Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged The-Law

Rss Feed Group items tagged

Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Paul Merrell

CURIA - Documents - 0 views

  • 37      It must be stated that the interference caused by Directive 2006/24 with the fundamental rights laid down in Articles 7 and 8 of the Charter is, as the Advocate General has also pointed out, in particular, in paragraphs 77 and 80 of his Opinion, wide-ranging, and it must be considered to be particularly serious. Furthermore, as the Advocate General has pointed out in paragraphs 52 and 72 of his Opinion, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance.
  • 43      In this respect, it is apparent from recital 7 in the preamble to Directive 2006/24 that, because of the significant growth in the possibilities afforded by electronic communications, the Justice and Home Affairs Council of 19 December 2002 concluded that data relating to the use of electronic communications are particularly important and therefore a valuable tool in the prevention of offences and the fight against crime, in particular organised crime. 44      It must therefore be held that the retention of data for the purpose of allowing the competent national authorities to have possible access to those data, as required by Directive 2006/24, genuinely satisfies an objective of general interest.45      In those circumstances, it is necessary to verify the proportionality of the interference found to exist.46      In that regard, according to the settled case-law of the Court, the principle of proportionality requires that acts of the EU institutions be appropriate for attaining the legitimate objectives pursued by the legislation at issue and do not exceed the limits of what is appropriate and necessary in order to achieve those objectives (see, to that effect, Case C‑343/09 Afton Chemical EU:C:2010:419, paragraph 45; Volker und Markus Schecke and Eifert EU:C:2010:662, paragraph 74; Cases C‑581/10 and C‑629/10 Nelson and Others EU:C:2012:657, paragraph 71; Case C‑283/11 Sky Österreich EU:C:2013:28, paragraph 50; and Case C‑101/12 Schaible EU:C:2013:661, paragraph 29).
  • 67      Article 7 of Directive 2006/24, read in conjunction with Article 4(1) of Directive 2002/58 and the second subparagraph of Article 17(1) of Directive 95/46, does not ensure that a particularly high level of protection and security is applied by those providers by means of technical and organisational measures, but permits those providers in particular to have regard to economic considerations when determining the level of security which they apply, as regards the costs of implementing security measures. In particular, Directive 2006/24 does not ensure the irreversible destruction of the data at the end of the data retention period.68      In the second place, it should be added that that directive does not require the data in question to be retained within the European Union, with the result that it cannot be held that the control, explicitly required by Article 8(3) of the Charter, by an independent authority of compliance with the requirements of protection and security, as referred to in the two previous paragraphs, is fully ensured. Such a control, carried out on the basis of EU law, is an essential component of the protection of individuals with regard to the processing of personal data (see, to that effect, Case C‑614/10 Commission v Austria EU:C:2012:631, paragraph 37).69      Having regard to all the foregoing considerations, it must be held that, by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter.
  • ...13 more annotations...
  • 58      Directive 2006/24 affects, in a comprehensive manner, all persons using electronic communications services, but without the persons whose data are retained being, even indirectly, in a situation which is liable to give rise to criminal prosecutions. It therefore applies even to persons for whom there is no evidence capable of suggesting that their conduct might have a link, even an indirect or remote one, with serious crime. Furthermore, it does not provide for any exception, with the result that it applies even to persons whose communications are subject, according to rules of national law, to the obligation of professional secrecy. 59      Moreover, whilst seeking to contribute to the fight against serious crime, Directive 2006/24 does not require any relationship between the data whose retention is provided for and a threat to public security and, in particular, it is not restricted to a retention in relation (i) to data pertaining to a particular time period and/or a particular geographical zone and/or to a circle of particular persons likely to be involved, in one way or another, in a serious crime, or (ii) to persons who could, for other reasons, contribute, by the retention of their data, to the prevention, detection or prosecution of serious offences.
  • 1        These requests for a preliminary ruling concern the validity of Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC (OJ 2006 L 105, p. 54).
  • Digital Rights Ireland Ltd (C‑293/12)vMinister for Communications, Marine and Natural Resources,Minister for Justice, Equality and Law Reform,Commissioner of the Garda Síochána,Ireland,The Attorney General,intervener:Irish Human Rights Commission, andKärntner Landesregierung (C‑594/12),Michael Seitlinger,Christof Tschohl and others,
  • JUDGMENT OF THE COURT (Grand Chamber)8 April 2014 (*)(Electronic communications — Directive 2006/24/EC — Publicly available electronic communications services or public communications networks services — Retention of data generated or processed in connection with the provision of such services — Validity — Articles 7, 8 and 11 of the Charter of Fundamental Rights of the European Union)In Joined Cases C‑293/12 and C‑594/12,
  • 34      As a result, the obligation imposed by Articles 3 and 6 of Directive 2006/24 on providers of publicly available electronic communications services or of public communications networks to retain, for a certain period, data relating to a person’s private life and to his communications, such as those referred to in Article 5 of the directive, constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter. 35      Furthermore, the access of the competent national authorities to the data constitutes a further interference with that fundamental right (see, as regards Article 8 of the ECHR, Eur. Court H.R., Leander v. Sweden, 26 March 1987, § 48, Series A no 116; Rotaru v. Romania [GC], no. 28341/95, § 46, ECHR 2000-V; and Weber and Saravia v. Germany (dec.), no. 54934/00, § 79, ECHR 2006-XI). Accordingly, Articles 4 and 8 of Directive 2006/24 laying down rules relating to the access of the competent national authorities to the data also constitute an interference with the rights guaranteed by Article 7 of the Charter. 36      Likewise, Directive 2006/24 constitutes an interference with the fundamental right to the protection of personal data guaranteed by Article 8 of the Charter because it provides for the processing of personal data.
  • 65      It follows from the above that Directive 2006/24 does not lay down clear and precise rules governing the extent of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter. It must therefore be held that Directive 2006/24 entails a wide-ranging and particularly serious interference with those fundamental rights in the legal order of the EU, without such an interference being precisely circumscribed by provisions to ensure that it is actually limited to what is strictly necessary.66      Moreover, as far as concerns the rules relating to the security and protection of data retained by providers of publicly available electronic communications services or of public communications networks, it must be held that Directive 2006/24 does not provide for sufficient safeguards, as required by Article 8 of the Charter, to ensure effective protection of the data retained against the risk of abuse and against any unlawful access and use of that data. In the first place, Article 7 of Directive 2006/24 does not lay down rules which are specific and adapted to (i) the vast quantity of data whose retention is required by that directive, (ii) the sensitive nature of that data and (iii) the risk of unlawful access to that data, rules which would serve, in particular, to govern the protection and security of the data in question in a clear and strict manner in order to ensure their full integrity and confidentiality. Furthermore, a specific obligation on Member States to establish such rules has also not been laid down.
  • 60      Secondly, not only is there a general absence of limits in Directive 2006/24 but Directive 2006/24 also fails to lay down any objective criterion by which to determine the limits of the access of the competent national authorities to the data and their subsequent use for the purposes of prevention, detection or criminal prosecutions concerning offences that, in view of the extent and seriousness of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter, may be considered to be sufficiently serious to justify such an interference. On the contrary, Directive 2006/24 simply refers, in Article 1(1), in a general manner to serious crime, as defined by each Member State in its national law.61      Furthermore, Directive 2006/24 does not contain substantive and procedural conditions relating to the access of the competent national authorities to the data and to their subsequent use. Article 4 of the directive, which governs the access of those authorities to the data retained, does not expressly provide that that access and the subsequent use of the data in question must be strictly restricted to the purpose of preventing and detecting precisely defined serious offences or of conducting criminal prosecutions relating thereto; it merely provides that each Member State is to define the procedures to be followed and the conditions to be fulfilled in order to gain access to the retained data in accordance with necessity and proportionality requirements.
  • 55      The need for such safeguards is all the greater where, as laid down in Directive 2006/24, personal data are subjected to automatic processing and where there is a significant risk of unlawful access to those data (see, by analogy, as regards Article 8 of the ECHR, S. and Marper v. the United Kingdom, § 103, and M. K. v. France, 18 April 2013, no. 19522/09, § 35).56      As for the question of whether the interference caused by Directive 2006/24 is limited to what is strictly necessary, it should be observed that, in accordance with Article 3 read in conjunction with Article 5(1) of that directive, the directive requires the retention of all traffic data concerning fixed telephony, mobile telephony, Internet access, Internet e-mail and Internet telephony. It therefore applies to all means of electronic communication, the use of which is very widespread and of growing importance in people’s everyday lives. Furthermore, in accordance with Article 3 of Directive 2006/24, the directive covers all subscribers and registered users. It therefore entails an interference with the fundamental rights of practically the entire European population. 57      In this respect, it must be noted, first, that Directive 2006/24 covers, in a generalised manner, all persons and all means of electronic communication as well as all traffic data without any differentiation, limitation or exception being made in the light of the objective of fighting against serious crime.
  • 62      In particular, Directive 2006/24 does not lay down any objective criterion by which the number of persons authorised to access and subsequently use the data retained is limited to what is strictly necessary in the light of the objective pursued. Above all, the access by the competent national authorities to the data retained is not made dependent on a prior review carried out by a court or by an independent administrative body whose decision seeks to limit access to the data and their use to what is strictly necessary for the purpose of attaining the objective pursued and which intervenes following a reasoned request of those authorities submitted within the framework of procedures of prevention, detection or criminal prosecutions. Nor does it lay down a specific obligation on Member States designed to establish such limits. 63      Thirdly, so far as concerns the data retention period, Article 6 of Directive 2006/24 requires that those data be retained for a period of at least six months, without any distinction being made between the categories of data set out in Article 5 of that directive on the basis of their possible usefulness for the purposes of the objective pursued or according to the persons concerned.64      Furthermore, that period is set at between a minimum of 6 months and a maximum of 24 months, but it is not stated that the determination of the period of retention must be based on objective criteria in order to ensure that it is limited to what is strictly necessary.
  • 52      So far as concerns the right to respect for private life, the protection of that fundamental right requires, according to the Court’s settled case-law, in any event, that derogations and limitations in relation to the protection of personal data must apply only in so far as is strictly necessary (Case C‑473/12 IPI EU:C:2013:715, paragraph 39 and the case-law cited).53      In that regard, it should be noted that the protection of personal data resulting from the explicit obligation laid down in Article 8(1) of the Charter is especially important for the right to respect for private life enshrined in Article 7 of the Charter.54      Consequently, the EU legislation in question must lay down clear and precise rules governing the scope and application of the measure in question and imposing minimum safeguards so that the persons whose data have been retained have sufficient guarantees to effectively protect their personal data against the risk of abuse and against any unlawful access and use of that data (see, by analogy, as regards Article 8 of the ECHR, Eur. Court H.R., Liberty and Others v. the United Kingdom, 1 July 2008, no. 58243/00, § 62 and 63; Rotaru v. Romania, § 57 to 59, and S. and Marper v. the United Kingdom, § 99).
  • 26      In that regard, it should be observed that the data which providers of publicly available electronic communications services or of public communications networks must retain, pursuant to Articles 3 and 5 of Directive 2006/24, include data necessary to trace and identify the source of a communication and its destination, to identify the date, time, duration and type of a communication, to identify users’ communication equipment, and to identify the location of mobile communication equipment, data which consist, inter alia, of the name and address of the subscriber or registered user, the calling telephone number, the number called and an IP address for Internet services. Those data make it possible, in particular, to know the identity of the person with whom a subscriber or registered user has communicated and by what means, and to identify the time of the communication as well as the place from which that communication took place. They also make it possible to know the frequency of the communications of the subscriber or registered user with certain persons during a given period. 27      Those data, taken as a whole, may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained, such as the habits of everyday life, permanent or temporary places of residence, daily or other movements, the activities carried out, the social relationships of those persons and the social environments frequented by them.
  • 32      By requiring the retention of the data listed in Article 5(1) of Directive 2006/24 and by allowing the competent national authorities to access those data, Directive 2006/24, as the Advocate General has pointed out, in particular, in paragraphs 39 and 40 of his Opinion, derogates from the system of protection of the right to privacy established by Directives 95/46 and 2002/58 with regard to the processing of personal data in the electronic communications sector, directives which provided for the confidentiality of communications and of traffic data as well as the obligation to erase or make those data anonymous where they are no longer needed for the purpose of the transmission of a communication, unless they are necessary for billing purposes and only for as long as so necessary.
  • On those grounds, the Court (Grand Chamber) hereby rules:Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC is invalid.
  •  
    EU Court of Justice decision in regard to a Directive that required communications data retention by telcos/ISPs, finding the Directive invalid as a violation of the right of privacy in communications. Fairly read, paragraph 59 outlaws bulk collection of such records, i.e., it requires the equivalent of a judge-issued search warrant in the U.S. based on probable cause to believe that the particular individual's communications are a legitimate object of a search.  Note also that paragraph 67 effectively forbids transfer of any retained data outside the E.U. So a barrier for NSA sharing of data with GCHQ derived from communications NSA collects from EU communications traffic. Bye-bye, Big Data for GCHQ in the E.U. 
Gary Edwards

