Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged May

Rss Feed Group items tagged

1More

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
1More

The Biggest Price-Fixing Scandal Ever - and the VESTS Solution - 0 views

  •  
    excerpt: Uber financial investigative journalist Matt Taibbi has discovered what we too realized when we began to scrutinize the financial industry. In his latest article, he writes, "Everything Is Rigged: The Biggest Price-Fixing Scandal Ever." The article's cut line is, "The Illuminati were amateurs. The second huge financial scandal of the year reveals the real international conspiracy: There's no price the big banks can't fix." Taibbi's incredulity is evident throughout the article, as well it should be. The interest-rate swap market is part of the larger derivatives market that totals over one billion TRILLION dollars............................... "Given the endless financial scandals that keep sweeping across the industry, it is fairly obvious that this regulatory system needs a good deal of improvement. In fact, I think that it may be no coincidence that so much is being revealed now. The idea is surely to create the conditions for another international regulatory effort that will end up further controlling what is left of free-market capital raising. It is a global game for globalists. The game is to regulate everything and then to position oneself above the regulations and above the governments that wield them. This gives you tremendous power over everyone else. One of the tools being used to whip up sentiment for a larger regulatory revisiting is scandal and more scandal. There have been revelations of so-called crooked practices in a number of areas lately, mostly in the area of industry pricing. It turns out that many standard prices are set via indications of interest rather than outright competition. We can see the same system at work in the gold market, where a small group of wise men set the price for physical gold every day. And now, as Taibbi and others have revealed, the dysfunctional system also affects interest rate swaps. This has incensed Taibbi, who opens his article as follows: Conspiracy theorists of the world, believers in the
1More

Gold Price "Manipulated For A Decade", Repeatedly Slammed Lower, Bloomberg Reports | Ze... - 0 views

  •  
    "While the FT promptly retracted an article on precisely the topic of gold manipulation from earlier this week (recorded for posterity here), Bloomberg appears to not have had the same "editorial" concerns and pressures, and today released an article once again slamming the final conspiracy theory that while every other asset class is manipulated, gold is in a pristine class of its own, untouched by close-banging, price fixing traders or central bankers, and reports that "the London gold fix, the benchmark used by miners, jewelers and central banks to value the metal, may have been manipulated for a decade by the banks setting it, researchers say." Of course, over the past 5 years we have reported time and again how official gold manipulation started in earnest some time in the 1960s (who can forget the "reshuffle club") but we will start with a decade. Here is what BBG finds: Unusual trading patterns around 3 p.m. in London, when the so-called afternoon fix is set on a private conference call between five of the biggest gold dealers, are a sign of collusive behavior and should be investigated, New York University's Stern School of Business Professor Rosa Abrantes-Metz and Albert Metz, a managing director at Moody's Investors Service, wrote in a draft research paper.   "The structure of the benchmark is certainly conducive to collusion and manipulation, and the empirical data are consistent with price artificiality," they say in the report, which hasn't yet been submitted for publication. "It is likely that co-operation between participants may be occurring."   The paper is the first to raise the possibility that the five banks overseeing the century-old rate -- Barclays Plc, Deutsche Bank AG, Bank of Nova Scotia, HSBC Holdings Plc and Societe Generale SA -- may have been actively working together to manipulate the benchmark. It also adds to pressure on the firms to overhaul the way the rate is calculated. Authorities around the world, already inv
11More

United States v. United States Dist. Court for Eastern Dist. of Mich., 407 US 297 - Sup... - 0 views

  • But a recognition of these elementary truths does not make the employment by Government of electronic surveillance a welcome development—even when employed with restraint and under judicial supervision. There is, understandably, a deep-seated uneasiness and apprehension that this capability will be used to intrude upon cherished privacy of law-abiding citizens.[13] We 313*313 look to the Bill of Rights to safeguard this privacy. Though physical entry of the home is the chief evil against which the wording of the Fourth Amendment is directed, its broader spirit now shields private speech from unreasonable surveillance. Katz v. United States, supra; Berger v. New York, supra; Silverman v. United States, 365 U. S. 505 (1961). Our decision in Katz refused to lock the Fourth Amendment into instances of actual physical trespass. Rather, the Amendment governs "not only the seizure of tangible items, but extends as well to the recording of oral statements . . . without any `technical trespass under . . . local property law.'" Katz, supra, at 353. That decision implicitly recognized that the broad and unsuspected governmental incursions into conversational privacy which electronic surveillance entails[14] necessitate the application of Fourth Amendment safeguards.
  • National security cases, moreover, often reflect a convergence of First and Fourth Amendment values not present in cases of "ordinary" crime. Though the investigative duty of the executive may be stronger in such cases, so also is there greater jeopardy to constitutionally protected speech. "Historically the struggle for freedom of speech and press in England was bound up with the issue of the scope of the search and seizure 314*314 power," Marcus v. Search Warrant, 367 U. S. 717, 724 (1961). History abundantly documents the tendency of Government—however benevolent and benign its motives —to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the Government attempts to act under so vague a concept as the power to protect "domestic security." Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent. Senator Hart addressed this dilemma in the floor debate on § 2511 (3):
  • "As I read it—and this is my fear—we are saying that the President, on his motion, could declare— name your favorite poison—draft dodgers, Black Muslims, the Ku Klux Klan, or civil rights activists to be a clear and present danger to the structure or existence of the Government."[15] The price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power. Nor must the fear of unauthorized official eavesdropping deter vigorous citizen dissent and discussion of Government action in private conversation. For private dissent, no less than open public discourse, is essential to our free society.
  • ...8 more annotations...
  • As the Fourth Amendment is not absolute in its terms, our task is to examine and balance the basic values at stake in this case: the duty of Government 315*315 to protect the domestic security, and the potential danger posed by unreasonable surveillance to individual privacy and free expression. If the legitimate need of Government to safeguard domestic security requires the use of electronic surveillance, the question is whether the needs of citizens for privacy and free expression may not be better protected by requiring a warrant before such surveillance is undertaken. We must also ask whether a warrant requirement would unduly frustrate the efforts of Government to protect itself from acts of subversion and overthrow directed against it. Though the Fourth Amendment speaks broadly of "unreasonable searches and seizures," the definition of "reasonableness" turns, at least in part, on the more specific commands of the warrant clause. Some have argued that "[t]he relevant test is not whether it is reasonable to procure a search warrant, but whether the search was reasonable," United States v. Rabinowitz, 339 U. S. 56, 66 (1950).[16] This view, however, overlooks the second clause of the Amendment. The warrant clause of the Fourth Amendment is not dead language. Rather, it has been
  • "a valued part of our constitutional law for decades, and it has determined the result in scores and scores of cases in courts all over this country. It is not an inconvenience to be somehow `weighed' against the claims of police efficiency. It is, or should 316*316 be, an important working part of our machinery of government, operating as a matter of course to check the `well-intentioned but mistakenly overzealous executive officers' who are a part of any system of law enforcement." Coolidge v. New Hampshire, 403 U. S., at 481. See also United States v. Rabinowitz, supra, at 68 (Frankfurter, J., dissenting); Davis v. United States, 328 U. S. 582, 604 (1946) (Frankfurter, J., dissenting). Over two centuries ago, Lord Mansfield held that common-law principles prohibited warrants that ordered the arrest of unnamed individuals who the officer might conclude were guilty of seditious libel. "It is not fit," said Mansfield, "that the receiving or judging of the information should be left to the discretion of the officer. The magistrate ought to judge; and should give certain directions to the officer." Leach v. Three of the King's Messengers, 19 How. St. Tr. 1001, 1027 (1765).
  • Lord Mansfield's formulation touches the very heart of the Fourth Amendment directive: that, where practical, a governmental search and seizure should represent both the efforts of the officer to gather evidence of wrongful acts and the judgment of the magistrate that the collected evidence is sufficient to justify invasion of a citizen's private premises or conversation. Inherent in the concept of a warrant is its issuance by a "neutral and detached magistrate." Coolidge v. New Hampshire, supra, at 453; Katz v. United States, supra, at 356. The further requirement of "probable cause" instructs the magistrate that baseless searches shall not proceed. These Fourth Amendment freedoms cannot properly be guaranteed if domestic security surveillances may be conducted solely within the discretion of the Executive 317*317 Branch. The Fourth Amendment does not contemplate the executive officers of Government as neutral and disinterested magistrates. Their duty and responsibility are to enforce the laws, to investigate, and to prosecute. Katz v. United States, supra, at 359-360 (DOUGLAS, J., concurring). But those charged with this investigative and prosecutorial duty should not be the sole judges of when to utilize constitutionally sensitive means in pursuing their tasks. The historical judgment, which the Fourth Amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and protected speech.[17]
  • It may well be that, in the instant case, the Government's surveillance of Plamondon's conversations was a reasonable one which readily would have gained prior judicial approval. But this Court "has never sustained a search upon the sole ground that officers reasonably expected to find evidence of a particular crime and voluntarily confined their activities to the least intrusive means consistent with that end." Katz, supra, at 356-357. The Fourth Amendment contemplates a prior judicial judgment,[18] not the risk that executive discretion may be reasonably exercised. This judicial role accords with our basic constitutional doctrine that individual freedoms will best be preserved through a separation of powers and division of functions among the different branches and levels of Government. Harlan, Thoughts at a Dedication: Keeping the Judicial Function in Balance, 49 A. B. A. J. 943-944 (1963). The independent check upon executive discretion is not 318*318 satisfied, as the Government argues, by "extremely limited" post-surveillance judicial review.[19] Indeed, post-surveillance review would never reach the surveillances which failed to result in prosecutions. Prior review by a neutral and detached magistrate is the time-tested means of effectuating Fourth Amendment rights. Beck v. Ohio, 379 U. S. 89, 96 (1964).
  • But we do not think a case has been made for the requested departure from Fourth Amendment standards. The circumstances described do not justify complete exemption of domestic security surveillance from prior judicial scrutiny. Official surveillance, whether its purpose be criminal investigation or ongoing intelligence gathering, risks infringement of constitutionally protected privacy of speech. Security surveillances are especially sensitive because of the inherent vagueness of the domestic security concept, the necessarily broad and continuing nature of intelligence gathering, and the temptation to utilize such surveillances to oversee political dissent. We recognize, as we have before, the constitutional basis of the President's domestic security role, but we think it must be exercised in a manner compatible with the Fourth Amendment. In this case we hold that this requires an appropriate prior warrant procedure. We cannot accept the Government's argument that internal security matters are too subtle and complex for judicial evaluation. Courts regularly deal with the most difficult issues of our society. There is no reason to believe that federal judges will be insensitive to or uncomprehending of the issues involved in domestic security cases. Certainly courts can recognize that domestic security surveillance involves different considerations from the surveillance of "ordinary crime." If the threat is too subtle or complex for our senior law enforcement officers to convey its significance to a court, one may question whether there is probable cause for surveillance.
  • Nor do we believe prior judicial approval will fracture the secrecy essential to official intelligence gathering. The investigation of criminal activity has long 321*321 involved imparting sensitive information to judicial officers who have respected the confidentialities involved. Judges may be counted upon to be especially conscious of security requirements in national security cases. Title III of the Omnibus Crime Control and Safe Streets Act already has imposed this responsibility on the judiciary in connection with such crimes as espionage, sabotage, and treason, §§ 2516 (1) (a) and (c), each of which may involve domestic as well as foreign security threats. Moreover, a warrant application involves no public or adversary proceedings: it is an ex parte request before a magistrate or judge. Whatever security dangers clerical and secretarial personnel may pose can be minimized by proper administrative measures, possibly to the point of allowing the Government itself to provide the necessary clerical assistance.
  • Thus, we conclude that the Government's concerns do not justify departure in this case from the customary Fourth Amendment requirement of judicial approval prior to initiation of a search or surveillance. Although some added burden will be imposed upon the Attorney General, this inconvenience is justified in a free society to protect constitutional values. Nor do we think the Government's domestic surveillance powers will be impaired to any significant degree. A prior warrant establishes presumptive validity of the surveillance and will minimize the burden of justification in post-surveillance judicial review. By no means of least importance will be the reassurance of the public generally that indiscriminate wiretapping and bugging of law-abiding citizens cannot occur.
  • As the surveillance of Plamondon's conversations was unlawful, because conducted without prior judicial approval, the courts below correctly held that Alderman v. United States, 394 U. S. 165 (1969), is controlling and that it requires disclosure to the accused of his own impermissibly intercepted conversations. As stated in Alderman, "the trial court can and should, where appropriate, place a defendant and his counsel under enforceable orders against unwarranted disclosure of the materials which they may be entitled to inspect." 394 U. S., at 185.[21]
1More

