Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Without

Rss Feed Group items tagged

Paul Merrell

U.S. reasserts need to keep domestic surveillance secret - The Washington Post - 0 views

  • The Obama administration Friday reasserted its claim of ­state-secrets privilege to try to block a court from ruling on the constitutionality of the National Security Agency’s interception of e-mails and phone calls on U.S. soil without a warrant. The reassertion of the privilege in two long-running lawsuits comes despite recent disclosures about the NSA’s programs and as President Obama is considering curbs to the NSA’s programs based on recommendations by a review panel he appointed.
  • The Obama administration Friday reasserted its claim of ­state-secrets privilege to try to block a court from ruling on the constitutionality of the National Security Agency’s interception of e-mails and phone calls on U.S. soil without a warrant. The reassertion of the privilege in two long-running lawsuits comes despite recent disclosures about the NSA’s programs and as President Obama is considering curbs to the NSA’s programs based on recommendations by a review panel he appointed.
  • “In my judgment, disclosure of still-classified details regarding these intelligence-gathering activities, either directly or indirectly, would seriously compromise, if not destroy, important and vital ongoing intelligence operations,” Director of National Intelligence James R. Clapper said in a declaration filed in U.S. District Court in Northern California on Friday.In court filings, the government also acknowledged for the first time that sweeping collections of Americans’ phone and Internet metadata began under the Bush administration, in concert with a program of intercepting phone and e-mail content without warrants — programs that operated for years solely under executive power before being brought under court and congressional oversight. Clapper said in his declaration that President George W. Bush authorized the collection efforts on Oct. 4, 2001, after the Sept. 11 terrorist attacks.
  • ...3 more annotations...
  • Jewel is suing on behalf of all AT&T customers, and Shubert is suing on behalf of all Americans.
  • At issue is the NSA’s program to intercept phone and e-mail communications without a warrant, which was placed under court supervision in 2007 and then authorized by Congress in 2007 and 2008. Jewel also is challenging the agency’s collection of Americans’ phone metadata, or call logs that include numbers dialed and call lengths and times. That program was placed under court supervision in 2006 on the basis of a statute that has been reauthorized several times since then. Its existence was revealed in June following a leak by former NSA contractor Edward Snowden. The government has already suffered a setback in the case. U.S. District Judge Jeffrey S. White in July ruled that the government could not assert a state-secrets privilege when the underlying law, the Foreign Intelligence Surveillance Act, offers a process to hear classified evidence in closed chambers.
  • The declassification of the Bush administration’s authorization of the programs came in response to White’s order to the government to review declarations filed in the case. The judge wanted to see what could be declassified in light of Snowden’s revelations as well as subsequent disclosures made by the government. The government also declassified eight other declarations filed in the litigation by senior intelligence officials alleging national security would be harmed by disclosing program information.
  •  
    Ooh. Reasserting the State Secrets privilege when Congress has already waived it and the judge has already ruled that it doesn't apply. That's the U.S. Justice Department in action. No argument to frivolous to raise.
  •  
    Also deserving of notice: The Feds had the right to take an immediate appeal from the judge's order to declassify but chose not to do so. Also, the finding that the State Secrets privilege did not apply was limited to the FISA section 215 bulk metadata collection. It's still in play for the search of communication content. Perhaps the "reassertion" was not a reassertion but an assertion involving another class of records.
Gary Edwards

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World ne... - 1 views

  • The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
  • The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10
  • "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".
  • ...23 more annotations...
  • US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."
  • But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
  • XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.
  • Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.
  • Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets.
  • But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
  • One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.
  • The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.
  • Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.
  • One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."
  • Email monitoring
  • One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".
  • To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.
  • One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications.
  • Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:
  • Chats, browsing history and other internet activity
  • Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
  • An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.
  • The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.
  • The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn "call events" collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.
  • William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A 2010 Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications."
  • The ACLU's deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans' communications without individualized warrants.
  • "The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.
  •  
    "One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet' ................................................................. A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do." But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks - what the agency calls Digital Network Intelligence (DNI). One
  •  
    "But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. " Note in that regard that Snowden said in an earlier interview that use of this system rarely was audited and that when audited, the most common request if changes were requested was to beef up the justification for the search. The XScore system puts the lie to just about everything the Administration has claimed about intense oversight by all three branches of federal government and about not reading emails or listening to (Skype) phone calls. The lies keep stacking up in an ever-deepening pile.
Gary Edwards

Coup d'etat -- Paul Craig Roberts - PaulCraigRoberts.org - 1 views

  •  
    Wow! excerpt: "The American people have suffered a coup d'etat, but they are hesitant to acknowledge it. The regime ruling in Washington today lacks constitutional and legal legitimacy. Americans are ruled by usurpers who claim that the executive branch is above the law and that the US Constitution is a mere "scrap of paper." An unconstitutional government is an illegitimate government. The oath of allegiance requires defense of the Constitution "against all enemies, foreign and domestic." As the Founding Fathers made clear, the main enemy of the Constitution is the government itself. Power does not like to be bound and tied down and constantly works to free itself from constraints. The basis of the regime in Washington is nothing but usurped power. The Obama Regime, like the Bush/Cheney Regime, has no legitimacy. Americans are oppressed by an illegitimate government ruling, not by law and the Constitution, but by lies and naked force. Those in government see the US Constitution as a "chain that binds our hands." The South African apartheid regime was more legitimate than the regime in Washington. The apartheid Israeli regime in Palestine is more legitimate. The Taliban are more legitimate. Muammar Gaddafi and Saddam Hussein were more legitimate. The only constitutional protection that the Bush/Obama regime has left standing is the Second Amendment, a meaningless amendment considering the disparity in arms between Washington and what is permitted to the citizenry. No citizen standing with a rifle can protect himself and his family from one of the Department of Homeland Security's 2,700 tanks, or from a drone, or from a heavily armed SWAT force in body armor. Like serfs in the dark ages, American citizens can be picked up on the authority of some unknown person in the executive branch and thrown in a dungeon, subject to torture, without any evidence ever being presented to a court or any information to the person's relatives of his/her wherea
Paul Merrell

NSA 'secret backdoor' paved way to U.S. phone, e-mail snooping | Politics and Law - CNE... - 0 views