The Sides Are Forming For The Coming Civil War. | Militia News - 1 views

  • America is in the choosing sides phase of the coming civil war. To use a college recruiting phrase, it is accurate to state that the letters of intent to join one side or another have mostly been signed and the commitments offered. However, there is one big uncommitted piece, but very soon the sides will be drawn.
  • The Chess Pieces of Civil War What is going on today in America all about choosing sides. There are clear lines being formed in the United States. The recruiting pool consists of the Department of Homeland Security, the American military, local law enforcement, the Russian troops pouring into the United States, the trickle of Chinese troops coming into the country through Hawaii and, of course, the poor, the middle class and elite. This is the recruiting pool which will form the chess pieces of the coming American Civil War. Even if all parties in this country wanted the country to continue, even in its present mortally wounded state, it would be foolish to believe that it could continue for much longer.
  • Barring a false flag event, US martial law will have a trigger event, which will lead to martial law, that will be financial and it will naturally occur as we are already on a collision course with destiny.
  • ...18 more annotations...
  • The net result of these staggering numbers can only end one way, and that is with a financial collapse, followed by a bank holiday, rioting in the streets and the full roll out of martial law. These financial numbers guarantee that the party cannot continue much longer. Since America, in her present form, cannot continue much longer without experiencing a cataclysmic shift, we would be wise to realize what resources are going to be the impetus for civil war. When you play the board game, Monopoly, the properties on Boardwalk are among the most coveted. It is no different in real life. The biggest prize of the coming conflict is real estate. Homes, office buildings and shopping malls are the most coveted prize. The MERS mortgage fraud continues unabated as millions of homes have been confiscated through mortgage fraud. When the dollar is worthless and is awaiting its replacement (e.g. the Amero or the Worldo), real estate will be more valuable than gold.
  • Other big game that is being hunted by both sides in the coming civil war will be bank accounts, which must be looted before the dormant computer digits we call money can be converted into hard assets. That is why my advice is, and has been, convert your cash into tangible assets which can enhance your survivability in the upcoming crash.
  • Also, your pensions, your 401K’s and your various entitlement programs are also at risk as evidenced by Secretary of Treasury Jack Lew’s “borrowing” from various Federal retirement accounts in order to increase the debt ceiling fight that will resurface in Congress, again, early next year.
  • Again, my advice is to convert your assets in tangible items which will aid in getting you through some very dark days coming up in the near future.
  • Before the cognitive dissonance crowd rears their ugly heads and accuses me of fear mongering, ask yourself what the elite did prior to the crash of the economy in 1929. For example, Joseph Kennedy took his money out of the stock market the day BEFORE it crashed. Vanderbilt, Rockefeller, Westinghouse, et al., all took their money out just prior to the crash, leaving the ignorant masses unaware of what was coming. Don’t make the same mistake.
  • I have news for you, there are Federal officials in every town, city and county in America. If one violates HR 347, they will be immediately arrested and charged with a felony.
  • The NDAA constitutes another big fence being built around the people in which all due process will soon be gone. The NDAA will allow the administration the “legal” right to secretly remove any burgeoning leadership of citizen opposition forces.
  • There are three paramount numbers that every American should be paying attention to and they are (1) national deficit ($17 trillion dollars), (2) the unfunded liabilities debt ($238 trillion dollars), and (3) the derivatives/futures debt (one quadrillion dollars which is 16 times the entire wealth of the planet.
  • In short, this spells the potential enslavement of the American people.
  • For those of you who still have your blinders on, research the NDAA and EO 13603 and then when you realize that I am correct in my interpretation, ask yourself one question; If the powers that be were not going to seize every important asset, then why would the government give itself the power to do just that?
  • And while you are at it, remember the Clean Water Act gives the EPA to control all private property as well as the precious resources of all water. And then of course, the FDA and the conflicts with local farmers is escalating.
  • And if this is not enough to convince the sheep of this country that the storm clouds are overhead, then take a look at HR 347 which outlaws protesting and takes away the First Amendment. This unconstitutional legislation makes it illegal to criticize the President and the government, as a whole, in the presence of Federal officials.
  • The second provision which will allow this country to quickly transition to martial law is Executive Order (EO) 13603 which allows the President to take control over any resource, property and even human labor within the United States. This EO gives the President unlimited authority including the ability to initiate a civilian draft as well as a military draft.
  • I just saw the Hunger Games sequel, Catching Fire, and this is eerily similar to what I saw in the movies in that the people are being provoked to revolution.
  • in the TV show, Revolution, the most evil entity in the series is the re-emergence of the United States government and the heroes of the show are rebelling against the abuse.
  • It seems like everywhere we turn in the media, the people are being encouraged to rise up now and challenge authority. I am sure the establishment would rather confront a small group of dissidents and squelch the rebellion now, before the numbers can become significant and overwhelming to the establishment and this theme is being carried out in the media.
  • The final action will consist of gun confiscation and one side of the coming conflict is attempting to position themselves to do that in the near future and that would be the DHS, the Russians and the Chinese.
  • I cannot think of another legitimate reason which would describe why they are here.
  •  
    While I'd be the first to agree that the degree of fiscal mismanagement of this nation's economy is beyond insane and have to admit that I see very little to admire in Barack Obama's presidency, the meme about Executive Order 13603 authorizing confiscation of any property and enslavement of the American public needs to be put to rest. See http://www.archives.gov/federal-register/executive-orders/2012.html#13603 E.O. 13603 is not much more than an updating of similar executive orders issued by prior presidents beginning with Dwight Eisenhower. In fact, in skimming it a few minutes ago, I didn't see anything drastically different from some of the prior related orders. E.g., it reflects that a bunch of agencies that were formerly either independent or under other departments are now under the newish Department of Homeland Security, whose Secretary now gets the authority formerly delegated to other department and agency heads. If blame must be cast, it belongs on the Congress that enacted the Defense Production Act of 1950, 50 U.S.C. 2061, et seq. The executive order does no more than obey that Act's instructions. For example there is a section authorizing pre-emption of manufacturing capacity of critical industries over any existing civilian contracts in the event of a national emergency, but that language is in the statute as well. But that power hasn't had much traction since Harry Truman tried to nationalize the steel industry to break a nationwide strike. The Supreme Court swatted down that effort as an abuse of a power that would be lawful in a true emergency, like another major. But even that semi-radical "survival" power is ameliorated by other provisions of the statute and the order that authorize loan guarantees for companies' construction and maintenance of critical productive capacity. Much of that has been implemented over the years as outright grants. So for example, many chemical manufacturing plants were built with Defense Production Act funds, with
Gary Edwards

Peter Beinart: How Ron Paul Will Change the GOP in 2012 - The Daily Beast - 2 views

  •  
    Not a big Peter Beinhart fan, but this article explains a large part of the Ron Paul phenom. After a life time as a big C Goldwater-Reagan Constitutional Conservative, this summer i made a full transition to big C Constitutional Libertarian. The tipping point for me was the GAO audit of the Federal Reserve, where they discovered $16.1 Trillion of taxpayer dollars missing from the Federal Reserve Bankster Cartel management books. It went to a who's who of international Bankster Cartel members. None of the taxpayer funded "financial collapse of 2008" bailout dollars went to the purposes chartered by their legislation. That includees the TARP $850 Billion, the Obama Stimulous $1 Trillion, and the mega FRBC $16.1 Trillion. No bad debts were purchased and retired. No rotting mortgage securities were swept up and restructured. No shovel ready jobs either. And no one in government or banksterism having caused the financial collapse went to jail. Instead, the perps feasted on the bailout dollars. The debt remains on the books of international Banksters, collecting interest, thirsting for foreclosure. The Bankster Cartel members are flush with cash, but not lending. By law (The Federal Reserve Act of December 23rd, 1913), FRBC members must keep a significant amount of their assets on "reserve" at the Federal Reserve, at 6% interest. In exchange for managing this process and the exploding money supply, the taxpayers of the USA are obligated by law to pay the FRBC 1% per year of (assets under management" (the money supply). Take note: the FRBC takes the 1% per year payment for their services in the form of GOLD!! They will not take payment in the form of paper notes labeled legal tender "Federal Reserve Notes". They only take GOLD. My transition to Constitutional Libertarian begins with a strct reading of the Constitution (the How), the Declaration of Independence, (the Why), and belief in the Rule of Law, not man. The concept of achievi
Gary Edwards

The Lawless President - 0 views

  •  
    Excellent read!  Peter Ferrara walks us through the latest Obama assault on the Constitution, this time his refusal to enforce laws he disagrees with.  Surprisingly, this now includes the employer mandate portion of ObamaCare!!!  Why he has to do this however is a stunning story. Bottom line:  The latest jobs report has the economy producing 195,000 new jobs in the past quarter.  The problem is, 100% of these new jobs are part-time.  Thanks to ObamaCare.   "The duties of the President of the United States are spelled out in Article II, Section 3 of the Constitution, which states, inter alia, that the President "shall take Care that the laws be faithfully executed." As Stanford Law Professor and former federal judge Michael McConnell explained in yesterday's Wall Street Journal, "This is a duty, not a discretionary power. While the president does have substantial discretion about how to enforce a law, he has no discretion about whether to do so." Section 1513(d) of the Unaffordable Care Act (aka "Obamacare") states unequivocally, "The amendments made by this section shall apply to months beginning after December 31, 2013." In other words, the provisions of Obamacare become fully effective in 2014, as a matter of duly enacted federal law. But over the long Fourth of July weekend, in a "Never Mind" moment, the Obama Administration announced, through a Deputy Assistant Secretary of the Treasury, that contrary to federal law, the employer mandate of Obamacare shall not become fully effective in months beginning after December 31, 2013, but only in months beginning after December 31, 2014. Making the announcement through such a low level Administration official to me says that Obama has contempt for the American people, and for the rule of law. Barack Obama: Lawbreaker But it does not matter who announces it. The President is the one responsible. And the announcement constitutes the assumption of authoritarian powers by President Obama. McCo
Paul Merrell

Resurrecting the Dubious State Secrets Privilege | John Dean | Verdict | Legal Analysis... - 0 views

  • In an unusual move, the U.S. Department of Justice has filed a motion to make a private lawsuit simply disappear. While the U.S. Government is not a party to this defamation lawsuit—Victor Restis et al. v. American Coalition Against Nuclear Iran, Inc.—filed July 19, 2013, in the U.S. District Court for the Southern District of New York, Attorney General Eric Holder is concerned that the discovery being undertaken might jeopardize our national security.
  • The government’s argument for intervening in this lawsuit is technical and thin.
  • The strongest precedent in the government’s brief in the current case is the 1985 case of Fitzgerald v. Penthouse Intern., Ltd. Fitzgerald had sued Penthouse Magazine for an allegedly libelous article, but the U.S. Navy moved to intervene on the ground that the government had a national security interest which would not be adequately protected by the parties, so the government requested the action be dismissed, after invoking the state secrets privilege. The federal district court granted the motions and dismissed the case, which the U.S. Court of Appeals for Fourth Circuit affirmed. So there is precedent for this unusual action by the government in a private lawsuit, but the legitimacy of the state secrets privilege remains subject to question.
  • ...9 more annotations...
  • In February 2000, Judith Loether, a daughter of one of the three civilians killed in the 1948 B-29 explosion, discovered the government’s once-secret accident report for the incident on the Internet. Loether had been seven weeks old when her father died but been told by her mother what was known of her father’s death and the unsuccessful efforts to find out what had truly happened. When Loether read the accident report she was stunned. There were no national security secrets whatsoever, rather there was glaringly clear evidence of the government’s negligence resulting in her father’s death. Loether shared this information with the families of the other civilian engineers who had been killed in the incident and they joined together in a legal action to overturn Reynolds, raising the fact that the executive branch of the government had misled the Supreme Court, not to mention the parties to the earlier lawsuit.
  • Lou Fisher looked closely at the state secrets privilege in his book In The Name of National Security, as well as in follow-up articles when the Reynolds case was litigated after it was discovered, decades after the fact, that the government had literally defrauded the Supreme Court in Reynolds, e.g., “The State Secrets Privilege: Relying on Reynolds.” The Reynolds ruling emerged from litigation initiated by the widows of three civilian engineers who died in a midair explosion of a B-29 bomber on October 6, 1948. The government refused to provide the widows with the government’s accident report. On March 9, 1953, the Supreme Court created the state secrets privilege when agreeing the accident report did not have to be produced since the government claimed it contained national security secrets. In fact, none of the federal judges in the lower courts, nor the justices on the Supreme Court, were allowed to read the report.
  • Lowell states in his letter: “By relying solely upon ex parte submissions to justify its invocation of the state secrets privilege, especially in the unprecedented circumstance of private party litigation without an obvious government interest, the Government has improperly invoked the state secrets privilege, deprived Plaintiffs of the opportunity to test the Government’s claims through the adversarial process, and limited the Court’s opportunity to make an informed judgment. “ Lowell further claims that in “the typical state secrets case, the Government will simultaneously file both a sealed declaration and a detailed public declaration.” (Emphasis in Lowell’s letter.) To bolster this contention, he provided the court with an example, and offered to provide additional examples if so requested.
  • The Justice Department’s memorandum of law accompanying its motion to intervene states that once the state secrets privilege has been asserted “by the head of the department with control over the matter in question . . . the scope of judicial review is quite narrow.” Quoting from the U.S. Supreme Court ruling establishing this privilege in 1953, U.S. v. Reynolds, the brief adds: “the sole determination for the court is whether, ‘from all the circumstances of the case . . . there is a reasonable danger that compulsion of the evidence will expose military [or other] matters which, in the interest of national security, should not be divulged.’”In short, all the Justice Department need claim is the magic phrase—”state secrets”—after assuring the court that the head of department or agency involved has personally decided it is information that cannot be released. That ends the matter. This is what has made this privilege so controversial, not to mention dubious. Indeed, invocation by the executive branch effectively removes the question from judicial determination, and the information underlying the decision is not even provided to the court.
  • As Fisher and other scholars note, there is much more room under the Reynolds ruling for the court to take a hard look at the evidence when the government claims state secrets than has been common practice. Fisher reminds: “The state secrets privilege is qualified, not absolute. Otherwise there is no adversary process in court, no exercise of judicial independence over what evidence is needed, and no fairness accorded to private litigants who challenge the government . . . . There is no justification in law or history for a court to acquiesce to the accuracy of affidavits, statements, and declarations submitted by the executive branch.” Indeed, he noted to do so is contrary to our constitutional system of checks and balances.
  • Time to Reexamine Blind Adherence to the State Secrets PrivilegeIn responding to the government’s move to intervene, invoke state secrets, and dismiss the Restis lawsuit, plaintiffs’ attorney Abbe Lowell sent a letter to Judge Edgardo Ramos, the presiding judge on the case on September 17, 2014, contesting the Department of Justice’s ex parte filings, and requesting that Judge Ramos “order the Government to file a public declaration in support of its filing that will enable Plaintiffs to meaningfully respond.” Lowell also suggested as an alternative that he “presently holds more than sufficient security clearances to be given access to the ex parte submission,” and the court could do here as in other national security cases, and issue a protective order that the information not be shared with anyone. While Lowell does not so state, he is in effect taking on the existing state secrets privilege procedure where only the government knows what is being withheld and why, and he is taking on Reynolds.
  • To make a long story short, the Supreme Court was more interested in the finality of their decisions than the fraud that had been perpetrated upon them. They rejected the direct appeal, and efforts to relegate the case through the lower courts failed. As Fisher notes, the Court ruled in Reynolds based on “vapors and allusions,” rather than facts and evidence, and today it is clear that when it uncritically accepted the government’s word, the Court abdicated its duty to protect the ability of each party to present its case fairly, not to mention it left the matter under the control of a “self-interested executive” branch.
  • Lowell explains it is not clear—and suggests the government is similarly unclear in having earlier suggested a “law enforcement privilege”—as to why the state secrets privilege is being invoked, and argues this case can be tried without exposing government secrets. Citing the Fitzgerald ruling, Lowell points out dismissal is appropriate “[o]nly when no amount of effort and care on the part of the court and the parties will safeguard privileged material is dismissal warranted.”
  • No telling how Judge Ramos will rule, and the government has a remarkable record of prevailing with the deeply flawed state secrets privilege. But Lowell’s letter appears to say, between the lines, that he has a client who is prepared to test this dubious privilege and the government’s use of it in this case if Judge Ramos dismisses this lawsuit. The U.S. Court of Appeals for the Second Circuit, where that ruling would be reviewed, sees itself every bit the intellectual equal of the U.S. Supreme Court and it is uniquely qualified to give this dubious privilege and the Reynolds holding a reexamination. It is long past time this be done.
  •  
    Interesting take on the Restis case by former Nixon White House Counsel John Dean. Where the State Secrets Privilege is at its very nastiest, in my opinion, is in criminal prosecutions where the government withholds potentially exculpatory evidence on grounds of state secrecy. I think the courts have been far too lenient in allowing people to be tried without production of such evidence. The work-around in the Guantanamo Bay inmate cases has been to appoint counsel who have security clearances, but in those cases the lawyer is forbidden from discussing the classified information with the client, who could have valuable input if advised what the evidence is. It's also incredibly unfair in the extraordinary rendition cases, where the courts have let the government get away with having the cases dismissed on state secrecy grounds, even though the tortures have been the victim of criminal official misconduct.  It forces the victims to appeal clear to the Supreme Court before they can start over in an international court with jurisdiction over human rights violations, where the government loses because of its refusal to produce the evidence.  (Under the relevant treaties that the U.S. is a party to, the U.S. is required to provide a judicial remedy without resort to claims of national security secrecy.) Then the U.S. refuses to pay the judgments of the International courts, placing the U.S. in double breach of its treaty obligations. We see the same kinds of outrageous secrecy playing out in the Senate Intellience Committee's report on CIA torture, where the Obama Administration is using state secrecy claims to delay release of the report summary and minimize what is in it. It's highly unlikely that I will live long enough to read the full report. And that just is not democracy in action. Down with the Dark State!   
Gary Edwards

