Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Personal-Information

Rss Feed Group items tagged

6More

James Clapper Confirms VADM Mike Rogers Needlessly Obfuscated in Confirmation Hearing |... - 0 views

  • On Friday, James Clapper finally provided Ron Wyden an unclassified response to a question he posed on January 29, admitting that the NSA conducts back door searches. (via Charlie Savage) As reflected in the August 2013 Semiannual Assessment of Compliance with Procedures and Guidelines Issued Pursuant to Section 702, which we declassified and released on August 21, 2013, there have been queries, using U.S. person identifiers, of communications lawfully acquired to obtain foreign intelligence by targeting non U.S. persons reasonably believed to be located outside the U.S. pursuant to Section 702 of FISA. It has taken just 9 months for Clapper to admit that, contrary to months of denials, the NSA (and FBI, which he doesn’t confirm but which the Report makes clear, as well as the CIA) can get the content of Americans’ communications without a warrant. But Clapper’s admission that this fact was declassified in August should disqualify Vice Admiral Mike Rogers from confirmation as CyberComm head (I believe he started serving as DIRNSA head, which doesn’t require confirmation, yesterday). Because it means Rogers refused to answer a question the response to which was already declassified.
  • Udall: If I might, in looking ahead, I want to turn to the 702 program and ask a policy question about the authorities under Section 702 that’s written into the FISA Amendments Act. The Committee asked your understanding of the legal rationale for NASA [sic] to search through data acquired under Section 702 using US person identifiers without probable cause. You replied the NASA–the NSA’s court approved procedures only permit searches of this lawfully acquired data using US person identifiers for valid foreign intelligence purposes and under the oversight of the Justice Department and the DNI. The statute’s written to anticipate the incidental collection of Americans’ communications in the course of collecting the communications of foreigners reasonably believed to be located overseas. But the focus of that collection is clearly intended to be foreigners’ communications, not Americans. But declassified court documents show that in 2011 the NSA sought and obtained the authority to go through communications collected under Section 702 and conduct warrantless searches for the communications of specific Americans. Now, my question is simple. Have any of those searches been conducted?
  • Rogers: I apologize Sir, I’m not in a position to answer that as the nominee. Udall: You–yes. Rogers: But if you would like me to come back to you in the future if confirmed to be able to specifically address that question I will be glad to do so, Sir. Udall: Let me follow up on that. You may recall that Director Clapper was asked this question in a hearing earlier this year and he didn’t believe that an open forum was the appropriate setting in which to discuss these issues. The problem that I have, Senator Wyden’s had, and others is that we’ve tried in various ways to get an unclassified answer — simple answer, yes or no — to the question. We want to have an answer because it relates — the answer does — to Americans’ privacy. Can you commit to answering the question before the Committee votes on your nomination?
  • ...3 more annotations...
  • Rogers: Sir, I believe that one of my challenges as the Director, if confirmed, is how do we engage the American people — and by extension their representatives — in a dialogue in which they have a level of comfort as to what we are doing and why. That is no insignificant challenge for those of us with an intelligence background, to be honest. But I believe that one of the takeaways from the situation over the last few months has been as an intelligence professional, as a senior intelligence leader, I have to be capable of communicating in a way that we are doing and why to the greatest extent possible. That perhaps the compromise is, if it comes to the how we do things, and the specifics, those are perhaps best addressed in classified sessions, but that one of my challenges is I have to be able to speak in broad terms in a way that most people can understand. And I look forward to that challenge. Udall: I’m going to continue asking that question and I look forward to working with you to rebuild the confidence. [my emphasis]
  • I assume that now that Clapper has given him the okay to discuss unclassified topics with Congress, Rogers will now provide a forthright answer, all the while claiming he was ignorant about the answer at the time (fine! then make me DIRNSA because I know more about it!). But Rogers’ response went far beyond such an answer. He refused — not just in the hearing but even after it — to commit to answering a question with a completely unclassified answer. And as I pointed out in this post, his written answers were even more obfuscatory. I don’t get a vote. But I think this should disqualify him as a nominee.
  • Update: Here’s the exchange in Rogers’ questions for the record on back door searches. What is your understanding of the legal rationale for NSA to search through data acquired under section 702 using U.S. Persons identifiers without probable cause? Information acquired by NSA under Section 702 of FI SA must be handled in strict accordance with minimization procedures adopted by the Attorney General and approved by the Foreign Intelligence Surveillance Court. As required by the statute and certifications approving Section 702 acquisitions, such activities must be limite d to targeting non-U.S. persons reasonably believed to be located outside the United States . NSA’s Court-approved procedures only permit searches of this lawfully acquired data using U.S. person identifiers for valid foreign intelligence purposes and under the oversight of the Department of Justice and Office of Director of National Intelligence.
4More

'Top Secret' emails found as Clinton probe expands to key aides | McClatchy DC - 0 views

  • As pressure builds on Hillary Clinton to explain her official use of personal email while serving as secretary of state, she faced new complications Tuesday. It was disclosed her top aides are being drawn into a burgeoning federal inquiry and that two emails on her private account have been classified as “Top Secret.”The inspector general for the Intelligence Community notified senior members of Congress that two of four classified emails discovered on the server Clinton maintained at her New York home contained material deemed to be in one of the highest security classifications - more sensitive than previously known. The notice came as the State Department inspector general’s office acknowledged that it is reviewing the use of “personal communications hardware and software” by Clinton’s former top aides after requests from Congress.
  • The expanding inquiry threatens to further erode Clinton’s standing as the front-runner for the Democratic presidential nomination. Since her reliance on private email was revealed in March, polls in crucial swing states show that increasing numbers of voters say Clinton is not honest and trustworthy, in part, because of her use of private emails.
  • Sen. Chuck Grassley, the Republican chairman of the Judiciary Committee, wants Clinton and her aides to “come clean and cough up” information about their personal email use. “Both the State Department and Intelligence Community inspectors general should be looking into the staff use of the Clinton private server for official State Department business. This means giving both inspectors general access and custody of all emails that haven’t already been deleted,” said Grassley of Iowa. “From what is publicly known, it appears that the investigation thus far has focused so much on the former secretary of state, that it’s gotten lost that high-level staff apparently also used this server too.” State Department spokesman John Kirby referred to the Intelligence Community’s disclosure as a recommendation to “upgrade” the two emails’ classification to “Top Secret.” In a statement, he said that “while we work with the Director of National Intelligence to resolve whether, in fact, this material is actually classified, we are taking steps to ensure the information is protected and stored appropriately.”
  • ...1 more annotation...
  • At least four top aides have turned over records, including copies of work emails on personal accounts, to the State Department, which is collecting them in response to a subpoena from Capitol Hill, according to the department. Lawmakers have demanded records, including personal emails, from six other aides, but it’s unknown whether they used personal email for work.
3More

Tell Congress: My Phone Calls are My Business. Reform the NSA. | EFF Action Center - 0 views