  • The National Security Agency created a "secret backdoor" so its massive databases could be searched for the contents of U.S. citizens' confidential phone calls and e-mail messages without a warrant, according to the latest classified documents leaked by Edward Snowden. A report in the Guardian on Friday quoted Sen. Ron Wyden, an Oregon Democrat who serves on the Senate Intelligence Committee, as saying the secret rule offers a loophole allowing "warrantless searches for the phone calls or emails of law-abiding Americans." That appears to confirm what Rep. Jerrold Nadler, a New York Democrat, said in June after receiving a classified briefing from administration officials a few days earlier on the extent of the NSA's domestic surveillance operations. If the NSA wants "to listen to the phone," an analyst's decision is sufficient, without any other legal authorization required, Nadler said he had been told during the briefing. "I was rather startled," said Nadler, an attorney who serves on the House Judiciary Committee.
  • FBI Director Robert Mueller responded by assuring Nadler, according to a transcript of the hearing, that to "listen to the phone," the government would need "a particularized order" from the Foreign Intelligence Surveillance Court -- a claim that is contradicted by today's Guardian report and other documents. Mueller has been succeeded by James Comey, who was confirmed last month by the Senate. In response to a CNET article at the time, Director of National Intelligence James Clapper released a statement saying: "The statement that a single analyst can eavesdrop on domestic communications without proper legal authorization is incorrect and was not briefed to Congress." Clapper never elaborated, however, on what "proper" authorization would be. Today's top-secret document leaked by Snowden reveals that "procedures approved on 3 October 2011 now allow for use of certain United States person names and identifiers as query terms when reviewing collected FAA 702 data."
  • FAA 702 is a reference to section 702 of a 2008 law that amended the Foreign Intelligence Surveillance Act. Those amendments created a warrantless surveillance process that could be employed by NSA analysts, but Congress never intended it to be used domestically against American citizens: A congressional report accompanying the law claimed it allows electronic surveillance only of "persons located outside the United States in order to acquire foreign intelligence information." In reality, though, the Obama Justice Department has devised secret interpretations of FAA 702 carving out loopholes in what were intended to be strict privacy safeguards. One loophole revealed in June shows that NSA, CIA, and FBI analysts are granted broad access to data vacuumed up by the world's most powerful intelligence agency -- but are supposed to follow certain "targeting" and "minimization" procedures to limit the number of Americans who become individual targets of warrantless surveillance.
  • ...2 more annotations...
  • Today's disclosures appear to be at odds with what President Obama has said over the last two months in defense of NSA surveillance. "What I can say unequivocally is that if you are a U.S. person, the NSA cannot listen to your telephone calls and the NSA cannot target your e-mails," Obama has said. Earlier reports have indicated that the NSA has the ability to record nearly all domestic and international phone calls -- in case an analyst needed to access the recordings in the future. A Wired magazine article last year disclosed that the NSA has established "listening posts" that allow the agency to collect and sift through billions of phone calls through a massive new data center in Utah, "whether they originate within the country or overseas." That includes not just metadata, but also the contents of the communications.
  • AT&T and other telecommunications companies that allow the NSA to tap into their fiber links receive absolute immunity from civil liability or criminal prosecution, thanks to Section 702 of the FISA Amendments Act, which Congress renewed in 2012. It says that any civil lawsuit "against any person for providing assistance to an element of the intelligence community...shall be promptly dismissed." Section 702 of the law says surveillance may be authorized by the attorney general and director of national intelligence without prior approval by the secret Foreign Intelligence Surveillance Court -- in practice, this means analysts at the NSA and other agencies with intelligence functions -- as long as minimization requirements and general procedures blessed by the court are followed. It's unclear whether the court has approved the "secret backdoor" allowing Americans' e-mail and phone messages to be targeted for domestic surveillance.
Gary Edwards

What the hell just happened? 'Tyranny By Executive Order' | by Constitutional Attorney ... - 0 views

  •  
    "What the hell just happened? That is the question that many Americans should be asking themselves following the news conference where Obama unveiled his plan for destroying the Bill of Rights to the U.S. Constitution. At first glance it appeared to be a case of Obama shamelessly using the deaths of innocents, and some live children as a backdrop, to push for the passage of radical gun control measures by Congress. Most of these have no chance of passing, yet, Obama's signing of Executive orders initiating 23 so called Executive actions on gun control seemed like an afterthought. Unfortunately, that is the real story, but it is generally being overlooked. The fact is that with a few strokes of his pen Obama set up the mechanisms he will personally use to not only destroy the Second Amendment to the Constitution, but also the First, Fourth, and Fifth Amendments. It will not matter what Congress does, Obama can and will act on his own, using these Executive actions, and will be violating both the Constitution and his oath of office when he does it. Here are the sections of the Executive Order that he will use: "1. Issue a Presidential Memorandum to require federal agencies to make relevant data available to the federal background-check system." What exactly is relevant data? Does it include our medical records obtained through Obamacare, our tax returns, our political affiliations, our military background, and our credit history? I suggest that all of the above, even if it violates our fourth Amendment right to privacy will now be relevant data for determining if we are allowed to purchase a firearm. "2. Address unnecessary legal barriers, particularly relating to the Health Insurance Portability and Accountability Act, that may prevent states from making information available to the background-check system." This should be read in conjunction with section 16 of the order that says: "16. Clarify that the Affordable Care Act does not prohibit doctors
Gary Edwards

EXCLUSIVE: Syrians In Ghouta Claim Saudi-Supplied Rebels Behind Chemical Attack - 0 views

  •  
    "Ghouta, Syria - As the machinery for a U.S.-led military intervention in Syria gathers pace following last week's chemical weapons attack, the U.S. and its allies may be targeting the wrong culprit. ........ continued ............... Interviews with people in Damascus and Ghouta, a suburb of the Syrian capital, where the humanitarian agency Doctors Without Borders said at least 355 people had died last week from what it believed to be a neurotoxic agent, appear to indicate as much. The U.S., Britain, and France as well as the Arab League have accused the regime of Syrian President Bashar al-Assad for carrying out the chemical weapons attack, which mainly targeted civilians. U.S. warships are stationed in the Mediterranean Sea to launch military strikes against Syria in punishment for carrying out a massive chemical weapons attack. The U.S. and others are not interested in examining any contrary evidence, with U.S Secretary of State John Kerry saying Monday that Assad's guilt was "a judgment … already clear to the world." However, from numerous interviews with doctors, Ghouta residents, rebel fighters and their families, a different picture emerges. Many believe that certain rebels received chemical weapons via the Saudi intelligence chief, Prince Bandar bin Sultan, and were responsible for carrying out the dealing gas attack. "My son came to me two weeks ago asking what I thought the weapons were that he had been asked to carry," said Abu Abdel-Moneim, the father of a rebel fighting to unseat Assad, who lives in Ghouta. Abdel-Moneim said his son and 12 other rebels were killed inside of a tunnel used to store weapons provided by a Saudi militant, known as Abu Ayesha, who was leading a fighting battalion. The father described the weapons as having a "tube-like structure" while others were like a "huge gas bottle." Ghouta townspeople said the rebels were using mosques and private houses to sleep while storing their weapons in tunnels. A
Paul Merrell

The Government Can No Longer Track Your Cell Phone Without a Warrant | Motherboard - 0 views