BENGHAZI - THE BIGGEST COVER-UP SCANDAL IN U.S. HISTORY? - WAS BENGHAZI A CIA GUN-RUNNI... - 0 views

  •  
    "LibertyNEWS.com - Editorial Team Special Report It's never fun to admit you've been lied to and duped. There is no comfort in realizing a high-level group in government has conned you. The wound created from such a realization would be deep and painful when paired with extraordinary insult when you realize the cons are people you not only trusted, but people who are tasked with protecting your rights, your liberty, your life. When these people betray you, you're in trouble - big trouble. Unfortunately, we believe America is being betrayed by powerful individuals tasked with our protection. These people are found in the White House, the Congress, the CIA and other government entities - and they're lying to you. Then they're covering it up on an epic scale, in a never-before-seen manner. Here are the basics of what the schemers in government and the complicit media would like for us all to focus on and buy into: Why wasn't there better security at the consulate (keep this misleading word in mind) in Benghazi? Why didn't authorization come to move special forces in for protection and rescue? Why was an obscure video blamed when everyone knew the video had nothing to do with it? Did Obama's administration cover-up the true nature of the attacks to win an election? Truth is, as we're starting to believe, the above questions are convenient, tactical distractions. And truth is, answers to these questions, if they ever come, will never lead to revelations of the REAL TRUTH and meaningful punishment of anyone found responsible. Rep. Darrell Issa knows this, members of the House Committee investigating the Benghazi attacks know this, the White House knows this, and much of the big corporate media infrastructure knows it, too. How do they know it? Because they know the truth. They know the truth, but cannot and/or will not discuss it in public. Here are the basics that we (America, in general) should be focusing on, but aren't: Why do media
6More

NSA surveillance may be legal - but it's unconstitutional - The Washington Post - 0 views

  • Laura K. Donohue is a professor at Georgetown University Law Center and director of Georgetown’s Center on National Security and the Law. The National Security Agency’s recently revealed surveillance programs undermine the purpose of the Foreign Intelligence Surveillance Act, which was established to prevent this kind of overreach. They violate the Fourth Amendment’s guarantee against unreasonable search and seizure. And they underscore the dangers of growing executive power.
  • Another program, PRISM, disclosed by the Guardian and The Washington Post, allows the NSA and the FBI to obtain online data including e-mails, photographs, documents and connection logs. The information that can be assembledabout any one person — much less organizations, social networks and entire communities — is staggering: What we do, think and believe.The government defends the programs’ legality, saying they comply with FISA and its amendments. It may be right, but only because FISA has ceased to provide a meaningful constraint.Under the traditional FISA, if the government wants to conduct electronic surveillance, it must make a classified application to a special court, identitying or describing the target. It must demonstrate probable cause that the target is a foreign power or an agent thereof, and that the facilities to be monitored will be used by the target.In 2008, Congress added section 702 to the statute, allowing the government to use electronic surveillance to collect foreign intelligence on non-U.S. persons it reasonably believes are abroad, without a court order for each target. A U.S. citizen may not intentionally be targeted.To the extent that the FISC sanctioned PRISM, it may be consistent with the law. But it is disingenuous to suggest that millions of Americans’ e-mails, photographs and documents are “incidental” to an investigation targeting foreigners overseas.
  • Another program, PRISM, disclosed by the Guardian and The Washington Post, allows the NSA and the FBI to obtain online data including e-mails, photographs, documents and connection logs. The information that can be assembledabout any one person — much less organizations, social networks and entire communities — is staggering: What we do, think and believe.The government defends the programs’ legality, saying they comply with FISA and its amendments. It may be right, but only because FISA has ceased to provide a meaningful constraint.
  • ...3 more annotations...
  • Under the traditional FISA, if the government wants to conduct electronic surveillance, it must make a classified application to a special court, identitying or describing the target. It must demonstrate probable cause that the target is a foreign power or an agent thereof, and that the facilities to be monitored will be used by the target.In 2008, Congress added section 702 to the statute, allowing the government to use electronic surveillance to collect foreign intelligence on non-U.S. persons it reasonably believes are abroad, without a court order for each target. A U.S. citizen may not intentionally be targeted.To the extent that the FISC sanctioned PRISM, it may be consistent with the law. But it is disingenuous to suggest that millions of Americans’ e-mails, photographs and documents are “incidental” to an investigation targeting foreigners overseas.The telephony metadata program raises similar concerns. FISA did not originally envision the government accessing records. Following the 1995 Oklahoma City bombing, Congress allowed applications for obtaining records from certain kinds of businesses. In 2001, lawmakers further expanded FISA to give the government access to any business or personal records. Under section 215 of the Patriot Act, the government no longer has to prove that the target is a foreign power. It need only state that the records are sought as part of an investigation to protect against terrorism or clandestine intelligence.
  • The telephony metadata program raises similar concerns. FISA did not originally envision the government accessing records. Following the 1995 Oklahoma City bombing, Congress allowed applications for obtaining records from certain kinds of businesses. In 2001, lawmakers further expanded FISA to give the government access to any business or personal records. Under section 215 of the Patriot Act, the government no longer has to prove that the target is a foreign power. It need only state that the records are sought as part of an investigation to protect against terrorism or clandestine intelligence.This means that FISA can now be used to gather records concerning individuals who are neither the target of any investigation nor an agent of a foreign power. Entire databases — such as telephony metadata — can be obtained, as long as an authorized investigation exists.Congress didn’t pass Section 215 to allow for the wholesale collection of information. As Rep. F. James Sensenbrenner Jr. (R-Wis.), who helped draft the statute, wrote in the Guardian: “Congress intended to allow the intelligence communities to access targeted information for specific investigations. How can every call that every American makes or receives be relevant to a specific investigation?”As a constitutional matter, the Supreme Court has long held that, where an individual has a reasonable expectation of privacy, search and seizure may occur only once the government has obtained a warrant, supported by probable cause and issued by a judge. The warrant must specify the places to be searched and items to be seized.
  • There are exceptions to the warrant requirement. In 1979 the court held that the use of a pen register to record numbers dialed from someone’s home was not a search. The court suggested that people who disclose their communications to others assume the risk that law enforcement may obtain the information.More than three decades later, digitization and the explosion of social-network technology have changed the calculus. In the ordinary course of life, third parties obtain massive amounts of information about us that, when analyzed, have much deeper implications for our privacy than before.As for Section 702 of FISA, the Supreme Court has held that the Fourth Amendment does not protect foreigners from searches conducted abroad. But it has never recognized a foreign intelligence exception to the warrant requirement when foreign-targeted searches result in the collection of vast stores of citizens’ communications.Americans reasonably expect that their movements, communications and decisions will not be recorded and analyzed by the government. A majority of the Supreme Court seems to agree. Last year, the court considered a case involving 28-day GPS surveillance. Justice Samuel Alito suggested that in most criminal investigations, long-term monitoring “impinges on expectations of privacy.” Justice Sonia Sotomayor recognized that following a person’s movements “reflects a wealth of detail about her familial, political, professional, religious, and sexual associations.”The FISC is supposed to operate as a check. But it is a secret court, notorious for its low rate of denial. From 1979 to 2002, it did not reject a single application. Over the past five years, out of nearly 8,600 applications, only two have been denied.
8More

Netanyahu scandals reflect corruption at the heart of Israeli society - Mondoweiss - 0 views