  • The USA PATRIOT Act granted the government powerful new spying capabilities that have grown out of control—but the provision that the FBI and NSA have been using to collect the phone records of millions of innocent people expires on June 1. Tell Congress: it’s time to rethink out-of-control spying. A vote to reauthorize Section 215 is a vote against the Constitution.
  • On June 5, 2013, the Guardian published a secret court order showing that the NSA has interpreted Section 215 to mean that, with the help of the FBI, it can collect the private calling records of millions of innocent people. The government could even try to use Section 215 for bulk collection of financial records. The NSA’s defenders argue that invading our privacy is the only way to keep us safe. But the White House itself, along with the President’s Review Board has said that the government can accomplish its goals without bulk telephone records collection. And the Privacy and Civil Liberties Oversight Board said, “We have not identified a single instance involving a threat to the United States in which [bulk collection under Section 215 of the PATRIOT Act] made a concrete difference in the outcome of a counterterrorism investigation.” Since June of 2013, we’ve continued to learn more about how out of control the NSA is. But what has not happened since June is legislative reform of the NSA. There have been myriad bipartisan proposals in Congress—some authentic and some not—but lawmakers didn’t pass anything. We need comprehensive reform that addresses all the ways the NSA has overstepped its authority and provides the NSA with appropriate and constitutional tools to keep America safe. In the meantime, tell Congress to take a stand. A vote against reauthorization of Section 215 is a vote for the Constitution.
  •  
    EFF has launched an email campagin to press members of Congress not to renew sectiion 215 of the Patriot Act when it expires on June 1, 2015.   Sectjon 215 authorizes FBI officials to "make an application for an order requiring the production of *any tangible things* (including books, records, papers, documents, and other items) for an investigation to obtain foreign intelligence information not concerning a United States person or to protect against international terrorism or clandestine intelligence activities, provided that such investigation of a United States person is not conducted solely upon the basis of activities protected by the first amendment to the Constitution." http://www.law.cornell.edu/uscode/text/50/1861 The section has been abused to obtain bulk collecdtion of all telephone records for the NSA's storage and processing.But the section goes farther and lists as specific examples of records that can be obtained under section 215's authority, "library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records."  Think of the NSA's voracious appetite for new "haystacks" it can store  and search in its gigantic new data center in Utah. Then ask yourself, "do I want the NSA to obtain all of my personal data, store it, and search it at will?" If your anser is "no," you might consider visiting this page to send your Congress critters an email urging them to vote against renewal of section 215 and to vote for other NSA reforms listed in the EFF sample email text. Please do not procrastinate. Do it now, before you forget. Every voice counts. 
7More

NSA performed warrantless searches on Americans' calls and emails - Clapper |... - 0 views

  • US intelligence chiefs have confirmed that the National Security Agency has used a "back door" in surveillance law to perform warrantless searches on Americans’ communications.The NSA's collection programs are ostensibly targeted at foreigners, but in August the Guardian revealed a secret rule change allowing NSA analysts to search for Americans' details within the databases.Now, in a letter to Senator Ron Wyden, an Oregon Democrat on the intelligence committee, the director of national intelligence, James Clapper, has confirmed the use of this legal authority to search for data related to “US persons”.
  • “There have been queries, using US person identifiers, of communications lawfully acquired to obtain foreign intelligence targeting non-US persons reasonably believed to be located outside the United States,” Clapper wrote in the letter, which has been obtained by the Guardian.“These queries were performed pursuant to minimization procedures approved by the Fisa court and consistent with the statute and the fourth amendment.” The legal authority to perform the searches, revealed in top-secret NSA documents provided to the Guardian by Edward Snowden, was denounced by Wyden as a “backdoor search loophole.”Many of the NSA's most controversial programs collect information under the law affected by the so-called loophole. These include Prism, which allows the agency to collect data from Google, Apple, Facebook, Yahoo and other tech companies, and the agency's Upstream program – a huge network of internet cable taps.
  • Clapper did not say how many warrantless searches had been performed by the NSA. It was not the first time the searches had been confirmed: after the Snowden leaks, the office of the director of national intelligence declassified documents that discussed the rule change. But Clapper's letter drew greater attention to the issue.Confirmation that the NSA has searched for Americans’ communications in its phone call and email databases complicates President Barack Obama’s initial defenses of the broad surveillance in June.“When it comes to telephone calls, nobody is listening to your telephone calls. That’s not what this program’s about,” Obama said. “As was indicated, what the intelligence community is doing is looking at phone numbers and durations of calls. They are not looking at people’s names, and they’re not looking at content.”Obama was referring specifically to the bulk collection of US phone records, but his answer misleadingly suggested that the NSA could not examine Americans’ phone calls and emails.
  • ...4 more annotations...
  • At a recent hearing of the Privacy and Civil Liberties Oversight Board, administration lawyers defended their latitude to perform such searches. The board is scheduled to deliver a report on the legal authority under which the communications are collected, Section 702 of the Foreign Intelligence Surveillance Act (Fisa), passed in 2008. Wyden and Colorado Democrat Mark Udall failed in 2012 to persuade their fellow Senate intelligence committee members to prevent such warrantless searches during the re-authorisation of the 2008 Fisa Amendments Act, which wrote Section 702 into law. Dianne Feinstein, the California Democrat who chairs the committee, defended the practice, and argued that it did not violate the act’s “reverse targeting” prohibition on using NSA’s vast powers to collect content on Americans.
  • Much of the NSA's bulk data collection is covered by section 702 of the Fisa Amendments Act. This allows for the collection of communications – content and metadata alike – without individual warrants, so long as there is a reasonable belief the communications are both foreign and overseas.The communications of Americans in direct contact with foreign targets can also be collected without a warrant, and the intelligence agencies acknowledge that purely domestic communications can also be inadvertently swept into its databases. That process is known as "incidental collection".Initially, NSA rules on such data prevented the databases being searched for any details relating to "US persons" – that is, citizens or residents of the US. However, in October 2011 the Fisa court approved new procedures which allowed the agency to search for US person data, a revelation contained in documents revealed by Snowden.
  • The ruling appears to give the agency free access to search for information relating to US people within its vast databases, though not to specifically collect information against US citizens in the first place. However, until the DNI's disclosure to Wyden, it was not clear whether the NSA had ever actually used these powers.On Tuesday, Wyden and Udall said the NSA’s warrantless searches of Americans’ emails and phone calls “should be concerning to all.” “This is unacceptable. It raises serious constitutional questions, and poses a real threat to the privacy rights of law-abiding Americans. If a government agency thinks that a particular American is engaged in terrorism or espionage, the fourth amendment requires that the government secure a warrant or emergency authorisation before monitoring his or her communications. This fact should be beyond dispute,” the two senators said in a joint statement.
  • They continued: “Today’s admission by the Director of National Intelligence is further proof that meaningful surveillance reform must include closing the back-door searches loophole and requiring the intelligence community to show probable cause before deliberately searching through data collected under section 702 to find the communications of individual Americans."
1More

