edward Snowden’s lawyer, directs the American Civil Liberties Union’s Speech, Privacy & Technology Project. Wizner, who joined the ACLU in August 2001, one month before the 9/11 attacks, has been a force in the legal battles against torture, watch lists, and extraordinary rendition since the beginning of the global “war on terror.” Ad Policy On October 15, we met with Wizner in an upstate New York pub to discuss the state of privacy advocacy today. In sometimes sardonic tones, he talked about the transition from litigating on issues of torture to privacy advocacy, differences between corporate and state-sponsored surveillance, recent developments in state legislatures and the federal government, and some of the obstacles impeding civil liberties litigation. The interview has been edited and abridged for publication.
  • en Wizner, who is perhaps best known as Edward Snowden’s lawyer, directs the American Civil Liberties Union’s Speech, Privacy & Technology Project. Wizner, who joined the ACLU in August 2001, one month before the 9/11 attacks, has been a force in the legal battles against torture, watch lists, and extraordinary rendition since the beginning of the global “war on terror.” Ad Policy On October 15, we met with Wizner in an upstate New York pub to discuss the state of privacy advocacy today. In sometimes sardonic tones, he talked about the transition from litigating on issues of torture to privacy advocacy, differences between corporate and state-sponsored surveillance, recent developments in state legislatures and the federal government, and some of the obstacles impeding civil liberties litigation. The interview has been edited and abridged for publication.
  • Many of the technologies, both military technologies and surveillance technologies, that are developed for purposes of policing the empire find their way back home and get repurposed. You saw this in Ferguson, where we had military equipment in the streets to police nonviolent civil unrest, and we’re seeing this with surveillance technologies, where things that are deployed for use in war zones are now commonly in the arsenals of local police departments. For example, a cellphone surveillance tool that we call the StingRay—which mimics a cellphone tower and communicates with all the phones around—was really developed as a military technology to help identify targets. Now, because it’s so inexpensive, and because there is a surplus of these things that are being developed, it ends up getting pushed down into local communities without local democratic consent or control.
  • ...4 more annotations...
  • SG & TP: How do you see the current state of the right to privacy? BW: I joked when I took this job that I was relieved that I was going to be working on the Fourth Amendment, because finally I’d have a chance to win. That was intended as gallows humor; the Fourth Amendment had been a dishrag for the last several decades, largely because of the war on drugs. The joke in civil liberties circles was, “What amendment?” But I was able to make this joke because I was coming to Fourth Amendment litigation from something even worse, which was trying to sue the CIA for torture, or targeted killings, or various things where the invariable outcome was some kind of non-justiciability ruling. We weren’t even reaching the merits at all. It turns out that my gallows humor joke was prescient.
  • The truth is that over the last few years, we’ve seen some of the most important Fourth Amendment decisions from the Supreme Court in perhaps half a century. Certainly, I think the Jones decision in 2012 [U.S. v. Jones], which held that GPS tracking was a Fourth Amendment search, was the most important Fourth Amendment decision since Katz in 1967 [Katz v. United States], in terms of starting a revolution in Fourth Amendment jurisprudence signifying that changes in technology were not just differences in degree, but they were differences in kind, and require the Court to grapple with it in a different way. Just two years later, you saw the Court holding that police can’t search your phone incident to an arrest without getting a warrant [Riley v. California]. Since 2012, at the level of Supreme Court jurisprudence, we’re seeing a recognition that technology has required a rethinking of the Fourth Amendment at the state and local level. We’re seeing a wave of privacy legislation that’s really passing beneath the radar for people who are not paying close attention. It’s not just happening in liberal states like California; it’s happening in red states like Montana, Utah, and Wyoming. And purple states like Colorado and Maine. You see as many libertarians and conservatives pushing these new rules as you see liberals. It really has cut across at least party lines, if not ideologies. My overall point here is that with respect to constraints on government surveillance—I should be more specific—law-enforcement government surveillance—momentum has been on our side in a way that has surprised even me.