  • The government and police regularly use location data pulled off of cell phone towers to put criminals at the scenes of crimes—often without a warrant. Well, an appeals court ruled today that the practice is unconstitutional, in one of the strongest judicial defenses of technology privacy rights we've seen in a while.  The United States Court of Appeals for the Eleventh Circuit ruled that the government illegally obtained and used Quartavious Davis's cell phone location data to help convict him in a string of armed robberies in Miami and unequivocally stated that cell phone location information is protected by the Fourth Amendment. "In short, we hold that cell site location information is within the subscriber’s reasonable expectation of privacy," the court ruled in an opinion written by Judge David Sentelle. "The obtaining of that data without a warrant is a Fourth Amendment violation."
  • In Davis's case, police used his cell phone's call history against him to put him at the scene of several armed robberies. They obtained a court order—which does not require the government to show probable cause—not a warrant, to do so. From now on, that'll be illegal. The decision applies only in the Eleventh Circuit, but sets a strong precedent for future cases.
  • "One’s cell phone, unlike an automobile, can accompany its owner anywhere. Thus, the exposure of the cell site location information can convert what would otherwise be a private event into a public one," he wrote. "In that sense, cell site data is more like communications data than it is like GPS information. That is, it is private in nature rather than being public data that warrants privacy protection only when its collection creates a sufficient mosaic to expose that which would otherwise be private." Finally, the government argued that, because Davis made outgoing calls, he "voluntarily" gave up his location data. Sentelle rejected that, too, citing a prior decision by a Third Circuit Court. "The Third Circuit went on to observe that 'a cell phone customer has not ‘voluntarily’ shared his location information with a cellular provider in any meaningful way.' That circuit further noted that 'it is unlikely that cell phone customers are aware that their cell phone providers collect and store historical location information,'” Sentelle wrote.
  • ...2 more annotations...
  • Indeed, the decision alone is a huge privacy win, but Sentelle's strong language supporting cell phone users' privacy rights is perhaps the most important part of the opinion. Sentelle pushed back against several of the federal government's arguments, including one that suggested that, because cell phone location data based on a caller's closest cell tower isn't precise, it should be readily collectable.  "The United States further argues that cell site location information is less protected than GPS data because it is less precise. We are not sure why this should be significant. We do not doubt that there may be a difference in precision, but that is not to say that the difference in precision has constitutional significance," Sentelle wrote. "That information obtained by an invasion of privacy may not be entirely precise does not change the calculus as to whether obtaining it was in fact an invasion of privacy." The court also cited the infamous US v. Jones Supreme Court decision that held that attaching a GPS to a suspect's car is a "search" under the Fourth Amendment. Sentelle suggested a cell phone user has an even greater expectation of location privacy with his or her cell phone use than a driver does with his or her car. A car, Sentelle wrote, isn't always with a person, while a cell phone, these days, usually is.
  • "Therefore, as the Third Circuit concluded, 'when a cell phone user makes a call, the only information that is voluntarily and knowingly conveyed to the phone company is the number that is dialed, and there is no indication to the user that making that call will also locate the caller,'" he continued.
  •  
    Another victory for civil libertarians against the surveillance state. Note that this is another decision drawing guidance from the Supreme Court's decision in U.S. v. Jones, shortly before the Edward Snowden leaks came to light, that called for re-examination of the Third Party Doctrine, an older doctrine that data given to or generated by third parties is not protected by the Fourth Amendment.   
Paul Merrell

Legally required video surveillance - The Washington Post - 1 views

  • Chicago Mayor Rahm Emanuel has proposed an ordinance that would compel all gun dealers to video-record sales (“to discourage traffickers and buyers who use false identification”). Presumably the video recordings would have to be kept for an extended time, since future investigations that would use the video recordings could happen years after the sale. A similar New York state bill would require that the videos be kept for one year. Likewise, two weeks ago, Minnesota enacted a law — with much less fanfare — that would require video- or photo recording of people who come to sell cellular phones, with each recording to be kept for at least 30 days:
  • The ostensible focus of the law is on people who sell the phones (presumably in order to deter phone theft), but any video cameras — which “must be turned on at all times” — will also capture all cell phone buyers as well. The Center for Democracy & Technology has more on this statute. Likewise, last year, Minnesota enacted a similar law applicable to people who sell scrap vehicles, presumably aimed at sellers of stolen vehicles. I suspect that, especially if the gun sales videorecording bills are enacted, similar laws will be proposed for sales of alcohol (which is often sold to underage buyers who have fake IDs, or to straw purchasers who are buying on behalf of an underage buyer), for sales of marijuana in places where it has been legalized, for sales of legal substances that are nonetheless potential drug or bomb precursors, and so on.
  •  
    And of course it's only a hop from the video surveillance database to the facial recognition database. This is straight out of George Orwell's "1984" novel. Big Brother wants to watch you at all times, whether your conduct is legal or not. But note that because these measures do not discriminate between the lawful and unlawful conduct there's a strong argument that a prohibited Fourth Amendment search and seizure is involved, without particularized suspicion of a particular crime, i.e., without "probable cause." 
Paul Merrell

CIA Seeks More Time to Declassify Interrogation Documents - Secrecy News - 0 views

  • The Central Intelligence Agency today asked a court to allow more time to declassify its response to the Senate Select Committee on Intelligence report on CIA rendition, detention and interrogation (RDI) activities, which itself is undergoing a time-consuming declassification review. “This complex process requires the careful review of over 500 pages of highly classified material. In addition, sufficient time must be allowed not only for coordination with other agencies, but — after completion of declassification review — for implementation of security measures to ensure the safety of U.S. personnel and facilities overseas,” according to a May 15 motion filed by the government in a FOIA lawsuit brought by the ACLU. “Due to the fluid nature of this process, aspects of which are beyond the CIA’s control, the Agency does not yet have a firm date by which it can complete the processing of the CIA Response [to the SSCI report] and the so-called Panetta Report, although it hopes the declassification review and accompanying processing of those documents can be completed this summer.” The CIA therefore requested an extension of time to respond, to which the ACLU plaintiffs did not consent.
  • With respect to the Senate Intelligence Committee report itself, the government promised an “expeditious” declassification review of the executive summary, findings, and conclusions. “While all declassification decisions are guided by the need to protect national security interests, the President has expressed a clear intent to declassify as much of the executive summary, findings, and conclusions of the SSCI Report as possible, and intends the declassification process to be expeditious,” the government motion said. According to an April 18 letter from then-White House counsel Katherine Ruemmler, appended to the new motion, “The President supports making public the Committee’s important review of the historical RDI program, as he believes that public scrutiny and debate will help to inform the public understanding of the program and to ensure that such a program will not be contemplated by a future administration.
  •  
    Horse puckey. The quoted article is misleading, attempting to conflate two distinct sets of documents that the Court ordered the CIA to disclose after removing all properly classified information. The duty to disclose segregable portions of  records that are not classified has been in place since the early 70s. It should have been done without a lawsuit having been filed and litigated. I.e.,it was a court order the CIA knew was coming since it first received the FOIA request from the ACLU. One set is the CIA response to the Senate Committee. The other set is the DoJ's Office of Legal Counsel memoranda on the legality of torture techniques. not documents documenting the torture itself and not the CIA response to the Senate Committee. Even if he CIA really needed more time for the documents in the Senate group, the legal memoranda could be shorn of classified information in a mater of hours, not days, weeks, or months.  It's the legal memoranda disclosure that CIA and DOJ are really trying to delay. At least two of them were written and/or signed by a former head of the DoJ Office of Legal Counsel whose nomination to the First Circuit Court of Appeals is now pending in Congress. And it's crystal clear that he signed memoranda arguing that torture was legal, which bears directly on his fitness to become a federal appellate judge. It takes a lawyer without ethics or morality to argue that torture is legal. It's not, under either U.S. law or the Geneva Conventions governing warfare. Neither  is grabbing people and turning them over to other governments for torture.  Those memoranda will establish that the nominee is a war criminal. We know this because we have already had a preview in the form of a white paper on the topic released by the White House last year that it's known the same nominee had worked on. And the legal arguments in that white paper are preposterous.   The delay attempt is transparently in aid of pushing that nomination through Congress before
Paul Merrell