Articles by Mark Dice - 0 views

  •  
    Libertarian writer and researcher, Mark Dice, has provided a list of articles he has written.  Mark's literary works include: ... "The Illuminati: Facts & Fiction" ...... separates and analyzes the various claims and evidence about the Illuminati, their history, beliefs, members, organizations, and activities. This is a supplement for Mark's previous book - ..... "The Resistance Manifesto",  which focuses more on the New World Order, the 9/11 attacks, Big Brother, and how the political agendas of the elite are fulfilling Bible prophecy.   .... "The New World Order" ....   His website, markdice.com has high light summary of his work that's quite interesting: A detailed analysis of the September 11th attacks and evidence they were aided by elements within U.S. and foreign intelligence agencies to be used as a reason to jumpstart the "War on Terror" and the erosion of privacy and personal liberties outlined in the constitution. The Knights Templar, the real Holy Grail, and the role the Templars played in the formation of the Illuminati mafia. Quotes from the original writings of the Illuminati founders and how the organization drew up plans over 200 years ago to take over every major institution of power and influence in the world through deception and criminal activity. An expose on the Bohemian Grove resort including quotes from President Richard Nixon, senator John Decamp, and information from Chris Jones who worked at the club and became an informant on the activities within the compound. The secrets of Freemasonry and a history of the organization and their influence on society and quotes from the bible of Freemasonry on how the organization knowingly deceives lower level members and nonmembers as to the true secrets and goals of the fraternity. The history and meaning of the mysterious Georgia Guidestones monument and why the elite want to reduce world population to 500 million by killing billions of people through wars and plagues. A history of
1More

The Public-Private Surveillance Partnership - Bloomberg - 1 views

  •  
    Incredible must read article by Bruce Schneier, author of "Liars and Outliers: Enabling the Trust Society Needs to Thrive." Bruce makes the argument that the Government and big Corporations are locked in a parasitical symbiotic relationship, with the citizen being the host they feed on.   He argues that modern citizens need Internet communications and data services.  The corporate service providers need to "collect" massive amounts of citizen data to further their profit models. So the corporations need continuing government consent to use the personal citizen information.  The government seeks to control citizens, and needs access to the personal information the corporations are collecting.  The mutually beneficial symbiosis is formed.  One that will prove very difficult for citizens to turn back. Great piece of thinking!!!  Must read.
1More

Articles of Impeachment Against Obama - 0 views

  •  
    Sarasota, FL ( August 12, 2013) - The National Black Republican Association (NBRA) based in Sarasota, FL, headed by Chairman Frances Rice, filed Articles of Impeachment against President Barack Obama with the following language.   We, black American citizens, in order to free ourselves and our fellow citizens from governmental tyranny, do herewith submit these Articles of Impeachment to Congress for the removal of President Barack H. Obama, aka, Barry Soetoro, from office for his attack on liberty and commission of egregious acts of despotism that constitute high crimes and misdemeanors.   On July 4, 1776, the founders of our nation declared their independence from governmental tyranny and reaffirmed their faith in independence with the ratification of the Bill of Rights in 1791.   Asserting their right to break free from the tyranny of a nation that denied them the civil liberties that are our birthright, the founders declared:   "When a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security."  -  Declaration of Independence, July 4, 1776.   THE IMPEACHMENT POWER   Article II, Section IV of the United States Constitution provides: "The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors."   THE ARTICLES OF IMPEACHMENT   In his conduct of the office of President of the United States, Barack H. Obama, aka Barry Soetoro, personally and through his subordinates and agents, in violation or disregard of the constitutional rights of citizens and in violation of his constitutional duty to take care that the laws be faithfully executed, has prevented, obstructed, and impeded the administration of justice, in that:   ARTICL
2More

Sandy Hook and Obama's Connecticut Social Security number | Fellowship of the Minds - 1 views

  • In May 2011, blogger The Obama Hustle conducted a database pull for SSN 042-68-4425 and got the names of Harrison J. Bounel and Barack Obama (see below), indicating that one SSN was being used by both men.
  •  
    "Sandy Hook and Obama's Connecticut Social Security number Posted on December 27, 2014 by Dr. Eowyn | 18 Comments One of the many curiosities about the sitting President of the United States is the fact that, unlike us, he has not one, but multiple Social Security numbers (SSN). In 2010, two licensed private investigators, Susan Daniels and Neal Sankey, found that multiple SS numbers are associated with Barack Obama's name. Daniels and Sankey put their findings in sworn affidavits. Dr. Orly Taitz further verified their information with a third source, a retired Department of Homeland Security senior investigator named John Sampson. In May 2010, the mystery deepened when it was determined that the SSN Obama is currently using (042-68-4425) has a Connecticut prefix, 042, but Obama had never lived in nor had associations with the state of Connecticut. Obama has been using that 042 SS number since 1979 when he was 18 years old. In an article for Western Journalism, Stephen Baldwin writes: All told, there are 49 addresses and 16 different Social Security numbers listed for a person whose name is spelled "Barack Obama." […] the one Social Security number Obama most frequently used, the one beginning with 042, is a number issued in Connecticut sometime during 1976-1977, yet there is no record of Obama ever living or working in Connecticut. Indeed, during this time period Obama would have been 15-16 years old and living in Hawaii at the time. In late February 2011, the mystery further deepened when retired US Air Force Col. Gregory Hollister, the litigant in an Obama eligibility lawsuit, conducted a search for Obama's Connecticut SSN in the Social Security Number Verification System used by small businesses to verify employment eligibility. The results came back as: Failed: SSN not in file (never issued) To the question of why Obama obtained a Connecticut-issued SSN instead of one by Hawaii, Joel Gilbert, maker of the documentary Dreams from
6More

The Cartel: How BP Got Insider Tips Through a Secret Chat Room - Bloomberg - 0 views

  • Copies of messages sent to BP traders over the course of a year were provided to Bloomberg News by a person with access to the online conversations. The person, who redacted the names of banks sending the messages and dates of conversations, said they came from firms whose senior foreign-exchange traders belonged to a chat room called “The Cartel” that was set up by Usher and included dealers at JPMorgan, Citigroup Inc. (C), Barclays Plc and UBS Group AG. (UBSN) The information offered an insight into currency moves minutes, sometimes hours before they happened. The messages could drag the U.K.’s biggest energy company into a scandal that has enveloped 11 banks and led to more than 30 traders from London to Singapore losing or being suspended from their jobs. Last month six banks were fined $4.3 billion for passing along information about their clients and working together to rig foreign-exchange markets.
  • While there’s no evidence that any BP traders were members of the Cartel, Usher participated in at least one chat room with White, according to a person who has examined conversations that included both men. It couldn’t be determined from the messages reviewed by Bloomberg News who sent the information to BP or whether BP employees acted on any of the tips.
  • In the clubby, lightly regulated world of foreign exchange, traders passed around tips to their circle of trusted contacts like candy. The victims: mutual-fund investors, pensioners and day traders who took the other side of a transaction at a lower price than they would have if they had the same information. “The authorities have made it clear in the enforcement notices accompanying the recent fines that irrespective of whether specific markets are regulated, banks cannot have pockets of business where traders behave as if they’re dealing in the Wild West,” said Janine Alexander, a partner at law firm Collyer Bristow LLP in London who specializes in financial-services litigation. “Banks have a responsibility to preserve market integrity, and traders must consider the effect of their behavior on clients and the market as a whole.”
  • ...3 more annotations...
  • The settlements the banks reached with regulators reveal that in the minutes before 4 p.m. the traders would meet on chat rooms to discuss their positions and how they planned to execute them. Sometimes they also agreed to work together to push exchange rates around to boost their profits –- something they called “double-teaming.”
  • The four banks in the Cartel controlled about 45 percent of the global spot-currency market, according to a survey by Euromoney Institutional Investor Plc, so information about their plans was valuable. Some days they worked together to push around the 4 p.m. fix, settlements with the banks show.
  • The party came to an end in October 2013, when regulators around the world announced they were investigating allegations of abuses in the currency market. The four members of the Cartel have left their firms, and JPMorgan, Citigroup and UBS were among banks fined in November. Individuals could face criminal charges when the U.S. Department of Justice and the U.K.’s Serious Fraud Office conclude their own investigations.
2More