Rand Paul's Tea Party Response: Full Text - 0 views

  • With my five-year budget, millions of jobs would be created by cutting the corporate income tax in half, by creating a flat personal income tax of 17%, and by cutting the regulations that are strangling American businesses.
  • America has much greatness left in her. We will begin to thrive again when we begin to believe in ourselves again, when we regain our respect for our founding documents, when we balance our budget, when we understand that capitalism and free markets and free individuals are what creates our nation’s prosperity.
  •  
    Outstanding statement about what made America great, an dhow are government is destroying that greatness.  This is the full Text of Sen. Rand Paul's Tea Party Response to Obama's State of the Union Address: I speak to you tonight from Washington, D.C. The state of our economy is tenuous but our people remain the greatest example of freedom and prosperity the world has ever known. People say America is exceptional. I agree, but it's not the complexion of our skin or the twists in our DNA that make us unique. America is exceptional because we were founded upon the notion that everyone should be free to pursue life, liberty, and happiness. For the first time in history, men and women were guaranteed a chance to succeed based NOT on who your parents were but on your own initiative and desire to work. We are in danger, though, of forgetting what made us great. The President seems to think the country can continue to borrow $50,000 per second. The President believes that we should just squeeze more money out of those who are working. The path we are on is not sustainable, but few in Congress or in this Administration seem to recognize that their actions are endangering the prosperity of this great nation. Ronald Reagan said, government is not the answer to the problem, government is the problem. Tonight, the President told the nation he disagrees. President Obama believes government is the solution: More government, more taxes, more debt. What the President fails to grasp is that the American system that rewards hard work is what made America so prosperous. What America needs is not Robin Hood but Adam Smith. In the year we won our independence, Adam Smith described what creates the Wealth of Nations. He described a limited government that largely did not interfere with individuals and their pursuit of happiness. All that we are, all that we wish to be is now threatened by the notion that you can have something for nothing, that you can have your cake and ea
Paul Merrell

John McCain, Conductor of the "Arab Spring" and the Caliph , by Thierry Meyssan - 0 views

  • Everyone has noticed the contradiction of those who recently characterized the Islamic Emirate as "freedom fighters" in Syria and who are indignant today faced with its abuses in Iraq. But if that speech is incoherent in itself, it makes perfect sense in the strategic plan: the same individuals were to be presented as allies yesterday and must be as enemies today, even if they are still on orders from Washington. Thierry Meyssan reveals below US policy through the particular case of Senator John McCain, conductor of the "Arab Spring" and longtime partner of Caliph Ibrahim.
  • ohn McCain is known as the leader of the Republicans and unhappy 2008 US presidential candidate. This is, we will see, only the real part of his biography, which serves as a cover to conduct covert actions on behalf of his government. When I was in Libya during the "Western"attack, I was able to view a report of the foreign intelligence services. It stated that, on February 4, 2011 in Cairo, NATO organized a meeting to launch the "Arab Spring" in Libya and Syria. According to this document, the meeting was chaired by John McCain. The report detailed the list of Libyan participants, whose delegation was led by the No. 2 man of the government of the day, Mahmoud Jibril, who abruptly switched sides at the entrance of the meeting to become the opposition leader in exile. I remember that, among the French delegates present, the report quoted Bernard-Henry Lévy, although officially he had never exercised functions within the French government. Many other personalities attended the symposium, including a large delegation of Syrians living abroad.
  • Emerging from the meeting, the mysterious Syrian Revolution 2011 Facebook account called for demonstrations outside the People’s Council (National Assembly) in Damascus on February 11. Although this Facebook account at the time claimed to have more than 40,000 followers, only a dozen people responded to its call before the flashes of photographers and hundreds of police. The demonstration dispersed peacefully and clashes only began more than a month later in Deraa. [1] On February 16, 2011, a demonstration underway in Benghazi, in memory of members of the Islamic Fighting Group in Libya [2] massacred in 1996 in the Abu Selim prison, degenerated into shooting. The next day, a second event, this time in memory of those who died by attacking the Danish consulate during the Muhammad cartoons affair, also degenerated into shooting. At the same time, members of the Islamic Fighting Group in Libya ,coming from Egypt and coordinated by unidentified, hooded individuals, simultaneously attacked four military bases in four different cities. After three days of fighting and atrocities, the rebels launched the uprising of Cyrenaica against Tripolitania [3]; a terrorist attack that the western press falsely presented as a "democratic revolution" against "the regime" of Muammar el-Qaddafi.
  • ...16 more annotations...
  • On February 22nd, John McCain was in Lebanon. He met members of the Future Movement (the party of Saad Hariri) whom he charged to oversee the transfer of arms to Syria around the MP Okab Sakr [4]. Then, leaving Beirut, he inspected the Syrian border and the selected villages including Ersal, which were used as a basis to back mercenaries in the war to come. The meetings chaired by John McCain were clearly the trigger point for a long-prepared Washington plan; the plan that would have the UK and France attack Libya and Syria simultaneously, following the doctrine of "leadership from behind" and the annex of the Treaty of Lancaster House of November 2010. [5]
  • In May 2013, Senator John McCain made his way illegally to near Idleb in Syria via Turkey to meet with leaders of the "armed opposition". His trip was not made public until his return to Washington. [6] This movement was organized by the Syrian Emergency Task Force, which, contrary to its title, is a Zionist Organization led by a Palestinian employee of AIPAC [7]
  • John McCain in Syria. In the foreground at right is the director of the Syrian Emergency Task Force. In the doorway, center, Mohammad Nour.
  • In photographs released at that time, one noticed the presence of Mohammad Nour, a spokesman for the Northern Storm Brigade (of the Al-Nosra Front, that is to say, al-Qaeda in Syria), who kidnapped and held 11 Lebanese Shiite pilgrims in Azaz. [8] Asked about his proximity to al-Qaeda kidnappers, the Senator claimed not to know Mohammad Nour who would have invited himself into this photo. The affair made a great noise and the families of the abducted pilgrims lodged a complaint before the Lebanese judiciary against Senator McCain for complicity in kidnapping. Ultimately, an agreement was reached and the pilgrims were released. Let’s suppose that Senator McCain had told the truth and that he was abused by Mohammad Nour. The object of his illegal trip to Syria was to meet the chiefs of staff of the Free Syrian Army. According to him, the organization was composed "exclusively of Syrians" fighting for "their freedom" against the "Alouite dictatorship” (sic). The tour organizers published this photograph to attest to the meeting.
  • John McCain and the heads of the Free Syrian Army. In the left foreground, Ibrahim al-Badri, with which the Senator is talking. Next, Brigadier General Salim Idris (with glasses).
  • If we can see Brigadier General Idriss Salem, head of the Free Syrian Army, one can also see Ibrahim al-Badri (foreground on the left) with whom the senator is talking. Back from the surprise trip, John McCain claimed that all those responsible for the Free Syrian Army were "moderates who can be trusted" (sic).
  • However, since October 4, 2011, Ibrahim al-Badri (also known as Abu Du’a) was on the list of the five terrorists most wanted by the United States (Rewards for Justice). A premium of up to $ 10 million was offered to anyone who would assist in his capture. [9] The next day, October 5, 2011, Ibrahim al-Badri was included in the list of the Sanctions Committee of the UN as a member of Al Qaeda. [10] In addition, a month before receiving Senator McCain, Ibrahim al-Badri, known under his nom de guerre as Abu Bakr al-Baghdadi, created the Islamic State in Iraq and the Levant (ÉIIL) – all the while still belonging to the staff of the very "moderate" Free Syrian Army. He claimed as his own the attack on the Taj and Abu Ghraib prisons in Iraq, from which he helped between 500 and 1,000 jihadists escape who then joined his organization. This attack was coordinated with other almost simultaneous operations in eight other countries. Each time, the escapees joined the jihadist organizations fighting in Syria. This case is so strange that Interpol issued a note and requested the assistance of the 190 member countries. [11]
  • For my part, I have always said that there was no difference on the ground between the Free Syrian Army, Al-Nosra Front, the Islamic Emirate etc ... All these organizations are composed of the same individuals who continuously change flag. When they pose as the Free Syrian Army, they fly the flag of French colonization and speak only of overthrowing the "dog Bashar." When they say they belong to Al-Nosra Front, they carry the flag of al Qaeda and declare their intention to spread Islam in the world. Finally when they say they are the Islamic Emirate, they brandish the flag of the Caliphate and announce that they will clean the area of all infidels. But whatever the label, they proceed to the same abuses: rape, torture, beheadings, crucifixions. Yet neither Senator McCain nor his companions of the Syrian Emergency Task Force provided the information in their possession on Ibrahim al-Badri to the State Department, nor have they asked for the reward. Nor have they informed the anti-terrorism Committee of the UN.
  • But John McCain is not just the leader of the political opposition to President Obama, he is also one of his senior officials! He is in fact President of the International Republican Institute (IRI), the republican branch of NED / CIA [12], since January 1993. This so-called "NGO" was officially established by President Ronald Reagan to extend certain activities of the CIA, in connection with the British, Canadian and Australian secret services. Contrary to its claims, it is indeed an inter-governmental agency. Its budget is approved by Congress in a budget line dependent of the Secretary of State. It is also because it is a joint agency of the Anglo-Saxon secret services that several states in the world prohibit it from any activity on their territory.
  • he list of interventions by John McCain on behalf of the State Department is impressive. He participated in all the color revolutions of the last twenty years.
  • And an agent that has the best coverage imaginable: he is the official opponent of Barack Obama. As such, he can travel anywhere in the world (he is the most traveled US senator) and meet whoever he wants without fear. If his interlocutors approve Washington policy, he promised them to continue it, if they fight it, he hands over the responsibility to President Obama.
  • In 2003, France’s opposition was not enough to offset the influence of the Committee for the Liberation of Iraq. The United States attacked the country again and this time overthrew President Hussein. Of course, John McCain was a major contributor to the Committee. After handing to a private company the care of plundering the country for a year [17], they tried to partition Iraq into three separate states, but had to give it up due to the resistance of the population. They tried again in 2007, around the Biden-Brownback resolution, but again failed. [18] Hence the current strategy that attempts to achieve this by means of a non-state actor: the Islamic Emirate.
  • The operation was planned well in advance, even before the meeting between John McCain and Ibrahim al-Badri. For example, internal correspondence from the Qatari Ministry of Foreign Affairs, published by my friends James and Joanne Moriarty [19], shows that 5,000 jihadis were trained at the expense of Qatar in NATO’s Libya in 2012, and 2,5 million dollars was paid at the same time to the future Caliph. In January of 2014, the Congress of the United States held a secret meeting at which it voted, in violation of international law, to approve funding for the Al-Nosra Front (Al-Qaeda) and the Islamic emirate in Iraq and the Levant until September 2014. [20] Although it is unclear precisely what was really agreed to during this meeting revealed by the British Reuters news agency [21], and no media US media dared bypass censorship, it is highly probable that the law includes a section on arming and training jihadists.
  • Proud of this US funding, Saudi Arabia has claimed on its public television channel, Al-Arabiya, that the Islamic Emirate was headed by Prince Abdul Rahman al-Faisal, brother of Prince Saud al Faisal (Foreign Minister) and Prince Turki al-Faisal (Saudi ambassador to the United States and the United Kingdom) [22]. The Islamic Emirate represents a new step in the world of mercenaries. Unlike jihadi groups who fought in Afghanistan, Bosnia-Herzegovina and Chechnya around Osama bin Laden, it does not constitute a residual force but actually an army in itself. Unlike previous groups in Iraq, Libya and Syria, around Prince Bandar bin Sultan, they have sophisticated communication services at their disposal for recruitment and civilian officials trained in large western schools capable of instantly taking over the administration of a territory.
  • Brand new Ukrainian weapons were purchased by Saudi Arabia and conveyed by the Turkish secret services who gave them to the Islamic Emirate. Final details were coordinated with the Barzani family at a meeting of jihadist groups in Amman on 1 June 2014. [23] The joint attack on Iraq by the Islamic Emirate and the Kurdistan Regional Government began four days later. The Islamic Emirate seized the Sunni part of the country, while the Kurdistan Regional Government increased its territory by over 40%. Fleeing the atrocities of jihadists, religious minorities left the Sunni area, paving the way for the three-way partition of the country. Violating the Iraqi-US Defense agreement, the Pentagon did not intervene and allowed the Islamic Emirate to continue its conquest and massacres. A month later, while the Kurdish Peshmerga Regional Government had retreated without a fight, and when the emotions of world public opinion became too strong, President Obama gave the order to bomb some positions of the Islamic Emirate. However, according to General William Mayville, director of operations at the headquarters, "These bombings are unlikely to affect the overall capacity of the Islamic Emirate and its activities in other areas of Iraq or Syria ". [24] Obviously, they are not meant to destroy the jihadist army, but only to ensure that each player does not overlap the territory that has been assigned. Moreover, for the moment, they are symbolic and have destroyed only a handful of vehicles. It was ultimately the intervention of the Kurds of the Turkish and Syrian Kurdish PKK which halted the progress of the Islamic Emirate and opened a corridor to allow civilians to escape the massacre.
  • In the latest issue of its magazine, the Islamic Emirate devoted two pages to denounce Senator John McCain as "the enemy" and "double-crosser", recalling his support for the US invasion of Iraq. Lest this accusation remain unknown in the United States, Senator immediately issued a statement calling the Emirate the "most dangerous Islamist terrorist group in the world" [26]. This controversy is there only to distract the gallery. One would like to believe it ... if it were’t for this photograph from May 2013.
  •  
    Thierry Meysann makes the case that Sen. John McCain, working with  was the guiding force behind the Arab Spring, the overthrow of Qadaffi in Libya, and the invasion of Syria by mercenary Islamists, working with a Zionist but deliberately misnomered front group. Thierry goes on to show that McCain played a key role in the creation and deployment of ISIL.  
Joseph Skues