The Handover - An FP Slideshow | Foreign Policy - 0 views

  • Tuesday marked a milestone for the 12-year-old war in Afghanistan, with NATO forces officially handing over responsibility for the country's security to Afghan government forces. Since 2010, when President Barack Obama accelerated training as part of his rapid surge of forces into the country, the Afghan National Army has grown from around 100,000 members to 195,000. But it still faces a number of challenges, including a desertion rate so high that it needs 50,000 new recruits every year to replace those who leave). In December 2012, a Pentagon report determined that only one of the Afghan military's 23 brigades was able to operate effectively without NATO support. Now, Afghan troops will have to do just that; except in rare cases, they will no longer be able to rely on the support of U.S. warplanes, medical evacuation helicopters, or ground troops.
  • Tuesday marked a milestone for the 12-year-old war in Afghanistan, with NATO forces officially handing over responsibility for the country's security to Afghan government forces. Since 2010, when President Barack Obama accelerated training as part of his rapid surge of forces into the country, the Afghan National Army has grown from around 100,000 members to 195,000. But it still faces a number of challenges, including a desertion rate so high that it needs 50,000 new recruits every year to replace those who leave). In December 2012, a Pentagon report determined that only one of the Afghan military's 23 brigades was able to operate effectively without NATO support. Now, Afghan troops will have to do just that; except in rare cases, they will no longer be able to rely on the support of U.S. warplanes, medical evacuation helicopters, or ground troops. Here's a look back at the long preparation for this week's big handover. An Afghan National Army soldier assigned to the Mobile Strike Force Kandak fires an RPG-7 rocket-propelled grenade launcher during a live-fire exercise supervised by Marines Team on Camp Shorabak, Helmand province, Afghanistan on May 20, 2013.
  •  
    Here in one paragraph are a lot of the reasons two of Obama's claims about U.S. plans in Afghanistan cannot both be true: [i] all U.S. -and NATO combat troops will be withdrawn from Afghanistan by the end of 2014; and [ii] a fairly large contingent of U.S. non-combat troops will remain on U.S. bases in Afghanistan to advise, train, and support the Karzai government's defense forces.  1. The "surge" didn't work even though Obama sent more troops than the military had requested. Even at the peak of U.S. forces in that country, the U.S. military had been beaten back into enclaves by the Taliban. Nonetheless, Obama has  continued to draw down U.S. forces there. NATO allies have been pulling up their tent pegs too. 2. The Afghan government forces are utterly incapable of holding out against the Taliban without strong NATO backing that Obama says is ending. 3. Therefore, a small non-combatant U.S. force left behind after 2014 would be virtually defenseless if left behind. There seems to be no question that U.S. involvement in Afghanistan is winding down steadily. And Obama isn't dumb enough to have a few thousand U.S. troops stay behind to be slaughtered. So his "stay behind" claims are a bluff. The Taliban can read those tea leaves at least as well as I can. This is Vietnam War Redux, also a repeat of the Soviet retreat from Afghanistan. Obama has no credible stick to wield in negotiations with the Taliban. Therefore, the negotiations are either a sham or Obama has to offer the Taliban a carrot of suitable size. The Taliban has no incentive to participate in a sham; they've won their war and the U.S. departure is imminent. Therefore, we need consider what carrot Obama might offer the Taliban. A better royalty agreement on the sidetracked Trans-Afghanistan Pipeline that would supply India with natural gas? .  That doesn't seem enough.  But a consortium of western investors willing to pay royalties t
Paul Merrell

Saudi Prince Threatens 'Military Action Without American Support' Against Iran | MRCTV - 0 views

  • In the first public criticism of the P5+Iran deal by a member of the Saudi Arabian royal family, Prince Bandar bin Sultan told Lebanon’s Daily Star the deal would allow Iran to acquire a nuclear bomb and would “wreak havoc in the region." Covered in The Times of London, the prince also told Daily Star, "Saudi Arabia and the Gulf powers are prepared to take military action without American support after the Iran nuclear deal" Iran and Saudi Arabia are the two leading players in the Sunni/Shia divide and are competing for leadership of the Muslim world. The Sunni Islam Saudi Arabian monarchy fears that the Shia Islam Iranians will employ terrorists in an attempt topple the monarchy and the ruling House of Saud.  Prince Bandar was the Saudi ambassador to Washington for 20 years before returning home to run the country’s intelligence service from 2005-2014. While he is no longer a part of the inner ring of Saudi decision-making, the prince is still a very connected member of the ruling family. The prince would not be conducting interviews without the permission of highest authorities; most likely he was asked to to put himself out there by his uncle King Salman.
  • The Prince also said that regional powers have lost faith in America: “People in my region now are relying on God’s will, and consolidating their local capabilities and analysis with everybody else except our oldest and most powerful ally” The prince was less polite in an op-ed he wrote for the London-based Arabic news Web site Elaph. He compared the Iran nuclear deal made by Obama to the North Korean nuclear deal Bill Clinton made.  Bandar suggested that they were both bad deals but Clinton made a bad deal with the best of intentions thinking it was a good deal. Obama on the other hand knew he was making a lousy deal and made it anyway.  Quoted in a Washington Post article which translated part of the Elaph piece: Bandar says [about the North Korean pact], "it turned out that the strategic foreign policy analysis was wrong and there was a major intelligence failure." He added that if Clinton had known the full picture, "I am absolutely confident he would not have made that decision."
  • The Saudi royal then contrasts this with the present situation with Iran, "where the strategic foreign policy analysis, the national intelligence information, and America’s allies in the region's intelligence all predict not only the same outcome of the North Korean nuclear deal but worse – with the billions of dollars that Iran will have access to." Bandar says Obama is smart enough to understand this but that he is ideologically willing to accept collateral damage because he believes he is right. (..)The Saudi prince says the new Iran deal and other developments in the region have led him to conclude that a phrase first used by Henry Kissinger – “America’s enemies should fear America, but America’s friends should fear America more" – is correct.
Paul Merrell