Courthouse News Service - 0 views

  •      Her 45-page motion argues that her client's subpoena has fateful repercussions in the age of cloud computing, an umbrella term describing the use of remote databases to store users' private information.     "Personal communications, daily schedules and travel itineraries that you once stored in a desk drawer or dedicated directory on a home computer are now stored for you by your ISP or social-networking site, somewhere in the cloud," the motion states. "The information is still yours. You still have control over it, but both technically and technologically someone else is now its custodian.     "The question this case poses to the court is: What, if anything, does the change in architecture and protocols of the Internet mean for the relationship between the individual and the state?
  •      "From Harris' perspective, not much has changed - only the address of your e-storage locker. Law enforcement is still seeking your information, still has to go to you for it, and still has to get your consent or obtain the information via discovery.     "From the [District Attorney of New York]'s perspective, the rise of e-storage has changed everything. The advent of cloud computing releases the DANY from any obligation to ask you for the information or obtain it from you through discovery. From its perspective, it can deal with the owner of the e-storage locker as though that person were the principal, rather than your agent. Since the owner of the storage locker does not have a proprietary interest or expectation of privacy in the stored information, however, that means there are no meaningful constitutional constraints on law enforcement, and your First and Fourth Amendment rights have vanished."
1More

The worst rise to the top - Mises Economic Blog - 0 views

  •  
    Very interesting post from Douglas French concerning the repubican primaries and F.A. Hayek's "Road to Serfom" comments on modern politics. Fascinating stuff. Hayek argues that, in politics, "the worst rise to the top", and he outlines three reasons why: .... Choosing is the problem. Informed people are more "nuanced" - they have many divergent opinions and views. Uniformity however drives the group dynamics behind a democratic process. Uniformity of opinion rules, and the less informed a person is, the more uniform and drawn to larger groups they will be. The "lowest common denominator" rule rules the democratic process. Mobocracy at work. .... Those on top, pursuing the political leadership positions, must appeal to the masses and weave together the groups driven by the "lowest common denominator" rule. The docile and gullible "are ready to accept whatever values and ideology drummed into them". Advantage to big media, the socialist assemblage ruling public education, and public workers unions. ..... Third, political leaders "don't promote a positive agenda, but a negative one of hating an enemy and envy of the wealthy. To appeal to the masses, leaders preach an "us" against "them" program." The great unwashed and uninformed being guided and driven "by emotion and passion rather than critical thinking." Not sure i agree with any of this, much as i admire and recognize the importance of Hayek and his seminal, game changing "Road to Serfdom". One reason is that some of the most informed people i know are goose stepping socialist hell bent on ending individual liberty - as in "life, liberty and the pursuit of happiness", in exchange for Marxist social equality. Another reason i would disagree is that the salt of the earth "bitter clingers" Reagan Conservatives that rock the Tea Party movement are exactly what the establishment elites call the "uninformed masses". Not sure if that's what Hayek meant, but his viewpoint does look a
1More

NONE DARE CALL IT CONSPIRACY  by Gary Allen - 1 views

  •  
    "NONE DARE CALL IT CONSPIRACY" - Web Version Copyright © 1971 by Gary Allen with Larry Abraham  ISBN: 0899666612 Sourced INTRODUCTION 1. DON'T CONFUSE ME WITH FACTS 2. SOCIALISM - ROYAL ROAD TO POWER FOR THE SUPER-RICH 3. THE MONEY MANIPULATORS 4. BANKROLLING THE BOLSHEVIK REVOLUTION 5. ESTABLISHING THE ESTABLISHMENT 6. THE ROCKEFELLERS AND THE REDS 7. PRESSURE FROM ABOVE AND PRESSURE FROM BELOW 8. YOU ARE THE ANSWER     FOURTEEN SIGNPOSTS TO SLAVERY     WHAT WILL YOU DO?     MEMBERS OF THE COUNCIL ON FOREIGN RELATIONS NOMINATED AND APPOINTED BY PRESIDENT NIXON TO GOVERNMENT POSTS     OPERATION COUNTERATTACK WHAT THOSE "IN THE KNOW" SAY I wish that every citizen of every country in the free world and every slave behind the Iron Curtain might read this book. Ezra Taft Benson - Former Secretary of Agriculture NDCC is an admirable job of amassing information to prove that communism is socialism and socialism (a plot to enslave the world) is not a movement of the downtrodden but a scheme supported and directed by the wealthiest of people. If enough Americans read and act upon NDCC, they really can save the Republic from the conspirators - whose plans for the destruction of our country are galloping fast toward completion. Dan Smoot - Former Assistant to J. Edgar Hoover Now that NDCC is available, I no longer need to answer "no" to the question which is often put to me, namely: "Mr. Dodd, is there a book which I can read so I can know what you know?" No higher praise is possible for this book. Norman Dodd - Chief Investigator Reece Committee to Investigate Foundations This book concerns the way in which our nation and other nations are actually governed. As Benjamin Disaeli said, this is not the way in which most people think nations are governed. The whole subject of the Insiders who so largely control our political and economic lives is a fascinating mystery. For the reader who is intelligent but uninitiated in the literature of super
5More

IRS Lawyer Carter Hull Confirms Tea Party Targeting Ordered By Washington - Investors.com - 0 views

  • Hull has confirmed the premeditated targeting of Tea Party groups went even higher than him or Lerner.
  • Apparently not only Tea Party groups were targeted but actual candidates as well. On March 9, 2010, the day Tea Party candidate Christine O'Donnell revealed her plan to run for Vice President Joe Biden's former Delaware Senate seat , an IRS tax lien was placed on a house purported to be hers, an action that was quickly publicized by those who did not wish her well.
  • Earlier this year, Dennis Martel, special agent with the Department of Treasury in Baltimore, left a message on O'Donnell's cell phone telling her that an official in Delaware state government had improperly accessed her records on that very same day. The problem was that the house was not hers in the first place and the IRS eventually blamed the lien on a computer glitch and withdrew it.
  • ...1 more annotation...
  • To us it is inconceivable that one of only two political appointees was directly involved in targeting of Tea Party groups without White House knowledge and consent. It is said the fish rots from the head, and this one is really beginning to stink.
  •  
    This has gone way too far.  The 2012 elections must be nullified and rescheduled.  Tens of millions of American citizens have been systematically targeted, their civil and Constitutional rights destroyed, and their voices and votes politically eliminated by a massive government conspiracy.  The 2012 election is a fraud.  And nothing short of complete nullification and recall, and the termination of the IRS will do the great Republic justice. excerpt: Scandal: A retiring IRS lawyer implicates the IRS chief counsel's office, headed by an Obama appointee, as well as the head of the IRS' exempt organizations office. The targeting included a Tea Party Senate candidate. In Thursday's hearing before the House Oversight Committee, 72-year-old retiring IRS lawyer Carter Hull implicated the IRS chief counsel's office headed by William J. Wilkins, who attended at least nine White House meetings, and Lois Lerner, head of the exempt-organizations office, in the IRS scandal. In so doing, he made clear the targeting of Tea Party groups started in Washington and was directed from Washington. A tax-law specialist with 48 years of IRS experience, Hull testified that Lerner, the former head of the exempt organizations division, demanded that he send some of the reviews of Tea Party groups to the IRS chief counsel's office in Washington. The chief counsel is one of two political appointees in the IRS. According to Hull's testimony, Lerner, who famously pleaded her Fifth Amendment rights before the same committee, gave an atypical instruction that the Tea Party applications undergo special scrutiny that included an uncommon multilayer review that involved a top adviser to Lerner as well as the chief counsel's office. Hull's name came up earlier in the testimony of Holly Paz, a D.C.-based supervisor in the IRS's tax-exempt status division, who reported to Lerner. It was on May 22, the day after Paz was interviewed by investigators, that Lerner refused to answer questions from
6More