  • Do you think that increased privacy protections will happen on the state level before they happen on the federal level? BW: I think so. For example, look at what occurred with the death penalty and the Supreme Court’s recent Eighth Amendment jurisprudence. The question under the Eighth Amendment is, “Is the practice cruel and unusual?” The Court has looked at what it calls “evolving standards of decency” [Trop v. Dulles, 1958]. It matters to the Court, when it’s deciding whether a juvenile can be executed or if a juvenile can get life without parole, what’s going on in the states. It was important to the litigants in those cases to be able to show that even if most states allowed the bad practice, the momentum was in the other direction. The states that were legislating on this most recently were liberalizing their rules, were making it harder to execute people under 18 or to lock them up without the possibility of parole. I think you’re going to see the same thing with Fourth Amendment and privacy jurisprudence, even though the Court doesn’t have a specific doctrine like “evolving standards of decency.” The Court uses this much-maligned test, “Do individuals have a reasonable expectation of privacy?” We’ll advance the argument, I think successfully, that part of what the Court should look at in considering whether an expectation of privacy is reasonable is showing what’s going on in the states. If we can show that a dozen or eighteen state legislatures have enacted a constitutional protection that doesn’t exist in federal constitutional law, I think that that will influence the Supreme Court.
  • The question is will it also influence Congress. I think there the answer is also “yes.” If you’re a member of the House or the Senate from Montana, and you see that your state legislature and your Republican governor have enacted privacy legislation, you’re not going to be worried about voting in that direction. I think this is one of those places where, unlike civil rights, where you saw most of the action at the federal level and then getting forced down to the states, we’re going to see more action at the state level getting funneled up to the federal government.
  •  
    A must-read. Ben Wizner discusses the current climate in the courts in government surveillance cases and how Edward Snowden's disclosures have affected that, and much more. Wizner is not only Edward Snowden's lawyer, he is also the coordinator of all ACLU litigation on electronic surveillance matters.
Paul Merrell

Fresno Police Roll Out Dystopian 'Threat Ranking' System - 0 views

  • “On 57 monitors that cover the walls of the center, operators zoomed and panned an array of roughly 200 police cameras perched across the city. They could dial up 800 more feeds from the city’s schools and traffic cameras, and they soon hope to add 400 more streams from cameras worn on officers’ bodies and from thousands from local businesses that have surveillance systems.” Though the intricate surveillance apparatus described above seems straight from a dystopic novel, it is actually the Washington Post’s recent description of the the visual data collection system employed by a local California police department. The police department in Fresno, California, has taken extreme measures to combat high rates of crime in the city. As the Post reports, Fresno’s Real Time Crime Center, buried deep in the police station’s headquarters, has developed as a response to what many police call increasing threats. The system, according to police officials, can “provide critical information that can help uncover terrorists or thwart mass shootings, ensure the safety of officers and the public, find suspects, and crack open cases” — a feature they say is increasingly important in the wake of events like the November terror attack in Paris and the San Bernardino shooting last month.
  • “Our officers are expected to know the unknown and see the unseen,” Fresno Chief of Police Jerry Dyer said. “They are making split-second decisions based on limited facts. The more you can provide in terms of intelligence and video, the more safely you can respond to calls.” Programs similar to the Real Time Crime Center have launched in New York, Houston, and Seattle over the course of the last decade. Nationwide, the use of Stingrays, data fusion centers, and aerial drone surveillance have broadened the access local police have to private information. In another example, the FBI is continually developing a comprehensive biometric database that local police access every day. “This is something that’s been building since September 11,” says Jennifer Lynch, a senior attorney at the Electronic Frontier Foundation. Like the problem of police militarization, Lynch traces the trend back to the Pentagon: “First funding went to the military to develop this technology, and now it has come back to domestic law enforcement. It’s the perfect storm of cheaper and easier-to-use technologies and money from state and federal governments to purchase it.”