Yes, Islam condones wife beatings - 0 views

  •  
    "Recently, Marvin Levant (Dec. 28), Steve Harris (Dec. 30), Syed Soharwardy (Jan. 2), and Riazuddin Ahmed (Jan. 5) debated Islam through the forum of the Herald's letters to the editor. The issue of wife beating and gender inequality in Islam has become convoluted and highly controversial as many Muslims try to sugar-coat the ugly truths and others try to shed some light on the issue. Soharwardy's statement that "Beating one's wife is not only wrong, it is criminal and completely un-Islamic" is incorrect. The Qur'an says that "men are in charge of women because Allah has made one of them (men) to excel the other (women), thus man's superiority over women . . . good women are the obedient ones . . . admonish the rebellious women and banish them, and scourge them (whip them severely to inflict pain) (4:34) . . . smote them (hit or strike with the hand or with a weapon causing pain, beat them . . . (4:62)". Islam does not recognize gender equality. For example, polygamy is accepted in Islam, but polyandry is not. A woman's testimony is considered half as worthy as a man's in court; a son inherits twice as much as a daughter does. Muslim men may marry Muslim, Jewish or Christian women, but Muslim women can marry only Muslim men. In short, sharia law leads to the inhuman treatment of Muslim women by their husbands and others, especially in South Asia and the Middle East. Higher education is emphasized more for sons than for daughters; in cultural honour killings, almost always women are the target for murder. Under sharia, divorced Muslim women get custody of their sons under eight years of age and daughters until puberty, and then the fathers take the children away. Sharia enabled one of the worst fundamentalists, the vile and ruthless military dictator, Muhammad Zia-ul-Haq, to put more than 15,000 rape victims in jail because they could not comply with the absurd Islamic condition requiring them to have numerous male witnesses of their victimization. They were char
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
clausonlaw22

How Much Does Mental Health Disability Pay In 2023 - 0 views

  •  
    How Much Does Mental Health Disability Pay In 2023 Social Security Disability Insurance (SSDI or SSD) is the sole source of income for millions of Americans who are unable to work due to a non-work-related injury or illness. SSDI benefits are available only to workers and former workers with a substantial employment history. Both physical and mental disabilities are covered under the Social Security Act. While SSDI pays the same benefits for qualifying mental impairments as it does for physical impairments, the amount each individual receives in benefits depends on their history of earnings. This blog post will explain how Social Security defines qualifying disabilities, including mental impairments, and determines each individual's benefit payment. At The Clauson Law Firm, we know how important it is for every disability applicant and benefit recipient to understand how their benefits are arrived at, what affects their continued benefits, and how their benefits can change over time. Contact Clauson Law today if you have questions about qualifying for SSDI benefits or need help filing a claim or appealing a denial. We've helped thousands of disabled people across the U.S. with their disability claims. Mental Impairments And Social Security Disability More than 40% of SSD cases in the United States have some mental health or intellectual impairment as a component in the claim. Mental health impairments can result from an almost unlimited array of circumstances, including traumatic stress; depression; genetic predisposition to depression, bipolar disorder, or schizophrenia; or traumatic brain injury (TBI); one of the many forms of dementia; and others. The ways in which mental impairments affect the person suffering can often interfere with their ability to perform work on a regular basis. These are discussed in detail in the section "Common Mental Disabilities that May Qualify for SSDI" below. But first, let's look at how you qualify for SSD benefits and how you
  •  
    How Much Does Mental Health Disability Pay In 2023
Paul Merrell

DOJ's Motion to Dismiss in Smith v. Obama, the case challenging the legality of the war... - 0 views

  • As I noted in an earlier post, Nathan Smith, a U.S. Army captain deployed to Kuwait as part of the campaign against ISIL, Operation Inherent Resolve, has sued the President, seeking a declaration that Congress has not authorized the hostilities in Iraq and Syria and that therefore the War Powers Resolution requires the President to remove U.S. forces from hostilities in those nations. On Tuesday, the Department of Justice filed a motion to dismiss the case. Its brief in support of the motion includes one argument that I think is correct (albeit not for all the reasons the government offers) — namely, that Smith lacks standing to sue. That ought to be sufficient to have the case dismissed. The brief also includes an argument on the merits (albeit not designated as such) that is very interesting and potentially important — an account of how Congress has allegedly authorized Inherent Resolve in three ways: (i) in the 2001 AUMF; (ii) in the 2002 AUMF; and (iii) in current appropriations statutes. The heart of the brief, however, is devoted to a third argument — that Judge Koller-Kotelly must dismiss the case on the basis of the political question doctrine — that is not only wrong, but that simply ignores the Supreme Court’s recent (and repeated) repudiation of that very argument.
  • On page 39 of its 45-page brief, the government finally gets around to the reason why the court should dismiss the complaint: Smith lacks standing. Importantly, Smith’s theory of standing is not that he — an Army captain deployed to perform intelligence services in Kuwait — is more likely to be injured or killed by virtue of the President’s decision to deploy troops into hostilities in Iraq and Syria. It is, instead, that the President’s alleged failure to comply with the War Powers Act results in Captain Smith’s own violation of his officer’s oath to “support and defend” the Constitution “against all enemies, foreign and domestic,” and to “bear true faith and allegiance” to the Constitution.
  • The government’s standing argument begins (p. 35) by suggesting that “[p]laintiff’s claim that he is being forced to betray his oath is insufficient to establish standing because the violation of an oath, by itself, is not an injury in fact.” The cases the government cites for that proposition, however, do not say that a forced oath violation would not be an injury in fact — and that’s not a question the judge needs to resolve. What the cases establish, instead, is the point the government finally argues at page 39 — namely, that a government officer does not violate his oath by complying with superiors’ orders, even if it turns out that the law prohibits the military operation in which those orders are issued. Indeed, Smith would not violate his oath of office even if his superiors’ orders themselves were unauthorized, or if the intelligence activities he is ordered to performed were unauthorized. But he does not allege even those things (as I discuss below, he does not, for instance, alleged that he is being ordered to do anything unlawful). Instead, he merely argues that because President Obama should have withdrawn troops from Syria and Iraq 60 days after their deployment, Smith himself is violating his oath to “bear true faith and allegiance to the Constitution.” This is a non sequitur: Even if Smith is right that the continuation of Operation Inherent Resolve is unlawful, that would not mean that he is acting in violation of his oath. (Much more on this in my earlier post.) And that simple fact is reason enough for Judge Koller-Kotelly to dismiss the case.
  • ...8 more annotations...
  • One of Smith’s counsel, Professor Bruce Ackerman, argues that this reason for rejecting the oath-based theory of standing ignores the Supreme Court’s 1804 decision in Little v. Barreme. Little, however, is not on point. In that case, Navy Captain Little was sued by the owners of a Danish ship for damages caused when Little seized that neutral ship. The Court held that Little could be liable, notwithstanding the fact that he was following orders, because the capture violated a implicit statutory prohibition on the military’s seizure of ships sailing from France to the United States. In this case, however, Captain Smith has not argued — nor could he — that he has been ordered to do anything unlawful (in violation of a statute), let alone that he has been ordered to do something that would subject him to possible liability for damages. He is, instead, arguing that President Obama violated a statute. That is not enough to establish Smith’s standing to sue.
  • The government’s main argument, to which it devotes far too many pages, is that the judge must dismiss the case because it raises a “political question” that courts cannot answer. This is flatly wrong — and it ignores several controlling precedents, including the Supreme Court’s recent 8-1 rejection of virtually the same government argument in Zivotofsky v. Clinton.
  • The most interesting thing about the government’s brief — and by far the most important aspect of it, for public purposes apart from the lawsuit itself — is that, in the section ostensibly arguing that the case is nonjusticiable (see pp. 25-30, and also pp. 4-14), DOJ actually offers the Executive branch’s most detailed defense yet about why Operation Inherent Resolve is congressionally authorized. As some of us predicted, the government relies on three arguable authorizations, any one of which would be sufficient to defeat Smith’s WPR claim if the courts were to reach the merits. In this post I’m not going to assess the merits of the three arguments. For now, my purpose is only to describe them, and to raise one issue with respect to the third. i. First, the government argues that the 2001 AUMF authorizes the operation against ISIL.
  • Second, the government argues that the 2002 AUMF also authorizes Operation Inherent Resolve, just as it authorized operations in Iraq against AQI (which became ISIL) from 2003 to 2011, after the Hussain regime fell.
  • Finally, and most interestingly (in part because the government has not previously made this argument), DOJ argues that a recent “unbroken stream” of appropriations statutes not only confirm the authorities allegedly conferred by the 2001 and 2002 AUMFs, but also offer their own, independent congressional authorization.
  • Two things are fairly clear from this: The members of Congress approve of Operation Inherent Resolve — indeed, there’s virtually no opposition. And Congress has (most likely) appropriated funds to pay for it. The operative question, however, is whether Congress’s appropriations also serve as an authorization that would supersede the requirement of WPR section 5(b). The government brief alludes to one important argument that the plaintiff will undoubtedly raise: Section 8(a)(1) of the WPR provides that, for purposes of tolling the 60-day clock of section 5(b), “[a]uthority to introduce United States Armed Forces into hostilities or into situations wherein involvement in hostilities is clearly indicated by the circumstances shall not be inferred (1) from any provision of law . . . including any provision contained in any appropriations Act, unless such provision specifically authorizes the introduction of United States Armed Forces into hostilities or into such situations and states that it is intended to constitute specific statutory authorization within the meaning of this chapter.” Obviously, the 2016 Act does not satisfy that requirement. Is that fatal to the appropriations-as-authorization argument?
  • As the Office of Legal Counsel 50 U.S.C. 1542 and 1543). These provisions might be read simply to convey that the executive must continue to comply with the consultation and reporting requirements of WPR sections 3 and 4, even after the 2016 Act authorizes the introduction of troops into hostilities in Iraq and Syria. Or they might alternatively be construed to also specify that the Act is not providing the authority that section 5(b) of the WPR calls for.
  • Not surprisingly, DOJ argues for the former view (pp. 27-28 of the brief): “[I]n the few provisions in which Congress did reference the War Powers Resolution, to clarify that no funds made available for Operation Inherent Resolve are to be used ‘in contravention’ of the Resolution, Congress signaled its agreement that the President’s counter-ISIL military actions were authorized by simultaneously funding Operation Inherent Resolve. If Congress believed that the United States had been conducting airstrikes and other counter-ISIL military activities ‘in contravention of the War Powers Resolution,’ it would have made no sense for Congress to use the ‘in contravention’ proviso in the same laws that make funds available for the express purpose of continuing those military activities.” That’s not a bad argument, at least at first glance; but it’s not a slam-dunk, either, in part because appropriations provisions do not necessarily establish authorizations. It’ll be interesting to see how Captain Smith’s lawyers respond to this particular aspect of the merits argument. I doubt Judge Koller-Kotelly will reach it, however, because she is likely to dismiss the case for want of standing.
  •  
    I've read the brief. I don't think the implied partial repeal of the War Powers Resolution argument should fly. The relevant provision establishes a rule of interpretation of later statutes and the appropriations bills neither reject the rule of interpretation nor specifically provide authorization for use of military force. They just authorize funding. On the standing issue, I think the DoJ position is correct; the oath of office applies only to senior officers who make the decision to initiate a war. But DoJ may have opened the door to a more compelling standing argument by arguing that the war does not constitute a war crime, a crime against peace, or a crime against humanity under international law. DoJ did not need to make that argument because Smith had not alleged in his complaint that he was being ordered to commit such crimes, but by doing so DoJ waives any argument that such issues are beyond the scope of Smith's standing and the evidence that the Iraq and Syrian wars are illegal under international law is, to say the least, strong.
Paul Merrell