U.S. gives big, secret push to Internet surveillance - CNET - 0 views

  • Senior Obama administration officials have secretly authorized the interception of communications carried on portions of networks operated by AT&T and other Internet service providers, a practice that might otherwise be illegal under federal wiretapping laws. The secret legal authorization from the Justice Department originally applied to a cybersecurity pilot project in which the military monitored defense contractors' Internet links. Since then, however, the program has been expanded by President Obama to cover all critical infrastructure sectors including energy, healthcare, and finance starting June 12. "The Justice Department is helping private companies evade federal wiretap laws," said Marc Rotenberg, executive director of the Electronic Privacy Information Center, which obtained over 1,000 pages of internal government documents and provided them to CNET this week. "Alarm bells should be going off." Those documents show the National Security Agency and the Defense Department were deeply involved in pressing for the secret legal authorization, with NSA director Keith Alexander participating in some of the discussions personally. Despite initial reservations, including from industry participants, Justice Department attorneys eventually signed off on the project.
  • The Justice Department agreed to grant legal immunity to the participating network providers in the form of what participants in the confidential discussions refer to as "2511 letters," a reference to the Wiretap Act codified at 18 USC 2511 in the federal statute books. The Wiretap Act limits the ability of Internet providers to eavesdrop on network traffic except when monitoring is a "necessary incident" to providing the service or it takes place with a user's "lawful consent." An industry representative told CNET the 2511 letters provided legal immunity to the providers by agreeing not to prosecute for criminal violations of the Wiretap Act. It's not clear how many 2511 letters were issued by the Justice Department. In 2011, Deputy Secretary of Defense William Lynn publicly disclosed the existence of the original project, called the DIB Cyber Pilot, which used login banners to inform network users that monitoring was taking place. In May 2012, the pilot was turned into an ongoing program -- broader but still voluntary -- by the name of Joint Cybersecurity Services Pilot, with the Department of Homeland Security becoming involved for the first time. It was renamed again to Enhanced Cybersecurity Services program in January, and is currently being expanded to all types of companies operating critical infrastructure.
  • Paul Rosenzweig, a former Homeland Security official and founder of Red Branch Consulting, compared the NSA and DOD asking the Justice Department for 2511 letters to the CIA asking the Justice Department for the so-called torture memos a decade ago. (They were written by Justice Department official John Yoo, who reached the controversial conclusion that waterboarding was not torture.) "If you think of it poorly, it's a CYA function," Rosenzweig says. "If you think well of it, it's an effort to secure advance authorization for an action that may not be clearly legal." A report (PDF) published last month by the Congressional Research Service, a non-partisan arm of Congress, says the executive branch likely does not have the legal authority to authorize more widespread monitoring of communications unless Congress rewrites the law. "Such an executive action would contravene current federal laws protecting electronic communications," the report says.
  • ...2 more annotations...
  • Another e-mail message from a Justice Department attorney wondered: "Will the program cover all parts of the company network -- including say day care centers (as mentioned as a question in a [deputies committee meeting]) and what are the policy implications of this?" The deputies committee includes the deputy secretary of defense, the deputy director of national intelligence, the deputy attorney general, and the vice chairman of the Joint Chiefs of Staff. "These agencies are clearly seeking authority to receive a large amount of information, including personal information, from private Internet networks," says EPIC staff attorney Amie Stepanovich, who filed a lawsuit against Homeland Security in March 2012 seeking documents relating to the program under the Freedom of Information Act. "If this program was broadly deployed, it would raise serious questions about government cybersecurity practices." In January, the Department of Homeland Security's privacy office published a privacy analysis (PDF) of the program saying that users of the networks of companies participating in the program will see "an electronic login banner [saying] information and data on the network may be monitored or disclosed to third parties, and/or that the network users' communications on the network are not private."
  • An internal Defense Department presentation cites as possible legal authority a classified presidential directive called NSPD 54 that President Bush signed in January 2008. Obama's own executive order , signed in February 2013, says Homeland Security must establish procedures to expand the data-sharing program "to all critical infrastructure sectors" by mid-June. Those are defined as any companies providing services that, if disrupted, would harm national economic security or "national public health or safety."
  •  
    Article is from April 2013, before the Snowden disclosures. 
8More

THE TRUTH ABOUT SPYING: The Feds Are Intercepting Your Internet Data And Tech Giants Kn... - 0 views

  • Last year James Bamford of Wired — who wrote the book "The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America" — reported that the NSA hired secretive companies linked to Israeli intelligence to establish 10 to 20 wiretapping rooms at key Internet Service Provider (ISP) telecommunication points throughout the country.
  • In 2004 AT&T engineer Mark Klein discovered that a special NSA network actively "vacuumed up Internet and phone-call data from ordinary Americans with the cooperation of AT&T," emphasizing that "much of the data sent through AT&T to the NSA was purely domestic."
  • Glenn Greenwald revealed that the National Security Agency (NSA) is secretly using the so-called "business records" provision of the Patriot Act to collect telephone records of millions of Americans from Verizon. Greenwald noted that "previous reporting has suggested the NSA has collected cell records from all major mobile networks," which was best illustrated by this ACLU infographic graphic illustrating how the NSA intercepts more than a billion electronic records and communications every day.
  • ...4 more annotations...
  • NSA whistleblowers William Binney and Thomas Drake corroborated Klein's assertions: Binney contends that the NSA analyzes the information "to be able to monitor what people are doing" and who they are doing it with while Drake maintains that the NSA is using Israeli-made NARUS hardware to "seize and save all personal electronic communications."
  • Eric Lichtblau and James Risen of the New York Times won a Pulitzer-Prize for this 2005 story: As part of the program approved by President Bush for domestic surveillance without warrants, the N.S.A. has gained the cooperation of American telecommunications companies to obtain backdoor access to streams of domestic and international communications, the officials said.
  • in January Google released a transparency report detailing the government's use of controversial legislation that bypasses judicial approval to access the online information of private citizens.
  • Given the fact that the CIA's recently visited tech conference to detail the Agency's vision for collecting and analyzing all of the information people put on the Internet, it would be naïve to think that American tech giants hasn't know that all their data belongs to NSA.
  •  
    Timeline for reports and whistleblower information going public about NSA world wide dragnet of information and communications.  Note that the official timeline the NSA slides depict the start of the Internet dragnet as late 2007, when the Bush Administration wrangled Microsoft as a source.  The whistleblower timeline starts in 2001 and is rolling worldwide by 2004.
17More