  • While many of these programs may fail to shock Americans, one new software program takes police scrutiny of private citizens to a new level. Beware, a software tool produced by tech firm Intrado, not only surveils the data of the citizens of Fresno, the first city to test it — it calculates threat levels based on what it discovers. The software scours arrest records, property records, Deep Web searches, commercial databases, and social media postings. By this method, it was able to designate a man with a firearm and gang convictions involved in a real-time domestic violence dispute as the highest of three threat levels: a bright red ranking. Fresno police say the intelligence from Beware aided them, as the man eventually surrendered and officers found he was armed with a gun. Beware scours billions of data points to develop rankings for citizens, and though few recoil at the thought of catching criminals and miscreants, the program provides particular cause for concern because of both its invasiveness and its fallibility.
  • ...3 more annotations...
  • These shortcomings have sparked concern among Fresno’s city council members, who discussed the issue at a meeting in November. At that meeting, one council member cited an incident where a girl who posted on social media about a card game called “Rage” was consequently given an elevated threat ranking — all because “rage” could be a triggering keyword for Beware. At that same meeting, libertarian-leaning Republican councilman Clinton J. Olivier asked Chief Dyer to use the technology to calculate his threat level. In real-time, Olivier was given a green, or non-threatening ranking, but his home received a yellow, or medium, threat ranking. It was likely due to the record of his home’s prior occupant. “Even though it’s not me that’s the yellow guy, your officers are going to treat whoever comes out of that house in his boxer shorts as the yellow guy,” Olivier told Dyer. “That may not be fair to me.” He added later, “[Beware] has failed right here with a council member as the example.” “It’s a very unrefined, gross technique,” Fresno civil rights attorney, Rob Nabarro, has said of Beware’s color-coded levels. “A police call is something that can be very dangerous for a citizen,” he noted, echoing Olivier’s worries.
  • Further, though Fresno police use Beware, they are left in the dark about how it determines rankings. Intrado designates the method a “trade secret,” and as such, will not share it with the officers who use it. This element of the software’s implementation has concerned civil rights advocates like Nabarro. He believes the secrecy surrounding the technology may result in unfair, unchecked threat rankings. Nabarro cautioned that between the software’s secrecy and room for error, Beware could accidentally rank a citizen as dangerous based on, for example, posts on social media criticizing police. This potential carries with it the ability for citizens to be punished not for actual crimes, but for exercising basic constitutional rights. Further, it compromises the rights of individuals who have been previously convicted of crimes, potentially using past behavior to assume guilt in unrelated future incidents. Chief Dyer insists concerns are exaggerated and that a particular score does not guarantee a particular police response. Police maintain the tools are necessary to fight crime. Nevertheless, following the heated November meeting, Dyer suggested he would work to turn off the color-coded threat ranking due to citizens’ concerns. “It’s a balancing act,” he admitted.
  • It remains to be seen if Fresno police and residents will move forward with the technology or shut it down over privacy concerns. City officials in Oakland, California, for example, recently scaled back plans to establish a Real Time Crime Center after outraged citizens protested. At the very least, as Northern California ACLU attorney Matt Cagle said, “[W]henever these surveillance technologies are on the table, there needs to be a meaningful debate. There needs to be safeguards and oversight.”
  •  
    Claiming trade secrecy for the software's selection criteria for threat ranking actually constitutes policy policy, the trade secrecy claim would probably not survive judical review. It's at least arguably an unconstitutional delegation of a government function (ranking citizens as threats) to a private company. Police departments in Florida were sued to produce records of how a related surveillance device, the Stingray IMSI device that intercepts cell phone calls by mimicking a cell-phone tower, and only averted court-ordered disclosure of its trade secret workings by the FBI swooping in just before decision to remove all the software documentation from local police possession, custody, and control.    There is a long chain of case law holding that information that is legitimately trade secret and proprietary loses that protection if adopted by local or federal government as law. With a software program that classifies citizens as threats for governmental purposes if they meet the program's selection criteria, the software is performing a strictly governmental function that is in reality law. 