A Distorted Lens Justifying An Illegitimate Ukrainian Government - 0 views

  • Support it or oppose it, a coup d’état took place in Kiev after an EU-brokered agreement was signed by the Ukrainian government and the mainstream opposition on Feb. 21. The agreement called for power sharing between both sides through the formation of a national unity government and for an end to the opposition-led street protests in Kiev. President Viktor Yanukovych ordered the Ukrainian police and security forces to withdraw from their positions, and even earlier, he had made multiple concessions to the opposition leadership. Instead of keeping its end of the bargain, the Ukrainian mainstream opposition executed a coup through the use of violence by organized ultra-nationalist gangs, which some analysts have compared to stay-behinds or secretive militias that were created by NATO during the Cold War. These armed ultra-nationalist groups took over administrative bodies in Ukraine and fought until they managed to oust the Ukrainian government and opened the path for opposition leaders to take power on Feb. 25. The Ukrainian mainstream opposition used the EU-brokered agreement, which the Brussels-based European Commission deliberately refused to enforce, as a means of justifying the formation of a coup-imposed government.
  • In the absence of almost half the Ukrainian Verkhovna Rada, or Ukrainian Parliament, the opposition parties began to arbitrarily pass unconstitutional laws. They also unconstitutionally selected Oleksandr/Aleksandr Valentynovych Turchynov as the acting president of Ukraine before President Viktor Yanukovych was even impeached. Intimidation and violence were additionally used to secure the cooperation of any disagreeing parliamentarians or state officials in Kiev. Saying that the ultra-nationalists and fascists are marginal elements, the mainstream media networks in North America and the European Union have simply dismissed the armed ultra-nationalist groups involved in the coup that are presently integrated into the putsch regime running Kiev. The militant ultra-nationalists, however, are very influential and amassing power under the illegal premiership of Arseniy Yatsenyuk.  Yatsenyuk, himself, is from Yulia Tymoshenko’s notoriously corrupt All-Ukrainian Union Fatherland Party (Batkivshchyna) and essentially a U.S. and EU appointee. There is even a pre-coup leaked telephone interception, likely either recorded by the intelligence services of Russia or Ukraine, in which U.S. Assistant Secretary of State Victory Nuland says that Yatsenyuk will be appointed as the prime minister of the Ukrainian government that the U.S. is putting together.
  • It is unlikely that Yatsenyuk and the loosely-knit alliance of the governing parties that ran Ukraine under the Yushchenko-Tymoshenko governments, foreign-based Ukrainians, and the forces behind the Orange Revolution that form the Orangist camp which he belongs to could have gotten back into power in Ukraine without pressure, the use of force and foreign backing. Yatsenyuk was even threatened and booed by the Ukrainians gathered at Independence Square when it was announced that he would be appointed as the prime minister of the post-coup government. A vast segment of the protesters made it clear that Tymoshenko, Yatsenyuk’s party leader, was no alternative to the ousted President Viktor Yanukovych in their eyes, either, when it was announced that she wanted to run for prime minister. The Orangists do not have the support of a majority of the population, nor did they form the parliamentary majority in the Verkhovna Rada. Their Orangist president, Viktor Yushchenko, only got 5 percent of the vote in January 2010, in a show of no-confidence, whereas Viktor Yanukovych won the first and second rounds of the presidential elections in 2010. According to Victoria Nuland, the U.S. has also poured $5 billion into “democracy promotion” inside Ukraine. This is U.S. State Department doublespeak for politicized funding that Washington has sent to Ukraine to organize the Orange Revolution and its Euromaidan sequel or what can frankly be described as regime change.
  • ...10 more annotations...
  • To rule Ukraine once more, the Orangists and their foreign backers have used and manipulated the ultra-nationalist elements of the population — some of which are openly anti-European Union — as their foot soldiers in an application of force against their democratically-elected opponents. Despite their views, the ultra-nationalists are actually more honest than the Orangist liberal figures like Arseniy Yatsenyuk. Unlike the misleading and utterly corrupt Orangist leaders, the ultra-nationalists do not hide their agendas and platforms.
  • The ultra-nationalists have inconsolably anti-Russian attitudes. Many of them also dislike a vast spectrum of other groups, including Jews, Armenians, Roma, Poles, Tatars, supporters of the Party of Regions and communists. In this context, it should come as no surprise that one of the first decisions that the post-coup regime in Kiev made was to remove the legal status of the Russian language as the regional language of half of Ukraine. Right Sector is, itself, a coalition of militant ultra-nationalists. These militants were instrumental in fighting government forces and taking over both government buildings in Kiev and regional governments in the western portion of Ukraine. Despite the protests of First Deputy Defense Minister Oleynik, Deputy Defense Minister Mozharovskiy and Defense Minister Babenk, Arseniy Yatsenyuk’s post-coup government has even given the ultra-nationalist opposition militias official status within the Ukrainian military and security forces. Yatsenyuk and the Orangists also dismissed all the officials that protested that the move would fracture the country and make the political divide in Ukraine irreversible.
  • Several members of Svoboda have been given key cabinet and government posts. One of the two junior deputy prime ministers, or assistant deputy prime ministers, is Oleksandr Sych. The ministry of agriculture and food has been given for management to Ihor Shvaika. The environment and natural resources ministry has been assigned to Andry/Andriy Mokhnyk. The defense minister is Ihor Tenyukh, a former admiral in the Ukrainian Navy who obstructed Russian naval movements in Sevastopol during the Russo-Georgian War over South Ossetia and who was later dismissed by the Ukrainian government for insubordination. Oleh Makhnitsky, another member of Svoboda, has been assigned as the new prosecutor-general of Ukraine by the coup government. Andry Parubiy, one of the founders of Svoboda, is now the post-coup secretary of the National Security and Defense Council of Ukraine (RNBO). He was the man controlling the so-called “Euromaidan security forces” that fought government forces in Kiev. His job as secretary is to represent the president and act on his behalf in coordinating and implementing the RNBO’s decisions. As a figure, Parubiy clearly illustrates how the mainstream opposition in Ukraine is integrated with the ultra-nationalists. Parubiy is an Orangist and was a leader in the Orange Revolution. He has changed parties several times. After founding Svoboda, he joined Viktor Yushchenko’s Our Ukraine before joining Yulia Tymoshenko’s Fatherland Party and being elected as one of the Fatherland Party’s deputies, or members of parliament.
  • While the mainstream media in North America and the EU look the other way about the ultra-nationalists in the coup government in Kiev, the facts speak for themselves. Both the EU and the U.S. governments have rubbed their elbows with the ultra-nationalists. Oleh Tyahnybok, the leader of Svoboda (formerly the Social Nationalist Party of Ukraine), was even part of the opposition triumvirate that all the U.S. and EU officials visiting Kiev met with while performing their political pilgrimages to Ukraine to encourage the protesters to continue with their demonstrations and riots demanding Euro-Atlantic integration. Svoboda has popularly been described as a neo-Nazi grouping. The World Jewish Congress has demanded that Svoboda be banned. The ultra-nationalist party was even condemned by the EU’s own European Parliament, which passed a motion on Dec. 13, 2012 categorically condemning Svoboda.
  • The ultra-nationalists are such an integral part of the mainstream opposition that the U.S.-supported Orangist president of Ukraine, Viktor Yushchenko, posthumously awarded the infamous Nazi collaborator Stepan Bandera the title and decoration of the “Hero of Ukraine” in 2010. Foreign audiences, however, would not know that if they relied on reportage from the likes of the U.S. state-run Radio Free Europe, which tried to protect Yushchenko because he wanted to reorient Ukraine toward the U.S. and EU. Parubiy also lobbied the European Parliament not to oppose Yushchenko’s decision. Other smaller ultra-nationalists parties were also given government posts, and several of the independent cabinet members are also aligned to these parties. Dmytro Yarosh from Right Sector (Pravyi Sektor) is the deputy secretary of the RNBO, and the Trizub Party was given the education ministry. Trizub had Sergey Kvit appointed to the post of education minister.
  • The role of the ultra-nationalists in executing the coup has been essentially ignored by the mainstream media in North America and the EU. The roots of the bloodshed in Kiev have been ignored, too. The shootings of protesters by snipers have simply been presented as the vile actions of the Ukrainian government, never taking into consideration the agitation of the armed ultra-nationalist gangs and the mainstream opposition leaders for a conflict. According to a leaked telephone conversation on Feb. 26 between Estonian Foreign Minister Urmas Paet and European Union Commissionaire Catherine Ashton, which was leaked by the Security Service of Ukraine (SBU) , the snipers who shot at protesters and police in Kiev were allegedly hired by Ukrainian opposition leaders. Estonian Foreign Minister Paet made the statements on the basis of details he was given by one of the head doctors of the medical team of the anti-government protests, Olga Bogomolets, an opponent of Viktor Yanukovych’s government who wanted it removed from power. Paet tells Ashton the following first: “There is now stronger and stronger understanding that behind the snipers, it was not Yanukovych, but it was somebody from the new coalition.” This is also corroborated by the fact that Yanukovych actually had ordered the Ukrainian riot police and security forces not to use lethal force.
  • The Estonian official then mentions that it was verified to him that the same snipers were killing people on both sides. He tells Ashton the following: “And second, what was quite disturbing, this same Olga [Bogomolets] told as well that all the evidence shows that the people who were killed by snipers from both sides, among policemen and then people from the streets, that they were the same snipers killing people from both sides.” Another important point that Paet makes to Ashton is the following: “[Dr. Olga Bogomolets] then also showed me some photos she said that as a medical doctor she can say that it is the same handwriting, the same type of bullets, and it’s really disturbing that now the new coalition, that they don’t want to investigate what exactly happened.” Past reports that the mainstream media were hostile to the ousted Ukrainian government also raise serious questions that corroborate what has been said about the snipers intentionally killing protesters to instigate regime change.
  • The Telegraph reported on Feb. 20 that “[a]t least three of the bodies displayed single bullet wounds to the heads,” and “were shot in the head, the neck or the heart. None were shot anywhere else like in the legs.” This means that the snipers were making kill shots by design, which seems like the last thing that the Ukrainian government would want to do when it was trying to appease the protesters and bring calm to Kiev. The Ukrainian journalist Alexey Yaroshevsky’s account of the sniper shootings is also worth noting, and it is backed up by footage taken by his Russian crew in Kiev.  Their footage shows armed opposition members running away from the scene of the shooting of anti-government protesters. What comes across as unusual is that the armed members of the opposition were constantly agitating to start firefights at every opportunity that they could get.
  • The commandant of the SSU, Major-General Oleksandr Yakimenko, has testified that his counter-intelligence forces were monitoring the CIA in Ukraine during the protests. According to the SSU, the CIA was active on the ground in Kiev and collaborating with a small circle of opposition figures. Yakimenko has also said that it was not the police or government forces that fired on the protesters, but snipers from the Philharmonic Building that was controlled by the opposition leader Andriy Parubiy, which he asserts was interacting with the CIA. Speaking to the Russian media, Yakimenko said that 20 men wearing “special combat clothes” and carrying “sniper rifle cases, as well as AKMs with scopes” ran out of the opposition-controlled Philharmonic Building and split into two groups of 10 people, with one taking position at the Ukraine Hotel. The anti-government protesters even saw this and asked Ukrainian police to pursue them, and even figures from Right Sector and Svoboda asked Yakimenko’s SSU to investigate and apprehend them, but Parubiy prevented it. Major-General Yakimenko has categorically stated that opposition leaders were behind the shootings. Following the release of the conversation between Paet and Ashton, the Estonian Foreign Ministry confirmed that the leak was authentic, whereas the European Commission kept silent. The mainstream media in North America and the EU either ignored it or said very little. The Telegraph even claimed that Dr. Bogomolets told it that she had not treated any government forces even though she contradicts this directly in an interview with CNN where says she treated military personnel.
  • CNN, on the other hand, quickly glossed over the story, giving it only enough attention to create the impression that the network is fairly covering the news. Opting not to give the story the airtime that it deserved, CNN instead posted it on its webpage. The conversation is immediately discredited, undermined and dismissed in the first sentence of the article, which is attributed to Foreign Minister Paet: “Don’t read too much into the conversation.” The article was deliberately structured by CNN to undermine the important information that would challenge the narrative that the U.S. mainstream media have been painting. The title, sub-titles and opening sentences of most texts act as microcosms or summaries of the articles, and in many cases, readers evaluate or decide to read the articles on the basis of what these texts communicate. Moreover, the first sentence of the article sets the tempo for readers and and influences their opinion, too. Although anyone who listens to the conversation between Paet and Ashton and considers the evidence that is being discussed would realize just how important the news was, the message being set forth by CNN was a dismissive one.
Gary Edwards

The obscure legal system that lets corporations sue countries | Claire Provost and Matt... - 0 views