The Stunning Hypocrisy of the U.S. Government - BlackListedNews.com - 1 views

  • Please read this rather good summary in this morning’s New York Times of the worldwide debate Snowden has enabled – how these disclosures have “set off a national debate over the proper limits of government surveillance” and “opened an unprecedented window on the details of surveillance by the NSA, including its compilation of logs of virtually all telephone calls in the United States and its collection of e-mails of foreigners from the major American Internet companies, including Google, Yahoo, Microsoft, Apple and Skype” – and ask yourself: has Snowden actually does anything to bring “injury to the United States”, or has he performed an immense public service?
  • The irony is obvious: the same people who are building a ubiquitous surveillance system to spy on everyone in the world, including their own citizens, are now accusing the person who exposed it of “espionage”.
  • It seems clear that the people who are actually bringing “injury to the United States” are those who are waging war on basic tenets of transparency and secretly constructing a mass and often illegal and unconstitutional surveillance apparatus aimed at American citizens – and those who are lying to the American people and its Congress about what they’re doing – rather than those who are devoted to informing the American people that this is being done.
  • ...13 more annotations...
  • The Obama administration leaks classified information continuously. They do it to glorify the President, or manipulate public opinion, or even to help produce a pre-election propaganda film about the Osama bin Laden raid.
  • The Obama administration does not hate unauthorized leaks of classified information. They are more responsible for such leaks than anyone.
  • What they hate are leaks that embarrass them or expose their wrongdoing.
  • The “enemy” they’re seeking to keep ignorant with selective and excessive leak prosecutions are not The Terrorists or The Chinese Communists.
  • It’s the American people.
  • The people who have learned things they didn’t already know are American citizens who have no connection to terrorism or foreign intelligence, as well as hundreds of millions of citizens around the world about whom the same is true.
  • What they have learned is that the vast bulk of this surveillance apparatus is directed not at the Chinese or Russian governments or the Terrorists, but at them.
  • And that is precisely why the US government is so furious and will bring its full weight to bear against these disclosures.
  • What has been “harmed” is not the national security of the US but the ability of its political leaders to work against their own citizens and citizens around the world in the dark, with zero transparency or real accountability.
  • If anything is a crime, it’s that secret, unaccountable and deceitful behavior: not the shining of light on it.
  • At a press conference to discuss the accusations, an N.S.A. spokesman surprised observers by announcing the spying charges against Mr. Snowden with a totally straight face. “These charges send a clear message,” the spokesman said. “In the United States, you can’t spy on people.”
  • “The American people have the right to assume that their private documents will remain private and won’t be collected by someone in the government for his own purposes.”
  • “Only by bringing Mr. Snowden to justice can we safeguard the most precious of American rights: privacy,” added the spokesman, apparently serious.
  •  
    Extremely well linked story from "Washington's Blog" excerpt: "The Government's Hypocrisy Is the Core Problem Congress has exempted itself from the prohibition against trading on inside information … the law that got Martha Stewart and many other people thrown in jail. There are many other ways in which the hypocrisy of the politicians in D.C. are hurting our country. Washington politicians say we have to slash basic services, and yet waste hundreds of billions of dollars on counter-productive boondoggles.  If the politicos just stopped throwing money at corporate welfare queens, military and security boondoggles and pork, harmful quantitative easing, unnecessary nuclear subsidies,  the failed war on drugs, and other wasted and counter-productive expenses, we wouldn't need to impose austerity on the people. The D.C. politicians said that the giant failed banks couldn't be nationalized, because that would be socialism.  Instead of temporarily nationalizing them and then spinning them off to the private sector - or breaking them up - the politicians have bailed them out to the tune of many tens of billions of dollars each year, and created a system where all of the profits are privatized, and all of the losses socialized. Obama and Congress promised help for struggling homeowners, and passed numerous bills that they claimed would rescue the little guy.  But every single one of these bills actually bails out the banks … and doesn't really help the homeowner. The D.C. regulators pretend that they are being tough on the big banks, but are actually doing everything they can to help cover up their sins. Many have pointed out Obama's hypocrisy in slamming Bush's spying programs … and then expanding them  (millions more). And in slamming China's cyber-warfare … while doing the same thing. And - while the Obama administration is spying on everyone in the country - it is at the same time the most secretive administration ever (ba
4More

Court Rules Feds Need Warrant to Access Drug Prescriptions Database | American Civil Li... - 0 views

  • In a significant win for the privacy rights of anyone who has ever gotten a drug prescription, a federal judge in Oregon ruled yesterday that the DEA needs a warrant to search confidential prescription records. Oregon, like 48 other states, has a Prescription Drug Monitoring Program (PDMP), which tracks patients’ prescriptions for medications used to treat a long list of sensitive medical conditions. Although Oregon law requires police to get a warrant from a judge before searching prescription records in the database, the DEA has been requesting records using administrative subpoenas, which do not involve judicial authorization or probable cause. After the State of Oregon sued the DEA over this practice, the ACLU and ACLU of Oregon joined the suit on behalf of four patients and a doctor in the state. Last month, we argued in court that the DEA is violating the Fourth Amendment by bypassing the Constitution’s warrant requirement when seeking private prescription records. Yesterday, the court agreed. The court’s ruling is the first time a judge has held that law enforcement must get a probable cause warrant to access confidential prescription records from a state database in a criminal investigation. The opinion is significant for several reasons.
  • First, the court soundly rejected the DEA’s extreme argument that people lose their Fourth Amendment privacy rights in their medical information when they engage in confidential discussions with their doctor and pharmacist about their illnesses and treatment decisions. The federal government had argued that the “third party doctrine” applied, comparing confidential prescription records to electricity consumption records, bank records, and other categories of information held by third-party companies, for which courts have said police don’t need a warrant. The judge batted this argument aside, explaining that prescription records are “more inherently personal or private than bank records, and are entitled to and treated with a heightened expectation of privacy.” As the court held: “Although there is not an absolute right to privacy in prescription information, as patients must expect that physicians, pharmacists, and other medical personnel can and must access their records, it is more than reasonable for patients to believe that law enforcement agencies will not have unfettered access to their records.” More importantly, this ruling fits into a series of recent opinions calling into question the continuing vitality of the third party doctrine in modern society. As Justice Sotomayor wrote in United States v. Jonestwo years ago, “it may be necessary to reconsider the premise that an individual has no reasonable expectation of privacy in information voluntarily disclosed to third parties. This approach is ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks.” This sentiment was echoed by the federal judge who ruled last year that the NSA’s bulk telephone metadata program violates the Fourth Amendment. The Oregon case is another blow to the third party doctrine’s shaky foundation.
  • In addition, although yesterday’s ruling is only binding within Oregon, it will be persuasive precedent for courts evaluating law enforcement’s use of subpoenas to obtain private prescription records—and similar information—around the country. The case is a reminder to the DEA and other law enforcement agencies that they are not above the law, and that they must comply with the Fourth Amendment’s warrant requirement when seeking sensitive information in criminal investigations. Finally, the case should add momentum to a movement within state legislatures to amend PDMP statutes to require police to get a warrant for prescription records. Ten states currently require a warrant as a matter of state law (Rhode Island was the most recent state to add this requirement, last year). The Pennsylvania House has passed legislation creating a warrant requirement for that state’s PDMP, and is waiting for the state senate to act. The Florida legislature may update the privacy protections for its PDMP this year. Action by state legislatures will send a strong message to the DEA that it should be getting warrants everywhere, not just in Oregon.
  •  
    A case to watch as it wends it way through the appellate process. A very big win for the ACLU, with major implications for federal intelligence gathering in general. 
7More