  •       Israeli prime minister Benjamin Netanyahu is in danger of being brought down, possibly soon, over what initially appears to be little more than an imprudent taste for Cuban cigars and pink champagne. In truth, however, the allegations ensnaring Netanyahu reveal far more than his personal flaws or an infatuation with the high life. They shine a rare light on the corrupt nexus between Israel’s business, political and media worlds, compounded by the perverse influence of overseas Jewish money. Of the two police investigations Netanyahu faces (there are more in the wings), the one known as Case 1000, concerning gifts from businessmen worth hundreds of thousands of dollars, is most likely to lead to his downfall. But it is the second investigation, Case 2000, and the still-murky relationship between the two cases, that more fully exposes the rot at the heart of Israel’s political system. This latter case hinges on a tape recording in which Netanyahu plots with an Israeli newspaper tycoon to rig media coverage in his favor. Leads from both cases suggest that Netanyahu may have been further meddling, together with his billionaire friends, in the shadowy world of international espionage.
  • Netanyahu’s appetite for a free lunch has been common knowledge in Israel since his first term as prime minister in the late 1990s. Then, he was twice investigated for fraud, though controversially charges were not brought in either case. Police discovered along the way that he and his wife, Sara, had horded many of the gifts he received during state visits. More than 100 were never recovered. The clarifications that were issued more than 15 years ago, as a result of those investigations, make it hard for Netanyahu to claim now that he did not understand the rules. According to justice ministry advice in 2001, government and state officials cannot keep gifts worth more than $100 without risking violating Israeli law. The gifts Netanyahu received from one of the Israeli businessmen involved in Case 1000, Hollywood film producer Arnon Milchan, amounted to as much as $180,000. Netanyahu has argued that these presents, ranging from cigars to jewelry, were expressions of a close friendship rather than bribes to him in his capacity as prime minister. The problem, however, is that Netanyahu appears to have reciprocated by using his position as head of the Israeli government to lobby John Kerry, the then U.S. secretary of state, to gain Milchan a 10-year U.S. residency visa. He may have done more.
  • Also being investigated are his family’s ties to a friend of Milchan’s, Australian billionaire James Packer, who made his fortune in the media and gambling industries. Packer has similarly lavished gifts on the Netanyahu family, especially Yair, Netanyahu’s eldest son. At the same time, Packer, now a neighbor of the Netanyahus in the coastal town of Caesarea, has been seeking permanent residency and the enormous benefits that would accrue with tax status in Israel. As a non-Jew, Packer should have no hope of being awarded residency. There are suspicions that Netanyahu may have been trying to pull strings on the Australian’s behalf. Many of these gifts were apparently not given freely. The Netanyahus asked for them. Indicating that Netanyahu knew there might be legal concerns, he used code words – “leaves” for cigars and “pinks” for champagne – to disguise his orders to Milchan. Police are reported to be confident, after questioning Netanyahu three times, that they have enough evidence to indict him. If they do, Netanyahu will be under heavy pressure to resign.
  • ...5 more annotations...
  • Yossi Cohen was appointed head of the Mossad a year ago, after a government vetting committee accepted that he had no personal ties to Netanyahu. But Cohen forgot to mention that he is extremely close to Netanyahu’s high-flying friends – connections that are now under investigation. Milchan set up a global security firm in 2008 called Blue Sky International, stuffed with Israeli security veterans. Packer soon became a partner. They developed close ties to Cohen, first while he was a senior official at the Mossad and later when he headed Israel’s national security council. Before Cohen was appointed head of Mossad in December 2015, the pair had hoped to recruit him to their cyber-security operations. Cohen received several gifts from Packer, in violation of Israeli government rules, including a stay at one of his luxury hotels. A source speaking to Haaretz said Blue Sky had “more than [a] direct line” to Netanyahu. They “would pull him out from anywhere, at any time, on any occasion.” According to Haaretz’s military analyst, Amir Oren, the new disclosures raise serious questions about whether Milchan and Packer twisted Netanyahu’s arm to parachute Cohen into the post over the favored candidate. In return, Packer may have been hoping that Cohen would authorise exceptional Israeli residency for him, classifying him as a security asset.
  • From Hollywood to Mossad Cases 1000 and 2000 share at least one figure in common. Milchan gave Netanyahu extravagant gifts over many years, but he is also reported to have acted as go-between, bringing arch-enemies Netanyahu and Mozes together. Milchan has his own financial stake in the media, in his case a holding in the Channel 10 TV station. In addition, Milchan introduced Netanyahu to sympathetic businessmen, including his friend Packer, to discuss taking the ailing Yedioth media group off Mozes’ hands. Only last October he arranged for media mogul Rupert Murdoch’s son, Lachlan, to fly to Israel for one night for a secret meeting with Netanyahu. Milchan is undoubtedly at the centre of the shadowy world of power and finance that corrupts public life in Israel. Not only is Milchan a highly influential Hollywood figure, having produced more than 100 films, but he has admitted that he is a former Mossad agent. He used his Hollywood connections to help make arms deals and secure parts for Israel’s nuclear weapons program. One can only wonder whether Milchan was not effectively set up in his Hollywood career as a cover for his Mossad activities. But Milchan, it seems, is still wielding influence in Israel’s twilight world of security.
  • eyond this, one one can only speculate about how Cohen’s indebtedness to Milchan, Packer and Netanyahu might have influenced his decisions as head of the Mossad. It was only a few years ago that the former Mossad chief, Meir Dagan, was reported to have wrestled furiously with Netanyahu to stop him launching a military strike on Iran. Prosecution drags feet It is unclear for the time being whether the revelations are drawing to a close or will lead deeper into Israel’s twin netherworlds of financial corruption and security. But what has emerged so far should be enough to finish off Netanyahu as prime minister. Whether it does so may depend on the extent of Israel’s compromised legal system. Attorney general Avichai Mendelblit was appointed by Netanyahu and is a political ally. He appears to have been dragging his feet as much as possible to slow down the police investigation, if not sabotage it. But the weight of evidence is looking like it may prove too overwhelming. As political analyst Yossi Verter observed: “There’s no way that a police commissioner … appointed [by Netanyahu] and a cautious attorney general, who in the past was part of his close circle and one of his loyalists, would be putting him through the seven circles of hell if they weren’t convinced that there’s a solid basis for indictment and conviction.” The next question for Netanyahu is whether he will step down if indicted. He should, if Olmert’s example is followed. But his officials are citing a 1993 high court ruling that allows a cabinet minister under indictment to remain in office. Certainly if Netanyahu chooses to stay on, his decision would be appealed to the court again. However, the judges may be reluctant to oust a sitting prime minister. The court of public opinion is likely to be decisive in that regard. A recent poll shows few Israelis believe Netanyahu is innocent of the allegations. Some 54 per cent think he broke the law, while only 28 believe him. Opinion, however, is split evenly on whether he should resign.
  • If past experience is any measure, Netanyahu will try to turn public opinion his way by increasing friction with the Palestinians and exploiting the international arena, especially his relations with the Trump administration. He may be expected to encourage Trump at the very least to posture more stridently against Iran. Nonetheless, most observers assume Netanyahu is doomed – it is simply a matter of when. The odds are on an indictment in late spring, followed by elections in the fall, say Israeli analysts. At this stage, none of his political rivals wants to be seen stabbing Netanyahu in the back. Most are keeping quiet. But behind the scenes, political leaders are hurrying to forge new alliances and extract political concessions while Netanyahu is wounded.
  • Who might succeed Netanyahu? Yair Lapid, of the centre-right Yesh Atid, is heading the polls, but that may in part reflect the disarray in Netanyahu’s Likud party. In a sign of where the deeper currents in Israeli society are leading, a Maariv poll last week showed that settler leader Naftali Bennett would win an election if he were to head the Likud. Netanyahu now needs the help of all the powerful friends he can muster. His biggest ally, U.S. casino magnate Sheldon Adelson, may not be among them. After the revelations that Netanyahu was conspiring against him with Mozes, Adelson has cut back on Israel Hayom’s circulation and is reported to be offering less favorable coverage of the Netanyahus. That could prove the final straw, sealing Netanyahu’s fate.
8More

Judge Rules: Obama Social Security Card Fraud May Finally Get Answers | - 1 views

  • The reason for the judge’s amendment seems to be a procedural one. Taitz filed suit with the court prior to receiving word back from her Freedom of Information Act request, which she did receive on July 29, 2013 from Dawn S. Wiggins, a Fredom of Information Officer. Wiggins replied to Taitz: I have enclosed a copy of the SS-5s for Mr. Tsarnaev and Ms. Dunham. . . . We were unable to find any information for Mr. Bounel based on the information you provided to us. Mr. Bounel may not have applied for a Social Security number (SSN) or may have given different information on the application for a number.
  • The controversy over Barack Hussein Obama and his past, along with fraudulent documents continues to make headlines. Yet, the items needed to actually verify who Obama is continue to be kept from the public eye. Well, that all may be about to change. Attorney Orly Taitz may have just found a chink in the federal government’s armor in protecting Barack Obama from scrutiny, following a judge’s ruling over her Freedom of Information Act request from the Social Security Administration. Taitz has claimed that Obama uses the Social Security number of Harry Bounel and has submitted several Freedom of Information Act requests for the information from the Social Security Administration. Each time, she has been met with stonewalling by the Social Security Administration. However, Judge Ellen Lipton Hollander has ruled to give Taitz “an opportunity to file a second amended complaint and add allegations of SSA not doing a proper search and withholding records.”
  • Additionally, there is an increased tampering with the web site of Orly Taitz and with her ability to send mass -emails. It seems her private server is somehow affected and Taitz is unable to send mass e-mails on two different programs.
  • ...4 more annotations...
  • From Taitz’s Press Release: Judge Hollander in Maryland gives Attorney Orly Taitz 21 days to file a second amended complaint and add allegations in regards to an improper withholding by the Social Security Administration of records of Harry Bounel, whose Social security number is being illegally used by Barack Obama. When Taitz filed the complaint, SSA did not respond at all. After the law suit was filed, SSA responded by fraudulently claiming that the records were not found. Taitz responded that this is a fraudulent assertion, since the records were found before and denied to another petitioner due to privacy concerns, however Social Security has no right to claim privacy as according to their own 120 year rule they have a duty to release the records. The judge stated that the plaintiff Taitz might be correct, however at this time she cannot rule in her favor as her original complaint was filed before SSA responded, so the judge gave Taitz an opportunity to refile a second amended complaint and add new allegations, stating the SSA responded but improperly hidden the records . This is a great development. This all but assures that the judge will order the SSA to release the SS-5, Social Security application of resident of CT, Harrison (Harry) Bounel, whose CT SSN 042-68-4425 was stolen by Obama and used in Obama’s 2009 tax returns, which initially were posted on WhiteHouse.gov without proper redaction, without flattening of the file. Taitz will be very careful not to be Breitbarted or Fuddied in the next 21 days.
  • It’s interesting that Taitz points out that she will be “careful not to be Breitbarted or Fuddied,” indicating that she believes that both Andrew Breitbart and Andrew Breitbart and Loretta Fuddy were targeted by Obama for assassination.” Breitbart died on the very day that he said he would begin vetting Obama for the 2012 elections, which raised suspicions. Fuddy, best remembered as being instrumental in issuing the Hawaii long-form birth certificate, was the only person to die aboard a small plane that crashed off the coast of Hawaii last week. Already, there are questions surrounding the narrative of her death.
  • Taitz alleged that Mr. Bounel was born in 1890, and therefore, under the “’120 Year Rule’ implemented by the SSA in 2010,” pertaining to “‘extremely aged individuals,’” Bounel’s “Social Security applications have to be released under FOIA without proof of [his] death . . . .”
  • It appears that once the amendment is submitted, this may force the Social Security Administration to explain exactly what is going on with Barack Obama’s Social Security number. We should know something about the case by the second week in January 2014.
  •  
    @ One passage in the article: "It appears that once the amendment is submitted, this may force the Social Security Administration to explain exactly what is going on with Barack Obama's Social Security number." That's far too optimistic, probably reflecting a lack of understanding of Freedom of Information Act and the processing of a FOIA complaint in federal court. I read the judge's opinion. After the amended complaint is filed, the government gets another shot at summary judgment, submitting a new affidavit about the scope of the search that meets the judge's criticism. (The judge did not rule that the search was inadequate, merely that it was inadequately described and might have been inadequate.) That shifts the burden to the plaintiff to prove that the search was inadequate. If she meets that burden, which isn't easy, the government has to do a new search, file a new motion for summary judgment with a new affidavit, rinse, lather, and repeat. So long as someone is willing to sign an affidavit describing the search and stating that nothing was found, the plaintiff will eventually be unable to prove that the search was inadequate and will lose the case. On the other hand, a new search may find the requested record and result in disclosure. But I'm not confident that this case will go very far. From the description of the complaint that the judge ruled on, it was fatally defective anyway, suggesting that the plaintiff doesn't know much about FOIA litigation. The complaint sought an order that the government be required to respond to her FOIA request letter. But once a FOIA request goes unanswered for 20 business days, the request is deemed denied and the plaintiff can file suit to compel disclosure of the records. The FOIA does not provide for lawsuits to compel the agency to answer a FOIA request. So the plaintiff apparenttly obviously does not understand the FOIA, probably making her easy pickings for an Assistant U.S. District Attorney whose specialty
2More