12 Banks Reveal 'Living Wills' That Hint Toward a Future Bail-in | nsnbc international - 0 views

  • Twelve major banks have made their living wills open to the public in response to US regulators pushing for more “convincing plans” for self-dismantling should their operations fail.
  • The purpose of living wills is a way “to give bankers and regulators a clearer understanding of a bank’s operations and its assets and liabilities [and] map out the steps the banks would take to distribute large losses among stakeholders.” The Federal Reserve Bank (FRB) and the Federal Deposit Insurance Corp (FDIC) are overseeing the bank’s contingency plans, ensuring that no bank is “too big to fail”. This includes financial institutions with more than $50 billion in assets; as well as non-financial firms that are considered systemically important as understood by the US Department of Treasury (USDT) Financial Stability Oversight Council (FSOC). The banks participating in this exercise include:
  • • JPMorgan Chase & Co • Morgan Stanley • Bank of America • Credit Suisse Group AG • Goldman Sachs Group • Wells Fargo & Co • State Street Corp • Bank of New York Mellon Corp • UBS Group AG • Deutsche Bank AG • Barclays Plc Should another financial crisis rear its head again, these revelations provide investors and traders a better sense of the standing of banks.
  • ...4 more annotations...
  • Collectively, the banks divulged that they have “stockpiled long-term debt” within holding companies (or the parent company that owns the bank) to make their portfolios appear to be “less complex”. In other words, banks have placed their derivatives (or stockpiled long-term debt) within the main corporation that owns their subsidiaries. The only problem is that if the parent fails, so do its “children”. The bank’s assets could be placed into receivership with the intention of being split up and auctioned off; however some corporations abuse receivership and bankruptcy to make investors and creditors think they are dead in the water only to pull out at the last minute and enjoy large primary debt write-offs. This is a sort of corporate version of playing possum.
  • This classic con tactic would provide the unique advantage of not having to go to the Senate and demand a taxpayer bailout. The banks could simply file for bankruptcy and exert social pressure via public outcry, protests and demands of the people that Congress consider another bailout. In this scenario, the parent company gets saved and not the subsidiaries. This tactic is a reserve version of what happened after the crash in 2008. Regarding the bank’s contingency plans, JPMorgan’s “hypothetical death”would see the bank downsize by a 3rd and provide a resolve for the bank “without systemic disruption or taxpayer support”. Citigroup has proposed shrinking by selling off $300 billion in corporate assets and “cut US retail banking to about $200 billion”; as well as get rid of broker-dealers.
  • Mark Costigilo, spokesperson for Citigroup, explained that should Citigroup go into bankruptcy, their living will “demonstrates that we can do so without the use of taxpayer funds and without adverse systemic impact.” And Bank of America (BoA) stated that their rise out of bankruptcy would involve the unloading of $1.2 trillion in assets; as well as “shedding most of … non-bank operations”. Last year, the major banks were told to revise previously submitted living wills because their plans did not provide a “credible or clear path through bankruptcy that doesn’t require unrealistic assumptions and direct or indirect public support.” All of this adds up to a bail-in, as predicted by economic analyst Jim Sinclair who said: “Bail-ins are coming to North America without any doubt, and will be remembered as the ‘Great Leveling,’ of the ‘great Flushing’ (of Lehman Brothers). Not only can it happen here, but it will happen here. It stands on legal grounds by legal precedent both in the U.S., Canada and the U.K.”
  • Sinclair pointed out: “Bail-ins do not require a crisis to occur and can surface one bank at a time, spread out over years. The major situation is deposits above insurance levels in banks too big to fail. Those deposits are directly in harm’s way.”
Paul Merrell

The frightening promise of self-tracking pills | The Verge - 0 views

  • Some morning in the future, you take a pill — maybe something for depression or cholesterol. You take it every morning. Buried inside the pill is a sand-sized grain, one millimeter square and a third of a millimeter thick, made from copper, magnesium, and silicon. When the pill reaches your stomach, your stomach acids form a circuit with the copper and magnesium, powering up a microchip. Soon, the entire contraption will dissolve, but in the five minutes before that happens, the chip taps out a steady rhythm of electrical pulses, barely audible over the body's background hum. The signal travels as far as a patch stuck to your skin near the navel, which verifies the signal, then transmits it wirelessly to your smartphone, which passes it along to your doctor. There's now a verifiable record that the pill reached your stomach.
  • This is the vision of Proteus, a new drug-device accepted for review by the Food and Drug Administration last month. The company says it's the first in a new generation of smart drugs, a new source of data for patients and doctors alike. But bioethicists worry that the same data could be used to control patients, infringing on the intensely personal right to refuse medication and giving insurers new power over patients’ lives. As the device moves closer to market, it raises a serious question: Is tracking medicine worth the risk?
  • But not everyone's convinced that the ability to track pills will be good news for patients. The right to refuse treatment is an important, fragile principle in health care. Many are worried that tracking whether a pill is being consumed will be the first step towards punishing patients that don't comply. While doctors can’t force a patient to take a pill, court orders frequently mandate treatments involving specific drug regimens.
  • ...3 more annotations...
  • NYU bioethicist Arthur Caplan says he can imagine a judge using Proteus to enforce medication as part of a sentence: miss a pill, and your parole is revoked. "The temptation in the legal system to say, 'I can monitor you and make sure you're not a threat' is going to be huge," Caplan says. "Maybe that's good, maybe it's bad, but it's a different world than saying I consent to taking these pills." Those court orders are rare at the moment, since there’s no way to ensure a patient is taking medication outside of a controlled treatment facility — but as pill-tracking becomes easier, those measures could become much more common. That's particularly likely given the way Proteus is entering the market. The device's first partnership bundles it with Abilify, a powerful antipsychotic most commonly used to treat mood disorders, schizophrenia, and Tourette's. The most common effects are improved concentration and decreased hallucinations, but it comes with extreme side effects like increased suicide risk and a lower seizure threshold. It's most often prescribed in cases of severe mental illness, often in psychiatric institutions or as part of a court-mandated treatment program — exactly the scenarios bioethicists like Caplan are most worried about.
  • Patient's biggest protection are medical privacy laws like HIPAA, which prevent medical data from being shared with anyone outside the hospital system. That would stop your boss or your parents from using Proteus to make sure you haven't fallen behind on your anti-anxiety medication. But those laws won't keep data out of the hands of healthcare providers, and Caplan is concerned the pill could also be used to enforce compliance. Insurers might offer a discounted rate on tracked pills, then hit patients with a $100 co-pay for every treatment they miss. It's not as oppressive as a court order, but the end result would be similar.
  • Still, those concerns are unlikely to keep Proteus out of the hands of doctors. The upcoming FDA approval will focus largely on safety and efficacy, leaving the larger ethical challenges to be solved after the drug is released to doctors and patients at large. With the technology available, it will be up to the courts to decide when it’s legal and ethical to use it. As far as Proteus is concerned, the power of the technology outweighs the risks. "There are challenges with bringing digital into any sector," a company representative said. "The reason to embrace the challenge in health care is because the need is so great."
  •  
    Let's not forget that because Congress recently decided to revive Patriot Act sect. 215, the FBI is authorized to gather medical records for foreign intelligence and anti-terrorism purposes and according to ex-NSA chief scientist William Binney, the NSA in fact collects medical records and makes them available to law enforcement agencies without a warrant or court order.  http://motherboard.vice.com/read/i-toured-stasi-hq-with-nsa-whistleblowers  One judge has found that statute unconstitutional and may rule in the next few days. A court of appeals has found that the statute did not authorize bulk collection of telephone metadata records. An Oregon federal judge ruled that the DEA cannot obtain prescription records (in part because they are medical records) without an individualized search warrant, specifically ruling against the bulk collection argument. Maybe someday someone in federal government will get a clue that medical records are not one of the "haystacks" the NSA is permitted to create.  Involuntary medical treatment is another giant legal hairball. See https://en.wikipedia.org/wiki/Involuntary_treatment   
Paul Merrell

The Engineered Destruction and Political Fragmentation of Iraq. Towards the Creation of... - 0 views