Paul Merrell

Obama Administration Fights To Withhold Over 2,000 Photos Of Alleged U.S. Torture and A... - 0 views

  • President Obama once pledged that his government would be the most transparent in history — a claim that is often mocked by civil libertarians and other critics who accuse him of almost Nixonian secrecy policies and inclinations. That troubling record is playing out again before U.S District Court Judge Alvin K. Hellerstein of the United States District Court for the Southern District of New York. The Administration continues to fight to withhold over 2,000 images of torture and abuse of detainees in Iraq and Afghanistan simply because it would make the United States look bad. Ironically, there is a transparent element to this case. Few Administration have been so transparently obvious in their use of classification rule to simply bar the disclosure of information that would be embarrassing to officials or the government. Usually, the Justice Department attempts to spin a tale of some other national security rationale for non-disclosure. Here, however, there is nothing even plausible to come up with. The Obama Administration simply wants to deep six the photos because people would be really angry if they saw what the government did, including photos that are believed to be far worse than those Abu Ghraib
Paul Merrell

A Snapshot of a Multipolar World in Action « LobeLog - 0 views

  • In the strangest election year in recent American history — one in which the Libertarian Party’s Gary Johnson couldn’t even conjure up the name of a foreign leader he “admired” while Donald Trump remained intent on building his “fat, beautiful wall” and “taking” Iraq oil — the world may be out of focus for many Americans right now.  So a little introduction to the planet we actually inhabit is in order.  Welcome to a multipolar world.  One fact stands out: Earth is no longer the property of the globe’s “sole superpower.” If you want proof, you can start by checking out Moscow’s recent role in reshaping the civil war in Syria and frustrating Washington’s agenda to overthrow President Bashar al-Assad.  And that’s just one of a number of developments that highlight America’s diminishing power globally in both the military and the diplomatic arenas.  On a peaceable note, consider the way China has successfully launched the Asian Infrastructure Investment Bank as a rival to the World Bank, not to speak of its implementation of a plan to link numerous countries in Asia and Europe to China in a vast multinational transportation and pipeline network it grandly calls the One Belt and One Road system, or the New Silk Road project.  In such developments, one can see ways in which the previously overwhelming economic power of the U.S. is gradually being challenged and curtailed internationally.
  •  
    Yes. We have an empire in decline. Isn't it about time that our politicians address that reality rather than exchanging barbs about "making America great again" or "America is still great?" The western economic system needs a rework to accommodate the reality that western economies will not continually expand and will instead contract. We need to address the reality that there are no longer enough living wage jobs; is it time to recognize that we don't need for everyone to work and flip to an economic model where the rich subsidize the poor instead of vice versa? And it's past time to recognize that the Cold War is over, downsize the military drastically, and refocus our military on defense rather than projection of power. We have enough nukes to melt down the entire planet; why do we need a large military force to defend the Homeland? No conventional force would dare invade while we still have the nukes. Defense could probably be handled with two ground divisions, one for the continental U.S. and the other dispersed among Hawaii, Alaska, and U.S. territories. Get rid of the aircraft carrier groups; they've been obsoleted by Russia's advanced hypersonic carrier killer missiles, which it has shared with China and looks to be soon sharing with India. Maybe it's time for a new Diigo group, "The Empire in Decline?"