Theresa May to Take Over as UK's Prime Minister on Wednesday - nsnbc international | ns... - 0 views

  • Britain’s Prime Minister David Cameron announced that Theresa May will step in as Prime Minister on Wednesday. The change of leadership came after Cameron decided to step down to let negotiations about the UK’s Brexit to be handled by a new leadership. May, who is considered more conservative than Cameron, is not no stranger to controversy.
  • David Cameron addressed the press at No. 10 Downing Street, saying that he was delighted the his Conservative Party won’t have a long leadership election campaign. Cameron stressed that Andrea Leadon had made absolutely the right decision to step aside. Cameron stressed that it is absolutely clear that Theresa May has the overwhelming support of the Conservative Party. Cameron said that he also was delighted that Theresa May would become the next prime minister. He described May as strong, competent, and more than able to provide the leadership that the UK is going to need in the years ahead. Cameron added that Theresa May will have the party’s full support. Cameron said that obviously, with the changes that are ahead, the UK does not need a long period of transition. Cameron said he would go to the palace and offer his resignation on Wednesday, so there will be a new prime minister at No.10 Downing Street by Wednesday evening.
12More

From Energy War to Currency War: America's Attack on the Russian Ruble | Global Research - 0 views

  • Putin announced that Russia has cancelled the South Stream project on December 1, 2014. Instead the South Stream pipeline project has been replaced by a natural gas pipeline that goes across the Black Sea to Turkey from the Russian Federation’s South Federal District. This alternative pipeline has been popularly billed the «Turk Stream» and partners Russian energy giant Gazprom with Turkey’s Botas. Moreover, Gazprom will start giving Turkey discounts in the purchase of Russian natural gas that will increase with the intensification of Russo-Turkish cooperation. The natural gas deal between Ankara and Moscow creates a win-win situation for both the Turkish and Russian sides. Not only will Ankara get a discount on energy supplies, but Turk Stream gives the Turkish government what it has wanted and desired for years. The Turk Stream pipeline will make Turkey an important energy corridor and transit point, complete with transit revenues. In this case Turkey becomes the corridor between energy supplier Russia and European Union and non-EU energy customers in southeastern Europe. Ankara will gain some leverage over the European Union and have an extra negotiating card with the EU too, because the EU will have to deal with it as an energy broker.
  • For its part, Russia has reduced the risks that it faced in building the South Stream by cancelling the project. Moscow could have wasted resources and time building the South Stream to see the project sanctioned or obstructed in the Balkans by Washington and Brussels. If the European Union really wants Russian natural gas then the Turk Stream pipeline can be expanded from Turkey to Greece, the former Yugoslav Republic (FYR) of Macedonia, Serbia, Hungary, Slovenia, Italy, Austria, and other European countries that want to be integrated into the energy project. The cancellation of South Stream also means that there will be one less alternative energy corridor from Russia to the European Union for some time. This has positive implications for a settlement in Ukraine, which is an important transit route for Russian natural gas to the European Union. As a means of securing the flow of natural gas across Ukrainian territory from Russia, the European Union will be more prone to push the authorities in Kiev to end the conflict in East Ukraine.
  • From the perspective of Russian Presidential Advisor Sergey Glazyev, the US is waging its multi-spectrum war against Russia to ultimately challenge Moscow’s Chinese partners. In an insightful interview, Glazyev explained the following points to the Ukrainian journalist Alyona Berezovskaya — working for a Rossiya Segodnya subsidiary focusing on information involving Ukraine — about the basis for US hostility towards Russia: the bankruptcy of the US, its decline in competitiveness on global markets, and Washington’s inability to ultimately save its financial system by servicing its foreign debt or getting enough investments to establish some sort of innovative economic breakthrough are the reasons why Washington has been going after the Russian Federation. [13] In Glazyev’s own words, the US wants «a new world war». [14] The US needs conflict and confrontation, in other words. This is what the crisis in Ukraine is nurturing in Europe. Sergey Glazyev reiterates the same points months down the road on September 23, 2014 in an article he authors for the magazine Russia in Global Affairs, which is sponsored by the Russian International Affairs Council — a think-tank founded by the Russian Foreign Ministry and Russian Ministry of Education 2010 — and the US journal Foreign Affairs — which is the magazine published by the Council on Foreign Relation in the US. In his article, Glazyev adds that the war Washington is inciting against Russia in Europe may ultimately benefit the Chinese, because the struggle being waged will weaken the US, Russia, and the European Union to the advantage of China. [15] The point of explaining all this is to explain that Russia wants a balanced strategic partnership with China. Glazyev himself even told Berezovskaya in their interview that Russia wants a mutually beneficial relationship with China that does reduce it to becoming a subordinate to Beijing. [16]
  • ...9 more annotations...
  • It is because of the importance of Irano-Turkish and Russo-Turkish trade and energy ties that Ankara has had an understanding with both Russia and Iran not to let politics and their differences over the Syrian crisis get in the way of their economic ties and business relationships while Washington has tried to disrupt Irano-Turkish and Russo-Turkish trade and energy ties like it has disrupted trade ties between Russia and the EU. [9] Ankara, however, realizes that if it lets politics disrupt its economic ties with Iran and Russia that Turkey itself will become weakened and lose whatever independence it enjoys Masterfully announcing the Russian move while in Ankara, Putin also took the opportunity to ensure that there would be heated conversation inside the EU. Some would call this rubbing salt on the wounds. Knowing that profit and opportunity costs would create internal debate within Bulgaria and the EU, Putin rhetorically asked if Bulgaria was going to be economically compensated by the European Commission for the loss.
  • It is clear that Russian business and trade ties have been redirected to the People’s Republic of China and East Asia. On the occasion of the Sino-Russian mega natural gas deal, this author pointed out that this was not as much a Russian countermove to US economic pressure as it was really a long-term Russian strategy that seeks an increase in trade and ties with East Asia. [10] Vladimir Putin himself also corroborated this standpoint during the December 18 press conference mentioned earlier when he dismissed — like this author — the notion that the so-called «Russian turn to the East» was mainly the result of the crisis in Ukraine. In President Putin’s own words, the process of increasing business ties with the Chinese and East Asia «stems from the global economic processes, because the East – that is, the Asia-Pacific Region – shows faster growth than the rest of the world». [11] If this is not convincing enough that the turn towards East Asia was already in the works for Russia, then Putin makes it categorically clear as he proceeds talking at the December 18 press conference. In reference to the Sino-Russian gas deal and other Russian projects in East Asia, Putin explained the following: «The projects we are working on were planned long ago, even before the most recent problems occurred in the global or Russian economy. We are simply implementing our long-time plans». [12]
  • According to Presidential Advisor Sergey Glazyev, Washington is «trying to destroy and weaken Russia, causing it to fragment, as they need this territory and want to establish control over this entire space». [18] «We have offered cooperation from Lisbon to Vladivostok, whereas they need control to maintain their geopolitical leadership in a competition with China,» he has explained, pointing out that the US wants lordship and is not interested in cooperation. [19] Alluding to former US top diplomat Madeline Albright’s sentiments that Russia was unfairly endowed with vast territory and resources, Putin also spoke along similar lines at his December 18 press conference, explaining how the US wanted to divide Russia and control the abundant natural resources in Russian territory. It is of little wonder that in 2014 a record number of Russian citizens have negative attitudes about relations between their country and the United States. A survey conducted by the Russian Public Opinion Research Center has shown that of 39% of Russian respondents viewed relations with the US as «mostly bad» and 27% as «very bad». [20] This means 66% of Russian respondents have negative views about relations with Washington. This is an inference of the entire Russian population’s views. Moreover, this is the highest rise in negative perceptions about the US since 2008 when the US supported Georgian President Mikheil Saakashvili in Tbilisi’s war against Russia and the breakaway republic of South Ossetia; 40% viewed them as «mostly bad» and 25% of Russians viewed relations as «very bad» and at the time. [21]
  • In more ways than one the Turk Stream pipeline can be viewed as a reconfigured of the failed Nabucco natural gas pipeline. Not only will Turk Stream court Turkey and give Moscow leverage against the European Union, instead of reducing Russian influence as Nabucco was originally intended to do, the new pipeline to Turkey also coaxes Ankara to align its economic and strategic interests with those of Russian interests. This is why, when addressing Nabucco and the rivalries for establishing alternate energy corridors, this author pointed out in 2007 that «the creation of these energy corridors and networks is like a two-edged sword. These geo-strategic fulcrums or energy pivots can also switch their directions of leverage. The integration of infrastructure also leads towards economic integration». [8] The creation of Turk Stream and the strengthening of Russo-Turkish ties may even help placate the gory conflict in Syria. If Iranian natural gas is integrated into the mainframe of Turk Stream through another energy corridor entering Anatolia from Iranian territory, then Turkish interests would be even more tightly aligned with both Moscow and Tehran. Turkey will save itself from the defeats of its neo-Ottoman policies and be able to withdraw from the Syrian crisis. This will allow Ankara to politically realign itself with two of its most important trading partners, Iran and Russia.
  • Whatever Washington’s intentions are, every step that the US takes to target Russia economically will eventually hurt the US economy too. It is also highly unlikely that the policy mandarins in Beijing are unaware of what the US may try to be doing. The Chinese are aware that ultimately it is China and not Russia that is the target of the United States.
  • The United States is waging a fully fledged economic war against the Russian Federations and its national economy. Ultimately, all Russians are collectively the target. The economic sanctions are nothing more than economic warfare. If the crisis in Ukraine did not happen, another pretext would have been found for assaulting Russia. Both US Assistant-Secretary of State Victoria Nuland and US Assistant-Secretary of the Treasury Daniel Glaser even told the Foreign Affairs Committee of the US House of Representatives in May 2014 that the ultimate objectives of the US economic sanctions against Russia are to make the Russian population so miserable and desperate that they would eventually demand that the Kremlin surrender to the US and bring about «political change». «Political change» can mean many things, but what it most probably implies here is regime change in Moscow. In fact, the aims of the US do not even appear to be geared at coercing the Russian government to change its foreign policy, but to incite regime change in Moscow and to cripple the Russian Federation entirely through the instigation of internal divisions. This is why maps of a divided Russia are being circulated by Radio Free Europe. [17]
  • Without question, the US wants to disrupt the strategic partnership between Beijing and Moscow. Moscow’s strategic long-term planning and Sino-Russian cooperation has provided the Russia Federation with an important degree of economic and strategic insulation from the economic warfare being waged against the Russian national economy. Washington, however, may also be trying to entice the Chinese to overplay their hand as Russia is economically attacked. In this context, the price drops in the energy market may also be geared at creating friction between Beijing and Moscow. In part, the manipulation of the energy market and the price drops could seek to weaken and erode Sino-Russian relations by coaxing the Chinese into taking steps that would tarnish their excellent ties with their Russian partners. The currency war against the Russian ruble may also be geared towards this too. In other words, Washington may be hoping that China becomes greedy and shortsighted enough to make an attempt to take advantage of the price drop in energy prices in the devaluation of the Russian ruble.
  • Russia can address the economic warfare being directed against its national economy and society as a form of «economic terrorism». If Russia’s banks and financial institutions are weakened with the aim of creating financial collapse in the Russian Federation, Moscow can introduce fiscal measures to help its banks and financial sector that could create economic shockwaves in the European Union and North America. Speaking in hypothetical terms, Russia has lots of options for a financial defensive or counter-offensive that can be compared to its scorched earth policies against Western European invaders during the Napoleonic Wars, the First World War, and the Second World War. If Russian banks and institutions default and do not pay or delay payment of their derivative debts and justify it on the basis of the economic warfare and economic terrorism, there would be a financial shock and tsunami that would vertebrate from the European Union to North America. This scenario has some parallels to the steps that Argentina is taken to sidestep the vulture funds.
  • The currency war eventually will rebound on Washington and Wall Street. The energy war will also reverse directions. Already, the Kremlin has made it clear that it and a coalition of other countries will de-claw the US in the currency market through a response that will neutralize US financial manipulation and the petro-dollar. In the words of Sergey Glazyev, Moscow is thinking of a «systemic and comprehensive» response «aimed at exposing and ending US political domination, and, most importantly, at undermining US military-political power based on the printing of dollars as a global currency». [22] His solution includes the creation of «a coalition of sound forces advocating stability — in essence, a global anti-war coalition with a positive plan for rearranging the international financial and economic architecture on the principles of mutual benefit, fairness, and respect for national sovereignty». [23] The coming century will not be the «American Century» as the neo-conservatives in Washington think. It will be a «Eurasian Century». Washington has taken on more than it can handle, this may be why the US government has announced an end to its sanctions regime against Cuba and why the US is trying to rekindle trade ties with Iran. Despite this, the architecture of the post-Second World War or post-1945 global order is now in its death bed and finished. This is what the Kremlin and Putin’s presidential spokesman and press secretary Dmitry Peskov mean when they impart—as Peskov stated to Rossiya-24 in a December 17, 2014 interview — that the year 2014 has finally led to «a paradigm shift in the international system».
8More