NSA spied on Indian embassy and UN mission, Edward Snowden files reveal | World news | ... - 0 views

  • The US National Security Agency may have accessed computers within the Indian embassy in Washington and mission at the United Nations in New York as part of a huge clandestine effort to mine electronic data held by its south Asian ally.Documents released by the US whistleblower Edward Snowden also reveal the extent and aggressive nature of other NSA datamining exercises targeting India as recently as March of this year.The latest revelations – published in the Hindu newspaper – came as Manmohan Singh, the Indian prime minister, flew to Europe on his way to the US, where he will meet President Barack Obama.The NSA operation targeting India used two datamining tools, Boundless Informant and Prism, a system allowing the agency easy access to the personal information of non-US nationals from the databases of some of the world's biggest tech companies, including Apple, Google, Microsoft and Yahoo.
  • The largest amount of intelligence was gathered from Iran, with more than 14bn reports in that period, followed by 13.5bn from Pakistan. Jordan, one of America's closest Arab allies, came third with 12.7bn, Egypt fourth with 7.6bn and India fifth with 6.3bn.
  • According to one document obtained by the Hindu, the US agency used the Prism programme to gather information on India's domestic politics and the country's strategic and commercial interests, specifically categories designated as nuclear, space and politics.
  • ...3 more annotations...
  • A further NSA document obtained by the Hindu suggests the agency selected the office of India's mission at the UN in New York and the country's Washington embassy as "location targets" where records of Internet traffic, emails, telephone and office conversations – and even official documents stored digitally – could potentially be accessed after programs had been clandestinely inserted into computers.In March 2013, the NSA collected 6.3bn pieces of information from internet networks in India and 6.2bn pieces of information from the country's telephone networks during the same period, the Hindu said.After the Guardian reported in June that Pm program allowed the NSA "to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders", both US and Indian officials claimed no content was being taken from the country's networks and that the programs were intended to aid "counter-terrorism".
  • A home ministry official told the newspaper the government had been "rattled" to discover the extent of the the programme's interest in India. "It's not just violation of our sovereignty, it's a complete intrusion into our decision-making process," the official said.
  • The Hindu argued that "the targeting of India's politics and space programme by the NSA busts the myth of close strategic partnership between India and US", pointing out that the other countries targeted in the same way as India "are generally seen as adversarial" by Washington.
  •  
    An important bit of proof that NSA digital surveillance involves far more than counter-terrorism. 
13More

Resurrecting the Dubious State Secrets Privilege | John Dean | Verdict | Legal Analysis... - 0 views

  • In an unusual move, the U.S. Department of Justice has filed a motion to make a private lawsuit simply disappear. While the U.S. Government is not a party to this defamation lawsuit—Victor Restis et al. v. American Coalition Against Nuclear Iran, Inc.—filed July 19, 2013, in the U.S. District Court for the Southern District of New York, Attorney General Eric Holder is concerned that the discovery being undertaken might jeopardize our national security.
  • The government’s argument for intervening in this lawsuit is technical and thin.
  • The strongest precedent in the government’s brief in the current case is the 1985 case of Fitzgerald v. Penthouse Intern., Ltd. Fitzgerald had sued Penthouse Magazine for an allegedly libelous article, but the U.S. Navy moved to intervene on the ground that the government had a national security interest which would not be adequately protected by the parties, so the government requested the action be dismissed, after invoking the state secrets privilege. The federal district court granted the motions and dismissed the case, which the U.S. Court of Appeals for Fourth Circuit affirmed. So there is precedent for this unusual action by the government in a private lawsuit, but the legitimacy of the state secrets privilege remains subject to question.
  • ...9 more annotations...
  • In February 2000, Judith Loether, a daughter of one of the three civilians killed in the 1948 B-29 explosion, discovered the government’s once-secret accident report for the incident on the Internet. Loether had been seven weeks old when her father died but been told by her mother what was known of her father’s death and the unsuccessful efforts to find out what had truly happened. When Loether read the accident report she was stunned. There were no national security secrets whatsoever, rather there was glaringly clear evidence of the government’s negligence resulting in her father’s death. Loether shared this information with the families of the other civilian engineers who had been killed in the incident and they joined together in a legal action to overturn Reynolds, raising the fact that the executive branch of the government had misled the Supreme Court, not to mention the parties to the earlier lawsuit.
  • Lou Fisher looked closely at the state secrets privilege in his book In The Name of National Security, as well as in follow-up articles when the Reynolds case was litigated after it was discovered, decades after the fact, that the government had literally defrauded the Supreme Court in Reynolds, e.g., “The State Secrets Privilege: Relying on Reynolds.” The Reynolds ruling emerged from litigation initiated by the widows of three civilian engineers who died in a midair explosion of a B-29 bomber on October 6, 1948. The government refused to provide the widows with the government’s accident report. On March 9, 1953, the Supreme Court created the state secrets privilege when agreeing the accident report did not have to be produced since the government claimed it contained national security secrets. In fact, none of the federal judges in the lower courts, nor the justices on the Supreme Court, were allowed to read the report.
  • Lowell states in his letter: “By relying solely upon ex parte submissions to justify its invocation of the state secrets privilege, especially in the unprecedented circumstance of private party litigation without an obvious government interest, the Government has improperly invoked the state secrets privilege, deprived Plaintiffs of the opportunity to test the Government’s claims through the adversarial process, and limited the Court’s opportunity to make an informed judgment. “ Lowell further claims that in “the typical state secrets case, the Government will simultaneously file both a sealed declaration and a detailed public declaration.” (Emphasis in Lowell’s letter.) To bolster this contention, he provided the court with an example, and offered to provide additional examples if so requested.
  • The Justice Department’s memorandum of law accompanying its motion to intervene states that once the state secrets privilege has been asserted “by the head of the department with control over the matter in question . . . the scope of judicial review is quite narrow.” Quoting from the U.S. Supreme Court ruling establishing this privilege in 1953, U.S. v. Reynolds, the brief adds: “the sole determination for the court is whether, ‘from all the circumstances of the case . . . there is a reasonable danger that compulsion of the evidence will expose military [or other] matters which, in the interest of national security, should not be divulged.’”In short, all the Justice Department need claim is the magic phrase—”state secrets”—after assuring the court that the head of department or agency involved has personally decided it is information that cannot be released. That ends the matter. This is what has made this privilege so controversial, not to mention dubious. Indeed, invocation by the executive branch effectively removes the question from judicial determination, and the information underlying the decision is not even provided to the court.
  • As Fisher and other scholars note, there is much more room under the Reynolds ruling for the court to take a hard look at the evidence when the government claims state secrets than has been common practice. Fisher reminds: “The state secrets privilege is qualified, not absolute. Otherwise there is no adversary process in court, no exercise of judicial independence over what evidence is needed, and no fairness accorded to private litigants who challenge the government . . . . There is no justification in law or history for a court to acquiesce to the accuracy of affidavits, statements, and declarations submitted by the executive branch.” Indeed, he noted to do so is contrary to our constitutional system of checks and balances.
  • Time to Reexamine Blind Adherence to the State Secrets PrivilegeIn responding to the government’s move to intervene, invoke state secrets, and dismiss the Restis lawsuit, plaintiffs’ attorney Abbe Lowell sent a letter to Judge Edgardo Ramos, the presiding judge on the case on September 17, 2014, contesting the Department of Justice’s ex parte filings, and requesting that Judge Ramos “order the Government to file a public declaration in support of its filing that will enable Plaintiffs to meaningfully respond.” Lowell also suggested as an alternative that he “presently holds more than sufficient security clearances to be given access to the ex parte submission,” and the court could do here as in other national security cases, and issue a protective order that the information not be shared with anyone. While Lowell does not so state, he is in effect taking on the existing state secrets privilege procedure where only the government knows what is being withheld and why, and he is taking on Reynolds.
  • To make a long story short, the Supreme Court was more interested in the finality of their decisions than the fraud that had been perpetrated upon them. They rejected the direct appeal, and efforts to relegate the case through the lower courts failed. As Fisher notes, the Court ruled in Reynolds based on “vapors and allusions,” rather than facts and evidence, and today it is clear that when it uncritically accepted the government’s word, the Court abdicated its duty to protect the ability of each party to present its case fairly, not to mention it left the matter under the control of a “self-interested executive” branch.
  • Lowell explains it is not clear—and suggests the government is similarly unclear in having earlier suggested a “law enforcement privilege”—as to why the state secrets privilege is being invoked, and argues this case can be tried without exposing government secrets. Citing the Fitzgerald ruling, Lowell points out dismissal is appropriate “[o]nly when no amount of effort and care on the part of the court and the parties will safeguard privileged material is dismissal warranted.”
  • No telling how Judge Ramos will rule, and the government has a remarkable record of prevailing with the deeply flawed state secrets privilege. But Lowell’s letter appears to say, between the lines, that he has a client who is prepared to test this dubious privilege and the government’s use of it in this case if Judge Ramos dismisses this lawsuit. The U.S. Court of Appeals for the Second Circuit, where that ruling would be reviewed, sees itself every bit the intellectual equal of the U.S. Supreme Court and it is uniquely qualified to give this dubious privilege and the Reynolds holding a reexamination. It is long past time this be done.
  •  
    Interesting take on the Restis case by former Nixon White House Counsel John Dean. Where the State Secrets Privilege is at its very nastiest, in my opinion, is in criminal prosecutions where the government withholds potentially exculpatory evidence on grounds of state secrecy. I think the courts have been far too lenient in allowing people to be tried without production of such evidence. The work-around in the Guantanamo Bay inmate cases has been to appoint counsel who have security clearances, but in those cases the lawyer is forbidden from discussing the classified information with the client, who could have valuable input if advised what the evidence is. It's also incredibly unfair in the extraordinary rendition cases, where the courts have let the government get away with having the cases dismissed on state secrecy grounds, even though the tortures have been the victim of criminal official misconduct.  It forces the victims to appeal clear to the Supreme Court before they can start over in an international court with jurisdiction over human rights violations, where the government loses because of its refusal to produce the evidence.  (Under the relevant treaties that the U.S. is a party to, the U.S. is required to provide a judicial remedy without resort to claims of national security secrecy.) Then the U.S. refuses to pay the judgments of the International courts, placing the U.S. in double breach of its treaty obligations. We see the same kinds of outrageous secrecy playing out in the Senate Intellience Committee's report on CIA torture, where the Obama Administration is using state secrecy claims to delay release of the report summary and minimize what is in it. It's highly unlikely that I will live long enough to read the full report. And that just is not democracy in action. Down with the Dark State!   
4More