  • The Capture of Mosul:  US-NATO Covert Support to the Islamic State of Iraq and Syria (ISIS) Something unusual occurred in Mosul which cannot be explained in strictly military terms. On June 10, the insurgent forces of the Islamic State of Iraq and the Levant (ISIS) captured Mosul, Iraq’s second largest city, with a population of close to 1.5 million people.  While these developments were “unexpected” according to the Obama administration, they were known to the Pentagon and US intelligence, which were not only providing weapons, logistics and financial support to the ISIS rebels, they were also coordinating, behind the scenes, the ISIS attack on the city of Mosul. While ISIS is a well equipped and disciplined rebel army when compared to other Al Qaeda affiliated formations, the capture of Mosul, did not hinge upon ISIS’s military capabilities. Quite the opposite: Iraqi forces which outnumbered the rebels by far, equipped with advanced weapons systems could have easily repelled the ISIS rebels. There were 30,000 government forces in Mosul as opposed to 1000 ISIS rebels, according to reports. The Iraqi army chose not to intervene. The media reports explained without evidence that the decision of the Iraqi armed forces not to intervene was spontaneous characterized by mass defections.
  • Iraqi officials told the Guardian that two divisions of Iraqi soldiers – roughly 30,000 men – simply turned and ran in the face of the assault by an insurgent force of just 800 fighters. Isis extremists roamed freely on Wednesday through the streets of Mosul, openly surprised at the ease with which they took Iraq’s second largest city after three days of sporadic fighting. (Guardian, June 12, 2014, emphasis added) The reports point to the fact that Iraqi military commanders were sympathetic with the Sunni led ISIS insurgency: Speaking from the Kurdish city of Erbil, the defectors accused their officers of cowardice and betrayal, saying generals in Mosul “handed over” the city over to Sunni insurgents, with whom they shared sectarian and historical ties. (Daily Telegraph,  13 June 2014) What is important to understand, is that both sides, namely the regular Iraqi forces and the ISIS rebel army are supported by US-NATO. There were US military advisers and special forces including operatives from private military companies on location in Mosul working with Iraq’s regular armed forces. In turn, there are Western special forces or mercenaries within ISIS (acting on contract to the CIA or the Pentagon) who are in liaison with US-NATO (e.g. through satellite phones).
  • Under these circumstances, with US intelligence amply involved, there would have been routine communication, coordination, logistics and exchange of intelligence between a US-NATO military and intelligence command center, US-NATO military advisers forces or private military contractors on the ground assigned to the Iraqi Army and Western special forces attached to the ISIS brigades. These Western special forces operating covertly within the ISIS could have been dispatched by a private security company on contract to US-NATO.
  • ...14 more annotations...
  • In this regard, the capture of Mosul appears to have been a carefully engineered operation, planned well in advance. With the exception of a few skirmishes, no fighting took place. Entire divisions of the Iraqi National Army –trained by the US military with advanced weapons systems at their disposal– could have easily repelled the ISIS rebels. Reports suggest that they were ordered by their commanders not to intervene. According to witnesses, “Not a single shot was fired”. The forces that had been in Mosul have fled — some of which abandoned their uniforms as well as their posts as the ISIS forces swarmed into the city. Fighters with the Islamic State of Iraq and Syria (ISIS), an al-Qaeda offshoot, overran the entire western bank of the city overnight after Iraqi soldiers and police apparently fled their posts, in some instances discarding their uniforms as they sought to escape the advance of the militants. http://hotair.com/archives/2014/06/10/mosul-falls-to-al-qaeda-as-us-trained-security-forces-flee/
  • A contingent of one thousand ISIS rebels take over a city of more than one million? Without prior knowledge that the US controlled Iraqi Army (30,000 strong) would not intervene, the Mosul operation would have fallen flat, the rebels would have been decimated. Who was behind the decision to let the ISIS terrorists take control of Mosul? Had the senior Iraqi commanders been instructed by their Western military advisers to hand over the city to the ISIS terrorists? Were they co-opted?
  • The formation of the caliphate may be the first step towards a broader conflict in the Middle East, bearing in mind that Iran is supportive of the Al Maliki government and the US ploy may indeed be to encourage the intervention of Iran. The proposed redivision of Iraq is broadly modeled on that of the Federation of Yugoslavia which was split up into seven “independent states” (Serbia, Croatia, Bosnia-Herzegovina, Macedonia (FYRM), Slovenia, Montenegro, Kosovo). According to Mahdi Darius Nazemroaya, the re division of Iraq into three separate states is part of a broader process of redrawing the Map of the Middle East.
  • US forces could have intervened. They had been instructed to let it happen. It was part of a carefully planned agenda to facilitate the advance of the ISIS rebel forces and the installation of the ISIS caliphate. The whole operation appears to have been carefully staged.
  • In Mosul, government buildings, police stations, schools, hospitals, etc are formally now under the control of the Islamic State of Iraq and Syria (ISIS). In turn, ISIS has taken control of military hardware including helicopters and tanks which were abandoned by the Iraqi armed forces. What is unfolding is the installation of a US sponsored Islamist ISIS caliphate alongside the rapid demise of the Baghdad government. Meanwhile, the Northern Kurdistan region has de facto declared its independence from Baghdad. Kurdish peshmerga rebel forces (which are supported by Israel) have taken control of the cities of Arbil and Kirkuk. (See map above) Concluding Remarks There were no Al Qaeda rebels in Iraq prior to the 2003 invasion. Moreover, Al Qaeda was non-existent in Syria until the outset of the US-NATO-Israeli supported insurgency in March 2011. The ISIS is not an independent entity. It is a creation of US intelligence. It is a US intelligence asset, an instrument of non-conventional warfare.
  • Was the handing over of Mosul to ISIS part of a US intelligence agenda? Were the Iraqi military commanders manipulated or paid off into allowing the city to fall into the hands of the ISIS rebels without “a single shot being fired”. Shiite General Mehdi Sabih al-Gharawi who was in charge of the Mosul Army divisions “had left the city”. Al Gharawi had worked hand in glove with the US military. He took over the command of Mosul in September 2011, from US Col Scott McKean. Had he been co-opted, instructed by his US counterparts to abandon his command?
  • The ultimate objective of this ongoing US-NATO engineered conflict opposing Maliki government forces to the ISIS insurgency is to destroy and destabilize Iraq as a Nation State. It is part of an intelligence operation, an engineered process of  transforming countries into territories. The break up of Iraq along sectarian lines is a longstanding policy of the US and its allies. The ISIS is a caliphate project of creating a Sunni Islamist state. It is not a project of the Sunni population of Iraq which historically has been committed to a secular system of government. The caliphate project is a US design. The advances of ISIS forces is intended to garnish broad support within the Sunni population directed against the Al Maliki government The division of Iraq along sectarian-ethnic lines has been on the drawing board of the Pentagon for more than 10 years.
  • The above map was prepared by Lieutenant-Colonel Ralph Peters. It was published in the Armed Forces Journal in June 2006, Peters is a retired colonel of the U.S. National War Academy. (Map Copyright Lieutenant-Colonel Ralph Peters 2006). Although the map does not officially reflect Pentagon doctrine, it has been used in a training program at NATO’s Defense College for senior military officers”. (See Plans for Redrawing the Middle East: The Project for a “New Middle East” By Mahdi Darius Nazemroaya, Global Research, November 2006)
  • The Western media in chorus have described the unfolding conflict in Iraq as a “civil war” opposing the Islamic State of Iraq and al-Sham against the Armed forces of the Al-Maliki government. (Also referred to as Islamic State of Iraq and the Levant (ISIL) or Islamic State of Iraq and Syria (ISIS)) The conflict is casually described as “sectarian warfare” between Radical Sunni and Shia without addressing “who is behind the various factions”.  What is at stake is a carefully staged US military-intelligence agenda. Known and documented, Al Qaeda affiliated entities have been used by US-NATO in numerous conflicts as “intelligence assets” since the heyday of the Soviet-Afghan war. In Syria, the Al Nusrah and ISIS rebels are the foot-soldiers of the Western military alliance, which oversees and controls the recruitment and training of paramilitary forces.
  • The Al Qaeda affiliated Islamic State of Iraq (ISI) re-emerged in April 2013 with a different name and acronym, commonly referred to as the Islamic State of Iraq and Syria (ISIS). The formation of a terrorist entity encompassing both Iraq and Syria was part of a US intelligence agenda. It responded to geopolitical objectives. It also coincided with the advances of Syrian government forces against the US sponsored insurgency in Syria and the failures of both the Free Syrian Army (FSA) and its various “opposition” terror brigades. The decision was taken by Washington to channel its support (covertly) in favor of a terrorist entity which operates in both Syria and Iraq and which has logistical bases in both countries. The Islamic State of Iraq and al-Sham’s Sunni caliphate project coincides with a longstanding US agenda to carve up both Iraq and Syria into three separate territories: A Sunni Islamist Caliphate, an Arab Shia Republic, and a Republic of Kurdistan.
  • Whereas the (US proxy) government in Baghdad purchases advanced weapons systems from the US including F16 fighter jets from Lockheed Martin, the Islamic State of Iraq and al-Sham –which is fighting Iraqi government forces– is supported covertly by Western intelligence. The objective is to engineer a civil war in Iraq, in which both sides are controlled indirectly by US-NATO. The scenario is to arm and equip them, on both sides, finance them with advanced weapons systems and then “let them fight”.
  • The Islamic caliphate is supported covertly by the CIA in liaison with Saudi Arabia, Qatar and Turkish intelligence. Israel is also involved in channeling support to both Al Qaeda rebels in Syria (out of the Golan Heights) as well to the Kurdish separatist movement in Syria and Iraq.
  • First published by GR on June 14, 2014.  President Barack Obama has initiated a series of US bombing raids in Iraq allegedly directed towards the rebel army of the Islamic State (IS). The Islamic State terrorists are portrayed as an enemy of America and the Western world. Amply documented, the Islamic State is a creation of Western intelligence, supported by the CIA and Israel’s Mossad and financed by Saudi Arabia and Qatar. We are dealing with a diabolical military agenda whereby the United States is targeting a rebel army which is directly funded by the US and its allies. The incursion into Iraq of the Islamic State rebels in late June was part of a carefully planned intelligence operation. The rebels of the Islamic state, formerly known as the ISIS, were covertly supported by US-NATO-Israel  to wage a terrorist insurgency against the Syrian government of Bashar Al Assad.  The atrocities committed in Iraq are similar to those committed in Syria. The sponsors of IS including Barack Obama have blood on their hands.
  • The killings of innocent civilians by the Islamic state terrorists create a pretext and the justification for US military intervention on humanitarian grounds. Lest we forget, the rebels who committed these atrocities and who are a target of US military action are supported by the United States. The bombing raids ordered by Obama are not intended to eliminate the terrorists. Quite the opposite, the US is targeting the civilian population as well as the Iraqi resistance movement. The endgame is to destabilize Iraq as a nation state and trigger its partition into three separate entities.
  •  
    The destabilization and fragmentation of Israel's neighboring nations has indeed been on the Zionist/Neocon drawing board for a very long time. http://goo.gl/Z1gdoA In the Mideast, it's important to remember that there are no significant Islamist forces that are not under the control of the U.S. or its allies Saudi Arabia and Qatar. The Iraqi Army's withdrawal of the two divisions from the defense of Mosul is indeed curious. In that regard, Col. Peters' map of a future Mideast is almost certainly more than a coincidence. 
Gary Edwards