The Blood Sacrifice of Sergeant Bergdahl | Matthew Hoh - 0 views

  • Last week charges of Desertion and Misbehavior Before the Enemy were recommended against Sergeant Bowe Bergdahl. Tragically, Sergeant Bergdahl was once again crucified, without evidence or trial, throughout mainstream, alternative and social media. That same day Sergeant Bergdahl was offered as a sacrifice to primarily Republican politicians, bloggers, pundits, chicken hawks and jingoists, while Democrats mostly kept silent as Sergeant Bergdahl was paraded electronically and digitally in the latest Triumph of the Global War on Terror, President Ashraf Ghani was applauded, in person, by the American Congress. Such coincidences, whether they are arranged or accidental, often appear in literary or cinematic tales, but they do, occasionally, manifest themselves in real life, often appearing to juxtapose the virtues and vices of a society for the sake and advancement of political narratives. The problem with this specific coincidence for those on the Right, indulging in the fantasy of American military success abroad, as well as for those on the Left, desperate to prove that Democrats can be as tough as Republicans, is that reality may intrude. To the chagrin and consternation of many in DC, Sergeant Bergdahl may prove to be the selfless hero, while President Ghani may play the thief, and Sergeant Bergdahl's departure from his unit in Afghanistan may come to be understood as just and his time as a prisoner of war principled, while President Obama's continued propping up and bankrolling of the government in Kabul, at the expense of American servicemembers and taxpayers, comes to be fully acknowledged as immoral and profligate.
  • Buried in much of the media coverage this past week on the charges presented against Sergeant Bergdahl, with the exception of CNN, are details of the Army's investigation into Sergeant Bergdahl's disappearance, capture and captivity. As revealed by Sergeant Bergdahl's legal team, twenty-two Army investigators have constructed a report that details aspects of Sergeant Bergdahl's departure from his unit, his capture and his five years as a prisoner of war that disprove many of the malicious rumors and depictions of him and his conduct.
  • As documented in his lawyers' statement submitted to the Army on March 25, 2015, in response to Sergeant Bergdahl's referral to the Article 32 preliminary hearing (which is roughly the military equivalent of a civilian grand jury), the following facts are now known about Sergeant Bergdahl and his time prior to and during his captivity as a prisoner of war:• Sergeant Bergdahl is a "truthful person" who "did not act out of a bad motive"; • he did not have the intention to desert permanently nor did he have an intention to leave the Army when he left his unit's outpost in eastern Afghanistan in 2009; • he did not have the intention of joining the Taliban or assisting the enemy; • he left his post to report "disturbing circumstances to the attention of the nearest general officer". • while he was a prisoner of war for five years, he was tortured, but he did not cooperate with his captors. Rather, Sergeant Bergdahl attempted to escape twelve times, each time with the knowledge he would be tortured or killed if caught; • there is no evidence American soldiers died looking for Sergeant Bergdahl.
  • ...4 more annotations...
  • Again, these are the findings of the Army's investigation into Sergeant Bergdahl's disappearance; they are not the apologies or fantasies of his legal team, Marines turned anti-war peaceniks like myself, or Obama fawning conspirators. The details behind these facts are contained in the Army's report, authored by Major General Kenneth Dahl, which has not been publically released, but hopefully will be made available to the public after Sergeant Bergdahl's preliminary hearing next month or, if the desertion and misbehavior charges are pursued, during his court martial. Just what events Sergeant Bergdahl witnessed that would compel him to risk his life, traveling unarmed through enemy controlled territory, to provide information to an American general, are not presently known. We do know that the unit Sergeant Bergdahl belonged to underwent serious disciplinary actions both before and after Sergeant Bergdahl's capture, that several of his unit's leaders were fired and replaced both prior to and subsequent to his capture, and, from communications between Sergeant Bergdahl and his family prior to his capture, Sergeant Bergdahl was sickened and distraught over the actions of his unit, including its possible complicity in the death of an Afghan child. It is quite possible Sergeant Bergdahl left his unit to report a war crime(s) or other serious crime(s) committed by American forces. He may have been trying to report a failure of his immediate leadership or it may have been something, in hindsight, that we would now consider trivial. Such an action on Sergeant Bergdahl's part would help to explain why his former platoon mates, quite possibly the very men whom Sergeant Bergdahl left to report on, have been so forceful in their condemnation of him, so determined not to forgive him for his disappearance, and so adamant in their denial to show compassion for his suffering while a prisoner of war.
  • This knowledge may explain why the Taliban believed Sergeant Bergdahl had fallen behind on a patrol rather than deserted. If he truly was deserting, than Sergeant Bergdahl most likely would have told the Taliban disparaging information about US forces in an attempt to harvest friendship and avoid torture, but if he was on a personal mission to report wrongdoing, than he certainly would not relate such information to the enemy. This may explain why Sergeant Bergdahl told his captors a lie rather than disclose his voluntary departure from the platoon outpost. This would also justify why Sergeant Bergdahl left his base without his weapon or equipment. Before his departure from his outpost, Sergeant Bergdahl asked his team leader what would happen if a soldier left the base, without permission, with his weapon and other issued gear. Sergeant Bergdahl's team leader replied that the soldier would get in trouble. Understanding Sergeant Bergdahl as not deserting, but trying to serve the Army by reporting wrongdoing to another base would explain why he chose not to carry his weapon and issued gear off of the outpost. Sergeant Bergdahl was not planning on deserting, i.e. quitting the army and the war, and he did not want to get in trouble for taking his weapon and issued gear with him on his unauthorized mission.
  • This possible exposure to senior leaders, and ultimately the media and American public, of civilian deaths or other offenses would also account for the non-disclosure agreement Sergeant Bergdahl's unit was forced to sign after his disappearance. Non-disclosure agreements may be common in the civilian world and do exist in military fields such as special operations and intelligence, but for regular infantry units they are rare. Sergeant Bergdahl's capture by the enemy, possibly while en-route to reveal war crimes or other wrongdoings, would certainly be the type of event an embarrassed chain of command would attempt to hide. Such a cover up would certainly not be unprecedented in American military history.Similar to the assertions made by many politicians, pundits and former soldiers that Sergeant Bergdahl deserted because, to paraphrase, he hated America and wanted to join the Taliban, the notion that he cooperated and assisted the Taliban while a prisoner of war has also been debunked by the Army's investigation. We know that Sergeant Bergdahl resisted his captors throughout his five years as a prisoner of war. His dozen escape attempts, with full knowledge of the risks involved in recapture, are in keeping with the Code of Conduct all American service members are required to abide by during captivity by the enemy.
  • In his own words, Sergeant Bergdahl's description of his treatment reveals a ghastly and barbaric five years of non-stop isolation, exposure, malnutrition, dehydration, and physical and psychological torture. Among other reasons, his survival must be attested to an unshakeable moral fortitude and inner strength. The same inherent qualities that led him to seek out an American general to report "disturbing circumstances" could well be the same mental, emotional and spiritual strengths that kept him alive through half a decade of brutal shackling, caging, and torture. It is my understanding the US military's prisoner of war and survival training instructors are studying Sergeant Bergdahl's experience in order to better train American service members to endure future experiences as prisoners of war. Susan Rice, President Obama's National Security Advisor, was roundly lampooned and criticized last year for stating that Sergeant Bergdahl "served with honor and distinction". It is only the most callous and politically craven among us who, now understanding the torture Sergeant Bergdahl endured, his resistance to the enemy that held him prisoner, and his adherence to the US military's Code of Conduct for five years in horrific conditions, would argue that he did not serve with honor and distinction.
  •  
    There's more article than I highlighted and it's worth reading. Obama should step in here and issue a full pardon to end this young man's torment by Army generals playing to the press. Let's recall here that Obama, when asked to prosecute Bush II officials for war crimes, said he would rather look forward rather than backward. Sgt. Bergdahl, who committed no war crime, deserves no less. Five years of torture and malnutrition as a POW is more punishment than anyone deserves.
1More