  • Every year on 15 September, thousands of Salvadorans celebrate the date when much of Central America gained independence from Spain. Fireworks are set off and marching bands parade through villages across the country. But, last year, in the town of San Isidro, in Cabañas, the festivities had a markedly different tone. Hundreds had gathered to protest against the mine. Gold mines often use cyanide to separate gold from ore, and widespread concern over already severe water contamination in El Salvador has helped fuel a powerful movement determined to keep the country’s minerals in the ground. In the central square, colourful banners were strung up, calling on OceanaGold to drop its case against the country and leave the area. Many were adorned with the slogan, “No a la mineria, Si a la vida” (No to mining, Yes to life). On the same day, in Washington DC, Parada gathered his notes and shuffled into a suite of nondescript meeting rooms in the World Bank’s J building, across the street from its main headquarters on Pennsylvania Avenue. This is the International Centre for the Settlement of Investment Disputes (ICSID): the primary institution for handling the cases that companies file against sovereign states. (The ICSID is not the sole venue for such cases; there are similar forums in London, Paris, Hong Kong and the Hague, among others.) The date of the hearing was not a coincidence, Parada said. The case has been framed in El Salvador as a test of the country’s sovereignty in the 21st century, and he suggested that it should be heard on Independence Day. “The ultimate question in this case,” he said, “is whether a foreign investor can force a government to change its laws to please the investor as opposed to the investor complying with the laws they find in the country.”
  • Most international investment treaties and free-trade deals grant foreign investors the right to activate this system, known as investor-state dispute settlement (ISDS), if they want to challenge government decisions affecting their investments. In Europe, this system has become a sticking point in negotiations over the controversial Transatlantic Trade and Investment Partnership (TTIP) deal proposed between the European Union and the US, which would massively extend its scope and power and make it harder to challenge in the future. Both France and Germany have said that they want access to investor-state dispute settlement removed from the TTIP treaty currently under discussion. Investors have used this system not only to sue for compensation for alleged expropriation of land and factories, but also over a huge range of government measures, including environmental and social regulations, which they say infringe on their rights. Multinationals have sued to recover money they have already invested, but also for alleged lost profits and “expected future profits”. The number of suits filed against countries at the ICSID is now around 500 – and that figure is growing at an average rate of one case a week. The sums awarded in damages are so vast that investment funds have taken notice: corporations’ claims against states are now seen as assets that can be invested in or used as leverage to secure multimillion-dollar loans. Increasingly, companies are using the threat of a lawsuit at the ICSID to exert pressure on governments not to challenge investors’ actions.
  • “I had absolutely no idea this was coming,” Parada said. Sitting in a glass-walled meeting room in his offices, at the law firm Foley Hoag, he paused, searching for the right word to describe what has happened in his field. “Rogue,” he decided, finally. “I think the investor-state arbitration system was created with good intentions, but in practice it has gone completely rogue.”
  • ...13 more annotations...
  • The quiet village of Moorburg in Germany lies just across the river from Hamburg. Past the 16th-century church and meadows rich with wildflowers, two huge chimneys spew a steady stream of thick, grey smoke into the sky. This is Kraftwerk Moorburg, a new coal-fired power plant – the village’s controversial next-door neighbour. In 2009, it was the subject of a €1.4bn investor-state case filed by Vattenfall, the Swedish energy giant, against the Federal Republic of Germany. It is a prime example of how this powerful international legal system, built to protect foreign investors in developing countries, is now being used to challenge the actions of European governments as well. Since the 1980s, German investors have sued dozens of countries, including Ghana, Ukraine and the Philippines, at the World Bank’s Centre in Washington DC. But with the Vattenfall case, Germany found itself in the dock for the first time. The irony was not lost on those who considered Germany to be the grandfather of investor-state arbitration: it was a group of German businessmen, in the late 1950s, who first conceived of a way to protect their overseas investments as a wave of developing countries gained independence from European colonial powers. Led by Deutsche Bank chairman Hermann Abs, they called their proposal an “international magna carta” for private investors.
  • In the 1960s, the idea was taken up by the World Bank, which said that such a system could help the world’s poorer countries attract foreign capital. “I am convinced,” the World Bank president George Woods said at the time, “that those … who adopt as their national policy a welcome [environment] for international investment – and that means, to mince no words about it, giving foreign investors a fair opportunity to make attractive profits – will achieve their development objectives more rapidly than those who do not.” At the World Bank’s 1964 annual meeting in Tokyo, it approved a resolution to set up a mechanism for handling investor-state cases. The first line of the ICSID Convention’s preamble sets out its goal as “international cooperation for economic development”. There was sharp opposition to this system from its inception, with a bloc of developing countries warning that it would undermine their sovereignty. A group of 21 countries – almost every Latin American country, plus Iraq and the Philippines – voted against the proposal in Tokyo. But the World Bank moved ahead regardless. Andreas Lowenfeld, an American legal academic who was involved in some of these early discussions, later remarked: “I believe this was the first time that a major resolution of the World Bank had been pressed forward with so much opposition.”
  • now governments are discovering, too late, the true price of that confidence. The Kraftwerk Moorburg plant was controversial long before the case was filed. For years, local residents and environmental groups objected to its construction, amid growing concern over climate change and the impact the project would have on the Elbe river. In 2008, Vattenfall was granted a water permit for its Moorburg project, but, in response to local pressure, local authorities imposed strict environmental conditions to limit the utility’s water usage and its impact on fish. Vattenfall sued Hamburg in the local courts. But, as a foreign investor, it was also able to file a case at the ICSID. These environmental measures, it said, were so strict that they constituted a violation of its rights as guaranteed by the Energy Charter Treaty, a multilateral investment agreement signed by more than 50 countries, including Sweden and Germany. It claimed that the environmental conditions placed on its permit were so severe that they made the plant uneconomical and constituted acts of indirect expropriation.
  • With the rapid growth in these treaties – today there are more than 3,000 in force – a specialist industry has developed in advising companies how best to exploit treaties that give investors access to the dispute resolution system, and how to structure their businesses to benefit from the different protections on offer. It is a lucrative sector: legal fees alone average $8m per case, but they have exceeded $30m in some disputes; arbitrators’ fees at start at $3,000 per day, plus expenses.
  • Vattenfall v Germany ended in a settlement in 2011, after the company won its case in the local court and received a new water permit for its Moorburg plant – which significantly lowered the environmental standards that had originally been imposed, according to legal experts, allowing the plant to use more water from the river and weakening measures to protect fish. The European Commission has now stepped in, taking Germany to the EU Court of Justice, saying its authorisation of the Moorburg coal plant violated EU environmental law by not doing more to reduce the risk to protected fish species, including salmon, which pass near the plant while migrating from the North Sea. A year after the Moorburg case closed, Vattenfall filed another claim against Germany, this time over the federal government’s decision to phase out nuclear power. This second suit – for which very little information is available in the public domain, despite reports that the company is seeking €4.7bn from German taxpayers – is still ongoing. Roughly one third of all concluded cases filed at the ICSID are recorded as ending in “settlements”, which – as the Moorburg dispute shows – can be very profitable for investors, though their terms are rarely fully disclosed.
  • “It was a total surprise for us,” the local Green party leader Jens Kerstan laughed, in a meeting at his sunny office in Hamburg last year. “As far as I knew, there were some [treaties] to protect German companies in the [developing] world or in dictatorships, but that a European company can sue Germany, that was totally a surprise to me.”
  • While a tribunal cannot force a country to change its laws, or give a company a permit, the risk of massive damages may in some cases be enough to persuade a government to reconsider its actions. The possibility of arbitration proceedings can be used to encourage states to enter into meaningful settlement negotiations.
  • A small number of countries are now attempting to extricate themselves from the bonds of the investor-state dispute system. One of these is Bolivia, where thousands of people took to the streets of the country’s third-largest city, Cochabamba, in 2000, to protest against a dramatic hike in water rates by a private company owned by Bechtel, the US civil engineering firm. During the demonstrations, the Bolivian government stepped in and terminated the company’s concession. The company then filed a $50m suit against Bolivia at the ICSID. In 2006, following a campaign calling for the case to be thrown out, the company agreed to accept a token payment of less than $1. After this expensive case, Bolivia cancelled the international agreements it had signed with other states giving their investors access to these tribunals. But getting out of this system is not easily done. Most of these international agreements have sunset clauses, under which their provisions remain in force for a further 10 or even 20 years, even if the treaties themselves are cancelled.
  • There are now thousands of international investment agreements and free-trade acts, signed by states, which give foreign companies access to the investor-state dispute system, if they decide to challenge government decisions. Disputes are typically heard by panels of three arbitrators; one selected by each side, and the third agreed upon by both parties. Rulings are made by majority vote, and decisions are final and binding. There is no appeals process – only an annulment option that can be used on very limited grounds. If states do not pay up after the decision, their assets are subject to seizure in almost every country in the world (the company can apply to local courts for an enforcement order).
  • While there is no equivalent of legal aid for states trying to defend themselves against these suits, corporations have access to a growing group of third-party financiers who are willing to fund their cases against states, usually in exchange for a cut of any eventual award.
  • Increasingly, these suits are becoming valuable even before claims are settled. After Rurelec filed suit against Bolivia, it took its case to the market and secured a multimillion-dollar corporate loan, using its dispute with Bolivia as collateral, so that it could expand its business. Over the last 10 years, and particularly since the global financial crisis, a growing number of specialised investment funds have moved to raise money through these cases, treating companies’ multimillion-dollar claims against states as a new “asset class”.
  • El Salvador has already spent more than $12m defending itself against Pacific Rim, but even if it succeeds in beating the company’s $284m claim, it may never recover these costs. For years Salvadoran protest groups have been calling on the World Bank to initiate an open and public review of ICSID. To date, no such study has been carried out. In recent years, a number of ideas have been mooted to reform the international investor-state dispute system – to adopt a “loser pays” approach to costs, for example, or to increase transparency. The solution may lie in creating an appeals system, so that controversial judgments can be revisited.
  • Brazil has never signed up to this system – it has not entered into a single treaty with these investor-state dispute provisions – and yet it has had no trouble attracting foreign investment.
  •  
    "Luis Parada's office is just four blocks from the White House, in the heart of K Street, Washington's lobbying row - a stretch of steel and glass buildings once dubbed the "road to riches", when influence-peddling became an American growth industry. Parada, a soft-spoken 55-year-old from El Salvador, is one of a handful of lawyers in the world who specialise in defending sovereign states against lawsuits lodged by multinational corporations. He is the lawyer for the defence in an obscure but increasingly powerful field of international law - where foreign investors can sue governments in a network of tribunals for billions of dollars. Fifteen years ago, Parada's work was a minor niche even within the legal business. But since 2000, hundreds of foreign investors have sued more than half of the world's countries, claiming damages for a wide range of government actions that they say have threatened their profits. In 2006, Ecuador cancelled an oil-exploration contract with Houston-based Occidental Petroleum; in 2012, after Occidental filed a suit before an international investment tribunal, Ecuador was ordered to pay a record $1.8bn - roughly equal to the country's health budget for a year. (Ecuador has logged a request for the decision to be annulled.) Parada's first case was defending Argentina in the late 1990s against the French conglomerate Vivendi, which sued after the Argentine province of Tucuman stepped in to limit the price it charged people for water and wastewater services. Argentina eventually lost, and was ordered to pay the company more than $100m. Now, in his most high-profile case yet, Parada is part of the team defending El Salvador as it tries to fend off a multimillion-dollar suit lodged by a multinational mining company after the tiny Central American country refused to allow it to dig for gold."
Paul Merrell

WorldLII - WorldLII: About WorldLII - 0 views

  • You are here: WorldLII >> About WorldLII   What is WorldLII? The World Legal Information Institute (WorldLII) is a free, independent and non-profit global legal research facility developed collaboratively by the following Legal Information Institutes and other organisations. Australasian Legal Information Institute (AustLII) British and Irish Legal Information Institute (BAILII) Canadian Legal Information Institute (CanLII) Hong Kong Legal Information Institute (HKLII) Legal Information Institute (Cornell) (LII (Cornell)) Pacific Islands Legal Information Institute (PacLII) Wits University School of Law (Wits Law School) For further details, see the WorldLII brochure. The LIIs, meeting in Montreal in October 2002, adopted the Montreal Declaration on public access to law. WorldLII comprises three main facilities: Databases, Catalog and Websearch.
  • WorldLII Databases WorldLII provides a single search facility for databases located on the following Legal Information Institutes: AustLII; BAILII; CanLII; HKLII; LII (Cornell); and PacLII. WorldLII also includes as part of this searchable collection its own databases not found on other LIIs. These include databases of decisions of international Courts and Tribunals, databases from a number of Asian countries, and databases from South Africa (provided by Wits Law School). Over 270 databases from 48 jurisdictions in 20 countries are included in the initial release of WorldLII. Databases of case-law, legislation, treaties, law reform reports, law journals, and other materials are included. WorldLII welcomes enquiries concerning the possible inclusion of other databases on WorldLII or on one of its collaborating LIIs. WorldLII Catalog and Websearch The WorldLII Catalog provides links to over 15,000 law-related web sites in every country in the world. WorldLII's Websearch makes searchable the full text of as many of these sites as WorldLII's web-spider can reach. WorldLII welcomes enquiries from law librarians and other legal experts who are interested to become Contributing Editors to the WorldLII Catalog.
  • Operation of WorldLII The provision of the WorldLII service is coordinated by the Australasian Legal Information Institute (AustLII), which maintains WorldLII's user interface, the WorldLII Catalog and Websearch, and the databases located only on WorldLII. Technical enhancements to WorldLII are being developed jointly by the cooperating Legal Information Institutes. Contacting WorldLII General contact: feedback@worldlii.org AustLII/WorldLII Co-Directors: Professor Andrew Mowbray, UTS <andrew@austlii.edu.au> Professor Graham Greenleaf, UNSW <graham@austlii.edu.au> Philip Chung, AustLII Executive Director <philip@austlii.edu.au> Mail: WorldLII, c/- AustLII, UTS Faculty of Law, PO Box 123 Broadway NSW 2007 Australia Telephone: +61 2 9514 4921 Fax: +61 2 9514 4908 We hope that you enjoy using WorldLII and find it to be a useful service. Feedback (particularly words of encouragement or constructive criticism) are welcome and may be sent to feedback@worldlii.org. WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback URL: http://www.worldlii.org/worldlii/
  •  
    The various Legal information Institutes that collaborate on WorldLII have the most advanced, integrated, and largest public legal research databases available on the Internet, searchable through a common interface. Still nothing like a complete university law library because so many legal source materials are copyrighted, this is the combined effort of many law schools. A companion browser extension is available for Chrome and Firefox called Jureeka. That extension causes your pages rendered in the browser to contain hyperlinks to all legal authorities cited on the page that are recognized by the extension, with the links going to case law, regulations, and statues that are in the public domain. https://chrome.google.com/webstore/detail/jureeka/ediidjmindkcaflpfjgabfaibhngadbb?utm_source=chrome-app-launcher-info-dialog Thus far, Jureeka is integrated with all legal materials published by the Legal Information Institute long located at Cornell Law School, as well as the Justia archives of U.S. case law. Rumor has it that the extension will be extended to cover materials published by other Legal Information Institutes at various law schools around the globe.
Paul Merrell

Responding to Failure: Reorganizing U.S. Policies in the Middle East | Middle East Poli... - 0 views