Petraeus Gets Leniency for Leaking - And Risen's CIA Source Should Too, His Lawyers Say... - 0 views

  • Lawyers for Jeffrey Sterling, convicted earlier this year of leaking classified information to New York Times reporter James Risen, urged today that Sterling “not receive a different form of justice” than David Petraeus, the former general and CIA director who has pleaded guilty to a misdemeanor for leaking classified information to his biographer. While Petraeus will not go to jail — yesterday a judge sentenced him to two years probation and a $100,000 fine — prosecutors have asked for a “severe” sentence against Sterling within federal guidelines of 19 to 24 years in prison. In January, a jury convicted Sterling, a former CIA agent, on nine counts related to leaking information to Risen, a Times reporter who in 2006 wrote a book that revealed the agency had mishandled a program to disrupt Iran’s nuclear weapons program. Sterling’s lawyers, Edward MacMahon Jr. and Barry Pollack, filed their sentencing memorandum today, arguing that their client “should be treated no more harshly than any other person who has been charged and convicted of ‘leaking’ to the press.” In addition to Petraeus, they cited the cases of John Kiriakou, a former CIA agent who was sentenced to 30 months in prison, and Stephen Kim, who received a 13-month sentence. Unlike Petraeus, Kiriakou and Kim, who reached plea agreements, Sterling took his case to a jury. He is scheduled to be sentenced on May 11.
  • “He should be treated similarly to others convicted for the same crimes and not singled out for a long prison sentence because he elected to exercise his right to trial,” the lawyers stated. “[T]he court cannot turn a blind eye to the positions the government has taken in similar cases.” The Petraeus and Sterling cases have highlighted another disparity in the government’s handling of leak cases: powerful officials like Petraeus are treated leniently while mid-level ones like Kiriakou, Kim and Sterling go to jail. In the Petraeus case, the government claims no harm was caused by his leak, because none of the information he leaked to Paula Broadwell, his biographer and onetime lover, was published, whereas the information published by Risen had caused “substantial damage” to national security. However, this characterization was called “overwrought hyperbole” by a former CIA official in a letter of support for Sterling released today by his lawyers. David J. Manners, a former station chief in Prague and Amman as well as chief of the agency’s Iran task force, described as “not credible” the prosecution’s claim that Risen’s book severely hurt the CIA’s ability to recruit spies. Manners, who first met Sterling when both worked at the agency, noted that the government itself has often disclosed the role of intelligence operatives.
  • “While such disclosures are never helpful, they happen all the time (and sometimes the United States quietly endorses the disclosure — read some of Bob Woodward’s books, or look at Agency collaboration on the film about the bin Laden raid),” Manners wrote. Sterling’s lawyers called attention to what they regard as another inequity in the treatment of Petraeus and their client. Petraeus admitted in his plea agreement that the classified information he leaked included highly sensitive names of covert operatives, war plans for U.S. forces, as well as details about his discussions with senior officials, including President Obama. Petraeus also admitted to lying to FBI agents about what he had done. Sterling, his lawyers noted, “revealed the names of no covert personnel and never lied about his actions to the FBI.” The prosecution appears to be trying to do more than put Sterling behind bars for two decades; it appears to be trying to rewrite history and put an end to leaks of information that embarrass the government.
  •  
    I read the two sentencing memorandums. Sterling's lawyer makes an excellent case that the government is attempting to punish Sterling for being a whistleblower and for his decision to go to trial rather than accept a deal. And the trial is already infamous for the government's failure to bring forward any direct proof of guilt. The light sentence meted to Gen. Petraeus is directly at issue in the sentencing. It will be interesting to see what Judge Berkema decides. 
« First ‹ Previous 81 - 100 of 415 Next › Last »
Showing 20 items per page