Harry Binswanger - Market Justice & The Second Amendment - Forbes - 0 views

  •  
    One of the best arguments for protecting individual liberty through the Constitution and Bill of Rights; including the 2nd Amendment. excerpt: Junking the collectivist approach, ridding myself of the idea that the lives of the few can be sacrificed to the lives of the many, I found the issue almost settled itself. Taking the individualist approach, I asked myself: what laws should the individual be subject to? What is the principle governing the individual's relation to the state? The principle is "individual rights"-your rights and mine. Rights define the proper limits of state action. They recognize the areas within which the individual is sovereign, entitled to act on his own judgment, free from interference by his fellow man and by the state. The fundamental right is the right to life. Its expressions are the right to liberty, property, and the pursuit of happiness. As the Declaration states, government is established "to secure these rights." To secure them against what? There is only one thing that can deprive a man of his life, liberty, or property: physical force. Only guns, clubs, chains, jails, or some form of nonconsensual physical contact can kill you, injure you, or negate your ability to act on your own judgment. The proper job of government is to protect the individual's rights by wielding retaliatory force against the force initiated by criminals or foreign aggressors. The issue with guns is the threat of force. But the threat of force is force. Orders issued at gunpoint are as coercive-as rights-violating-as laying on hands and overpowering you. (All this is explained in more detail in Ayn Rand's articles "Man's Rights" and "The Nature of Government.") The government may use force only against an objective threat of force. Only that constitutes retaliation. In particular, the government may not descend to the evil of preventive law. The government cannot treat men as guilty until they have proven th
1More

'Clinton death list': 33 spine-tingling cases - 0 views

  •  
    "(Editor's note: This list was originally published in August 2016 and has gone viral on the web. WND is running it again as American voters cast their ballots for the nation's next president on Election Day.) How many people do you personally know who have died mysteriously? How about in plane crashes or car wrecks? Bizarre suicides? People beaten to death or murdered in a hail of bullets? And what about violent freak accidents - like separate mountain biking and skiing collisions in Aspen, Colorado? Or barbells crushing a person's throat? Bill and Hillary Clinton attend a funeral Apparently, if you're Bill or Hillary Clinton, the answer to that question is at least 33 - and possibly many more. Talk-radio star Rush Limbaugh addressed the issue of the "Clinton body count" during an August show. "I swear, I could swear I saw these stories back in 1992, back in 1993, 1994," Limbaugh said. He cited a report from Rachel Alexander at Townhall.com titled, "Clinton body count or left-wing conspiracy? Three with ties to DNC mysteriously die." Limbaugh said he recalled Ted Koppel, then-anchor of ABC News' "Nightline," routinely having discussions on the issue following the July 20, 1993, death of White House Deputy Counsel Vince Foster. In fact, Limbaugh said, he appeared on Koppel's show. "One of the things I said was, 'Who knows what happened here? But let me ask you a question.' I said, 'Ted, how many people do you know in your life who've been murdered? Ted, how many people do you know in your life that have died under suspicious circumstances?' "Of course, the answer is zilch, zero, nada, none, very few," Limbaugh chuckled. "Ask the Clintons that question. And it's a significant number. It's a lot of people that they know who have died, who've been murdered. "And the same question here from Rachel Alexander. It's amazing the cycle that exists with the Clintons. [Citing Townhall]: 'What it
1More

The Biggest Financial Scam In World History           : Information Clearing ... - 0 views

  •  
    Marbux sent me this link to series of videos explaining the LiBOR bankster crisis.  The awesome Bill Black is featured in two of the video interviews.  Others include Matt Taibi of the Rolling Stone Magazine.  Matt's work on bankster criminals is legendary.  This is incredible stuff.  Very heated.  Clearly we are at the heart of the largest criminal fraud ever perpetrated, and it involves the worlds largest banksters.  Including the Queen of England (Bank of England).  $800 Trillion in fraud.  Incredible. Yes, the Libor Scandal Affects You By Jack Hough July 06, 2012 "Smart Money" - -A liger is a cross between a lion and a tiger. Libor, on the other hand, is a daily approximation of what banks charge each other for loans. It turns out only one of these things is real. Awkwardly, it's not the one used to set prices on an estimated $800 trillion in global financial instruments, or $116,000 worth for each person on earth, ranging from complex derivatives to student loans. That's a problem for holders of bank stocks - which includes just about anyone who owns a mutual fund or 401(k). Barclays (BCS) agreed last week to pay $453 million to settle allegations that it manipulated Libor, which stands for London interbank offered rate. As The Wall Street Journal reported Thursday, it's likely only the first: More than a dozen banks on three continents are under investigation. Libor is compiled by asking 18 banks what they think they would pay if they needed money. Some banks may have submitted artificially low responses during the global financial crisis to give the appearance of high creditworthiness. Others may have tinkered with the reading to profit from trades, or avoid losses. The Barclays settlement is affordable, at less than 7% of the company's projected profits this year, but the size of legal claims it and other banks face is difficult to imagine. Trial lawyers will do their best to work out the sums, of course. Libor may have been subject
1More

NONE DARE CALL IT CONSPIRACY  by Gary Allen - 1 views

  •  
    "NONE DARE CALL IT CONSPIRACY" - Web Version Copyright © 1971 by Gary Allen with Larry Abraham  ISBN: 0899666612 Sourced INTRODUCTION 1. DON'T CONFUSE ME WITH FACTS 2. SOCIALISM - ROYAL ROAD TO POWER FOR THE SUPER-RICH 3. THE MONEY MANIPULATORS 4. BANKROLLING THE BOLSHEVIK REVOLUTION 5. ESTABLISHING THE ESTABLISHMENT 6. THE ROCKEFELLERS AND THE REDS 7. PRESSURE FROM ABOVE AND PRESSURE FROM BELOW 8. YOU ARE THE ANSWER     FOURTEEN SIGNPOSTS TO SLAVERY     WHAT WILL YOU DO?     MEMBERS OF THE COUNCIL ON FOREIGN RELATIONS NOMINATED AND APPOINTED BY PRESIDENT NIXON TO GOVERNMENT POSTS     OPERATION COUNTERATTACK WHAT THOSE "IN THE KNOW" SAY I wish that every citizen of every country in the free world and every slave behind the Iron Curtain might read this book. Ezra Taft Benson - Former Secretary of Agriculture NDCC is an admirable job of amassing information to prove that communism is socialism and socialism (a plot to enslave the world) is not a movement of the downtrodden but a scheme supported and directed by the wealthiest of people. If enough Americans read and act upon NDCC, they really can save the Republic from the conspirators - whose plans for the destruction of our country are galloping fast toward completion. Dan Smoot - Former Assistant to J. Edgar Hoover Now that NDCC is available, I no longer need to answer "no" to the question which is often put to me, namely: "Mr. Dodd, is there a book which I can read so I can know what you know?" No higher praise is possible for this book. Norman Dodd - Chief Investigator Reece Committee to Investigate Foundations This book concerns the way in which our nation and other nations are actually governed. As Benjamin Disaeli said, this is not the way in which most people think nations are governed. The whole subject of the Insiders who so largely control our political and economic lives is a fascinating mystery. For the reader who is intelligent but uninitiated in the literature of super
5More

US v. Warshak, 631 F. 3d 266 - Court of Appeals, 6th Circuit 2010 - Google Scholar - 0 views