  • I want to speak with you today about the Middle East. This is the region where Africa, Asia, and Europe come together. It is also the part of the world where we have been most compellingly reminded that some struggles cannot be won, but there are no struggles that cannot be lost. It is often said that human beings learn little useful from success but can learn a great deal from defeat. If so, the Middle East now offers a remarkably rich menu of foreign-policy failures for Americans to study. • Our four-decade-long diplomatic effort to bring peace to the Holy Land sputtered to an ignominious conclusion a year ago. • Our unconditional political, economic, and military backing of Israel has earned us the enmity of Israel’s enemies even as it has enabled egregiously contemptuous expressions of ingratitude and disrespect for us from Israel itself.
  • • Our attempts to contain the Iranian revolution have instead empowered it. • Our military campaigns to pacify the region have destabilized it, dismantled its states, and ignited ferocious wars of religion among its peoples. • Our efforts to democratize Arab societies have helped to produce anarchy, terrorism, dictatorship, or an indecisive juxtaposition of all three. • In Iraq, Libya, and Syria we have shown that war does not decide who’s right so much as determine who’s left. • Our campaign against terrorism with global reach has multiplied our enemies and continuously expanded their areas of operation. • Our opposition to nuclear proliferation did not prevent Israel from clandestinely developing nuclear weapons and related delivery systems and may not preclude Iran and others from following suit.
  • • At the global level, our policies in the Middle East have damaged our prestige, weakened our alliances, and gained us a reputation for militaristic fecklessness in the conduct of our foreign affairs. They have also distracted us from challenges elsewhere of equal or greater importance to our national interests. That’s quite a record.
  • ...12 more annotations...
  • One can only measure success or failure by reference to what one is trying achieve. So, in practice, what have U.S. objectives been? Are these objectives still valid? If we’ve failed to advance them, what went wrong? What must we do now to have a better chance of success? Our objectives in the Middle East have not changed much over the course of the past half century or more. We have sought to 1. Gain acceptance and security for a Jewish homeland from the other states and peoples of the region; 2. Ensure the uninterrupted availability of the region’s energy supplies to sustain global and U.S. security and prosperity; 3. Preserve our ability to transit the region so as to be able to project power around the world; 4. Prevent the rise of a regional hegemon or the deployment of weapons of mass destruction that might threaten any or all of these first three objectives; 5. Maximize profitable commerce; and 6. Promote stability while enhancing respect for human rights and progress toward constitutional democracy. Let’s briefly review what’s happened with respect to each of these objectives. I will not mince words.
  • Israel has come to enjoy military supremacy but it remains excluded from most participation in its region’s political, economic, and cultural life. In the 67 years since the Jewish state was proclaimed, Israel has not made a single friend in the Middle East, where it continues to be regarded as an illegitimate legacy of Western imperialism engaged in racist removal of the indigenous population. International support for Israel is down to the United States and a few of the former colonial powers that originally imposed the Zionist project on the Arabs under Sykes-Picot and the related Balfour Declaration. The two-state solution has expired as a physical or political possibility. There is no longer any peace process to distract global attention from Israel’s maltreatment of its captive Arab populations. After years of deference to American diplomacy, the Palestinians are about to challenge the legality of Israel’s cruelties to them in the International Criminal Court and other venues in which Americans have no veto, are not present, or cannot protect the Jewish state from the consequences of its own behavior as we have always been able to do in the past. Israel’s ongoing occupation of the West Bank and siege of Gaza are fueling a drive to boycott its products, disinvest in its companies, and sanction its political and cultural elite. These trends are the very opposite of what the United States has attempted to achieve for Israel.
  • In a stunning demonstration of his country’s most famous renewable resource — chutzpah — Israel’s Prime Minister chose this very moment to make America the main issue in his reelection campaign while simultaneously transforming Israel into a partisan issue in the United States. This is the very opposite of a sound survival strategy for Israel. Uncertainties about their country’s future are leading many Israelis to emigrate, not just to America but to Europe. This should disturb not just Israelis but Americans, if only because of the enormous investment we have made in attempts to gain a secure place for Israel in its region and the world. The Palestinians have been silent about Mr. Netanyahu’s recent political maneuvers. Evidently, they recall Napoleon’s adage that one should never interrupt an enemy when he is making a mistake. This brings me to an awkward but transcendently important issue. Israel was established as a haven from anti-Semitism — Jew hatred — in Europe, a disease of nationalism and Christian culture that culminated in the Holocaust. Israel’s creation was a relief for European Jews but a disaster for the Arabs of Palestine, who were either ethnically cleansed by European Jewish settlers or subjugated, or both.  But the birth of Israel also proved tragic for Jews throughout the Middle East — the Mizrahim. In a nasty irony, the implementation of Zionism in the Holy Land led to the introduction of European-style anti-Semitism — including its classic Christian libels on Jews — to the region, dividing Arab Jews from their Muslim neighbors as never before and compelling them to join European Jews in taking refuge in Israel amidst outrage over the dispossession of Palestinians from their homeland. Now, in a further irony, Israel’s pogroms and other injustices to the Muslim and Christian Arabs over whom it rules are leading not just to a rebirth of anti-Semitism in Europe but to its globalization.
  • The late King `Abdullah of Saudi Arabia engineered a reversal of decades of Arab rejectionism at Beirut in 2002. He brought all Arab countries and later all 57 Muslim countries to agree to normalize relations with Israel if it did a deal — any deal — with the Palestinians that the latter could accept. Israel spurned the offer. Its working assumption seems to be that it does not need peace with its neighbors as long as it can bomb and strafe them. Proceeding on this basis is not just a bad bet, it is one that is dividing Israel from the world, including Jews outside Israel. This does not look like a story with a happy ending. It’s hard to avoid the thought that Zionism is turning out to be bad for the Jews. If so, given the American investment in it, it will also have turned out to be bad for America. The political costs to America of support for Israel are steadily rising. We must find a way to divert Israel from the largely self-engineered isolation into which it is driving itself, while repairing our own increasing international ostracism on issues related to Israel.  
  • Despite Mr. Netanyahu’s recent public hysteria about Iran and his efforts to demonize it, Israel has traditionally seen Iran’s rivalry with the Arabs as a strategic asset. It had a very cooperative relationship with the Shah. Neither Israelis nor Arabs have forgotten the strategic logic that produced Israel's entente with Iran. Israel is very much on Daesh’s list of targets, as is Iran. For now, however, Israel’s main concern is the possible loss of its nuclear monopoly in the Middle East. Many years ago, Israel actually did what it now accuses Iran of planning to do. It clandestinely developed nuclear weapons while denying to us and others that it was doing so. Unlike Iran, Israel has not adhered to the Nuclear Non-Proliferation Treaty or subjected its nuclear facilities to international inspection. It has expressed no interest in proposals for a nuclear-free zone in the Middle East. It sees its ability to bring on nuclear Armageddon as the ultimate guarantee of its existence.
  • To many, Israel now seems to have acquired the obnoxious habit of biting the American hand that has fed it for so long. The Palestinians have despaired of American support for their self-determination. They are reaching out to the international community in ways that deliberately bypass the United States. Random acts of violence herald mayhem in the Holy Land. Daesh has proclaimed the objective of erasing the Sykes-Picot borders and the states within them. It has already expunged the border between Iraq and Syria. It is at work in Lebanon and has set its sights on Jordan, Palestine, and Israel. Lebanon, under Saudi influence, has turned to France rather than America for support. Hezbollah has intervened militarily in Iraq and Syria, both of whose governments are close to Iran. Egypt and Turkey have distanced themselves from the United States as well as from each other. Russia is back as a regional actor and arms supplier. The Gulf Arabs, Egypt, and Turkey now separately intervene in Libya, Syria, and Iraq without reference to American policy or views. Iran is the dominant influence in Iraq, Syria, parts of Lebanon, and now Yemen. It has boots on the ground in Iraq. And now Saudi Arabia seems to be organizing a coalition that will manage its own nuclear deterrence and military balancing of Ir
  • To describe this as out of control is hardly adequate. What are we to do about it? Perhaps we should start by recalling the first law of holes — “when stuck in one, stop digging.” It appears that “don’t just sit there, bomb something” isn’t much of a strategy. When he was asked last summer what our strategy for dealing with Daesh was, President Obama replied, “We don’t yet have one.” He was widely derided for that. He should have been praised for making the novel suggestion that before Washington acts, it should first think through what it hopes to accomplish and how best to do it. Sunzi once observed that “tactics without strategy is the noise before defeat." America’s noisy but strategy-free approach to the Middle East has proven him right. Again the starting point must be what we are trying to accomplish. Strategy is "the discipline of achieving desired ends through the most efficient use of available means" [John Lewis Gaddis].Our desired ends with respect to the Middle East are not in doubt. They have been and remain to gain an accepted and therefore secure place for Israel there; to keep the region's oil and gas coming at reasonable prices; to be able to pass through the area at will; to head off challenges to these interests; to do profitable business in the markets of the Middle East; and to promote stability amidst the expansion of liberty in its countries. Judging by results, we have been doing a lot wrong. Two related problems in our overall approach need correction. They are “enablement” and the creation of “moral hazard.” Both are fall-out from  relationships of codependency.
  • Enablement occurs when one party to a relationship indulges or supports and thereby enables another party’s dysfunctional behavior. A familiar example from ordinary life is giving money to a drunk or a drug addict or ignoring, explaining away, or defending their subsequent self-destructive behavior.  Moral hazard is the condition that obtains when one party is emboldened to take risks it would not otherwise take because it knows another party will shoulder the consequences and bear the costs of failure. The U.S.-Israel relationship has evolved to exemplify codependency. It now embodies both enablement and moral hazard. U.S. support for Israel is unconditional.  Israel has therefore had no need to cultivate relations with others in the Middle East, to declare its borders, or to choose peace over continued expansion into formerly Arab lands. Confidence in U.S. backing enables Israel to do whatever it likes to the Palestinians and its neighbors without having to worry about the consequences. Israel is now a rich country, but the United States continues to subsidize it with cash transfers and other fiscal privileges. The Jewish state is the most powerful country in the Middle East. It can launch attacks on its neighbors, confident that it will be resupplied by the United States. Its use of U.S. weapons in ways that violate both U.S. and international law goes unrebuked. 41 American vetoes in the United Nations Security Council have exempted Israel from censure and international law. We enable it to defy the expressed will of the international community, including, ironically, our own.
  • We Americans are facilitating Israel's indulgence in denial and avoidance of the choices it must make if it is not to jeopardize its long-term existence as a state in the Middle East. The biggest contribution we could now make to Israel's longevity would be to ration our support for it, so as to cause it to rethink and reform its often self-destructive behavior. Such peace as Israel now enjoys with Egypt, Jordan, and the Palestinians is the direct result of tough love of this kind by earlier American administrations. We Americans cannot save Israel from itself, but we can avoid killing it with uncritical kindness. We should support Israel when it makes sense to do so and it needs our support on specific issues, but not otherwise. Israel is placing itself and American interests in jeopardy. We need to discuss how to reverse this dynamic.
  • Moral hazard has also been a major problem in our relationship with our Arab partners. Why should they play an active role in countering the threat to them they perceive from Iran, if they can get America to do this for them? Similarly, why should any Muslim country rearrange its priorities to deal with Muslim renegades like Daesh when it can count on America to act for it? If America thinks it must lead, why not let it do so? But responsible foreign and defense policies begin with self-help, not outsourcing of military risks. The United States has the power-projection and war-fighting capabilities to back a Saudi-led coalition effort against Daesh. The Saudis have the religious and political credibility, leadership credentials, and diplomatic connections to organize such an effort. We do not. Since this century began, America has administered multiple disappointments to its allies and friends in the Middle East, while empowering their and our adversaries. Unlike the Gulf Arabs, Egypt, and Turkey, Washington does not have diplomatic relations with Tehran. Given our non-Muslim identity, solidarity with Israel, and recent history in the Fertile Crescent, the United States cannot hope to unite the region’s Muslims against Daesh.  Daesh is an insurgency that claims to exemplify Islam as well as a governing structure and an armed force. A coalition led by inhibited foreign forces, built on papered-over differences, and embodying hedged commitments will not defeat such an insurgency with or without boots on the ground.
  • When elections have yielded governments whose policies we oppose, we have not hesitated to conspire with their opponents to overthrow them. But the results of our efforts to coerce political change in the Middle East are not just failures but catastrophic failures. Our policies have nowhere produced democracy. They have instead contrived the destabilization of societies, the kindling of religious warfare, and the installation of dictatorships contemptuous of the rights of religious and ethnic minorities. Frankly, we have done a lot better at selling things, including armaments, to the region than we have at transplanting the ideals of the Atlantic Enlightenment there. The region’s autocrats cooperate with us to secure our protection, and they get it. When they are nonetheless overthrown, the result is not democracy or the rule of law but socio-political collapse and the emergence of  a Hobbesian state of nature in which religious and ethnic communities, families, and individuals are able to feel safe only when they are armed and have the drop on each other. Where we have engineered or attempted to engineer regime change, violent politics, partition, and ethno-religious cleansing have everywhere succeeded unjust but tranquil order. One result of our bungled interventions in Iraq and Syria is the rise of Daesh. This is yet another illustration that, in our efforts to do good in the Middle East, we have violated the principle that one should first do no harm.
  • Americans used to believe that we could best lead by example. We and those in the Middle East seeking nonviolent change would all be better off if America returned to that tradition and forswore ideologically motivated hectoring and intervention. No one willingly follows a wagging finger. Despite our unparalleled ability to use force against foreigners, the best way to inspire them to emulate us remains showing them that we have our act together. At the moment, we do not. In the end, to cure the dysfunction in our policies toward the Middle East, it comes down to this. We must cure the dysfunction and venality of our politics. If we cannot, we have no business trying to use an 8,000-mile-long screwdriver to fix things one-third of the way around the world. That doesn’t work well under the best of circumstances. But when the country wielding the screwdriver has very little idea what it’s doing, it really screws things up.
  •  
    Chas Freeman served as US ambassador to Saudi Arabia during the war to liberate Kuwait and as Assistant Secretary of Defense from 1993-94. He was the editor of the Encyclopedia Britannica entry on "diplomacy" and is the author of five books, including "America's Misadventures in the Middle East" and "Interesting Times: China, America, and the Shifting Balance of Prestige."  I have largely omitted highlighting portions of the speech dealing with Muslim nations because Freeman has apparently lost touch with the actual U.S., Saudi, UAE, Kuwait, and Turish roles in creating and expanding ISIL. But his analysis of Israel's situation and recommendations for curing it seem quite valid, as well as his overall Mideast recommendation to heed the First Law of Holes: "when stuck in one, stop digging."   I recommend reading the entire speech notwithstanding his misunderstanding of ISIL. There is a lot of very important history there ably summarized.
Gary Edwards