Is U.S. Now On Slippery Slope To Tyranny? - Thomas Sowell - 0 views

  •  
    This is the article that has set the Web on fire.  Thomas Sowell takes the recent Obama shakedown of BP and cast these unconstitutional actions against the historical background of how tyrants go about the business of crushing constitutional liberty.  The first to go is the "rule of Law", as the crisis of the moment is used as an excuse to suspend the rule of Law for the good of the people. excerpt: "In our times, American democracy is being dismantled, piece by piece, before our very eyes by the current administration in Washington, and few people seem to be concerned about it. The president's poll numbers are going down because increasing numbers of people disagree with particular policies of his, but the damage being done to the fundamental structure of this nation goes far beyond particular counterproductive policies. Just where in the Constitution of the United States does it say that a president has the authority to extract vast sums of money from a private enterprise and distribute it as he sees fit to whomever he deems worthy of compensation? Nowhere. But our government is supposed to be "a government of laws and not of men." If our laws and our institutions determine that BP ought to pay $20 billion - or $50 billion or $100 billion - then so be it. But the Constitution says that private property is not to be confiscated by the government without "due process of law." With vastly expanded powers of government available at the discretion of politicians and bureaucrats, private individuals and organizations can be forced into accepting the imposition of powers that were never granted to the government by the Constitution. If you believe that the end justifies the means, then you don't believe in constitutional government. And, without constitutional government, freedom cannot endure. There will always be a "crisis" - which, as the president's chief of staff has said, cannot be allowed to "go to waste" as an opportunity to expand the government's p
Gary Edwards

The Obama Depression: Holman Jenkins Says Barack Obama's Ideas on the Environment, Soci... - 0 views

  •  
    "Mr. Obama came to office without a conspicuous vision other than "bipartisanship" and a belief in the beneficent influence on America and the world of seeing a black man exercising the powers of the presidency. He wields his party's shibboleths like one who sees them mainly as levers for delivering the goods. His ideas about the exercise of politics, in fact, may be accurately reflected in the recent stimulus bill -- in office you supply the wish lists of those who put you there.

    His will be a fascinating presidency to watch, not least because of his inexperience, his intellectual agility, and the crisis in which he finds himself. But his presidency will get really interesting in a year or two, or six months -- whenever he finally realizes that everything he thought he wanted to do is irrelevant. He'll then have to adapt an agenda for the world as it is, in which many childish things no longer have a place.