  • While a letter is in the mail, the police may not intercept it and examine its contents unless they first obtain a warrant based on probable cause. Ibid. This is true despite the fact that sealed letters are handed over to perhaps dozens of mail carriers, any one of whom could tear open the thin paper envelopes that separate the private words from the world outside. Put another way, trusting a letter to an intermediary does not necessarily defeat a reasonable expectation that the letter will remain private. See Katz, 389 U.S. at 351, 88 S.Ct. 507 ("[W]hat [a person] seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected."). Given the fundamental similarities between email and traditional forms of communication, it would defy common sense 286*286 to afford emails lesser Fourth Amendment protection. See Patricia L. Bellia & Susan Freiwald, Fourth Amendment Protection for Stored E-Mail, 2008 U. Chi. Legal F. 121, 135 (2008) (recognizing the need to "eliminate the strangely disparate treatment of mailed and telephonic communications on the one hand and electronic communications on the other"); City of Ontario v. Quon, ___ U.S. ___, 130 S.Ct. 2619, 2631, 177 L.Ed.2d 216 (2010) (implying that "a search of [an individual's] personal e-mail account" would be just as intrusive as "a wiretap on his home phone line"); United States v. Forrester, 512 F.3d 500, 511 (9th Cir.2008) (holding that "[t]he privacy interests in [mail and email] are identical"). Email is the technological scion of tangible mail, and it plays an indispensable part in the Information Age.
  • Over the last decade, email has become "so pervasive that some persons may consider [it] to be [an] essential means or necessary instrument[] for self-expression, even self-identification." Quon, 130 S.Ct. at 2630. It follows that email requires strong protection under the Fourth Amendment; otherwise, the Fourth Amendment would prove an ineffective guardian of private communication, an essential purpose it has long been recognized to serve. See U.S. Dist. Court, 407 U.S. at 313, 92 S.Ct. 2125; United States v. Waller, 581 F.2d 585, 587 (6th Cir.1978) (noting the Fourth Amendment's role in protecting "private communications"). As some forms of communication begin to diminish, the Fourth Amendment must recognize and protect nascent ones that arise. See Warshak I, 490 F.3d at 473 ("It goes without saying that like the telephone earlier in our history, e-mail is an ever-increasing mode of private communication, and protecting shared communications through this medium is as important to Fourth Amendment principles today as protecting telephone conversations has been in the past.").
  • If we accept that an email is analogous to a letter or a phone call, it is manifest that agents of the government cannot compel a commercial ISP to turn over the contents of an email without triggering the Fourth Amendment. An ISP is the intermediary that makes email communication possible. Emails must pass through an ISP's servers to reach their intended recipient. Thus, the ISP is the functional equivalent of a post office or a telephone company. As we have discussed above, the police may not storm the post office and intercept a letter, and they are likewise forbidden from using the phone system to make a clandestine recording of a telephone call—unless they get a warrant, that is. See Jacobsen, 466 U.S. at 114, 104 S.Ct. 1652; Katz, 389 U.S. at 353, 88 S.Ct. 507. It only stands to reason that, if government agents compel an ISP to surrender the contents of a subscriber's emails, those agents have thereby conducted a Fourth Amendment search, which necessitates compliance with the warrant requirement absent some exception. In Warshak I, the government argued that this conclusion was improper, pointing to the fact that NuVox contractually reserved the right to access Warshak's emails for certain purposes. While we acknowledge that a subscriber agreement might, in some cases, be sweeping enough to defeat a reasonable expectation of privacy in the contents of an email account, see Warshak I, 490 F.3d at 473; Warshak II, 532 F.3d at 526-27, we doubt that will be the case in most situations, and it is certainly not the case here.
  • ...1 more annotation...
  • Accordingly, we hold that a subscriber enjoys a reasonable expectation of privacy in the contents of emails "that are stored with, or sent or received through, a commercial ISP." Warshak I, 490 F.3d at 473; see Forrester, 512 F.3d at 511 (suggesting that "[t]he contents [of email messages] may deserve Fourth Amendment protection"). The government may not compel a commercial ISP to turn over the contents of a subscriber's emails without first obtaining a warrant based on probable cause. Therefore, because they did not obtain a warrant, the government agents violated the Fourth Amendment when they obtained the contents of Warshak's emails. Moreover, to the extent that the SCA purports to permit the government to obtain such emails warrantlessly, the SCA is unconstitutional.
  •  
    A 2010 decision by the U.S. 6th Circuit Court of Appeals that I had missed up to now. It finds the Stored Communications Act's section that excuses email in the possession of an ISP for more than 180 days from the 4th Amendment's judicial warrant clause. There may yet be hope for cloud computing in the U.S. 
4More

Encouraging Words of Regret From Dean Baquet and Weasel Words From James Clapper - The ... - 0 views

  • One should not expect any change to come from the U.S. government itself (which includes Congress), whose strategy in such cases is to enact the pretext of “reform” so as to placate public anger, protect the system from any serious weakening, and allow President Obama to go before the country and the world and give a pretty speech about how the U.S. heard their anger and re-calibrated the balance between privacy and security. Any new law that comes from the radically corrupted political class in DC will either be largely empty, or worse. The purpose will be to shield the NSA from real reform. There are, though, numerous other avenues with the real potential to engender serious limits on the NSA’s surveillance powers, including the self-interested though genuine panic of the U.S. tech industry over how surveillance will impede their future business prospects, the efforts of other countries to undermine U.S. hegemony over the internet, the newfound emphasis on privacy protections from internet companies worldwide, and, most of all, the increasing use of encryption technology by users around the world that poses genuine obstacles to state surveillance. Those are all far, far more promising avenues than any bill Barack Obama, Dianne Feinstein and Saxby Chambliss will let Congress cough up.
  • That national security state officials routinely mislead and deceive the public should never have even been in serious doubt in the first place – certainly not for journalists, and especially now after the experience of the Iraq War. That fact — that official pronouncements merit great skepticism rather than reverence — should be (but plainly is not) fundamental to how journalists view the world. More evidence for that is provided by a Washington Post column today by one of the national security state’s favorite outlets, David Ignatius. Ignatius interviewed the chronic deceiver, Director of National Intelligence James Clapper, who now “says it appears the impact [of Snowden's leaking] may be less than once feared because ‘it doesn’t look like he [Snowden] took as much’ as first thought.” Clapper specifically casts serious doubt on the U.S. government’s prior claim that Snowden ”had compromised the communications networks that make up the military’s command and control system”; instead, “officials now think that dire forecast may have been too extreme.” Ignatius — citing an anonymous “senior intelligence official” (who may or may not be Clapper) — also announces that the government has yet again revised its rank speculation about how many documents Snowden took: “This batch of probably downloaded material is about 1.5 million documents, the senior official said. That’s below an earlier estimate of 1.77 million documents.”
  • Most notable is Ignatius’ summary of the government’s attempt to claim Snowden seriously compromised the security of the U.S.: Pressed to explain what damage Snowden’s revelations had done, the official was guarded, saying that there was “damage in foreign relations” and that the leaks had “poisoned [NSA’s] relations with commercial providers.” He also said that terrorist groups had carefully studied the disclosures, turning more to anonymizers, encryption and use of couriers to shield communications. The senior official wouldn’t respond to repeated questions about whether the intelligence community has noted any changes in behavior by either the Russian or Chinese governments, in possible response to information they may have gleaned from Snowden’s revelations. In other words, the only specific damage they can point to is from the anger that other people around the world have about what the U.S. government has done and the fact that people will not want to buy U.S. tech products if they fear (for good reason) that those companies collaborate with the NSA. But, as usual, there is zero evidence provided (as opposed to bald, self-serving assertions) of any harm to genuine national security concerns (i.e., the ability to monitor anyone planning actual violent attacks).
  • ...1 more annotation...
  • As is always the case, the stream of fear-mongering and alarmist warnings issued by the government to demonize a whistleblower proves to be false and without any basis, and the same is true for accusations made about the revelations themselves (“In January, [Mike] Rogers said that the report concluded that most of the documents Snowden had access to concerned ‘vital operations of the U.S. Army, Navy, Marine Corps and Air Force’” – AP: Lawmakers: Snowden’s Leaks May Endanger US Troops“). But none of that has stopped countless U.S. journalists from mindlessly citing each one of the latest evidence-free official claims as sacred fact.
7More

DOJ Seeks Removal Of Restrictions On Computer Search Warrants - 0 views

  • The Justice Department recently submitted proposed new rules on the procedures and practices of the department’s agencies and bureaus. Among the suggested changes is a modification of the Federal Rules of Criminal Procedure Rule 41(b), which empowers a federal court to issue a warrant allowing the federal government to conduct a search of a computer or computer network involved in a criminal investigation. Under current regulations, a warrant issued by a federal court is only valid in that court’s district. As there are 94 federal judicial districts, investigating a widespread attack may require either petitioning dozens of district courts or acting extrajudicially by not seeking a warrant. An extrajudicial investigation, however, cannot be used if criminal convictions are sought, as evidence gathered in this manner is not typically admissible in court. The Justice Department is seeking to make remote access warrants to search, seize and copy electronic information valid for all federal districts.
  • The Justice Department argues that due to the sophistication of cyber-criminals, an offending computer or computer cluster can sit in a district separate from the district where the hackers that infected the target computer anonymously are and separate from the investigators’ district. “Criminals are using multiple computers in many districts simultaneously as part of complex criminal schemes, and effectively investigating and disrupting these schemes often requires remote access to Internet-connected computers in many different districts,” wrote then-acting Assistant Attorney General Mythili Raman in a September letter to the Advisory Committee on the Criminal Rules. “Botnets are a significant threat to the public: they are used to conduct large-scale denial of service attacks, steal personal and financial data, and distribute malware designed to invade the privacy of users of the host computers,” Raman continued. In the letter, Raman cited an investigation of a child porn site that uses The Onion Router Network, or Tor, to anonymize its traffic. The Justice Department argues that it knows the site’s hosting server location, but without a warrant local to the server, the department is prevented from retrieving the server’s user records — including IP and MAC addresses. In most cases, however, law enforcement do not know the physical location of the site’s server, making it impossible to request a specific warrant.
  • In these cases, the Justice Department could request a blanket warrant. This would allow the department to set up a “zero-day” attack on the server — an attack exploiting a manufacturer-unknown or -permitted security flaw, allowing access to the system’s operating software. However, a Texas judge denied the FBI access to such a warrant, saying the Justice Department’s use of “zero-day” attacks in its investigation exposes the public and the target to unknown risks. One typical type of a “zero-day” attack is an infected email that could affect a large number of innocent people if the target used a public computer to access his email. The FBI planned to install a Remote Administration Tool, or RAT, which would distribute such emails in a partially-targeted spam mail distribution. Last year, Federal Magistrate Judge Stephen Smith of the Houston Division of the Southern District of Texas ruled that this was a gross overreach of investigatory intrusion, blocking the plan temporarily. A “zero-day” attack has the potential to activate and control the targeted computer’s peripherals, such as webcams and microphones.
  • ...2 more annotations...
  • Following this ruling, based on the assumptions that federal law enforcement fundamentally act in good faith and that there may be a legitimate need for remote exploitation of computer data, the Justice Department sought to introduce changes to the rules that would overcome Smith’s objections. The proposed change to Rule 41(b) would allow magistrate judges “… to issue a warrant to use remote access to search electronic storage media and to seize electronically stored information located within or outside that district.” The Justice Department has indicated that it wants warrants permitting multiple computers to be searched at the same time, as well as permission to search all of the email and social media accounts accessible from a single computer. Such access would constitute a violation of the Electronic Communications Privacy Act, as the government, under the act, must make demonstrate probable cause to each targeted service provider and obtain and serve a warrant for each service provider. A warrant to search every account active on a computer would be actively bypassing the act’s numerous safeguards.
  • Privacy advocates fear that this rule change would allow prosecutors and the Justice Department to seek out magistrates likely to give them their requested warrants, creating a situation in which the federal government could have a “warrant shop” with just one judge for the whole of the nation. In light of allegations of federal government over-policing — including revelations of aggressive domestic and international electronic spying by the FBI and the National Security Agency — many advocates argue that an examination of the federal government’s commitment to the Fourth Amendment is needed. “The proposed amendment would significantly expand the government’s authority to conduct remote searches of electronic storage media,” the American Civil Liberties Union wrote in a memorandum early last month. “It would also expand the government’s power to engage in computer hacking in the course of criminal investigations, including through the use of malware and other techniques that pose a risk to internet security and that raise Fourth Amendment and policy concerns. “In light of these concerns, the ACLU recommends that the Advisory Committee exercise extreme caution before granting the government new authority to remotely search individuals’ electronic data.” The rules are scheduled to be discussed at the meeting of the Judiciary’s Committee on Rules of Practice and Procedure later this month.
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. ("Oh, Goody! Let's start shopping around for the judges we like instead of the ones we are now required to persuade. What? The Mississippi judge refused to sign the warrant? Oh well, let's try it with that other judge we like, the one in Gnome, Alaska.") In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted in the warrant's bottom margin, no doubt
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted at the bottom.  To be continued after this is intially posted to Diigo so the content isn't cut off.   
4More