Civil Unrest Ahead - LewRockwell.com - 0 views

  • The Victimized Inner Cities
  • This social disruption has motivated the enthusiastic growth and militarization of our local police departments. The law and order crowd thrives on excessive laws and regulations that no US citizen can escape. The out-of-control war on drugs is the worst part, and it generates the greatest danger in poverty-ridden areas via out-of-control police. It is estimated that these conditions have generated up to 80,000 SWAT raids per year in the United States. Most are in poor neighborhoods and involve black homes and businesses being hit disproportionately. This involves a high percentage of no-knock attacks. As can be expected many totally innocent people are killed in the process. Property damage is routine and compensation is rare. The routine use of civil forfeiture of property has become an abomination, totally out of control, which significantly contributes to the chaos. It should not be a surprise to see resentment building up against the police under these conditions. The violent reaction against local merchants in retaliation for police actions further aggravates the situation —hardly a recipe for a safe neighborhood.
  • Civil liberties are ignored by the police, and the private property of innocent bystanders is disregarded by those resenting police violence.
  • ...50 more annotations...
  • The entitlement mentality is a source of much anger and misunderstanding. It leads people who see themselves as victims to one conclusion: they are entitled to be taken care of.
  • If one trillion dollars per year doesn’t do the job, then make it $2 trillion. If the war on poverty’s $16 trillion hasn’t worked, make it $32 trillion.
  • The wealthy special interests, such as banks, the military-industrial complex, the medical industry, the drug industry, and many other corporatists, quickly gain control of the system.
  • Honest profits of successful entrepreneurs are quite different than profits of the corporate elite who gain control of the government and, as a consequence, accumulate obscene wealth by “robbing” the middle class.
  • To blame and destroy those who make an honest living by satisfying consumers without the use of special benefits from the government is destructive to liberty and wealth.
  • Crumbs may be thrown to the poor, but the principle of wealth transfer is hijacked and used for corporate and foreign welfare instead of wealth transfers to the poor.
  • True satisfaction comes from productive effort and self-reliance and not from a government transferring wealth in an effort to bring about an egalitarian society.
  • The people have too little confidence that most problems can be solved in a voluntary manner in a society that cherishes civil liberties. There’s never an admission that government problem-solving doesn’t work. Government-created problems are a road to poverty and resentment. Too many people believe that “free stuff” from the government can solve our problems. They mistakenly believe that deficits don’t matter and that wealth can come from a printing press.
  • The high profile episodes of police violence and overreaction are a consequence of conditions that in many ways were generated by government policy.
  • equal justice requires the end of welfare redistribution
  • Retraining the police won’t touch the complex problems that pit the police against the victims of complex social conditions generated by hate, violence and bad economic policies.
  • Redistribution is a process that is always destined to help a small minority, whether in an economy like ours that endorses central economic planning or in one run by radical fascists or communists.
  • Under an authoritarian regime, those in power take care of themselves. This always leads to poverty and discrepancy in wealth distribution.
  • Eventually the social strife that is predictable leads to an overthrow of the government.
  • The strife that we are witnessing is a reflection of a growing number of people who are recognizing the discrepancy between rich and poor, the weak and the powerful, Wall Street and Main Street.
  • Both political parties are financed by Wall Street, the big banks, and the military-industrial complex. Getting rich by being part of the government class is the problem.
  • Indeed the rich are getting richer and the poor poorer. The extreme current inequality is not a consequence of free markets and true liberty. Rather it results from the welfare state that, as always, morphs into a system that provides excesses for the powerful few.
  • The economic interventionist system under which we live today rewards those who benefit from government economic planning by the Federal Reserve, access to government contracts, and targeted special regulations to help one group over the other
  • There are two problems. First is conceding the principle that government has the moral authority to redistribute wealth. Second is believing the redistribution will be managed wisely and without corruption.
  • Police brutality and militarization may well induce a violent event far beyond what we have seen in Ferguson. It also can serve as an excuse. But it is not the root cause of turmoil. The real cause is poverty, the entitlement mentality, and the breakdown of the rule of law. Moral decay and the national police state are the real culprits.
  • We must limit the government’s role to protecting equal justice in defense of life, liberty, and property.
  • We have too many police, too many laws, and too much exemption of government officials from the crimes they commit.
  • There has to be an understanding that productive effort and self-reliance on the part of everyone is required for a free society to thrive.
  • The loss of our liberty has sharply accelerated since the 9/11 attacks. We have done to ourselves what no foreign enemy could have possibly accomplished.
  • Welfare, for the rich or poor, cannot exist without the sacrifice of the principal of property ownership.
  • The national police are made up of over 100,000 bureaucrats and police officials who carry guns to enforce federal law on the American citizens.
  • Today every American is a suspect. Our president has established a policy that an American citizen can be assassinated without even being charged with a crime.
  • The Founders and our Constitution intended that policing powers would be the responsibility of the individual states. That was forgotten a long time ago
  • the Feds are there taking charge over all local officials and property owners,
  • The Founders did not even want a standing army. They wanted only a militia.
  • Old-fashioned colonialism was deemed necessary by various European powers to secure natural resources along with control over sea lanes and markets for selling manufactured goods.
  • European-style colonialism — supporting a mercantilistic economy — came to be seen as politically unrealistic and unnecessary.
  • We are now subject to an out-of-control domestic police force while the US military maintains our Empire overseas.
  • When free-trade principles were utilized, colonialism did not die; it only changed form. Mercantilism in various forms and degrees drove trade policies of nations with strong economies and militaries.
  • The United States military presence around the world provides a “private” police force to protect US and other international companies against any local resistance or leaders that turn unfriendly. Our military presence overseas has nothing to do with protecting our freedoms and defending our Constitution.
  • The international monetary system is a powerful tool for the select few.
  • In fact, the real heroes are the ones who expose the truth and refuse to fight foreign wars for the international corporations.
  • The “one percenters,” generally speaking, are internationalists who are not champions of individual liberty and free trade. They are supporters of managed trade and international institutions like the WTO where the interests of the one percent can influence the rulings that frequently have little to do with advancing advertised goals of low tariffs and free trade.
  • Disengaging our troops from around the world and refusing to defend American neocolonialism is pursuing a course compatible with the qualities that Americans claim to stand for.
  • The obsession with continuing all the same policies has increased our poverty, increased violence between the classes, and lowered the standard of living for all except the elite one percent. And worst of all, the sacrifice of liberty was for naught.
  • Losing both liberty and the right to truly own property undermines the ability to create wealth.
  • When this process gets out-of-control the economy goes into a death spiral, in the beginning of which we currently find ourselves. Without a correction to the basic understanding of the proper role of government, the downward spiral will continue.
  • Tax revenues will continue to rise, aiding the policy of the government spending the people’s money rather than those who earned it.
  • Wall Street will be protected, and the trillions of dollars of big banks derivatives will be absorbed by the Fed, the FDIC, and ultimately by the American taxpayers in the next financial crisis.
  • There’s no doubt the poor will get poorer and the rich richer until the spirit of revolution in the people calls a halt to the systematic destruction of freedom in America.
  • Authoritarianism has overtaken our economic system as the welfare mentality takes over at every level of government.
  • Once the initiation of force by government is accepted by the people, even minimally, it escalates and involves every aspect of society. The only question that remains is just who gets to wield the power to distribute the largess to their friends and chosen beneficiaries.
  • It’s a recipe for steady growth of the government at the expense of liberties, even if official documents and laws written to limit government power are in place.
  • Restraining the few who thrive on the use of force to rule over us is the challenge. Fortunately they are outnumbered by those who would choose liberty yet lack the will to challenge the humanitarian monsters who gain support from naive and apathetic citizens.
  • The sentiments supporting secession, jury nullification, nullification of federal laws by state legislatures, and a drive for more independence from larger governments will continue.
  •  
    "If Americans were honest with themselves they would acknowledge that the Republic is no more. We now live in a police state. If we do not recognize and resist this development, freedom and prosperity for all Americans will continue to deteriorate. All liberties in America today are under siege. It didn't happen overnight. It took many years of neglect for our liberties to be given away so casually for a promise of security from the politicians. The tragic part is that the more security was promised - physical and economic - the less liberty was protected. With cradle-to-grave welfare protecting all citizens from any mistakes and a perpetual global war on terrorism, which a majority of Americans were convinced was absolutely necessary for our survival, our security and prosperity has been sacrificed. It was all based on lies and ignorance. Many came to believe that their best interests were served by giving up a little freedom now and then to gain a better life. The trap was set. At the beginning of a cycle that systematically undermines liberty with delusions of easy prosperity, the change may actually seem to be beneficial to a few. But to me that's like excusing embezzlement as a road to leisure and wealth - eventually payment and punishment always come due. One cannot escape the fact that a society's wealth cannot be sustained or increased without work and productive effort. Yes, some criminal elements can benefit for a while, but reality always sets in. Reality is now setting in for America and for that matter for most of the world. The piper will get his due even if "the children" have to suffer. The deception of promising "success" has lasted for quite a while. It was accomplished by ever-increasing taxes, deficits, borrowing, and printing press money. In the meantime the policing powers of the federal government were systematically and significantly expanded. No one cared much, as there seemed to be enough "gravy" for the rich, th
Paul Merrell

Australia's criminlisation of dissent: anti-protest law is an ominous sign of the times... - 0 views

  • Australia’s criminlisation of dissent: anti-protest law is an ominous sign of the times Share This Tags AustraliaTasmania Brendan Gogarty (TC) : The Workplaces (Protection from Protesters) Bill – locally known as the “anti-protest” bill – was passed by Tasmanian parliament late on Tuesday night. The law was introduced as part of the government’s intention to “re-build Tasmania’s forestry industry”. That is a source of controversy and division in Tasmanian society. To achieve its aim, the government has committed itself to a wide legislative agenda. This includes: amending the uniform Defamation Act 2005 to allow large companies to sue protesters; defunding community and conservation organisations; and tearing up a “peace deal” between foresters and conservationists, which had been enacted into law before the 2014 election.
  • Recognising the potential return to hostilities, the government said it would “not try and appease” protesters, but would rather “toughen the law to deter them”. The anti-protest law is its chosen mechanism of deterrence. While such hard-line policies on political opposition are not new, the severity and breadth of the law to enforce such a policy arguably is. The shift from hard-line policy to hard-line law is worrisome in a constitutional democracy. The spread of state anti-bikie laws in Australia illustrates why this law is not just of concern for Tasmanians.
  • The new law covers all acts on, or acts inhibiting access to, a business premises (all public and private land, including forestry and mining lands) which are: … in furtherance of, or for the purposes of promoting awareness of or support for an opinion, or belief, in respect of a political, environmental, social, cultural or economic issue. Any such protest is subject to significant penalties if they interrupt “business activity”. While originally such sanctions were mandatory, the government agreed in the upper house to exchange these for discretionary penalties. However, the government agreed to this only on condition that the subsequent maximum penalties would be significantly increased. This was to “send a strong message” to protesters and the courts charged with punishing them. As a consequence, protesters who repeatedly interrupt business face fines of up to A$10,000 and four years in jail.
  • ...1 more annotation...
  • From its inception, the law has been criticised by domestic and international lawyers. Three United Nations human rights rapporteurs considered the bill to breach international law, one describing it as “shocking”. They considered the legislation, as originally envisioned, to be: … disproportionate and unnecessary [creating a] chilling effect of silencing dissenters … [who are] key to raising awareness about human rights, political, [and] social concerns … holding not just governments, but also corporations accountable. A wide range of legal professionals have voiced similar criticisms. While the removal of mandatory penalties alleviated some concerns, the larger concern about a law designed solely to punish people for protesting against controversial business activities – especially publicly supported and funded ones – remains.
  •  
    Australia has neither constitution nor Bill of Rights. It shows.
Gary Edwards

A Victory for All of Us - Liberty in the Breach - 0 views

  •  
    Details of how a federal Judge came to rule that the insideous NDAA law is un Constitutional. excerpt: Posted on May 18, 2012 By Chris Hedges In January, attorneys Carl Mayer and Bruce Afran asked me to be the lead plaintiff in a lawsuit against President Barack Obama and Defense Secretary Leon Panetta that challenged the harsh provisions of the National Defense Authorization Act (NDAA). We filed the lawsuit, worked for hours on the affidavits, carried out the tedious depositions, prepared the case and went to trial because we did not want to be passive in the face of another egregious assault on basic civil liberties, because resistance is a moral imperative, and because, at the very least, we hoped we could draw attention to the injustice of the law. None of us thought we would win. But every once in a while the gods smile on the damned. U.S. District Judge Katherine Forrest, in a 68-page opinion, ruled Wednesday that Section 1021 of the NDAA was unconstitutional. It was a stunning and monumental victory. With her ruling she returned us to a country where-as it was before Obama signed this act into law Dec. 31-the government cannot strip a U.S. citizen of due process or use the military to arrest him or her and then hold him or her in military prison indefinitely. She categorically rejected the government's claims that the plaintiffs did not have the standing to bring the case to trial because none of us had been indefinitely detained, that lack of imminent enforcement against us meant there was no need for an injunction and that the NDAA simply codified what had previously been set down in the 2001 Authorization to Use Military Force Act. The ruling was a huge victory for the protection of free speech. Judge Forrest struck down language in the law that she said gave the government the ability to incarcerate people based on what they said or wrote. Maybe the ruling won't last. Maybe it will be overturned. But we and other Americans are
Gary Edwards

Newt Gingrich: 15 Things You Don't Know About Him - 1 views

  •  
    Good article on Newt; covers the good, the bad, and the ugly.  Personally i don't trust Newt.  As former repubican senator Jim Talent of Missouri says, "He's not a reliable and trusted conservative leader".  Strangely, Talent supports Romney. And there is nothing conservative about Romney.   The one thing i do like about Newt is that he is a bomb thrower extraordinaire.  There isn't a Libertarian (moi), conservative, or Constitutional conservative anywhere that wouldn't love to see Newt in the ring with Obama, hammering his Marxist ass without mercy.  But i'm not so sure that that desire is enough to overcome the serious character flaws and self centered egotistical baggage Newt hauls around.  He proves time and again that he lacks the core values of a true conservative, including dedication to the upholding the Constitution and Rule of Law. Funny though that a valueless establishment repubican "we can manage big government more efficiently and make it work" guy like Romney is attacking Newt as not being a true conservative?  What does that make Romney?  At least Newt can point to the awesome Contract with America repubican take over of Congress - after 40 years in the wilderness. Even though Ron Paul has lost it on foreign policy, i continue to send money.  My switch from Reagan Constitutional Conservative to Libertarian has "nearly" everything to do with the 2008 financial collapse, and the years of research and study that followed.   I say "nearly" because i just couldn't pull the trigger until unexpectedly i found myself in a Bloomberg discussion questioning my support for Herman Cain.  Sadly, Herman supports the Federal Reserve, including full approval of both Greenspan and Bernacke policies that have destroyed the US dollar and enabled the Banksters to run off with over $29 Trillion of our money.  Of course, this is an indefensible and inexcusable position.  The Libertarian's in the discussion pointed out that the problems this country faces cann
  •  
    disclosure: I met Cokie and Steve Roberts at an intimate house party in NH. Probably in 1991. Very nice people but they are full blown unionist-socialist-progressives iron bent on the European Socialism model. Not Constitutionalist in any way shape of form. Certainly not Constitutional Capitalist or free market types either.
‹ Previous 21 - 40 of 1477 Next › Last »
Showing 20 items per page