    And, by the way, he kids himself if he believes he will be allowed, like FDR, to preside over a depression without being politically blamed for it. The public is different now -- the world is different -- and he will own the "Obama depression" sooner than he thinks.
Gary Edwards

American Thinker: The Re-Establishment of America - 0 views

  •  
    Nails it.  This is exactly what is happening in my neighborhood.  And i'm at the epicenter of Silicon Valley;  about as liberal, far-left, marxist-statist-socialist as it gets.  Yet here we are.  As Lady Thatcher famously once said, " 'The trouble with socialism is that eventually you run out of other people's money".  "Eventually" has arrived.   excerpt:  America is on the verge of something unprecedented in history: the peaceful, constitutional replacement of our country's entire political establishment. This is what lies behind the decisions of so many elected officials, at every level, to step aside rather than fight for reelection. And it explains how the Tea Party movement can exert so much political leverage without nominating its own candidates or even without formally choosing its own leaders. Most of the time, we Americans don't pay much attention to politics. We focus all of our energy on our jobs, our families, and our faith. We work hard, play by the rules, and wish only to be left alone. We love our country, consider ourselves blessed to be living here, and ask little from the men and women we elect except to keep from screwing things up. But in just the last decade, Americans were shocked by two catastrophes we hadn't imagined our political establishment would allow to happen. The first was 9-11, when nineteen terrorists successfully attacked our homeland, and by doing so revealed that for years, al-Qaeda and its allies had been waging holy war against us. The second was the 2008 financial crash, which revealed that our economy is a house of cards built on a pile of debt so high we cannot possibly repay it.
Gary Edwards

Dan Ferris - What could really happen if Congress doesn't raise the debt ceiling - 0 views

  • interest payments on Treasury securities total about $29 billion for the month of August,
  • U.S. brings in about $173 billion a month.
  • If 44% of the federal government employees were out of work as of August 2, it would amount to roughly 880,000 new productive workers
  • ...3 more annotations...
  • $470 billion of debt the government has to roll over in the month of August
  • 2 million federal employees
  • We could be in for a rocky ride, but it's hard for me to understand how 44% less government would be anything but an economic miracle.
  •  
    Without a debt ceiling increase by August 2, the government will wake up August 3 unable to pay approximately 44% of its bills for August. The overwhelming majority of those bills are simply disbursements of funds for government programs, without which this would be a richer, freer country. Interest on the national debt due in August is not a big item. in the weeks and months that follow August 2, something unexpected would happen... something nobody in government wants you to know. You'd find out how much you don't need the government. ......
Gary Edwards

Federal gestapo illegally raid Gibson Guitar factories, arbitrarily confiscate millions... - 0 views

  • For the second time in two years, armed federal agents have illegally raided the manufacturing facilities of Gibson Guitars Corp., this time confiscating more than a million dollars worth of imported wood and ebony -- and they did so without proper notice or warning, without any valid reason, and without lawful charges of any kind.
  • Gibson, one of the world's premier guitar manufacturers, and a company that has continually tried to honestly and readily abide by domestic and international laws concerning its material sourcing while continuing to provide quality products to its customers, has for some reason landed in the cross fire of the federal gestapo
  • Though Gibson has not violated any laws, and has gone above and beyond mandated requirements for sourcing sustainable wood and other materials for its instruments, the heavy hand of a bloated and out-of-control government has decided to unlawfully target the company for extinction.According to a recent press statement made by Henry Juszkiewicz, Gibson's Chairman and CEO, armed marshals stormed the company's Nashville, Tenn., and Memphis, Tenn., manufacturing facilities on August 24, and proceeded to evacuate the buildings, shut down production, order all employees to go home, and steal more than a million dollars worth of rosewood and ebony that had been legally imported from India
  • ...6 more annotations...
  • US officials have actually refused to tell Gibson what it allegedly did wrong, and why the raid was conducted. The company was never notified of any potential violations prior to the raid, and no official charges were ever filed. By all appearances, the government simply decided one day to unlawfully storm the company's manufacturing units with loaded weapons, and is now attempting to destroy one of the last honest American manufacturers in existence
  • The fact that the US federal government is refusing to disclose why it raided Gibson, as well as its added failure to press any proper legal charges against the company, suggests that there is truly no legitimate reason at all. Every guitar manufacturer imports rosewood and ebony from India and various other countries -- and many do not even have the same high quality standards as Gibson -- and yet, for whatever reason, Gibson has become the government's chosen target, despite the fact that it has broken no laws and has never been convicted of any crimes.
  • In today's America, in other words, government officials do not even need a legitimate reason to target a company, seize its goods, and shut it down. In total desecration of the rule of law, the federal government simply targets whomever it wants to these days, without reason or cause, and sends in its taxpayer-funded minions to perform the execution
  • If you own a guitar, you too could be targeted by the Feds based on corrupted Lacey Law
  • those who own Gibson guitars, and potentially even guitars of other brands, may want to prepare themselves for potential targeting by the federal government as well. The vague wording of the US Department of Agriculture's (USDA) Lacey Act of 2008, which is the law that was somehow used to warrant the Gibson raids, places all guitar owners and resellers in the cross fire of potential federal scrutiny."According to [The Lacey Act], if you bought a guitar from us and you resell it, you are criminally liable," stated Juszkiewicz.
  • So there you have it. The US has literally devolved into an unbridled police state where the federal government freely raids companies, arrests innocent individuals, and performs other acts of domestic terrorism for absolutely no reason at all. The enemies of freedom that now run our government presume guilt rather than innocence, and they deny the constitutional protocols of due process that they are tasked with upholding in the process.
  •  
    (NaturalNews) Due process under the law and assumed innocence before being proven guilty are two concepts that are apparently no longer applicable in the United States of America, at least as far as the federal government is concerned. Learn more: http://www.naturalnews.com/033454_Gibson_Guitar_armed_raid.html#ixzz1Wd8Nf600
Paul Merrell

Fellow soldiers call Bowe Bergdahl a deserter, not a hero - CNN.com - 0 views

  • The sense of pride expressed by officials of the Obama administration at the release of Army Sgt. Bowe Bergdahl is not shared by many of those who served with him: veterans and soldiers who call him a deserter whose "selfish act" ended up costing the lives of better men.
  •  
    I've been disgusted with American mainstream media and our political class for a very long time. Every now and then I get super-disgusted.  I'll begin with the Obama Administration. They tried to make political hay with something that should not have been made public other than notifying the released American prisoners' parents before the prisoner had been debriefed. Moreover, while I have no problems with swapping Taliban prisoners to get the American prisoner back even if it meant not giving Congress the full 30-day notice required by statute, the Administration certainly could have done a better job of it, notifying key committee members earlier that the deal might be pulled off. Waiting until the Taliban prisoners were up to the steps of the airplane bound for the exchange was not the way this should have happened. Next up, we have the members of Congress who have done their level best to turn the situation into a partisan issue. Obama may have deserved criticism given that he tried to make political hay with the release. But prisoner swaps during wartime have been a feature of most U.S. wars. It is an ancient custom of war and procedures for doing so are even enshrined in the Geneva Conventions governing warfare. So far, I have not heard any war veteran member of Congress scream about releasing terrorists. During my 2+ years in a Viet Nam combat role, the thought of being captured was horrifying. Pilots shot down over North Viet Nam were the lucky ones. No American soldier captured in South Viet Nam was ever released. The enemy was fighting a guerrilla war in the South. They had no means to confine and care for prisoners. So captured American troops were questioned for intelligence and then killed.  Truth be told, American combat troops were prone to killing enemy who surrendered. War is a very ugly situation and feelings run high. It is perhaps a testament to the Taliban that they kept Sgt. Berdahl alive. Certainly that fact clashes irreconcilably with
« First ‹ Previous 61 - 80 of 1158 Next › Last »
Showing 20 items per page