​Russia may join forces with China to compete with US, European satnavs - RT ... - 0 views

  • Russia and China are eyeing a number of joint high-tech projects, ranging from creation of a new long-range passenger plane to joining forces on a satellite navigation system to compete with American GPS and European Galileo. The range of prospects was outlined on Friday by Russian Deputy Prime Minister Dmitry Rogozin, who met Chinese Vice-Premier Wang Yang in Siberian Novosibirsk. Rogozin said Russia would develop cooperation with BRICS members in defiance of any possible Western sanctions. “Our technological partnership should be directed at the countries that are close to us in mentality and which in general constitute an emerging geopolitical force that we could rely on in opposing the monopolar world. Those are BRICS countries first and foremost,” he said.
  • Rogozin set examples of several joint projects Russia has or may have with China. The most concrete is the project for a new long-range wide-hull airliner with an estimated development cost of $7-8 billion. Russia and China have already signed a memorandum on it in May. Another aviation project the countries may pursuit is the modernization of Mil Mi-26 heavy transport helicopter. The aircraft design would be altered for smaller weight, but without compromising its capacity too much. The new helicopter would be able to carry up to 15 tons of cargo as opposed to 20 tons of the original.
  • If both pilot projects do well, Russia and China may form a permanent cooperation consortium similar to Europe’s Airbus, Rogozin said. China and Russia may also find synergy in space by making their respective satellite navigation systems, Glonass and Beidou, more compatible, the Russian official said. “We see good prospect in cooperation between the Russian Glonass system and the Chinese navigation system,” he said. “Our system is more suitable for northern, polar latitudes. The Chinese system is more southern. Their complementariness would result in a biggest and most powerful competitor to any navigation system." Rogozin’s shot was aimed at both American GPS, which was the focus of a recent fallout between Russia and the US, and the European Galileo. He also commented on Russia’s downgrade of the work of ground stations of the Differential GPS network based in the Russian territory. This week’s move was Moscow’s response to Washington’s failure to allow deployment of similar Glonass stations in America.
  •  
    So Russia and China aim to take down Boeing and Airbus. And it seems as though the BRICS nations may get their own global positioning system by integrating Russian and Chinese satnavs. While Russia and China progress rapidly for earned economic leadership of the world, the U.S. sinks billions intoa new super-aircraft carrier and lets its civilian infrastructure -- vital to economic recovery if were was any serious plan to recover -- disintegrate into obsolete rust. But Obama tells us that the U.S. economy is not in decline.That's why China becomes the world's largest economy this year, no doubt. 
10More

Possible Constitutional Amendments in the event of an Article V Convention of States - ... - 0 views

  • NUMBER ONE: "Section One:   The Constitution of the United States shall be read and interpreted literally.   No words or phrases shall be changed or substituted and no part of the Constitution shall be used to expand or increase Federal Power or Authority beyond that EXPRESSLY granted and enumerated in the Constitution.   The language of the Constitution shall be interpreted according to the definition of words at the time of their inclusion in the Constitution. Section Two:    Congress shall have, by two thirds vote of both the House of Representatives and the Senate, the power to override individual rulings of the Supreme Court of the United States and/or subordinate Federal Courts.   The President shall not have veto authority over Congressional overrides of Federal Court decisions."
  • NUMBER TWO: "Section One:    No person shall be elected to Congress more than once unless serving in Congress at the time of the ratification of this amendment, in which case members of Congress shall be eligible for re-election to their respective seats one time. Section Two:     In the event the Seventeenth Amendment to the Constitution of the United States is repealed members of the Senate of the United States shall serve at the pleasure and discretion of the Legislature of their respective State. Section Three:  Neither Congress, the President, nor any Federal Court shall make any law, rule, regulation, or order that does not apply equally to themselves and all citizens of the United States.   Nor shall Congress, the President, or any Federal Court cause or allow any law, rule, regulation, or order to be made by any agent or agency of the Federal Government that does not apply equally to themselves and all citizens of the United States.
  • Section Four:    Neither Congress nor the President shall receive any publically-funded retirement or benefit beyond appropriate pay not available to all citizens of the United States. Section Five:    Section Four shall not apply to members of Congress or Presidents, serving or retired, at the time of the ratification of this amendment. Section Six:      The President shall be subject to popular recall by his/her constituency.   Within 90 days of the ratification of this amendment Congress shall pass legislation governing the recall of the President.   In the event Congress fails to pass the required legislation within the required 90 days, the President shall be considered to have been recalled and a new election held within 60 days. Section Seven: Members of Congress shall be subject to popular recall by their respective constituencies, unless the Seventeenth Amendment to the Constitution of the United States is repealed, in which case only members of the House of Representatives shall be subject to popular recall.   Within 90 days of the ratification of this amendment each State shall pass legislation governing the recall of its Congressional Delegation.   In the event a State fails to pass the required legislation within the required 90 days, that State's Congressional Delegation shall be considered to have been recalled and new elections held within 60 days."
  • ...6 more annotations...
  • NUMBER THREE: "Congress shall make and the President shall sign a Balanced Federal Budget every year and before the beginning of the ensuing fiscal year.   In the event Congress and the President fail to make said Balanced Federal Budget before the beginning of the ensuing fiscal year, the last Constitutionally passed and signed Federal Budget shall go into effect and shall be the Federal Budget for the entirety of the ensuing fiscal year.   Balanced shall be defined as expenditures not to exceed revenues except in time of war as declared by Congress.   Revenues shall be defined as monies received; not monies predicted, anticipated, or forecasted.   Unfunded liabilities, obligations, and/or mandates shall be included in the calculation of the Balanced Federal Budget."
  • NUMBER FOUR: "The Fourteenth, Sixteenth, and Seventeenth Amendments to the Constitution of the United States are hereby repealed.   All Federal agencies, programs, laws, rules, regulations, and/or orders created, passed, or handed down as a direct or indirect result of the Fourteenth, Sixteenth, and/or Seventeenth Amendments are hereby stricken from Law, declared null and void, and have no force of effect."
  • NUMBER FIVE: "Section One:     Only persons born of two parents, both of whom are citizens of the United States at the time of the birth of the person, shall be citizens of the United States unless naturalized under the terms and conditions of the Constitution of the United States. Section Two:      Only United States Citizens shall enjoy or receive all rights, benefits, and privileges of United States Citizenship. Section Three:   Non-citizens shall not receive, directly or indirectly, Federal or Constitutional benefits, privileges, or protections."
  • NUMBER SIX:   "The several States are hereby empowered, individually or collectively, to enforce the Constitution of the United States and Federal Law, within their respective borders, regardless of Federal resistance or objections."
  • NUMBER SEVEN:   "Section One:   The Second Amendment to the Constitution of the United States shall be interpreted to mean the FUNDAMENTAL right of individual citizens and/or groups of citizens to keep and bear arms; in their homes and/or other properties, in public and private, and on their persons. Section Two:    Non-citizens and persons convicted of a violent felony by a jury of their peers do not have this right."
  • NUMBER EIGHT: "The First Amendment to the Constitution of the United States shall not be interpreted to prohibit or restrict the peaceful, free exercise or expression of religion, in public or private, or in or on public property."
  •  
    "Possible Constitutional Amendments in the event of an Article V Convention of States Posted by Oren Long on January 12, 2015 at 3:42am in Tea PartyView Discussions ARTICLE V CONVENTION OF STATES; ARE YOU WILLING TO CHANGE THE STATUS QUO IN D.C.?   One of our astute and true conservative members of this site has drafted suggested changes to the Constitution to be proposed in an Article V, Convention of States. I know many of you have seen his postings on here about this issue. Mr. Oren Long is very knowledgeable and well educated and has honorably served our country. He has put a tremendous amount of time and thought into ways to, in his words, "armor and reinforce" the Constitution and return it to its Original Intent, as envisioned by the Founders. Therefore, because I agree with every one of his suggested changes, I am publishing it for him, with his permission. I truly hope that we, as a group, as conservatives and as a people who believe that our country is heading toward disaster, because of the course we are on, I fully endorse his recommended suggestions. I believe that we must take any and every course of action we can to "stop the madness" It is quite long, so PLEASE take the time to read each and every one of them. I am sure that some or many, may have suggestions to this document and they are welcome and open to discussion. If you agree with this, please call your State elected officials and urge them to get on board with an Article V Convention of States. To review or obtain more information of this process, please visit one of these sites:    http://www.conventionofstates.com/           http://www.cosaction.com/              To Whom It May Concern, The following is neither sanctioned by nor proposed by the Article V Convention of States Project.   Rather, it is entirely my work as a volunteer for the Convention of States Project.   To give you an overview of the kinds of amendments that may or may not be consid
1 - 20 of 1579 Next › Last »
Showing 20 items per page