Paul Merrell

ICE has struck a deal to track license plates across the US - The Verge - 0 views

  • The Immigration and Customs Enforcement (ICE) agency has officially gained agency-wide access to a nationwide license plate recognition database, according to a contract finalized earlier this month. The system gives the agency access to billions of license plate records and new powers of real-time location tracking, raising significant concerns from civil libertarians. The source of the data is not named in the contract, but an ICE representative said the data came from Vigilant Solutions, the leading network for license plate recognition data. “Like most other law enforcement agencies, ICE uses information obtained from license plate readers as one tool in support of its investigations,” spokesperson Dani Bennett said in a statement. “ICE is not seeking to build a license plate reader database, and will not collect nor contribute any data to a national public or private database through this contract.”
  • While it collects few photos itself, Vigilant Solutions has amassed a database of more than 2 billion license plate photos by ingesting data from partners like vehicle repossession agencies and other private groups. Vigilant also partners with local law enforcement agencies, often collecting even more data from camera-equipped police cars. The result is a massive vehicle-tracking network generating as many as 100 million sightings per month, each tagged with a date, time, and GPS coordinates of the sighting.
  • ICE agents would be able to query that database in two ways. A historical search would turn up every place a given license plate has been spotted in the last five years, a detailed record of the target’s movements. That data could be used to find a given subject’s residence or even identify associates if a given car is regularly spotted in a specific parking lot. “Knowing the previous locations of a vehicle can help determine the whereabouts of subjects of criminal investigations or priority aliens to facilitate their interdiction and removal,” an official privacy assessment explains. “In some cases, when other leads have gone cold, the availability of commercial LPR data may be the only viable way to find a subject.” ICE agents can also receive instantaneous email alerts whenever a new record of a particular plate is found — a system known internally as a “hot list.” (The same alerts can also be funneled to the Vigilant’s iOS app.) According to the privacy assessment, as many as 2,500 license plates could be uploaded to the hot list in a single batch, although the assessment does not detail how often new batches can be added. With sightings flooding in from police dashcams and stationary readers on bridges and toll booths, it would be hard for anyone on the list to stay unnoticed for long. Those powers are particularly troubling given ICE’s recent move to expand deportations beyond criminal offenders, fueling concerns of politically motivated enforcement. In California, state officials have braced for rumored deportation sweeps targeted at sanctuary cities. In New York, community leaders say they’ve been specifically targeted for deportation as a result of their activism. With automated license plate recognition, that targeting would only grow more powerful. For civil liberties groups, the implications go far beyond immigration.
  • ...1 more annotation...
  • The new license plate reader contract comes after years of internal lobbying by the agency. ICE first tested Vigilant’s system in 2012, gauging how effective it was at locating undocumented immigrants. Two years later, the agency issued an open solicitation for the technology, sparking an outcry from civil liberties group. Homeland Security secretary Jeh Johnson canceled the solicitation shortly afterward, citing privacy concerns, although two field offices subsequently formed rogue contracts with Vigilant in apparent violation of Johnson’s policy. In 2015, Homeland Security issued another call for bids, although an ICE representative said no contract resulted from that solicitation. As a result, this new contract is the first agency-wide contract ICE has completed with the company, a fact that is reflected in accompanying documents. On December 27th, 2017, Homeland Security issued an updated privacy assessment of license plate reader technology, a move it explained was necessary because “ICE has now entered into a contract with a vendor.” The new system places some limits on ICE surveillance, but not enough to quiet privacy concerns. Unlike many agencies, ICE won’t upload new data to Vigilant’s system but simply scan through the data that’s already there. In practical terms, that means driving past a Vigilant-linked camera might flag a car to ICE, but driving past an ICE camera won’t flag a car to everyone else using the system. License plates on the hot list will also expire after one year, and the system retains extensive audit logs to help supervisors trace back any abuse of the system. Still, the biggest concern for critics is the sheer scale of Vigilant’s network, assembled almost entirely outside of public accountability. “If ICE were to propose a system that would do what Vigilant does, there would be a huge privacy uproar and I don’t think Congress would approve it,” Stanley says. “But because it’s a private contract, they can sidestep that process.”
« First ‹ Previous 121 - 140 of 141 Next ›
Showing 20 items per page